tm logo
AGILESEC
REGISTERED

on 23 Jun 2021

Last Applicant/ Owned by

INFOSEC GLOBAL INC.

2225 Sheppard Avenue East, Suite 1015Toronto

ONTARIO

CA

M2J5C2

Serial Number

1837593 filed on 15th May 2017

Registration Number

TMA1102717 registered on 23rd Jun 2021

Registration expiry Date

23rd Jun 2031

Correspondent Address

130 Queens Quay East, Suite 1214Toronto

ONTARIO

CA

M5A0P6

AGILESEC

Trademark usage description

software development tools for use in the creation of public key encryption, symmetric key encryption and cyber security vulnerability testing softwar Read More

Classification Information


Class [009]
Software development tools for use in the creation of public key encryption, symmetric key encryption and cyber security vulnerability testing software; software used for public key encryption, symmetric key encryption, certification of resilience to cyber security vulnerabilities, access control and digital rights management, communication verification and communication privacy in the context of cyber security, confidentiality and integrity of voice communication, e-mail, network data packets and text messages, wired and wireless transmission of voice communication, e-mail, network data packets; software for securing network data packets of encrypted information in the field of communications and authentication of encrypted information in the field of communications; computer firmware, namely, for use in encryption, authentication and wired and wireless transmission of voice communication, e-mail, network data packets, and text messages; computer hardware for use in the encryption, decryption, authentication and wired and wireless transmission of voice, network data packets, virtual private networks, public key infrastructure and data link encryptors, network data packets of encrypted information in the field of communications and authentication of encrypted information in the field of communications, device to device communication, cryptography, digital signatures and public and private key generation, security functions, namely, encryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity; security software and communication software for the synchronization, transmission and sharing of voice communication, e-mail, network data packets, text messaging, video conferencing, calendar and music files between one or more electronic handheld units, namely personal digital assistants (PDAs), wireless phones, mobile phones, cellular phones, smart phones, video phones and mobile, slate and tablet computers, wearable computing devices, namely, smart watches and smart glasses, smart home devices, namely, smart meters and home appliances with built-in capability to connect to the internet and home automation electronic security devices, home automation systems comprising wireless and wired controllers, controlled electronic home security devices and software for light, HVAC, security, safety and home monitoring, and computers that are embedded into vehicles and stored on or associated with a computer; integrated circuits; computer software storage media, namely, pre-recorded CD-ROMS, USB keys featuring computer software and documentation for providing encryption, certification, authorization, authentication, verification, privacy, confidentiality and integrity in the context of cyber security, computer networking, cryptography, digital signatures and private and public key generation, and security functions, namely, encryption, certification, authentication, verification, privacy, confidentiality and integrity in the context of cyber security; cellular telephones; telecommunications equipment, namely, radio transmitters, telephone transmitters, satellite transmitters, receivers, namely, telephone receivers, audio receivers, video receivers and data receivers, namely, network switches, network routers, firewall software; computer networks, namely, local area network operating software and routers, wide area network operating software and routers, virtual private network operating software, cloud network operating software, internet access software, telephones, wireless computer networks, namely, networks comprised of client server and network attached storage devices consisting of computer hardware and software, wireless communication processors, namely, satellite processors, cellular telephony base stations, signal processors, radio and satellite telephones, wireless handheld computers, smartphones, network link encryption devices, namely, layer 2 link encryptors, software for operating a virtual private network gateway, smart cards and hardware security modules with an embedded integrated circuit containing account and user identity information and protected with private encryption keys for purpose of authentication and secure transmission of information stored on the device; computer terminals for use with credit cards, debit cards and plastic smart cards with an embedded integrated circuit, namely magnetic coded card readers and readers of plastic smart cards with an embedded integrated circuit; software for ensuring the security of electronic mail; computer software for encryption and cryptography; computer software and hardware for identifying or preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; cryptographic software featuring cryptographic algorithms; computer hardware incorporating cryptographic algorithms


Classification kind code

11

Class [016]
Printed materials, namely, educational and training programs in information technology, namely, educational and training books, guides, user manuals and marketing collateral, namely, security related product promotional pamphlets


Classification kind code

11

Class [025]
Promotional apparel, namely, t-shirts, sweatshirts, jackets, hats and gloves


Classification kind code

11

Class [037]
Maintenance services for computer hardware in the field of cyber security vulnerability testing of networked devices


Classification kind code

11

Class [042]
Information technology services, namely cryptographic and information security management consulting; computer systems development and systems integration relating to information security for others; architectural design of computer systems; computer security threat analysis for protecting date; design and development of computer software for others in the fields of data and information security, data and information validation, data and information assurance, and data and information cryptography; computer network security services; computer security consultancy; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer network; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; consulting services in the field of testing and assessing networked devices for cyber security vulnerabilities and risks; providing updates for computer hardware and software in the field of cyber security vulnerability testing of networked devices; cyber assurance security certification services in the field of cyber security vulnerability testing of networked devices; issuance and management of digital certificates for authentication and encryption of a digital communication, and authentication of a digital signature in an electronic transaction and communication, over the internet and other computer network and providing technical and customer support in connection therewith; technical and consulting services, namely, designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security software for others; updating and maintaining computer software for others; cloud computing services featuring software and databases for use in computer security and prevention and mitigation of computer risks; computer consultation and research in the field of computer hardware, computer software and network security; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; information technology services, namely consultation in the field of assessing, correcting and managing computer network vulnerabilities and security operations, regulatory compliance, risk management, corporate governance, network certification, network accreditation and cyber security


Classification kind code

11

Class [045]
Technology licensing of cryptographic methods and protocols and their respective implementations; technology licensing of security hardware and software


Classification kind code

11

Mark Details


Serial Number

1837593

Mark Type

Trademark

Legal History


Show more

Action TakenStatus
Submitted for opposition 26
on 07th Sep 2020
Approved
Submitted for opposition 27
on 07th Sep 2020
Approval Notice Sent
Submitted for opposition 15
on 19th Feb 2020
Correspondence Created
Submitted for opposition 12
on 11th Jul 2019
Extension of Time
Submitted for opposition 15
on 19th Dec 2018
Correspondence Created
Submitted for opposition 22
on 23rd Apr 2018
Search Recorded
Submitted for opposition 20
on 23rd Apr 2018
Examiner's First Report
Submitted for opposition 31
on 18th May 2017
Formalized
Submitted for opposition 30
on 15th May 2017
Filed
Submitted for opposition 1
on 15th May 2017
Created