ATHENE

Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V.

Trademark Registered: 2022-09-27
Trademark Application Details
Trademark Logo ATHENE
638
Live/Pending
NEW APPLICATION - ASSIGNED TO EXAMINER
Research OneLook Acronym Finder
Serial Number79281199
Registration Number6854422
Mark Drawing Code4000: Illustration: Drawing with word(s)/letter(s)/number(s) in Block form
Law Office AssignedN20
Employee NameO'BRIEN, JENNIFER LYNN

Timeline

2019-09-26Application Filed
2020-03-21Location: TMO LAW OFFICE 120
2020-03-21Status: Live/Pending
2020-03-21Transaction Date
2022-09-27Trademark Registered

Trademark Applicants & Owners

Owner: Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V.
Entity Statementeingetragener Verein
AddressHansastraße 27c 80686 München DE
Legal Entity Type
Legal Entity State DE

Documents

Click the blue "Refresh" button to load certificates, specimines, application, and other documents.

Attorney of Record

Fraunhofer-Gesellschaft zur Förderung
der angewandten Forschung e.V.
Hansastraße 27c
80686 München
FED REP GERMANY

Good, Services, and Codes

International Codes:9
U.S. Codes:021,023,026,036,038
International Codes:35
U.S. Codes:100,101,102
International Codes:38
U.S. Codes:100,101,104
International Codes:41
U.S. Codes:100,101,107
International Codes:42
U.S. Codes:100,101
International Codes:45
U.S. Codes:100,101
Type CodeType
GS0091Antispyware software; antivirus software; security surveillance apparatus; scientific research and laboratory apparatus, educational apparatus and simulators; recorded data; authentication software; banking software; biometric software; business intelligence software; computers; computer peripheral devices; computer programs; computer software for computer aided software engineering; computer software for the detection of threats to computer networks; computer software for the creation of firewalls; computer software for encryption; dashboard software; databases; data management software; privacy software; data processing apparatus; debugging software; utility, security and cryptography software; digital telephone systems and software; embedded software; integrated software packages; electronic security systems for home network; electronic encryption units; computer firewall software; downloadable computer security software; downloadable software applications; industrial controls incorporating software; wireless controllers to remotely monitor and control the function and status of security systems; artificial intelligence software for surveillance; artificial intelligence software for driverless cars; artificial intelligence software for vehicles; artificial intelligence and machine learning software; artificial intelligence software for analysis, in particular cybersecurity; mail server software; measuring, detecting and monitoring instruments, indicators and controllers; middleware for management of software functions on electronic devices; networking software; production support software; proxy server software; sensors and detectors; sensors and detectors, in particular for security purposes; server-side software; security control apparatus; security software; security warning apparatus; safety, security, protection and signaling devices; data protection backup units; software; software for providers of digital solutions; operational risk management software; computer software for biometric systems for the identification and authentication of persons; electronic commerce and electronic payment software; internet access software; software for the development of secure software, hardware, devices, systems and networks; industrial automation software; cloud network monitoring software; software for mobile device management; software for mobile device management, in particular in relation to cybersecurity; intrusion detection system software; software for diagnostics and troubleshooting; content control software; software for card readers; artificial intelligence software; machine learning software; machine learning software for surveillance; machine learning software for analysis; mobile software; software for network and device security; software for online messaging; software for security testing of hardware, software, devices, systems and networks; software for smartphones; software for traffic management systems; software and devices for controlling access to systems, devices and data; software, hardware and data processing equipment for the administration of software, hardware, devices, systems and networks, in particular with respect to cybersecurity properties; software, hardware and data processing equipment for the detection and extraction of embedded marks in data, in particular recognition and extraction of watermarks in multimedia data; software, hardware and data processing equipment for the detection and visualization of security-related information and events in software, hardware, devices, systems and networks; software, hardware and data processing equipment for marking data, in particular watermarks in multimedia data; software and devices for security analysis of software, hardware, devices, systems and networks; software and devices for security analysis of software, hardware, devices, systems and networks by means of mass analysis; software, hardware and data processing equipment for searching, detecting and extracting data traces and data from security-related events in software, hardware, devices, systems and networks; software, hardware and data processing equipment relating to cybersecurity; software, hardware and data processing equipment related to IT forensics; software, hardware and data processing equipment for the protection of software, hardware, devices, systems, networks and data, in particular for the protection of confidentiality and against tampering; privacy protection software; hardware testing software; electronic payment software; threat detection software; software for facilitating secure credit card trans-actions; computer software to maintain and operate computer systems; risk detection software; software for ensuring the security of electronic mails; instant messaging software; software for software analysis; electronic mail and messaging software; computer software packages; software programmable microprocessors; cards encoded with security features for identification purposes; encryption apparatus; computer software for encryption
GS0091Downloadable and recorded antispyware software; Downloadable and recorded computer antivirus software; Recorded data, namely, electronic data files featuring data in the field of cybersecurity for monitoring and ensuring the security of business networks, for the detection and protection against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protection for mobile devices and computer networks and in the field of privacy protection and user data protection; Downloadable and recorded authentication software, namely, for authenticating user identification in the field of cybersecurity for monitoring and ensuring the security of business networks; Downloadable and recorded banking software in the field of cybersecurity, privacy protection and user data protection, namely, for monitoring and ensuring the security of business networks, for detecting and protecting against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protecting mobile devices and computer networks; Downloadable and recorded biometric software in the field of cybersecurity, privacy protection and user data protection, namely, for monitoring and ensuring the security of business networks, for detecting and protecting against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protecting mobile devices and computer; Business intelligence software, namely, downloadable and recorded computer software that provides real-time, integrated business management intelligence by combining information from various databases and presenting it in an easy-to-understand user interface; Computers; Computer peripheral devices; Downloadable and recorded computer software for computer aided software engineering; Downloadable and recorded computer software for the detection of threats to computer networks; Downloadable and recorded computer software for the creation of firewalls; Downloadable and recorded computer software for encryption; Downloadable and recorded dashboard software in the field of cybersecurity, namely, for monitoring and ensuring the security of business networks, for detecting and protecting against IT security breaches; Downloadable and recorded databases in the field of cybersecurity for monitoring and ensuring the security of business networks, for the detection and protection against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protection for mobile devices and computer networks and in the field of privacy protection and user data protection; Downloadable and recorded data management software; Downloadable and recorded privacy software in the field of cybersecurity, privacy protection and user data protection, namely, for monitoring and ensuring the security of business networks, for detecting and protecting against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protecting mobile devices and computer networks; Downloadable and recorded debugging software; Downloadable and recorded utility, security and cryptography software in the field of cybersecurity privacy protection and user data protection, namely, for monitoring and ensuring the security of business networks, for detecting and protecting against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protecting mobile devices and computer networks; Digital telephone systems comprised of digital phones and telephone terminals and downloadable and recorded software in the field of cybersecurity, namely, for monitoring and ensuring the security of business networks; Downloadable and recorded embedded software in the field of cybersecurity, privacy protection and user data protection, namely, for monitoring and ensuring the security of business networks, for detecting and protecting against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protecting mobile devices and computer networks; Electronic security systems for home network comprised of USB computer security keys and security token hardware for cybersecurity for monitoring and ensuring the security of networks and the detection and protection against IT security breaches; Electronic encryption units; Computer firewall software, namely, downloadable and recorded computer software for the creation of firewalls; Downloadable and recorded computer security software in the field of cybersecurity, privacy protection and user data protection, namely, for monitoring and ensuring the security of business networks, for detecting and protecting against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protecting mobile devices and computer networks; Artificial intelligence software for surveillance, namely, downloadable and recorded computer software using artificial intelligence cybersecurity, privacy protection and user data protection, namely, for monitoring and ensuring the security of business networks, for detecting and protecting against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protecting mobile devices and computer networks; Artificial intelligence software for driverless cars, namely, downloadable and recorded computer software using artificial intelligence for operating and monitoring driverless cars; Artificial intelligence software for vehicles, namely, downloadable and recorded computer software using artificial intelligence for operating and monitoring vehicles; Artificial intelligence and machine learning software, namely, downloadable and recorded computer software using artificial intelligence in the field of cybersecurity, privacy protection and user data protection, namely, for monitoring and ensuring the security of business networks, for detecting and protecting against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protecting mobile devices and computer networks; Artificial intelligence software for analysis, in particular cybersecurity, namely, downloadable and recorded computer software using artificial intelligence in the field of cybersecurity, privacy protection and user data protection, namely, for monitoring and ensuring the security of business networks, for detecting and protecting against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protecting mobile devices and computer networks; Mail server software, namely, downloadable and recorded computer software for controlling and managing access server applications; Downloadable and recorded middleware for management of software functions on electronic devices; Data protection backup units, namely, recorded software and backup drives for computers for storage of data; Downloadable and recorded operational risk management software; Downloadable and recorded computer software for biometric systems for the identification and authentication of persons; Electronic commerce and electronic payment software, namely, downloadable and recorded computer e-commerce software to allow users to perform electronic business transactions via a global computer network; Downloadable and recorded software for granting Internet access; Downloadable and recorded software for the development of secure software, hardware, devices, systems and networks; Industrial automation software, namely, downloadable software for monitoring and controlling communication between computers and automated machine systems; Downloadable and recorded cloud network monitoring software; Downloadable and recorded software for mobile device management; Downloadable and recorded software for mobile device management, in particular in relation to cybersecurity; Downloadable and recorded intrusion detection system software; Downloadable and recorded software for diagnostics and troubleshooting; Downloadable and recorded content control software; Downloadable and recorded software for operating card readers; Downloadable and recorded computer software using artificial intelligence for machine learning software for surveillance; Downloadable and recorded computer software using artificial intelligence for machine learning software for analysis; Downloadable and recorded software for online messaging; Downloadable and recorded software for security testing of hardware, software, devices, systems and networks; Downloadable and recorded software for operating traffic management systems; Downloadable and recorded software and devices in the nature of information broker systems comprised of computer terminals, web-based and local data libraries in the nature of downloadable electronic files featuring data libraries, repositories in the nature of downloadable electronic files featuring data forms, web-based and local backup solutions comprised of backup drives for computers and downloadable for software for backing-up data, systems comprised of downloadable and recorded software for network security monitoring (SIEM), web based and local information reporting systems comprised of recorded and downloadable software for information reporting, voice over IP-systems comprised of VOIP phones and Voice over internet protocol (VOIP) phone adapter, firewall systems comprised of computer hardware in the nature of firewalls and downloadable computer software for the creation of firewalls, managed firewall systems comprised of computer hardware in the nature of firewalls and downloadable computer software for the creation of firewalls, installation and maintenance systems comprised of recorded and downloadable software for enabling the installation and maintenance of software, enterprise collaboration systems (ECS) comprised of downloadable and recorded enterprise software in the nature of a database for non-transactional data and a search engine for database content, enterprise resource planning systems (ERP) comprised of downloadable and recorded enterprise software in the nature of a database for non-transactional data and a search engine for database content, global information systems (GIS) comprised of downloadable and recorded software for managing information, managed information systems (MIS) comprised of downloadable and recorded software for managing information, detection support systems (DDS) comprised of downloadable and recorded software for controlling access to systems, devices and data; Downloadable and recorded software, computer hardware and data processing equipment for the administration of software, hardware, devices, systems and networks, in particular with respect to cybersecurity properties; Downloadable and recorded software, computer hardware and data processing equipment for the detection and extraction of embedded marks in data, in particular recognition and extraction of watermarks in multimedia data; Downloadable and recorded software, computer hardware and data processing equipment for the detection and visualization of security-related information and events in software, hardware, devices, systems and networks; Downloadable and recorded software, computer hardware and data processing equipment for marking data, in particular watermarks in multimedia data; Downloadable and recorded software and devices in the nature of information broker systems comprised of computer terminals, web-based and local data libraries in the nature of downloadable electronic files featuring data libraries, repositories in the nature of downloadable electronic files featuring data forms, web-based and local backup solutions comprised of backup drives for computers and downloadable for software for backing-up data, systems comprised of downloadable and recorded software for network security monitoring (SIEM), web based and local information reporting systems comprised of recorded and downloadable software for information reporting, voice over IP-systems comprised of VOIP phones and Voice over internet protocol (VOIP) phone adapter, firewall systems comprised of computer hardware in the nature of firewalls and downloadable computer software for the creation of firewalls, managed firewall systems comprised of computer hardware in the nature of firewalls and downloadable computer software for the creation of firewalls, installation and maintenance systems comprised of recorded and downloadable software for enabling the installation and maintenance of software, enterprise collaboration systems (ECS) comprised of downloadable and recorded enterprise software in the nature of a database for non-transactional data and a search engine for database content, enterprise resource planning systems (ERP) comprised of downloadable and recorded enterprise software in the nature of a database for non-transactional data and a search engine for database content, global information systems (GIS) comprised of downloadable and recorded software for managing information, managed information systems (MIS) comprised of downloadable and recorded software for managing information, detection support systems (DDS) comprised of downloadable and recorded software for security analysis of software, hardware, devices, systems and networks; Downloadable and recorded software and devices in the nature of information broker systems comprised of computer terminals, web-based and local data libraries in the nature of downloadable electronic files featuring data libraries, repositories in the nature of downloadable electronic files featuring data forms, web-based and local backup solutions comprised of backup drives for computers and downloadable for software for backing-up data, systems comprised of downloadable and recorded software for network security monitoring (SIEM), web based and local information reporting systems comprised of recorded and downloadable software for information reporting, voice over IP-systems comprised of VOIP phones and Voice over internet protocol (VOIP) phone adapter, firewall systems comprised of computer hardware in the nature of firewalls and downloadable computer software for the creation of firewalls, managed firewall systems comprised of computer hardware in the nature of firewalls and downloadable computer software for the creation of firewalls, installation and maintenance systems comprised of recorded and downloadable software for enabling the installation and maintenance of software, enterprise collaboration systems (ECS) comprised of downloadable and recorded enterprise software in the nature of a database for non-transactional data and a search engine for database content, enterprise resource planning systems (ERP) comprised of downloadable and recorded enterprise software in the nature of a database for non-transactional data and a search engine for database content, global information systems (GIS) comprised of downloadable and recorded software for managing information, managed information systems (MIS) comprised of downloadable and recorded software for managing information, detection support systems (DDS) comprised of downloadable and recorded software for security analysis of software, hardware, devices, systems and networks by means of mass analysis; Downloadable and recorded software, computer hardware and data processing equipment for searching, detecting and extracting data traces and data from security-related events in software, hardware, devices, systems and networks; Downloadable and recorded software, computer hardware and data processing equipment for the protection of software, hardware, devices, systems, networks and data, in particular for the protection of confidentiality and against tampering; Downloadable and recorded privacy protection software, namely, for restricting unauthorized access to computer networks; Downloadable and recorded hardware testing software; Downloadable and recorded electronic payment processing software; Downloadable and recorded threat detection software; Downloadable and recorded software for facilitating secure credit card transactions; Downloadable and recorded computer software to maintain and operate computer systems; Downloadable and recorded risk detection software; Downloadable and recorded software for ensuring the security of electronic mails; Downloadable and recorded instant messaging software; Downloadable and recorded software for software analysis; Downloadable and recorded electronic mail management and messaging software; Software programmable microprocessors, namely, electronic encryption units

Trademark Filing History

DescriptionDateEvent Coding
SN ASSIGNED FOR SECT 66A APPL FROM IB2020-03-191 REPR M:
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM2020-03-212 NWOS I:Incoming Correspondence
ASSIGNED TO EXAMINER2020-03-213 DOCK D:Assigned to Examiner
APPLICATION FILING RECEIPT MAILED2020-03-254 MAFR O:Outgoing Correspondence
NON-FINAL ACTION WRITTEN2020-03-305 CNRT R:Renewal
NON-FINAL ACTION (IB REFUSAL) PREPARED FOR REVIEW2020-03-316 RFCR E:E-Mail
REFUSAL PROCESSED BY MPU2020-04-157 RFRR P:
NON-FINAL ACTION MAILED - REFUSAL SENT TO IB2020-04-158 RFCS P:
REFUSAL PROCESSED BY IB2020-05-019 RFNT P:
TEAS CHANGE OF OWNER ADDRESS RECEIVED2020-09-2310 COAR I:Incoming Correspondence
TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED2020-09-2311 REAP I:Incoming Correspondence
ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED2020-09-2312 ARAA I:Incoming Correspondence
TEAS CHANGE OF DOMESTIC REPRESENTATIVES ADDRESS2020-09-2313 ECDR I:Incoming Correspondence
TEAS CHANGE OF CORRESPONDENCE RECEIVED2020-09-2314 TCCA I:Incoming Correspondence
APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED2020-09-2315 CHAN I:Incoming Correspondence
TEAS RESPONSE TO OFFICE ACTION RECEIVED2020-09-2316 TROA I:Incoming Correspondence
CORRESPONDENCE RECEIVED IN LAW OFFICE2020-09-2317 CRFA I:Incoming Correspondence
TEAS/EMAIL CORRESPONDENCE ENTERED2020-09-2418 TEME I:Incoming Correspondence
SUSPENSION LETTER WRITTEN2020-10-1319 CNSL R:Renewal
LETTER OF SUSPENSION E-MAILED2020-10-1320 GNSL S:
NOTIFICATION OF LETTER OF SUSPENSION E-MAILED2020-10-1321 GNS3 O:Outgoing Correspondence
LIE CHECKED SUSP - TO ATTY FOR ACTION2021-07-3022 RCCK S:
NOTIFICATION OF POSSIBLE OPPOSITION CREATED, TO BE SENT TO IB2021-08-2523 OPNR P:
NOTIFICATION OF POSSIBLE OPPOSITION SENT TO IB2021-08-2524 OPNS P:
LIE CHECKED SUSP - TO ATTY FOR ACTION2021-08-3025 RCCK S:
NOTIFICATION OF POSSIBLE OPPOSITION - PROCESSED BY IB2021-09-1026 OPNX P:
SUSPENSION CHECKED ¿ TO ATTORNEY FOR ACTION2021-09-2427 RCCK S:
FINAL REFUSAL WRITTEN2021-11-1128 CNFR R:Renewal
FINAL REFUSAL E-MAILED2021-11-1129 GNFR O:Outgoing Correspondence
NOTIFICATION OF FINAL REFUSAL EMAILED2021-11-1130 GNFN O:Outgoing Correspondence
EXPARTE APPEAL RECEIVED AT TTAB2022-05-1031 EXAF T:TTAB Proceeding
JURISDICTION RESTORED TO EXAMINING ATTORNEY2022-05-1032 JURT T:TTAB Proceeding
EX PARTE APPEAL-INSTITUTED2022-05-1033 EXPI T:TTAB Proceeding
TEAS REQUEST FOR RECONSIDERATION RECEIVED2022-05-1034 ERFR I:Incoming Correspondence
ASSIGNED TO LIE2022-05-1235 ALIE A:Allowance for Publication
CORRESPONDENCE RECEIVED IN LAW OFFICE2022-05-1236 CRFA I:Incoming Correspondence
TEAS/EMAIL CORRESPONDENCE ENTERED2022-05-1237 TEME I:Incoming Correspondence
EXAMINERS AMENDMENT -WRITTEN2022-06-0138 CNEA R:Renewal
EXAMINERS AMENDMENT E-MAILED2022-06-0139 GNEA O:Outgoing Correspondence
NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED2022-06-0140 GNEN O:Outgoing Correspondence
EXAMINER'S AMENDMENT ENTERED2022-06-0141 XAEC I:Incoming Correspondence
APPROVED FOR PUB - PRINCIPAL REGISTER2022-06-0842 CNSA O:Outgoing Correspondence
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED2022-06-2243 NONP E:E-Mail
NOTICE OF START OF OPPOSITION PERIOD CREATED, TO BE SENT TO IB2022-06-2244 OP2R P:
NOTIFICATION OF POSSIBLE OPPOSITION SENT TO IB2022-06-2245 OPNS P:
PUBLISHED FOR OPPOSITION2022-07-1246 PUBO A:Allowance for Publication
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED2022-07-1247 NPUB E:E-Mail
NOTIFICATION PROCESSED BY IB2022-07-1248 GPNX P:
REGISTERED-PRINCIPAL REGISTER2022-09-2749 R.PR A:Allowance for Publication
NOTICE OF REGISTRATION CONFIRMATION EMAILED2022-09-2750 NRCC E:E-Mail
FINAL DISPOSITION NOTICE CREATED, TO BE SENT TO IB2022-12-2751 FICR P:
GENERIC MADRID TRANSACTION CREATED2023-01-1852 XXCR P:
GENERIC MADRID TRANSACTION SENT TO IB2023-01-1853 XXSS O:Outgoing Correspondence
FINAL DECISION TRANSACTION PROCESSED BY IB2023-03-0654 FINO P:

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed