tm logo
WITH
Live/Pending
REPORT COMPLETED SUSPENSION CHECK - CASE STILL SUSPENDED

case still suspended

on 29 Mar 2024

Last Applicant/ Owned by

PL 24, TAMMASAARENKATU 7

HELSINKI

FI

00181

Serial Number

97145136 filed on 28th Nov 2021

Registration Number

N/A

Correspondent Address

Kathryn Starshak

K&L GATES LLP

P.O. BOX 1135

CHICAGO, IL 60690-1135

Filing Basis

No Filing Basis

Disclaimer

NO DATA

WITH

Scientific and technological services, namely, research and design in the field of cyber security; design and development of computer hardware and software; development of new technology for others in the field of cyber security; development of technologies for the protection of electronic networks for others in the field of cyber security; development of new technology for others in the field of Read More

Classification Information


Class [045]
Personal & Legal & Social Services


Licensing of technology, namely, licensing of intellectual property in the field of patents and copyrights; Licensing services, namely, licensing of software; information, advisory and consultation services in the field of data theft and identity theft, namely, cyber security consultation; providing information and consultation relating to cyber security

Class [042]
Computer & Software Services & Scientific Services


Scientific and technological services, namely, research and design in the field of cyber security; design and development of computer hardware and software; development of new technology for others in the field of cyber security; development of technologies for the protection of electronic networks for others in the field of cyber security; development of new technology for others in the field of cyber security and engineering services in the field of information technology and information technology security; engineering services in the field of data processing technology; technology consultancy in the field of cyber security, Internet security, computer security, computer network security and data security; researching, designing, developing, provisioning, providing, implementing, maintaining and updating software solutions and IT services in the nature of information technology in the field of cyber security and information security, including scanning, monitoring, analyzing and managing software applications, computer systems and Internet and information networks and their vulnerabilities as well as detecting and responding to cyber threats and attacks; researching, designing, provisioning, providing, implementing, maintaining and updating software solutions and IT services in the nature of information technology in the field of cyber security, including desktop, laptop, mobile device, server, cloud, network and Internet use security and protection; researching, designing, provisioning, providing, implementing, maintaining and updating software solutions and IT services in the nature of information technology in the field of cyber security, including data security and protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates and remote device management; providing online, non-downloadable software for anonymous browsing, anti-tracking protection, location management and privacy protection; data encryption services; network protection services in the nature of information technology; data compression of computer data; data leakage prevention services in the nature of information technology; IT services in the field of cyber security; IT consultancy, advisory and information services; IT security, protection and restoration services in the nature of information technology; Information technology support services in the nature of information technology security; technical support services relating to computer software and software applications, namely, troubleshooting of security software problems; monitoring of network and computer systems for security software problems; Onsite and remote monitoring of computer systems, computer networks and IT infrastructure for cyber security purposes for security software problems; Providing online, non-downloadable software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Providing temporary use of non-downloadable software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Software as a Service (SaaS) services featuring software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Platform as a Service (PaaS) featuring computer software platforms for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Infrastructure as a Service (IaaS)featuring computer software platforms for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Application service provider (ASP) featuring software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; cloud-based cyber security services, namely, cybersecurity services in the nature of restricting unauthorized access to computer systems; cloud services, namely, cloud computing featuring software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; quality control for others and authentication services in the field of cyber security; electronic monitoring of personally identifying information to detect online frauds and identity thefts; providing online, non-downloadable software for protection against fraud and identity thefts; information, advisory and consultancy services relating to all the aforementioned services, namely, information technology in the field of cyber security

Class [041]
Education and Entertainment Services


Educational services, namely, conducting seminars, conferences and workshops in the field of cyber security; providing of training in the field of cyber security; Arranging and conducting seminars, conferences and workshops in the field of cyber security; providing on-line electronic publications, not downloadable, in the nature of information technology in the field of cyber security

Class [038]
Communications Services


Telecommunication services in the areas of delivery of messages by electronic transmission and in the field of private and secure Internet browsing; providing virtual private networks (VPN) services; private electronic messaging services; providing virtual private network (VPN) services for user virtual location management; electronic transmission, retrieval and streaming of files and data including images, audio, video, documents, text, electronic messages, and electronic mail over local or global communications networks, including the Internet, intranets, extranets, television, mobile networks, cellular and satellite networks; secured data, sound and image transmission services; providing access to databases; providing user access to a global computer information network on the Internet; data transfer rerouting services, namely, telecommunications; secure data transfer via computer networks by telecommunications; information, advisory and consultancy services relating to all the aforementioned services, namely, telecommunications; none of the foregoing in relation to team, employee interaction, or collaboration for business purposes

Class [035]
Advertising, Business & Retail Services


Business management consulting services in the field of information technology; Data processing, systematisation into computer databases and database management; Collection of data, namely, electronic data collection for business purposes in the field of information technology; Computerised data processing; Management of computer databases and compilation of information into computerised databases; Information, advisory and consultancy services relating to all the aforesaid services, namely, business management consulting and business advisory

Class [009]
Computer & Software Products & Electrical & Scientific Products


Downloadable software and software applications for cyber security purposes; Downloadable software platforms for cyber security purposes; Downloadable software and software platforms for detecting and responding to cyber threats and attacks; Downloadable software and software platforms for scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities; Downloadable software and software platforms for desktop, laptop, mobile device, server, cloud, network and Internet use security and protection; Downloadable software and software platforms for data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates and remote device management; Downloadable software and software platforms for anonymous browsing, encryption, anti-tracking protection, location management, network protection, privacy protection, data compression, data leakage prevention, storing secure notes and data, private messaging and location sharing; Downloadable software for use of virtual private networks (VPN) for use in for data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; Downloadable software and software applications for wireless devices for use in data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; Downloadable computer application software for mobile phones for use in data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; Cloud servers; Downloadable cloud computing software for use in data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; Wireless routers; Computer network routers; Computer hardware; Computer peripherals; USB hardware and USB sticks in the nature of pre-recorded USB flash drives featuring a platform for cyber security purposes; Downloadable USB operating software; Downloadable software and software device drivers for use in data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, and for detecting and responding to cyber threats and attacks, for scanning and managing vulnerabilities; downloadable electronic publications in the nature of information technology in the field of cyber security

Mark Details


Serial Number

No 97145136

Mark Type

No Service Mark

Attorney Docket Number

No 3724249-

44D Filed

Yes

44D Current

No

44E filed

No

44E Current

Yes

66A Filed

No

66A Current

No

Current Basis

No

No Basis

No

Legal History


Show more

Status DateAction Taken
29th Mar 2024REPORT COMPLETED SUSPENSION CHECK CASE STILL SUSPENDED
28th Sep 2023REPORT COMPLETED SUSPENSION CHECK CASE STILL SUSPENDED
31st Mar 2023SUSPENSION LETTER WRITTEN
31st Mar 2023LETTER OF SUSPENSION E-MAILED
31st Mar 2023NOTIFICATION OF LETTER OF SUSPENSION E-MAILED
01st Mar 2023CORRESPONDENCE RECEIVED IN LAW OFFICE
01st Mar 2023TEAS/EMAIL CORRESPONDENCE ENTERED
28th Feb 2023ASSIGNED TO LIE
25th Jan 2023AUTOMATIC UPDATE OF ASSIGNMENT OF OWNERSHIP
17th Dec 2022TEAS RESPONSE TO OFFICE ACTION RECEIVED