ONESPAN

Onespan North America Inc.

Application Filed: 2018-05-08
Trademark Application Details
Trademark Logo ONESPAN
802
Live/Pending
REQUEST FOR EXTENSION OF TIME TO FILE OPPOSITION
Research OneLook Acronym Finder
Serial Number87911797
Registration Number6356346
Mark Drawing Code4000: Illustration: Drawing with word(s)/letter(s)/number(s) in Block form
Attorney NameJohn W. McGlynn
Attorney Docket NumberVAS-172US
Law Office AssignedL20
Employee NameRINKER, ANTHONY MICHAE

Timeline

2018-05-08Application Filed
2019-10-21Location: GENERIC WEB UPDATE
2019-10-22Published for Opposition
2019-11-12Status: Live/Pending
2019-11-12Transaction Date
2021-05-18Trademark Registered

Trademark Applicants & Owners

Owner: ONESPAN NORTH AMERICA INC.
Address121 W WACKER DRIVE, SUITE 2050 CHICAGO DE 60601
Legal Entity TypeCorporation
Legal Entity StateDE

Documents

Click the blue "Refresh" button to load certificates, specimines, application, and other documents.

Attorney of Record

JOHN W. MCGLYNN
RATNERPRESTIA
2200 RENASSIACE BLVD
SUITE 350
KING OF PRUSSIA, PA 19406

Good, Services, and Codes

International Codes:9
U.S. Codes:021,023,026,036,038
International Codes:38
U.S. Codes:100,101,104
International Codes:42
U.S. Codes:100,101
Type CodeType
GS0091Mobile application software for automating and securing the interaction between users and computer based business applications; software in the field of machine learning and artificial intelligence for automating and securing the interaction between users and computer based business applications; Cyber security software; authentication server software; authentication library software; downloadable computer security software for restricting unauthorized access to computers, computer networks, websites, computer-based applications and for ensuring authenticity and integrity of electronic transactions; software for network and device security for restricting unauthorized access to computers, computer networks, websites, computer-based applications; software for application, transaction and identity security related to mobile device applications for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and for ensuring authenticity and integrity of transactions submitted by users of mobile device applications; software for data security for authenticating, enforcing, restricting and controlling access privileges to users and for ensuring authenticity and integrity of transactions submitted by users; software for ensuring the security of electronic mail by authenticating, enforcing, restricting and controlling access privileges to users; software for computer virus tracking and computer virus neutralization; Electronic publications, namely, journals, books, manuals, magazines, brochures, downloadable, relating to the field of cyber security, internet security, computer security, computer network security, data security and cryptography; Software development kits (SDK); computer security Software Development Kits (SDK); mobile application software security development kits (SDK); Software development kits (SDK) for authentication of user identities; Software development kits (SDK) for biometric security software; real-time fraud prevention software for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and computer-based applications and for ensuring authenticity and integrity of transactions submitted by users of computer-based applications; software for monitoring, detecting and blocking of fraudulent electronic transactions submitted to computer-based applications; software for logging, monitoring and securing of computer-based services accessible via computer networks, including the internet and mobile networks; software for analyzing, and detecting unusual patterns in user and transaction data including behavioral and contextual data; software for behavioral analytics for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and computer-based applications and for ensuring authenticity and integrity of transactions submitted by users of mobile device applications and computer-based applications; Mobile application security software for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and computer-based applications and for ensuring authenticity and integrity of transactions submitted by users of mobile device applications and computer-based applications; software for protecting mobile applications against cyber threats, computer viruses, phishing attacks, computer malware, man-in-the-middle attacks; software for detecting, preventing and reporting mobile cyber attacks against computer-based applications; computer anti-malware software; runtime application self-protection software, namely, computer anti-malware software; tamper detection software, namely, software for detecting illegitimate tampering by unauthorized entities with electronic devices or software; device identification and device binding software namely, software for identifying an individual electronic device, and software for binding a software application instance to an individual electronic device; device fingerprinting software, namely, software for generating a fingerprint of a computing device; secure storage software, namely, software for secure electronic storage of data; secure communications software, namely, software for monitoring and controlling communication between computers and automated machine systems; electronic apparatus, namely, smart cards, smart card readers, USB tokens and authentication tokens for enabling secure telecommunications; Computer peripheral equipment; Smart card readers; Bluetooth enabled devices, namely, authentication tokens with a Bluetooth interface; USB hardware; USB smart card readers; USB tokens namely, USB computer access control key; Electronic key fobs, namely hardware authentication tokens; blank smart cards embedded with transponders; encoded smart cards containing program instructions used to authenticate users or to store PKI certificates; replacement parts and fittings for all the aforesaid goods; Electronic apparatus, namely, hardware authentication tokens, USB hardware, USB security tokens, and encoded smart cards, all the foregoing containing programming used for security, authentication and encryption; cards encoded with security features for identification purposes; electronic security tags; Radio frequency identification (RFID) tags; Electronic apparatus, namely, hardware authentication tokens, computer peripheral equipment, USB hardware, USB security tokens containing program instructions used to store, generate or use personal identification or authentication data, personal identification numbers, PKI certificates, and encryption keys, smart cards encoded with program instructions used to store personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and software, computer server software and mobile application software, all containing program instructions used to store, generate or use personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys or encryption keys all for use in the field of cyber security, internet security, computer security, computer network security and cryptography; Electronic apparatus, namely, computer peripheral equipment, USB hardware, USB security tokens, smart cards encoded with program instructions used to store, generate or use, personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and software, computer server software and mobile application software, used all for the protection of online transactions and data transfer by electronic means; Electronic apparatus, namely, computer peripheral equipment, USB hardware, USB security tokens, smart cards encoded with program instructions used to store, generate or use, personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and software, computer software and mobile application software, all for electronic generation and verification of authentication credentials and signatures; Electronic apparatus, namely, computer peripheral equipment, USB hardware, USB security tokens, smart cards encoded with program instructions used to store, generate or use personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and software, computer server software and mobile application software, all for use in, for connecting to and for providing Public Key Infrastructures (PKI); Electronic identification devices, namely, authentication tokens, programmed with specific parameters to obtain an authentication code for securing electronic transactions, bank operations, remote application access and securing data transfers; Electronic security tokens in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication to access computers, web sites, remote computer based applications, electronic networks and databases; Software, mobile application software, electronic apparatus, namely, authentication security token hardware and smart card readers adapted to optically capture digital information; software, mobile application software, electronic apparatus, namely, authentication security token hardware and smart card readers for capturing and decoding 2D-barcodes; Electronic apparatus namely, fingerprint scanners and biometric retinal scanners, and software for use in the field of biometric identify verification; Electronic apparatus, namely, fingerprint scanners and biometric retinal scanners, and software for biometric systems for the identification and authentication of persons; Electronic apparatus, namely, fingerprint scanners and biometric retinal scanners, and software for capturing, analyzing and verifying biometric traits; Electronic apparatus, namely, fingerprint scanners and biometric retinal scanners, and software for capturing, analyzing and verifying fingerprints, retinal scan, voice, heartbeat, gait and vein patterns; Biometric readers, namely, fingerprint scanners and biometric retinal scanners; Face recognition software; software for capturing, analyzing and verifying behavioral biometrics; behavioral authentication software, namely, software for authenticating users based on the behavioral biometrics of these users; Software for behavioral biometrics, namely, for recording and analyzing dynamic keystrokes and swiping finger patterns on mobile device input screens; Software for capturing, analyzing and verifying geolocation data; Electronic apparatus and software for recording, processing, manipulating and analyzing sounds and images; Electronic apparatus and software for providing cyber security, internet security, computer security, computer network security, data security and cryptography; Electronic apparatus, namely, authentication security token hardware and smart card readers and software, computer server software and mobile application software for data encryption and authentication in the fields of security, data security, and user authentication; Electronic apparatus hardware and software for providing multi-factor user authentication for security purposes; Electronic apparatus namely, hardware and software for providing layered security to protect data; Electronic apparatus namely, hardware and software for continuous, transparent and frictionless user authentication for identification purposes; software for coordinating and orchestrating user authentication and cyber security for authenticating, enforcing, restricting and controlling access privileges to users of mobile devices and applications; Electronic apparatus namely, hardware and software for protecting computer networks by authenticating, enforcing, restricting and controlling access privileges to users of computer networks, mobile devices and applications; Electronic apparatus, namely, hardware and software for securing telecommunications, data communications, electronic communications and digital communications by authenticating, enforcing, restricting and controlling access privileges to users of computer networks, mobile devices and applications; Electronic apparatus, namely, hardware and software for securing access to and operation on the Internet by authenticating, enforcing, restricting and controlling access privileges to users of computers, mobile devices and applications; Electronic apparatus namely, hardware and software for secure data-transfer by electronic means and via computer networks; Electronic apparatus namely, hardware and software for identification of persons; electronic apparatus, namely, hardware and software for providing, verifying and proving the identity of persons; Electronic apparatus, namely, hardware and computer software used to identify and authenticate users of intranet and internet websites and used to authenticate user access to intranet and internet sites, wide area networks (WAN) and local area networks (LAN) in order to secure online communications and transactions; Electronic apparatus, namely, hardware and software for limiting access control to physical and virtual spaces, to electronic systems, to computers, to electronic networks, to websites, to computer based applications and to electronic databases; Electronic apparatus, namely, hardware and computer software used for remote control of access to computers, computer based applications and telecommunications networks; Electronic apparatus, namely, hardware and software for digital certificate and encryption key management in the field of Public Key Infrastructures (PKI); Electronic apparatus, namely, hardware and software used for securing electronic and online transactions; Electronic apparatus, namely, hardware and software for providing of irrevocable and authenticated electronic and online transactions; Electronic apparatus, namely, hardware and software for the certification of orders given via computer and certifying electronic instructions for transactions; Electronic apparatus, namely, hardware and software for secure electronic transaction authentication for use in the field of banking and online consumer transactions; Electronic apparatus, namely, hardware and software used for ensuring the security of electronic banking operations and bank transactions; Electronic apparatus, namely, hardware and software for securing internet banking electronic transactions; Electronic apparatus, namely, hardware and software used for ensuring the security and authentication of sales orders transactions given by computer; Electronic apparatus, namely, hardware and software for use in the field of risk analysis, namely, risk analysis of electronic and remote electronic transactions, electronic transaction requests, and electronic network, account and computer access requests; software for assessing the security risk associated with end user identities; Electronic apparatus, namely, hardware and software in the field of fraud detection, risk detection, risk management, fraud management, risk analysis, fraud analysis and fraud prevention, all related to electronic, digital, online and remote electronic transactions; Electronic apparatus, namely, hardware and software for securing and protecting access to virtual, electronic and digital assets; Electronic apparatus, namely, hardware and software for creating, managing and transferring digital money, electronic and digital currencies and cryptocurrencies; Electronic apparatus, namely, hardware and software for creating, managing and transferring distributed ledgers and blockchains; Electronic apparatus, namely, hardware and software for creating, managing and transferring digital data; Electronic apparatus, namely, hardware and software for authenticating, certifying and controlling access to digital data; Electronic apparatus, namely, hardware and software for creating, managing, controlling the use, modification, and distribution of copyrighted works; Electronic apparatus, namely, hardware and software for storing, managing, encrypting, and protecting access to personal data; Electronic apparatus, namely, hardware and software for storing, managing and controlling access to personal identity information; software for use for customer enrollment, customer management and electronic transactions; Electronic apparatus, namely, hardware and transactional software for securing electronic payment services, internet banking and mobile banking services; Electronic apparatus, namely, hardware and software for governments to communicate with and provide services to citizens; software for creating and managing electronic signature applications and systems, including administrative and user applications and digital storage systems; Software programs allowing users to electronically approve documents using secure electronic signatures; Electronic apparatus, namely, hardware and software for the recording, the manipulation, the archiving, the security, the encoding of sound, images and data, including via the Internet; Software for capturing an approval of an electronic or online electronic transaction; software for generating and capturing electronic proof of authorization of electronic and online electronic transactions and documents; software for generating electronic signatures; software for electronically signing electronic and online electronic transactions; software for signing electronic documents; software for capturing electronic document signatures; Software for electronic document management; software allowing users to electronically send, sign, receive and manage documents as part of an electronic business transaction; software for authenticating and certifying the legal enforceability, regulatory compliance and auditability of documents or transactions; software for securing electronic forensic evidence relating to the business transaction process and documents; Electronic signature and transaction management software programs allowing users to electronically send, sign, receive and manage documents as part of an electronic business transaction, to ensure the legal enforceability, regulatory compliance and auditability of the documents and transactions, and to obtain secure electronic forensic evidence relating to the business transaction process and documents; software for capturing and storing electronic data; software for capturing and storing audit trail data of electronic, digital and online transactions; Software for capturing and storing electronic signature data; software for capturing and storing electronic evidence data that allows reproducing exactly what a signer saw and did regarding an electronic signature; software for capturing and storing audit trail data of electronic, digital and online transactions that allows reproducing exactly what a signer of an electronic document saw and did in making the electronic signature; Software for capturing and storing data documenting an electronic signature process; software for capturing and storing data documenting electronic delivery of documents and information; Software for viewing and reviewing electronic evidence data files; software for viewing and reviewing audit trail data files; software for viewing and reviewing electronic signature data; Software for viewing and reviewing electronic evidence data that allows reproducing exactly what a signer saw and did regarding an electronic signature or transaction; software for viewing and reviewing audit trail data files that allows reproducing exactly what a signer of an electronic document saw and did when using a document; software for viewing and reviewing data files documenting an electronic signature process; software for viewing and reviewing data documenting electronic delivery of documents and information; software for reviewing and verifying electronic forensic evidence data files; document management software for reproducing an authorization and approval process of electronic transactions and documents; document management software for reproducing a signing process of electronic transactions and documents; Software for securely storing electronic document files; electronic vaulting software, namely, software for securely storing electronic document files
GS0091Mobile application software for automating and securing the interaction between users and computer based business applications; software in the field of machine learning and artificial intelligence for automating and securing the interaction between users and computer based business applications; Cyber security software; authentication server software; authentication library software; downloadable computer security software for restricting unauthorized access to computers, computer networks, websites, computer-based applications and for ensuring authenticity and integrity of electronic transactions; software for network and device security for restricting unauthorized access to computers, computer networks, websites, computer-based applications; software for application, transaction and identity security related to mobile device applications for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and for ensuring authenticity and integrity of transactions submitted by users of mobile device applications; software for data security for authenticating, enforcing, restricting and controlling access privileges to users and for ensuring authenticity and integrity of transactions submitted by users; software for ensuring the security of electronic mail by authenticating, enforcing, restricting and controlling access privileges to users; Electronic publications, namely, journals, books, manuals, magazines, brochures, downloadable, relating to the field of cyber security, internet security, computer security, computer network security, data security and cryptography; Software development kits (SDK); computer security Software Development Kits (SDK); mobile application software security development kits (SDK); Software development kits (SDK) for authentication of user identities; Software development kits (SDK) for biometric security software; real-time fraud prevention software for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and computer-based applications and for ensuring authenticity and integrity of transactions submitted by users of computer-based applications; software for monitoring, detecting and blocking of fraudulent electronic transactions submitted to computer-based applications; software for logging, monitoring and securing of computer-based services accessible via computer networks, including the internet and mobile networks; software for analyzing, and detecting unusual patterns in user and transaction data including behavioral and contextual data; software for behavioral analytics for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and computer-based applications and for ensuring authenticity and integrity of transactions submitted by users of mobile device applications and computer-based applications; Mobile application security software for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and computer-based applications and for ensuring authenticity and integrity of transactions submitted by users of mobile device applications and computer-based applications; software for protecting mobile applications against cyber threats, computer viruses, phishing attacks, computer malware, man-in-the-middle attacks; software for detecting, preventing and reporting mobile cyber attacks against computer-based applications; computer anti-malware software; runtime application self-protection software, namely, computer anti-malware software; tamper detection software, namely, software for detecting illegitimate tampering by unauthorized entities with electronic devices or software; device identification and device binding software, namely, software for identifying an individual electronic device, and software for binding a software application instance to an individual electronic device; device fingerprinting software, namely, software for generating a fingerprint of a computing device; secure communications software, namely, software for monitoring and controlling communication between computers and automated machine systems; electronic apparatus, namely, smart cards, smart card readers, USB tokens and authentication tokens for enabling secure telecommunications; Computer peripheral equipment; Smart card readers; wireless radio enabled devices, namely, authentication tokens with a wireless radio interface; USB hardware; USB smart card readers; USB tokens, namely, USB computer access control key; Electronic key fobs, namely, hardware authentication tokens; blank smart cards embedded with transponders; encoded smart cards containing program instructions used to authenticate users or to store PKI certificates; replacement parts and fittings for all the aforesaid goods; Electronic apparatus, namely, hardware authentication tokens, USB hardware, USB security tokens, and encoded smart cards, all the foregoing containing programming used for security, authentication and encryption; cards encoded with security features for identification purposes; electronic security tags; Electronic apparatus, namely, hardware authentication tokens, computer peripheral equipment, USB hardware, USB security tokens containing program instructions used to store, generate or use personal identification or authentication data, personal identification numbers, PKI certificates, and encryption keys, smart cards encoded with program instructions used to store personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and software, computer server software and mobile application software, all containing program instructions used to store, generate or use personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys or encryption keys all for use in the field of cyber security, internet security, computer security, computer network security and cryptography; Electronic apparatus, namely, computer peripheral equipment, USB hardware, USB security tokens, smart cards encoded with program instructions used to store, generate or use, personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and software, computer server software and mobile application software, used all for the protection of online transactions and data transfer by electronic means; Electronic apparatus, namely, computer peripheral equipment, USB hardware, USB security tokens, smart cards encoded with program instructions used to store, generate or use, personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and software, computer software and mobile application software, all for electronic generation and verification of authentication credentials and signatures; Electronic apparatus, namely, computer peripheral equipment, USB hardware, USB security tokens, smart cards encoded with program instructions used to store, generate or use personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and software, computer server software and mobile application software, all for use in, for connecting to and for providing Public Key Infrastructures (PKI); Electronic identification devices, namely, authentication tokens, programmed with specific parameters to obtain an authentication code for securing electronic transactions, bank operations, remote application access and securing data transfers; Electronic security tokens in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication to access computers, web sites, remote computer based applications, electronic networks and databases; Software, mobile application software, electronic apparatus, namely, authentication security token hardware and smart card readers adapted to optically capture digital information; software, mobile application software, electronic apparatus, namely, authentication security token hardware and smart card readers for capturing and decoding 2D-barcodes; software for use in the field of biometric identify verification; software for biometric systems for the identification and authentication of persons; software for capturing, analyzing and verifying biometric traits; software for capturing, analyzing and verifying fingerprints; Face recognition software; software for capturing, analyzing and verifying behavioral biometrics; behavioral authentication software, namely, software for authenticating users based on the behavioral biometrics of these users; Software for behavioral biometrics, namely, for recording and analyzing dynamic keystrokes and swiping finger patterns on mobile device input screens; Software for capturing, analyzing and verifying geolocation data; Electronic apparatus and software for providing cyber security, internet security, computer security, computer network security, data security and cryptography; Electronic apparatus, namely, authentication security token hardware and smart card readers and software, computer server software and mobile application software for data encryption and authentication in the fields of security, data security, and user authentication; Electronic apparatus hardware and software for providing multi-factor user authentication for security purposes; Electronic apparatus, namely, hardware and software for providing layered security to protect data; Electronic apparatus, namely, hardware and software for continuous, transparent and frictionless user authentication for identification purposes; software for coordinating and orchestrating user authentication and cyber security for authenticating, enforcing, restricting and controlling access privileges to users of mobile devices and applications; Electronic apparatus, namely, hardware and software for protecting computer networks by authenticating, enforcing, restricting and controlling access privileges to users of computer networks, mobile devices and applications; Electronic apparatus, namely, hardware and software for securing telecommunications, data communications, electronic communications and digital communications by authenticating, enforcing, restricting and controlling access privileges to users of computer networks, mobile devices and applications; Electronic apparatus, namely, hardware and software for securing access to and operation on the Internet by authenticating, enforcing, restricting and controlling access privileges to users of computers, mobile devices and applications; Electronic apparatus, namely, hardware and software for secure data-transfer by electronic means and via computer networks; Electronic apparatus, namely, hardware and software for identification of persons; electronic apparatus, namely, hardware and software for providing, verifying and proving the identity of persons; Electronic apparatus, namely, hardware and computer software used to identify and authenticate users of intranet and internet websites and used to authenticate user access to intranet and internet sites, wide area networks (WAN) and local area networks (LAN) in order to secure online communications and transactions; Electronic apparatus, namely, hardware and software for limiting access control to physical and virtual spaces, to electronic systems, to computers, to electronic networks, to websites, to computer based applications and to electronic databases; Electronic apparatus, namely, hardware and computer software used for remote control of access to computers, computer based applications and telecommunications networks; Electronic apparatus, namely, hardware and software for digital certificate and encryption key management in the field of Public Key Infrastructures (PKI); Electronic apparatus, namely, hardware and software used for securing electronic and online transactions; Electronic apparatus, namely, hardware and software for providing of irrevocable and authenticated electronic and online transactions; Electronic apparatus, namely, hardware and software for the certification of orders given via computer and certifying electronic instructions for transactions; Electronic apparatus, namely, hardware and software for secure electronic transaction authentication for use in the field of banking and online consumer transactions; Electronic apparatus, namely, hardware and software used for ensuring the security of electronic banking operations and bank transactions; Electronic apparatus, namely, hardware and software for securing internet banking electronic transactions; Electronic apparatus, namely, hardware and software used for ensuring the security and authentication of sales orders transactions given by computer; Electronic apparatus, namely, hardware and software for use in the field of risk analysis, namely, risk analysis of electronic and remote electronic transactions, electronic transaction requests, and electronic network, account and computer access requests; software for assessing the security risk associated with end user identities; Electronic apparatus, namely, hardware and software in the field of fraud detection, risk detection, risk management, fraud management, risk analysis, fraud analysis and fraud prevention, all related to electronic, digital, online and remote electronic transactions; Electronic apparatus, namely, hardware and software for securing and protecting access to virtual, electronic and digital assets; Electronic apparatus, namely, hardware and software for creating, managing and transferring digital money, electronic and digital currencies and cryptocurrencies; Electronic apparatus, namely, hardware and software for creating, managing and transferring distributed ledgers and blockchains; Electronic apparatus, namely, hardware and software for creating, managing and transferring digital data; Electronic apparatus, namely, hardware and software for authenticating, certifying and controlling access to digital data; Electronic apparatus, namely, hardware and software for creating, managing, controlling the use, modification, and distribution of copyrighted works; Electronic apparatus, namely, hardware and software for storing, managing, encrypting, and protecting access to personal data; Electronic apparatus, namely, hardware and software for storing, managing and controlling access to personal identity information; software for use for customer enrollment, customer management and electronic transactions; Electronic apparatus, namely, hardware and transactional software for securing electronic payment services, internet banking and mobile banking services; Electronic apparatus, namely, hardware and software for governments to communicate with and provide services to citizens; software for creating and managing electronic signature applications and systems, including administrative and user applications and digital storage systems; Software programs allowing users to electronically approve documents using secure electronic signatures; Electronic apparatus, namely, hardware and software for the security, the encoding of sound, images and data, including via the Internet; Software for capturing an approval of an electronic or online electronic transaction; software for generating and capturing electronic proof of authorization of electronic and online electronic transactions and documents; software for generating electronic signatures; software for electronically signing electronic and online electronic transactions; software for signing electronic documents; software for capturing electronic document signatures; Software for electronic document management; software allowing users to electronically send, sign, receive and manage documents as part of an electronic business transaction; software for authenticating and certifying the legal enforceability, regulatory compliance and auditability of documents or transactions; software for securing electronic forensic evidence relating to the business transaction process and documents; Electronic signature and transaction management software programs allowing users to electronically send, sign, receive and manage documents as part of an electronic business transaction, to ensure the legal enforceability, regulatory compliance and auditability of the documents and transactions, and to obtain secure electronic forensic evidence relating to the business transaction process and documents; software for capturing and storing electronic data; software for capturing and storing audit trail data of electronic, digital and online transactions; Software for capturing and storing electronic signature data; software for capturing and storing electronic evidence data that allows reproducing exactly what a signer saw and did regarding an electronic signature; software for capturing and storing audit trail data of electronic, digital and online transactions that allows reproducing exactly what a signer of an electronic document saw and did in making the electronic signature; Software for capturing and storing data documenting an electronic signature process; software for capturing and storing data documenting electronic delivery of documents and information; Software for viewing and reviewing electronic evidence data files; software for viewing and reviewing audit trail data files; software for viewing and reviewing electronic signature data; Software for viewing and reviewing electronic evidence data that allows reproducing exactly what a signer saw and did regarding an electronic signature or transaction; software for viewing and reviewing audit trail data files that allows reproducing exactly what a signer of an electronic document saw and did when using a document; software for viewing and reviewing data files documenting an electronic signature process; software for viewing and reviewing data documenting electronic delivery of documents and information; software for reviewing and verifying electronic forensic evidence data files; document management software for reproducing an authorization and approval process of electronic transactions and documents; document management software for reproducing a signing process of electronic transactions and documents; Software for securely storing electronic document files; electronic vaulting software, namely, software for securely storing electronic document files; all the aforementioned to the exception of computer hardware and computer software for formal verification (this does not include personal identity verification and authentication) and sequential equivalence checking, in particular in the field of semiconductor production

Trademark Filing History

DescriptionDateEvent Coding
NEW APPLICATION ENTERED IN TRAM2018-05-111 NWAP I:Incoming Correspondence
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM2018-05-172 NWOS I:Incoming Correspondence
TEAS VOLUNTARY AMENDMENT RECEIVED2018-06-013 PARI I:Incoming Correspondence
ASSIGNED TO LIE2018-06-124 ALIE A:Allowance for Publication
APPLICANT AMENDMENT PRIOR TO EXAMINATION - ENTERED2018-06-155 AMPX O:Outgoing Correspondence
ASSIGNED TO EXAMINER2018-08-296 DOCK D:Assigned to Examiner
NON-FINAL ACTION WRITTEN2018-09-067 CNRT R:Renewal
NON-FINAL ACTION E-MAILED2018-09-068 GNRT F:First Action
NOTIFICATION OF NON-FINAL ACTION E-MAILED2018-09-069 GNRN O:Outgoing Correspondence
AUTOMATIC UPDATE OF ASSIGNMENT OF OWNERSHIP2018-10-3110 ASGN I:Incoming Correspondence
TEAS RESPONSE TO OFFICE ACTION RECEIVED2019-03-0611 TROA I:Incoming Correspondence
CORRESPONDENCE RECEIVED IN LAW OFFICE2019-03-0612 CRFA I:Incoming Correspondence
TEAS/EMAIL CORRESPONDENCE ENTERED2019-03-0713 TEME I:Incoming Correspondence
FINAL REFUSAL WRITTEN2019-04-0414 CNFR R:Renewal
FINAL REFUSAL E-MAILED2019-04-0415 GNFR O:Outgoing Correspondence
NOTIFICATION OF FINAL REFUSAL EMAILED2019-04-0416 GNFN O:Outgoing Correspondence
TEAS REQUEST FOR RECONSIDERATION RECEIVED2019-06-1417 ERFR I:Incoming Correspondence
CORRESPONDENCE RECEIVED IN LAW OFFICE2019-06-1418 CRFA I:Incoming Correspondence
TEAS/EMAIL CORRESPONDENCE ENTERED2019-06-1419 TEME I:Incoming Correspondence
LETTER OF PROTEST ACCEPTED2019-06-1720 LOPT I:Incoming Correspondence
LETTER OF PROTEST EVIDENCE REVIEWED-NO FURTHER ACTION TAKEN2019-06-2421 LOPR P:
APPROVED FOR PUB - PRINCIPAL REGISTER2019-09-1822 CNSA P:
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED2019-10-0223 NONP E:E-Mail
WITHDRAWN FROM PUB - OG REVIEW QUERY2019-10-2124 PBCR Z:Deletion
PUBLISHED FOR OPPOSITION2019-10-2225 PUBO A:Allowance for Publication
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED2019-10-2226 NPUB E:E-Mail
EXTENSION OF TIME TO OPPOSE RECEIVED2019-11-1227 ETOF T:TTAB Proceeding
EXTENSION OF TIME TO OPPOSE PROCESS - TERMINATED2020-03-0128 ETOP T:TTAB Proceeding
WITHDRAWN FROM PUB - OG REVIEW QUERY2020-04-0729 PBCR Z:Deletion
PREVIOUS ALLOWANCE COUNT WITHDRAWN2020-05-1530 ZZZX Z:Deletion
NON-FINAL ACTION WRITTEN2020-06-0531 CNRT R:Renewal
NON-FINAL ACTION E-MAILED2020-06-0532 GNRT O:Outgoing Correspondence
NOTIFICATION OF NON-FINAL ACTION E-MAILED2020-06-0533 GNRN O:Outgoing Correspondence
TEAS RESPONSE TO OFFICE ACTION RECEIVED2020-07-0834 TROA I:Incoming Correspondence
CORRESPONDENCE RECEIVED IN LAW OFFICE2020-07-0835 CRFA I:Incoming Correspondence
TEAS/EMAIL CORRESPONDENCE ENTERED2020-07-0836 TEME I:Incoming Correspondence
APPROVED FOR PUB - PRINCIPAL REGISTER2020-08-0637 CNSA P:
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED2020-08-1938 NONP E:E-Mail
PUBLISHED FOR OPPOSITION2020-09-0839 PUBO A:Allowance for Publication
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED2020-09-0840 NPUB E:E-Mail
NOA E-MAILED - SOU REQUIRED FROM APPLICANT2020-11-0341 NOAM E:E-Mail
TEAS STATEMENT OF USE RECEIVED2020-12-3042 EISU I:Incoming Correspondence
CASE ASSIGNED TO INTENT TO USE PARALEGAL2021-01-1943 AITU A:Allowance for Publication
USE AMENDMENT FILED2020-12-3044 IUAF S:
STATEMENT OF USE PROCESSING COMPLETE2021-01-2145 SUPC I:Incoming Correspondence
SU - NON-FINAL ACTION - WRITTEN2021-02-0946 CNRT W:
NON-FINAL ACTION E-MAILED2021-02-0947 GNRT O:Outgoing Correspondence
NOTIFICATION OF NON-FINAL ACTION E-MAILED2021-02-0948 GNRN O:Outgoing Correspondence
TEAS RESPONSE TO OFFICE ACTION RECEIVED2021-03-1049 TROA I:Incoming Correspondence
ASSIGNED TO LIE2021-03-1850 ALIE A:Allowance for Publication
CORRESPONDENCE RECEIVED IN LAW OFFICE2021-03-2351 CRFA I:Incoming Correspondence
TEAS/EMAIL CORRESPONDENCE ENTERED2021-03-2352 TEME I:Incoming Correspondence
ALLOWED PRINCIPAL REGISTER - SOU ACCEPTED2021-04-1453 CNPR P:
NOTICE OF ACCEPTANCE OF STATEMENT OF USE E-MAILED2021-04-1554 SUNA E:E-Mail
REGISTERED-PRINCIPAL REGISTER2021-05-1855 R.PR A:Allowance for Publication

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed