Trademark: 2029678
Word
Device Descrption:
STAR IN SHIELD
ID
2029678
Trademark Type
Figurative
Status
Registered: Registered/protected
Application Date
13 August 2019
Registration Date
13 August 2019
Renewal Date
13 August 2029

Service
AJ Park

Goods and Services:
Class 9:
Computer software, namely, identity management software for the authentication and authorization of individuals and other computer software, namely, programs that provide access to other computer software applications (including web, mobile and legacy applications), user directories (including databases) and devices (including Internet-of-things (IoT)), all for security purposes; computer software for use by others to enable and manage access by permitted individuals and other computer software programs to other computer software applications (including web, mobile and legacy applications), user directories (including databases) and devices (including Internet-of-things (IoT)) all for security purposes; computer software for use by others to enable and manage authentication and authorization of permitted individuals and other computer software programs to other computer software applications (including web, mobile and legacy applications), user directories (including databases) and devices (including Internet-of-things (IoT)) all for security purposes; computer software that facilitates identity federation, multi-factor and strong authentication and access control for web, mobile, Internet-of-things (IoT) and application programmable interfaces (APIs); computer software for authentication and authorization that enables the creation and management of user directories within the software platform, and that enables interoperability with external user directories; computer software that enables implementation and management of multi-factor authentication; computer software for authentication without use of a password, namely through email authentication, SMS authentication, and mobile device authentication; computer software that provides anomaly protection for user and computer program authentication and authorization, namely computer software that helps identify anomalies during the authentication and authorization processes; computer software for identity management that enables interoperability of identity management functionality with most other computer software applications without code modification of third-party software applications; customizable computer software for identity management that is customizable to multiple authentication use cases, including through use of rules, extensions and hooks; computer software providing high availability and high performance for identity management software platform
Class 42:
Consulting services related to standards, processes and methods in the field of identity management, namely the authentication and authorization of individual users and of computer software programs for access security and verification purposes, including machine authentication; Platform as a service (PaaS) services, namely the hosting, operation and management of non-downloadable computer software for use by others that facilitates identity management, namely the authentication and authorization of individual users and of computer software programs, including machine authentication; computer consultation in the field of computer system access and authentication security; computer security services namely, providing computer security service designed to verify user or machine identities, user or machine permissions, and for the management of user or machine identity data; providing temporary use of online non-downloadable software, namely, identity management software for use by others for authentication and authorization of individual users and software programs (machine authentication); consulting services related to the migration of data from one user directory to another; consulting services related to the use and integration of identity management as part of an organization's digital transformation, namely, the organization's integration of digital technology into all areas of its operations; consulting services related to the use and integration of identity management as part of an organization's converting or adapting monolithic applications for use in cloud environments; consulting services related to the architecting of integration of or interoperability between identity management computer software programs, and computer systems, web, mobile, IoT and internal computer applications on the other hand