Trademark: 1414862
Word
Device Descrption:
SYMBOL,CORRECT,SEGMENTED-END CUTS CIRCLE
ID
1414862
Trademark Type
Figurative
Status
Registered: Registered/protected
Application Date
17 March 2011
Registration Date
17 March 2011
Renewal Date
17 March 2031

Service
ALLENS PATENT & TRADE MARK ATTORNEYS

Goods and Services:
Class 9:
Computer antivirus software; computer software for providing network, internet, and computer security; computer software for providing online identity protection and parental control; computer software for providing intrusion detection and prevention; computer software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spyware, and other malware; internet security software, including computer software for use in the monitoring and control of computer and online activity; computer software for providing online transaction security; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer maintenance software; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; cloning software, including, software for cloning computer hard drives, software for cloning computer operating systems, software for cloning data files, software reconfiguring personal computers; computer software for the creation of virtual private network; computer utility software; computer utility software for removal of computer applications and software; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software, including, middleware for interfacing client applications and networked or host based databases; computer software for use in updating other computer software; computer software for use in networking applications; computer software for sending and receiving facsimile transmissions from computers; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software for telecommuting, including, for connecting to and use of a remote computer network, a remote computer and mobile devices; computer software for facsimile transmission; computer software for use with a home or remote office for connecting computer network users to global networks; computer software and databases for use in diagnosis, repair and configuration of computers, computer software and computer peripherals; computer software, hardware, firmware and peripherals for network and internet security data and system protection, and storage, server, client, and application performance management; downloadable software; computer hardware; computer hardware appliances that provide firewall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and storage area networks; computer software for backing up and restoring computer data; computer software for use in disaster recovery; computer software for use in removable storage media management; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for use in the field of enterprise information management; computer software for use in the field of online analytical processing (OLAP); computer software for generating reports from databases; computer software for scheduling automated processes; computer software for use in the central management of computer attached to a computer network; computer software for replicating and archiving files from one data store to another; computer software for metering the use of the other computer software; computer software for use in developing data analysis applications and other computer software; computer programs for data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, including, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; computer programs for use in teaching and training users in the use of computer software and/or computer hardware; computer programs for remotely monitoring, evaluating, demonstrating and controlling other computer programs or computer processes; computer programs for locking-down one or more computers on a computer network; computer hardware and software for authenticating users and maintaining and managing access to computer data, computer content, electronic communications, and computer networks; embedded software for network monitoring and security; embedded software for authenticating users and maintaining and managing access to computer data, computer content, electronic communications, and computer networks; computer software, including, content management software which filters, monitors, reports on and controls use of and access to locations on computer systems and networks and on global communication networks; electronic mail and news group filtering software which prevents or shunts delivery of defined categories or origins of electronic mail messages and news postings; protection software which detects electronic inquiries for information from computer systems or of users of computer systems and organizes, monitors, controls and prevents provision of such information; privacy management software which prevents, monitors, certifies, aggregates and reports on the distribution and use of personal identification information on computer systems and networks and on global communications networks; file transfer filtering software which prevents, monitors, reports on or shunts delivery of defined categories, origins, volumes, or timeframes of electronic files; and chat filtering software which prevents, monitors, reports on, analyzes, or shunts delivery of defined categories, senders, recipients, origins, volumes or timeframes of conversations transmitted or stored electronically; downloadable electronic publications in the nature of reference, user, technical and instructional manuals and data sheets for use with computer software, hardware, peripherals and firmware and downloadable electronic publications in the nature of manuals, blogs, instructional materials, teaching materials, newsletters, magazines, newspapers, books and pamphlets in the fields of computer software and computer and on-line security
Class 42:
Computer services; network and internet security services; computer consultation; computer consultation in the field of computer security; computer diagnostic services; computer services, including, data recovery services; technical support services, including, troubleshooting of computer software problems; technical support services, including, providing back-up computer programs and facilities; computer virus protection services; computer software installation services; computer programming; computer software design for others; technical consultation in the field of computer software installation and maintenance; consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; development, updating, publishing and maintenance of software for networks and standalone computers in the fields of security, database management, and anti-virus protection and monitoring security systems; providing information in the field of network and internet security; providing technical information in the field of computer software applications; application service provider services; notification and delivery of software updates; providing information regarding computers, computer hardware, computer software, computer networks, computer-related services, data storage management, enterprise information management, and online analytical processing (OLAP), including via online databases; remote or on-site monitoring of computer systems; monitoring the computer systems of others and providing back-up computer programs and facilities; integration of computer systems and networks; computer services, including providing information concerning the encryption and authentication of electronic data; consultancy services in the fields of digital media, data encryption, computer security, communication security and computer software; encryption and decryption of data and communications; web content categorization and filtering services; monitoring of computer systems for security purposes; providing security threat management systems, including, monitoring and tracking of security vulnerabilities and problems in computer software products, the internet, and computer networks; providing information in the fields of computer and internet security, preventing computer threats, computer hardware and software applications in security; electronic storage of data for clients to store and retrieve data via a global computer network; electronic document and email archiving services