CB

CB Canadian Trademark Information

Computer security services, namely, restricting and controlling access privileges of users of computer systems, servers, computer networks, endpoints, and portable electronic devices, and of computing resources for cloud, mobile or network resources based on assigned credentials; computer security consultancy; cloud computing featuring software for use in providing security for computer systems, servers, computer networks, endpoints, and portable electronic devices; maintenance of computer software relating to computer security and prevention of computer risks; software as a service (SAAS) featuring software for use in providing threat prevention, analysis, detection, and response, including on a real-time basis, for computer systems, servers, computer networks, endpoints, and portable electronic devices; software as a service (SAAS) featuring software for use in providing visibility, management, and monitoring, including on a real-time basis, of computer systems, servers, computer networks, endpoints, and portable electronic devices; platform as a service (PAAS) featuring computer software platforms for creating, managing, and deploying cloud computing infrastructure services;...
Classification Information
Class Code: 042 - Computer & Software Services & Scientific Services
Description: Computer and scientific
Class Code: 009 - Computer & Software Products & Electrical & Scientific Products
Description: Electrical, scientific and teaching apparatus and software
Matter History Events
Status Date Record Status Description
2023-05-04 National prosecution history entry - Agent Changed
2022-07-15 Registration published - Registered
2022-07-13 National prosecution history entry - Registration Fee Notice Sent
2022-07-13 Application published - Registration Pending
2022-03-30 Application published - Advertised
2022-01-25 National prosecution history entry - Approval Notice Sent
2022-01-25 Application accepted - Approved
2021-09-07 National prosecution history entry - Search Recorded
2021-09-07 National prosecution history entry - Examiner's First Report
2018-12-17 Filing date accorded - Formalized
2018-12-10 National prosecution history entry - Created
2018-12-07 Application filed - Filed
Word Mark: CB
Current Status:
Registration published
LIVE Mark!
7/15/2022
Application Number: 1934760
Filing Date: Friday, December 7, 2018
Filing Place: Canada
Registration Date: Friday, July 15, 2022
Registration Number: TMA1134425
Register Type: Primary
Type Of Mark: Trademark
Mark Feature: Figurative
Use In Commerce: No
Publication Registration: Wednesday, March 30, 2022
Opposition: 3/30/2022 - 3/30/2022
Last Applicant/Owner: *********
**********
***** ****
Correspondent: Not provided
Logo Design Information
Design Feature:
(1) Surfaces or backgrounds covered with repeated geometrical figures or designs
(2) Surfaces or backgrounds covered with polygons
(3) Surfaces or backgrounds covered with other repeated geometrical figures or designs
(4) Triangles with dark surfaces or parts of surfaces
(5) Several triangles, juxtaposed, joined or intersecting
(6) One polygon
(7) Polygons containing one or more triangles or lines forming an angle
(8) Polygons containing one or more letters
(9) Polygons with dark surfaces or parts of surfaces
(10) Letters or numerals forming geometrical figures, written or typographical matter in perspective
(11) Letters or numerals forming any other polygon (surface or periphery)
(12) Letters presenting a special form of writing
(13) Letters embellished or decorated with a drawing or composed of a collection of drawings
Goods and Services Information
Description:
(1) - Computer security services, namely, restricting and controlling access privileges of users of computer systems, servers, computer networks, endpoints, and portable electronic devices, and of computing resources for cloud, mobile or network resources based on assigned credentials; computer security consultancy; cloud computing featuring software for use in providing security for computer systems, servers, computer networks, endpoints, and portable electronic devices; maintenance of computer software relating to computer security and prevention of computer risks; software as a service (SAAS) featuring software for use in providing threat prevention, analysis, detection, and response, including on a real-time basis, for computer systems, servers, computer networks, endpoints, and portable electronic devices; software as a service (SAAS) featuring software for use in providing visibility, management, and monitoring, including on a real-time basis, of computer systems, servers, computer networks, endpoints, and portable electronic devices; platform as a service (PAAS) featuring computer software platforms for creating, managing, and deploying cloud computing infrastructure services; platform as a service (PAAS) featuring computer software platforms for use in providing security for computer systems, servers, computer networks, endpoints, and portable electronic devices; providing online non-downloadable software for use, including on a real-time basis, in operational and security monitoring and alerting, cyber defense and cyber-security of computer systems, internet, networks, applications, and electronic data and communications, endpoints, and portable electronic devices; providing online non-downloadable intrusion detection software; computer security services, namely, tracking software, data files, and executable files in computer networks, endpoints, and portable electronic devices, including on a real-time basis, identifying unauthorized, new or unknown software, data files, and executable files, including on a real-time basis, and blocking unauthorized software executions and data access, including on a real-time basis.
(2) - Computer programs and software for use in providing threat prevention, analysis, detection, and response, including on a real-time basis, for computer systems, servers, computer networks, endpoints, and portable electronic devices; computer programs and software for use in providing visibility, management, and monitoring, including on a real-time basis, of computer systems, servers, computer networks, endpoints, and portable electronic devices; computer programs for use, including on a real-time basis, in tracking software, data files, and executable files in computer networks, endpoints, and portable electronic devices for use in identifying unauthorized, new or unknown software, data files, and executable files, and for blocking unauthorized software executions and data access; computer programs for use as an online search engine and as a downloadable utility program; computer programs for preventing viruses and unauthorized access to computer systems, computer networks, endpoints, and portable electronic devices; software for use, including on a real-time basis, in operational and security monitoring and alerting, cyber defense and cyber-security of computer systems, internet, networks, applications, electronic data and communications, endpoints, and portable electronic devices; intrusion detection software.
(3) - Computer programs and software for use in providing threat prevention, analysis, detection, and response on a real-time basis, for computer systems, servers, computer networks, endpoints, and portable electronic devices; computer programs and software for computer security threat prevention for use in providing visibility, management, and monitoring on a real-time basis, of a third-party user's computer systems, servers, computer networks, endpoints, and portable electronic devices; computer programs for use on a real-time basis, in tracking software, data files, and executable files in computer networks, endpoints, and portable electronic devices for use in identifying unauthorized, new or unknown software, data files, and executable files, and for blocking unauthorized software executions and data access; computer programs for use as an online search engine and as a downloadable utility program for data compression and digital file management; computer programs for preventing viruses and unauthorized access to computer systems, computer networks, endpoints, and portable electronic devices; software for use on a real-time basis, in operational and security monitoring and alerting, cyber defense and cyber-security of computer systems, internet, networks, applications, electronic data and communications, endpoints, and portable electronic devices; intrusion detection software.
(4) - Computer programs and software for use in providing threat prevention, analysis, detection, and response, including on a real-time basis, for computer systems, servers, computer networks, endpoints, and portable electronic devices; computer programs and software for use in providing visibility, management, and monitoring, including on a real-time basis, of computer systems, servers, computer networks, endpoints, and portable electronic devices; computer programs for use, including on a real-time basis, in tracking software, data files, and executable files in computer networks, endpoints, and portable electronic devices for use in identifying unauthorized, new or unknown software, data files, and executable files, and for blocking unauthorized software executions and data access; computer programs for use as an online search engine and as a downloadable utility program; computer programs for preventing viruses and unauthorized access to computer systems, computer networks, endpoints, and portable electronic devices; software for use, including on a real-time basis, in operational and security monitoring and alerting, cyber defense and cyber-security of computer systems, internet, networks, applications, electronic data and communications, endpoints, and portable electronic devices; intrusion detection software.
(5) - Computer security services, namely, restricting and controlling access privileges of users of computer systems, servers, computer networks, endpoints, and portable electronic devices, and of computing resources for cloud, mobile or network resources based on assigned credentials; computer security consultancy; cloud computing featuring software for use in providing security for computer systems, servers, computer networks, endpoints, and portable electronic devices; maintenance of computer software relating to computer security and prevention of computer risks; software as a service (SAAS) featuring software for use in providing threat prevention, analysis, detection, and response on a real-time basis, for computer systems, servers, computer networks, endpoints, and portable electronic devices; software as a service (SAAS) featuring software for use in providing computer security threat prevention for use in providing visibility, management, and monitoring on a real-time basis, of a third-party user's computer systems, servers, computer networks, endpoints, and portable electronic devices; platform as a service (PAAS) featuring computer software platforms for creating, managing, and deploying cloud computing infrastructure services; platform as a service (PAAS) featuring computer software platforms for use in providing security for computer systems, servers, computer networks, endpoints, and portable electronic devices; providing online non-downloadable software for use on a real-time basis, in operational and security monitoring and alerting, cyber defense and cyber-security of computer systems, internet, networks, applications, and electronic data and communications, endpoints, and portable electronic devices; providing online non-downloadable intrusion detection software; computer security services, namely, tracking software, data files, and executable files in computer networks, endpoints, and portable electronic devices on a real-time basis, identifying unauthorized, new or unknown software, data files, and executable files on a real-time basis, and blocking unauthorized software executions and data access on a real-time basis.
(6) - Computer security services, namely, restricting and controlling access privileges of users of computer systems, servers, computer networks, endpoints, and portable electronic devices, and of computing resources for cloud, mobile or network resources based on assigned credentials; computer security consultancy; cloud computing featuring software for use in providing security for computer systems, servers, computer networks, endpoints, and portable electronic devices; maintenance of computer software relating to computer security and prevention of computer risks; software as a service (SAAS) featuring software for use in providing threat prevention, analysis, detection, and response, including on a real-time basis, for computer systems, servers, computer networks, endpoints, and portable electronic devices; software as a service (SAAS) featuring software for use in providing visibility, management, and monitoring, including on a real-time basis, of computer systems, servers, computer networks, endpoints, and portable electronic devices; platform as a service (PAAS) featuring computer software platforms for creating, managing, and deploying cloud computing infrastructure services; platform as a service (PAAS) featuring computer software platforms for use in providing security for computer systems, servers, computer networks, endpoints, and portable electronic devices; providing online non-downloadable software for use, including on a real-time basis, in operational and security monitoring and alerting, cyber defense and cyber-security of computer systems, internet, networks, applications, and electronic data and communications, endpoints, and portable electronic devices; providing online non-downloadable intrusion detection software; computer security services, namely, tracking software, data files, and executable files in computer networks, endpoints, and portable electronic devices, including on a real-time basis, identifying unauthorized, new or unknown software, data files, and executable files, including on a real-time basis, and blocking unauthorized software executions and data access, including on a real-time basis.
Trademarkia is the largest search engine for U.S., China, European Union, Canada, and Australia Trademarks. Each month hundreds of trademarks around the world are filed by licensed attorneys in the Trademarkia network law firms! You can register your trademark in 180+ countries in the world through Trademarkia Network. Trademarkia.com is a free search engine of publicly available government records. Trademarkia.com is not a law firm and does not represent owners & correspondents listed on this page.
What You Can Do:
Trademarkia lets you see how your personal name, product name, trademark name or username is being used on any of 530+ new and popular social networks. Be the first to reserve your name and get help stopping others from using it - all in one place!
As seen on