Trademark Alertz ®
Search
Trademark
Owner
Trademark: LOOP SECURE 1969008
Word
LOOP SECURE
Device Descrption:
INFINITY SYMBOL IS LTRS OO
ID
1969008
Trademark Type
Figurative
Status
Registered: Registered/protected
Application Date
15 November 2018
Registration Date
15 November 2018
Renewal Date
15 November 2028
Owner(s)
Loop Secure Pty Ltd
Service
Anisimoff Legal
Goods and Services:
Class 9
:
Computer software
;
computer hardware
;
computer software for digital information and data access
;
computer software in the field of security
;
computer software for use in monitoring computers for security purposes
;
computer hardware for cybersecurity and data analytics
;
computer network security, system security, file security, and data security software
;
computer software for data protection and data security
;
computer software for management and monitoring of computer networks, systems, files, and data
;
computer software for use in accessing databases
;
computer software for providing security for computers, networks and electronic communications
;
application and network security software
;
computer software for authentication and identity management information security
;
computer software for identity security
;
computer software for detecting identity fraud
;
computer software for authentication and identity management information security
;
computer software for providing online identity protection, privacy control, and parental control
;
fraud protection software
;
computer software for managing hardware and software in an information technology environment
;
computer software for use with computer servers for controlling and managing server applications
;
computer software for providing network, Internet, and computer security
;
computer software for use in networking computers
;
computer software for the management, transmission, and storage of data and information
;
computer software for providing compliance monitoring and configuration control of hardware and software
;
computer software for monitoring, gathering, analyzing and presenting information from computer network and security devices
;
computer software for detection, analysis, reporting, and restoration of changes to computer networks, systems, applications, files, and data
;
computer software for providing software updates
;
computer software for synchronizing data, email, documents, images, audio, video multimedia content, electronic publications and computer files
;
database synchronization software
;
computer software for scanning, detecting, and removing viruses
;
computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software
;
computer software for encrypting and authenticating data
;
computer software for encryption
;
computer software for connecting to computer systems, servers and storage devices
;
computer software that provides web-based access to applications and services through a web operating system or portal interface
;
computer software programs, products and applications (downloadable)
Class 38
:
Telecommunications
;
consulting in the field of communications and telecommunications
;
telecommunications security (providing secure connections and access including to computers and a global computer network)
;
telecommunications services, namely, transmission of voice, data, graphics, images, audio and video by means of telecommunications networks, wireless communication networks, and the Internet
;
providing secure real time electronic communication over a computer network
;
providing virtual private network services, namely, private and secure electronic communications over a private or public computer network
;
file sharing services, namely, electronic transmission of data via global computer networks
;
information transmission via electronic communications networks
;
providing online forums for transmission of messages among users in the fields of computers, software, information technology and general interest
;
streaming of audio and video material on the Internet
Class 45
:
Security services
;
security consultancy
;
Identification verification services, namely, providing authentication of personal identification information
;
providing authentication of personal identification information namely, consultation in the fields of document authentication and tracking
;
personalization services for documents, namely, providing authentication of personal identification information
;
personal background investigation services using alphanumeric and biometric data
;
providing user authentication services in e-commerce transactions
;
Information, consultancy and advisory services relating to all the foregoing services