Filters
on 12 Mar 2024
ONESPAN NORTH AMERICA INC.
97713061 · 12 Dec 2022
12 Mar 2030
038
Class 038
Communications Services
Telecommunication services, namely, transmission of voice, data, graphics, images, audio and video by means of telecommunications networks, wired communication networks, wireless communication networks; Video conferencing services; Electronic delivery of business and financial documents; Electronic transmission of data and documents via computer hardware and electronic devices; Provision of access to data or documents stored electronically in central files; Electronic transmission of audio, video, data and documents; Providing private and secure real time electronic communication over a computer network
042
Class 042
Computer & Software Services & Scientific Services
Software as a service (SAAS) services featuring software for video conferencing, identity authentication, electronic signature verification, document execution, and recordation of video and data; Software as a service (SAAS) services featuring software for providing video conferencing sessions in which participants can review and electronically sign electronic documents and wherein all steps of the session are captured as part of an audit trail; Electronic signature verification services using technology to authenticate user identity; creating an on-line environment for financial and business transactions; Computer services, namely, creating an on-line environment for financial and business transactions; Hosting the software, websites and other computer applications of others on a virtual private server; File sharing services, namely, providing a website featuring technology enabling users to upload and download electronic files; Providing a secured-access website that gives registered Internet networked institutions the ability to upload, view, copy, print, download and share documents and images for the purposes of conducting business and financial transactions; User authentication services using technology for e-commerce transactions; Providing user authentication services using single sign-on technology, biometric hardware and software technology for e-commerce transactions; Providing temporary use of a non-downloadable web application for web-based documents, collaborating on shared documents; Providing a web site featuring technology that enables internet users to share documents, images and videos; Providing a secured-access website that gives registered Internet networked institutions the ability to upload, view, copy, print, download and share documents and images for the purposes of conducting consumer-driven transactions; Providing a website that features technology that enables the secure exchange of information by users; Providing a secure electronic online system featuring technology which allows users to negotiate and enter financial and business transactions
Software as a service (SAAS) services featuring software for video con...
on 08 Jun 2021
ONESPAN NORTH AMERICA INC.
87911824 · 08 May 2018
08 Jun 2027
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Mobile application software for automating and securing the interaction between users and computer based business applications; software in the field of machine learning and artificial intelligence for automating and securing the interaction between users and computer based business applications; cyber security software; downloadable computer security software for restricting unauthorized access to computers, computer networks, websites, computer-based applications and for ensuring authenticity and integrity of electronic transactions; software for network and device security for restricting unauthorized access to computers, computer networks, websites, computer-based applications; software for application, transaction and identity security related to mobile device applications for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and for ensuring authenticity and integrity of transactions submitted by users of mobile device applications; software for data security for authenticating, enforcing, restricting and controlling access privileges to users and for ensuring authenticity and integrity of transactions submitted by users; software for ensuring the security of electronic mail by authenticating, enforcing, restricting and controlling access privileges to users; software for computer virus tracking and computer virus neutralization; electronic publications, namely, journals, books, manuals, magazines, brochures, downloadable, relating to the field of cyber security, internet security, computer security, computer network security, data security and cryptography; software development kits (SDK); computer security software development kits (SDK); mobile application software security development kits (SDK); software development kits (SDK) for authentication of user identities; software development kits (SDK) for biometric security software; real-time fraud prevention software for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and computer-based applications and for ensuring authenticity and integrity of transactions submitted by users of computer-based applications; software for monitoring, detecting and blocking of fraudulent electronic transactions submitted to computer-based applications; software for logging, monitoring and securing computer software applications hosted by server computers and accessible via computer networks, including the internet and mobile networks; software for analyzing, and detecting unusual patterns in user and transaction data including behavioral and contextual data; software for behavioral analytics for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and computer-based applications and for ensuring authenticity and integrity of transactions submitted by users of mobile device applications and computer-based applications; mobile application security software for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and computer-based applications and for ensuring authenticity and integrity of transactions submitted by users of mobile device applications and computer-based applications; software for protecting mobile applications against cyber threats, computer viruses, phishing attacks, computer malware, man-in-the-middle attacks; software for detecting, preventing and reporting mobile cyber attacks against computer-based applications; computer anti-malware software; runtime application self-protection software, namely, computer anti-malware software; tamper detection software, namely, software for detecting illegitimate tampering by unauthorized entities with electronic devices or software; device identification and device binding software, namely, software for identifying an individual electronic device, and software for binding a software application instance to an individual electronic device; device fingerprinting software, namely, software for collecting information about the hardware utilized by a website visitor and creating a profile to identify the visitor; secure storage software, namely, software for secure electronic storage of data; secure communications software, namely, software for monitoring and controlling communication between computers and automated machine systems; electronic apparatus, namely, smart card readers, USB tokens and authentication tokens for enabling secure telecommunications; computer peripheral equipment; smart card readers; USB hardware; USB smart card readers; USB tokens, namely, USB computer access control key; blank smart cards embedded with transponders; encoded smart cards containing program instructions used to authenticate users or to store PKI certificates; replacement parts and fittings for all the aforesaid goods; electronic apparatus, namely, hardware authentication tokens, USB hardware, USB security tokens, and encoded smart cards, all the foregoing containing programming used for security, authentication and encryption; cards encoded with security features for identification purposes; electronic security tags; radio frequency identification (RFID) tags; electronic apparatus, namely, hardware authentication tokens, computer peripheral equipment, USB hardware, USB security tokens containing program instructions used to store, generate or use personal identification or authentication data, personal identification numbers, PKI certificates, and encryption keys, smart cards encoded with program instructions used to store personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and software, computer server software and mobile application software, all containing program instructions used to store, generate or use personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys or encryption keys all for use in the field of cyber security, internet security, computer security, computer network security and cryptography; electronic apparatus, namely, computer peripheral equipment, USB hardware, USB security tokens, smart cards encoded with program instructions used to store, generate or use, personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and software, computer server software and mobile application software, used all for the protection of online transactions and data transfer by electronic means; electronic apparatus, namely, computer peripheral equipment, USB hardware, USB security tokens, smart cards encoded with program instructions used to store, generate or use, personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and software, computer software and mobile application software, all for electronic generation and verification of authentication credentials and signatures; electronic apparatus, namely, computer peripheral equipment, USB hardware, USB security tokens, smart cards encoded with program instructions used to store, generate or use personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and software, computer server software and mobile application software, all for use in, for connecting to and for providing public key infrastructures (PKI); electronic identification devices, namely, authentication tokens, programmed with specific parameters to obtain an authentication code for securing electronic transactions, bank operations, remote application access and securing data transfers; electronic security tokens in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication to access computers, web sites, remote computer based applications, electronic networks and databases; software, mobile application software, and authentication security token hardware and smart card readers, all for optically capturing digital information; software, mobile application software, and authentication security token hardware and smart card readers, all for capturing and decoding 2D-barcodes; electronic apparatus, namely, fingerprint scanners and biometric retinal scanners, and software for use in the field of biometric identify verification; electronic apparatus, namely, fingerprint scanners and biometric retinal scanners, and software for biometric systems for the identification and authentication of persons; electronic apparatus, namely, fingerprint scanners and biometric retinal scanners, and software for capturing, analyzing and verifying biometric traits; electronic apparatus, namely, fingerprint scanners and biometric retinal scanners, and software for capturing, analyzing and verifying fingerprints, retinal scan, voice, heartbeat, gait and vein patterns; biometric readers, namely, fingerprint scanners and biometric retinal scanners; face recognition software; software for capturing, analyzing and verifying behavioral biometrics; behavioral authentication software, namely, software for authenticating users based on the behavioral biometrics of these users; software for behavioral biometrics, namely, for recording and analyzing dynamic keystrokes and swiping finger patterns on mobile device input screens; software for capturing, analyzing and verifying geolocation data; electronic apparatus and software for recording, processing, manipulating and analyzing sounds and images; electronic apparatus, namely, computer hardware and software for providing cyber security, internet security, computer security, computer network security, data security and cryptography; electronic apparatus, namely, authentication security token hardware and smart card readers and software, computer server software and mobile application software for data encryption and authentication in the fields of security, data security, and user authentication; electronic apparatus, namely, computer hardware and software for providing multi-factor user authentication for security purposes; electronic apparatus, namely, computer hardware and software for providing layered security to protect data; electronic apparatus, namely, computer hardware and software for continuous, transparent and frictionless user authentication for identification purposes; software for coordinating and orchestrating user authentication and cyber security for authenticating, enforcing, restricting and controlling access privileges to users of mobile devices and applications; electronic apparatus, namely, computer hardware and software for protecting computer networks by authenticating, enforcing, restricting and controlling access privileges to users of computer networks, mobile devices and applications; electronic apparatus, namely, computer hardware and software for securing telecommunications, data communications, electronic communications and digital communications by authenticating, enforcing, restricting and controlling access privileges to users of computer networks, mobile devices and applications; electronic apparatus, namely, computer hardware and software for securing access to and operation on the internet by authenticating, enforcing, restricting and controlling access privileges to users of computers, mobile devices and applications; electronic apparatus, namely, computer hardware and software for secure data-transfer by electronic means and via computer networks; electronic apparatus, namely, computer hardware and software for identification of persons; electronic apparatus, namely, computer hardware and software for providing, verifying and proving the identity of persons; electronic apparatus, namely, computer hardware and computer software used to identify and authenticate users of intranet and internet websites and used to authenticate user access to intranet and internet sites, wide area networks (WAN) and local area networks (LAN) in order to secure online communications and transactions; electronic apparatus, namely, computer hardware and software for limiting access control to physical and virtual spaces, to electronic systems, to computers, to electronic networks, to websites, to computer based applications and to electronic databases; electronic apparatus, namely, computer hardware and computer software used for remote control of access to computers, computer based applications and telecommunications networks; electronic apparatus, namely, computer hardware and software for digital certificate and encryption key management in the field of public key infrastructures (PKI); electronic apparatus, namely, computer hardware and software used for securing electronic and online transactions; electronic apparatus, namely, computer hardware and software for providing of irrevocable and authenticated electronic and online transactions; electronic apparatus, namely, computer hardware and software for the certification of orders given via computer and certifying electronic instructions for transactions; electronic apparatus, namely, computer hardware and software for secure electronic transaction authentication for use in the field of banking and online consumer transactions; electronic apparatus, namely, computer hardware and software used for ensuring the security of electronic banking operations and bank transactions; electronic apparatus, namely, computer hardware and software for securing internet banking electronic transactions; electronic apparatus, namely, computer hardware and software used for ensuring the security and authentication of sales orders transactions given by computer; electronic apparatus, namely, computer hardware and software for use in the field of risk analysis, namely, risk analysis of electronic and remote electronic transactions, electronic transaction requests, and electronic network, account and computer access requests; software for assessing the security risk associated with end user identities; electronic apparatus, namely, computer hardware and software in the field of fraud detection, risk detection, risk management, fraud management, risk analysis, fraud analysis and fraud prevention, all related to electronic, digital, online and remote electronic transactions; electronic apparatus, namely, computer hardware and software for securing and protecting access to virtual, electronic and digital assets; electronic apparatus, namely, computer hardware and software for creating, managing and transferring digital money, electronic and digital currencies and cryptocurrencies; electronic apparatus, namely, computer hardware and software for creating, managing and transferring distributed ledgers and blockchains; electronic apparatus, namely, computer hardware and software for creating, managing and transferring digital data; electronic apparatus, namely, computer hardware and software for authenticating, certifying and controlling access to digital data; electronic apparatus, namely, computer hardware and software for creating, managing, controlling the use, modification, and distribution of copyrighted works; electronic apparatus, namely, computer hardware and software for storing, managing, encrypting, and protecting access to personal data; electronic apparatus, namely, computer hardware and software for storing, managing and controlling access to personal identity information; software for use for customer enrollment, customer management and electronic transactions; electronic apparatus, namely, computer hardware and transactional software for securing electronic payment services, internet banking and mobile banking services; electronic apparatus, namely, computer hardware and software for governments to communicate and interact with citizens; software for creating and managing electronic signature applications and systems, including administrative and user applications and digital storage systems; software programs allowing users to electronically approve documents using secure electronic signatures; electronic apparatus, namely, computer hardware and software for the recording, the manipulation, the archiving, the security, the encoding of sound, images and data, including via the internet; software for capturing an approval of an electronic or online electronic transaction; software for generating and capturing electronic proof of authorization of electronic and online electronic transactions and documents; software for generating electronic signatures; software for electronically signing electronic and online electronic transactions; software for signing electronic documents; software for capturing electronic document signatures; software for electronic document management; software allowing users to electronically send, sign, receive and manage documents as part of an electronic business transaction; software for authenticating and certifying the legal enforceability, regulatory compliance and auditability of documents or transactions; software for securing electronic forensic evidence relating to the business transaction process and documents; electronic signature and transaction management software programs allowing users to electronically send, sign, receive and manage documents as part of an electronic business transaction, to ensure the legal enforceability, regulatory compliance and auditability of the documents and transactions, and to obtain secure electronic forensic evidence relating to the business transaction process and documents; software for capturing and storing electronic data; software for capturing and storing audit trail data of electronic, digital and online transactions; software for capturing and storing electronic signature data; software for capturing and storing electronic evidence data that allows reproducing exactly what a signer saw and did regarding an electronic signature; software for capturing and storing audit trail data of electronic, digital and online transactions that allows reproducing exactly what a signer of an electronic document saw and did in making the electronic signature; software for capturing and storing data documenting an electronic signature process; software for capturing and storing data documenting electronic delivery of documents and information; software for viewing and reviewing electronic evidence data files; software for viewing and reviewing audit trail data files; software for viewing and reviewing electronic signature data; software for viewing and reviewing electronic evidence data that allows reproducing exactly what a signer saw and did regarding an electronic signature or transaction; software for viewing and reviewing audit trail data files that allows reproducing exactly what a signer of an electronic document saw and did when using a document; software for viewing and reviewing data files documenting an electronic signature process; software for viewing and reviewing data documenting electronic delivery of documents and information; software for reviewing and verifying electronic forensic evidence data files; document management software for reproducing an authorization and approval process of electronic transactions and documents; document management software for reproducing a signing process of electronic transactions and documents; software for securely storing electronic document files; electronic vaulting software, namely, software for securely storing electronic document files
038
Class 038
Communications Services
Color is not claimed as a feature of the mark.
...
Class 042
Computer & Software Services & Scientific Services
Mobile application software for automating and securing the interaction between users and computer based business applications; software in the field of machine learning and artificial intelligence for automating and securing the interaction between users and computer based business applications; cyber security software; downloadable computer security software for restricting unauthorized access to computers, computer networks, websites, computer-based applications and for ensuring authenticity and integrity of electronic transactions; software for network and device security for restricting unauthorized access to computers, computer networks, websites, computer-based applications; software for application, transaction and identity security related to mobile device applications for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and for ensuring authenticity and integrity of transactions submitted by users of mobile device applications; software for data security for authenticating, enforcing, restricting and controlling access privileges to users and for ensuring authenticity and integrity of transactions submitted by users; software for ensuring the security of electronic mail by authenticating, enforcing, restricting and controlling access privileges to users; software for computer virus tracking and computer virus neutralization; electronic publications, namely, journals, books, manuals, magazines, brochures, downloadable, relating to the field of cyber security, internet security, computer security, computer network security, data security and cryptography; software development kits (SDK); computer security software development kits (SDK); mobile application software security development kits (SDK); software development kits (SDK) for authentication of user identities; software development kits (SDK) for biometric security software; real-time fraud prevention software for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and computer-based applications and for ensuring authenticity and integrity of transactions submitted by users of computer-based applications; software for monitoring, detecting and blocking of fraudulent electronic transactions submitted to computer-based applications; software for logging, monitoring and securing computer software applications hosted by server computers and accessible via computer networks, including the internet and mobile networks; software for analyzing, and detecting unusual patterns in user and transaction data including behavioral and contextual data; software for behavioral analytics for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and computer-based applications and for ensuring authenticity and integrity of transactions submitted by users of mobile device applications and computer-based applications; mobile application security software for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and computer-based applications and for ensuring authenticity and integrity of transactions submitted by users of mobile device applications and computer-based applications; software for protecting mobile applications against cyber threats, computer viruses, phishing attacks, computer malware, man-in-the-middle attacks; software for detecting, preventing and reporting mobile cyber attacks against computer-based applications; computer anti-malware software; runtime application self-protection software, namely, computer anti-malware software; tamper detection software, namely, software for detecting illegitimate tampering by unauthorized entities with electronic devices or software; device identification and device binding software, namely, software for identifying an individual electronic device, and software for binding a software application instance to an individual electronic device; device fingerprinting software, namely, software for collecting information about the hardware utilized by a website visitor and creating a profile to identify the visitor; secure storage software, namely, software for secure electronic storage of data; secure communications software, namely, software for monitoring and controlling communication between computers and automated machine systems; electronic apparatus, namely, smart card readers, USB tokens and authentication tokens for enabling secure telecommunications; computer peripheral equipment; smart card readers; USB hardware; USB smart card readers; USB tokens, namely, USB computer access control key; blank smart cards embedded with transponders; encoded smart cards containing program instructions used to authenticate users or to store PKI certificates; replacement parts and fittings for all the aforesaid goods; electronic apparatus, namely, hardware authentication tokens, USB hardware, USB security tokens, and encoded smart cards, all the foregoing containing programming used for security, authentication and encryption; cards encoded with security features for identification purposes; electronic security tags; radio frequency identification (RFID) tags; electronic apparatus, namely, hardware authentication tokens, computer peripheral equipment, USB hardware, USB security tokens containing program instructions used to store, generate or use personal identification or authentication data, personal identification numbers, PKI certificates, and encryption keys, smart cards encoded with program instructions used to store personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and software, computer server software and mobile application software, all containing program instructions used to store, generate or use personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys or encryption keys all for use in the field of cyber security, internet security, computer security, computer network security and cryptography; electronic apparatus, namely, computer peripheral equipment, USB hardware, USB security tokens, smart cards encoded with program instructions used to store, generate or use, personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and software, computer server software and mobile application software, used all for the protection of online transactions and data transfer by electronic means; electronic apparatus, namely, computer peripheral equipment, USB hardware, USB security tokens, smart cards encoded with program instructions used to store, generate or use, personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and software, computer software and mobile application software, all for electronic generation and verification of authentication credentials and signatures; electronic apparatus, namely, computer peripheral equipment, USB hardware, USB security tokens, smart cards encoded with program instructions used to store, generate or use personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and software, computer server software and mobile application software, all for use in, for connecting to and for providing public key infrastructures (PKI); electronic identification devices, namely, authentication tokens, programmed with specific parameters to obtain an authentication code for securing electronic transactions, bank operations, remote application access and securing data transfers; electronic security tokens in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication to access computers, web sites, remote computer based applications, electronic networks and databases; software, mobile application software, and authentication security token hardware and smart card readers, all for optically capturing digital information; software, mobile application software, and authentication security token hardware and smart card readers, all for capturing and decoding 2D-barcodes; electronic apparatus, namely, fingerprint scanners and biometric retinal scanners, and software for use in the field of biometric identify verification; electronic apparatus, namely, fingerprint scanners and biometric retinal scanners, and software for biometric systems for the identification and authentication of persons; electronic apparatus, namely, fingerprint scanners and biometric retinal scanners, and software for capturing, analyzing and verifying biometric traits; electronic apparatus, namely, fingerprint scanners and biometric retinal scanners, and software for capturing, analyzing and verifying fingerprints, retinal scan, voice, heartbeat, gait and vein patterns; biometric readers, namely, fingerprint scanners and biometric retinal scanners; face recognition software; software for capturing, analyzing and verifying behavioral biometrics; behavioral authentication software, namely, software for authenticating users based on the behavioral biometrics of these users; software for behavioral biometrics, namely, for recording and analyzing dynamic keystrokes and swiping finger patterns on mobile device input screens; software for capturing, analyzing and verifying geolocation data; electronic apparatus and software for recording, processing, manipulating and analyzing sounds and images; electronic apparatus, namely, computer hardware and software for providing cyber security, internet security, computer security, computer network security, data security and cryptography; electronic apparatus, namely, authentication security token hardware and smart card readers and software, computer server software and mobile application software for data encryption and authentication in the fields of security, data security, and user authentication; electronic apparatus, namely, computer hardware and software for providing multi-factor user authentication for security purposes; electronic apparatus, namely, computer hardware and software for providing layered security to protect data; electronic apparatus, namely, computer hardware and software for continuous, transparent and frictionless user authentication for identification purposes; software for coordinating and orchestrating user authentication and cyber security for authenticating, enforcing, restricting and controlling access privileges to users of mobile devices and applications; electronic apparatus, namely, computer hardware and software for protecting computer networks by authenticating, enforcing, restricting and controlling access privileges to users of computer networks, mobile devices and applications; electronic apparatus, namely, computer hardware and software for securing telecommunications, data communications, electronic communications and digital communications by authenticating, enforcing, restricting and controlling access privileges to users of computer networks, mobile devices and applications; electronic apparatus, namely, computer hardware and software for securing access to and operation on the internet by authenticating, enforcing, restricting and controlling access privileges to users of computers, mobile devices and applications; electronic apparatus, namely, computer hardware and software for secure data-transfer by electronic means and via computer networks; electronic apparatus, namely, computer hardware and software for identification of persons; electronic apparatus, namely, computer hardware and software for providing, verifying and proving the identity of persons; electronic apparatus, namely, computer hardware and computer software used to identify and authenticate users of intranet and internet websites and used to authenticate user access to intranet and internet sites, wide area networks (WAN) and local area networks (LAN) in order to secure online communications and transactions; electronic apparatus, namely, computer hardware and software for limiting access control to physical and virtual spaces, to electronic systems, to computers, to electronic networks, to websites, to computer based applications and to electronic databases; electronic apparatus, namely, computer hardware and computer software used for remote control of access to computers, computer based applications and telecommunications networks; electronic apparatus, namely, computer hardware and software for digital certificate and encryption key management in the field of public key infrastructures (PKI); electronic apparatus, namely, computer hardware and software used for securing electronic and online transactions; electronic apparatus, namely, computer hardware and software for providing of irrevocable and authenticated electronic and online transactions; electronic apparatus, namely, computer hardware and software for the certification of orders given via computer and certifying electronic instructions for transactions; electronic apparatus, namely, computer hardware and software for secure electronic transaction authentication for use in the field of banking and online consumer transactions; electronic apparatus, namely, computer hardware and software used for ensuring the security of electronic banking operations and bank transactions; electronic apparatus, namely, computer hardware and software for securing internet banking electronic transactions; electronic apparatus, namely, computer hardware and software used for ensuring the security and authentication of sales orders transactions given by computer; electronic apparatus, namely, computer hardware and software for use in the field of risk analysis, namely, risk analysis of electronic and remote electronic transactions, electronic transaction requests, and electronic network, account and computer access requests; software for assessing the security risk associated with end user identities; electronic apparatus, namely, computer hardware and software in the field of fraud detection, risk detection, risk management, fraud management, risk analysis, fraud analysis and fraud prevention, all related to electronic, digital, online and remote electronic transactions; electronic apparatus, namely, computer hardware and software for securing and protecting access to virtual, electronic and digital assets; electronic apparatus, namely, computer hardware and software for creating, managing and transferring digital money, electronic and digital currencies and cryptocurrencies; electronic apparatus, namely, computer hardware and software for creating, managing and transferring distributed ledgers and blockchains; electronic apparatus, namely, computer hardware and software for creating, managing and transferring digital data; electronic apparatus, namely, computer hardware and software for authenticating, certifying and controlling access to digital data; electronic apparatus, namely, computer hardware and software for creating, managing, controlling the use, modification, and distribution of copyrighted works; electronic apparatus, namely, computer hardware and software for storing, managing, encrypting, and protecting access to personal data; electronic apparatus, namely, computer hardware and software for storing, managing and controlling access to personal identity information; software for use for customer enrollment, customer management and electronic transactions; electronic apparatus, namely, computer hardware and transactional software for securing electronic payment services, internet banking and mobile banking services; electronic apparatus, namely, computer hardware and software for governments to communicate and interact with citizens; software for creating and managing electronic signature applications and systems, including administrative and user applications and digital storage systems; software programs allowing users to electronically approve documents using secure electronic signatures; electronic apparatus, namely, computer hardware and software for the recording, the manipulation, the archiving, the security, the encoding of sound, images and data, including via the internet; software for capturing an approval of an electronic or online electronic transaction; software for generating and capturing electronic proof of authorization of electronic and online electronic transactions and documents; software for generating electronic signatures; software for electronically signing electronic and online electronic transactions; software for signing electronic documents; software for capturing electronic document signatures; software for electronic document management; software allowing users to electronically send, sign, receive and manage documents as part of an electronic business transaction; software for authenticating and certifying the legal enforceability, regulatory compliance and auditability of documents or transactions; software for securing electronic forensic evidence relating to the business transaction process and documents; electronic signature and transaction management software programs allowing users to electronically send, sign, receive and manage documents as part of an electronic business transaction, to ensure the legal enforceability, regulatory compliance and auditability of the documents and transactions, and to obtain secure electronic forensic evidence relating to the business transaction process and documents; software for capturing and storing electronic data; software for capturing and storing audit trail data of electronic, digital and online transactions; software for capturing and storing electronic signature data; software for capturing and storing electronic evidence data that allows reproducing exactly what a signer saw and did regarding an electronic signature; software for capturing and storing audit trail data of electronic, digital and online transactions that allows reproducing exactly what a signer of an electronic document saw and did in making the electronic signature; software for capturing and storing data documenting an electronic signature process; software for capturing and storing data documenting electronic delivery of documents and information; software for viewing and reviewing electronic evidence data files; software for viewing and reviewing audit trail data files; software for viewing and reviewing electronic signature data; software for viewing and reviewing electronic evidence data that allows reproducing exactly what a signer saw and did regarding an electronic signature or transaction; software for viewing and reviewing audit trail data files that allows reproducing exactly what a signer of an electronic document saw and did when using a document; software for viewing and reviewing data files documenting an electronic signature process; software for viewing and reviewing data documenting electronic delivery of documents and information; software for reviewing and verifying electronic forensic evidence data files; document management software for reproducing an authorization and approval process of electronic transactions and documents; document management software for reproducing a signing process of electronic transactions and documents; software for securely storing electronic document files; electronic vaulting software, namely, software for securely storing electronic document files
Color is not claimed as a feature of the mark.,Mobile application soft...
on 18 May 2021
ONESPAN NORTH AMERICA INC.
87911797 · 08 May 2018
18 May 2027
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Mobile application software for automating and securing the interaction between users and computer based business applications; software in the field of machine learning and artificial intelligence for automating and securing the interaction between users and computer based business applications; Cyber security software; authentication server software; authentication library software; downloadable computer security software for restricting unauthorized access to computers, computer networks, websites, computer-based applications and for ensuring authenticity and integrity of electronic transactions; software for network and device security for restricting unauthorized access to computers, computer networks, websites, computer-based applications; software for application, transaction and identity security related to mobile device applications for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and for ensuring authenticity and integrity of transactions submitted by users of mobile device applications; software for data security for authenticating, enforcing, restricting and controlling access privileges to users and for ensuring authenticity and integrity of transactions submitted by users; software for ensuring the security of electronic mail by authenticating, enforcing, restricting and controlling access privileges to users; Electronic publications, namely, journals, books, manuals, magazines, brochures, downloadable, relating to the field of cyber security, internet security, computer security, computer network security, data security and cryptography; Software development kits (SDK); computer security Software Development Kits (SDK); mobile application software security development kits (SDK); Software development kits (SDK) for authentication of user identities; Software development kits (SDK) for biometric security software; real-time fraud prevention software for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and computer-based applications and for ensuring authenticity and integrity of transactions submitted by users of computer-based applications; software for monitoring, detecting and blocking of fraudulent electronic transactions submitted to computer-based applications; software for logging, monitoring and securing of computer-based services accessible via computer networks, including the internet and mobile networks; software for analyzing, and detecting unusual patterns in user and transaction data including behavioral and contextual data; software for behavioral analytics for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and computer-based applications and for ensuring authenticity and integrity of transactions submitted by users of mobile device applications and computer-based applications; Mobile application security software for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and computer-based applications and for ensuring authenticity and integrity of transactions submitted by users of mobile device applications and computer-based applications; software for protecting mobile applications against cyber threats, computer viruses, phishing attacks, computer malware, man-in-the-middle attacks; software for detecting, preventing and reporting mobile cyber attacks against computer-based applications; computer anti-malware software; runtime application self-protection software, namely, computer anti-malware software; tamper detection software, namely, software for detecting illegitimate tampering by unauthorized entities with electronic devices or software; device identification and device binding software, namely, software for identifying an individual electronic device, and software for binding a software application instance to an individual electronic device; device fingerprinting software, namely, software for generating a fingerprint of a computing device; secure communications software, namely, software for monitoring and controlling communication between computers and automated machine systems; electronic apparatus, namely, smart cards, smart card readers, USB tokens and authentication tokens for enabling secure telecommunications; Computer peripheral equipment; Smart card readers; wireless radio enabled devices, namely, authentication tokens with a wireless radio interface; USB hardware; USB smart card readers; USB tokens, namely, USB computer access control key; Electronic key fobs, namely, hardware authentication tokens; blank smart cards embedded with transponders; encoded smart cards containing program instructions used to authenticate users or to store PKI certificates; replacement parts and fittings for all the aforesaid goods; Electronic apparatus, namely, hardware authentication tokens, USB hardware, USB security tokens, and encoded smart cards, all the foregoing containing programming used for security, authentication and encryption; cards encoded with security features for identification purposes; electronic security tags; Electronic apparatus, namely, hardware authentication tokens, computer peripheral equipment, USB hardware, USB security tokens containing program instructions used to store, generate or use personal identification or authentication data, personal identification numbers, PKI certificates, and encryption keys, smart cards encoded with program instructions used to store personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and software, computer server software and mobile application software, all containing program instructions used to store, generate or use personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys or encryption keys all for use in the field of cyber security, internet security, computer security, computer network security and cryptography; Electronic apparatus, namely, computer peripheral equipment, USB hardware, USB security tokens, smart cards encoded with program instructions used to store, generate or use, personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and software, computer server software and mobile application software, used all for the protection of online transactions and data transfer by electronic means; Electronic apparatus, namely, computer peripheral equipment, USB hardware, USB security tokens, smart cards encoded with program instructions used to store, generate or use, personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and software, computer software and mobile application software, all for electronic generation and verification of authentication credentials and signatures; Electronic apparatus, namely, computer peripheral equipment, USB hardware, USB security tokens, smart cards encoded with program instructions used to store, generate or use personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and software, computer server software and mobile application software, all for use in, for connecting to and for providing Public Key Infrastructures (PKI); Electronic identification devices, namely, authentication tokens, programmed with specific parameters to obtain an authentication code for securing electronic transactions, bank operations, remote application access and securing data transfers; Electronic security tokens in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication to access computers, web sites, remote computer based applications, electronic networks and databases; Software, mobile application software, electronic apparatus, namely, authentication security token hardware and smart card readers adapted to optically capture digital information; software, mobile application software, electronic apparatus, namely, authentication security token hardware and smart card readers for capturing and decoding 2D-barcodes; software for use in the field of biometric identify verification; software for biometric systems for the identification and authentication of persons; software for capturing, analyzing and verifying biometric traits; software for capturing, analyzing and verifying fingerprints; Face recognition software; software for capturing, analyzing and verifying behavioral biometrics; behavioral authentication software, namely, software for authenticating users based on the behavioral biometrics of these users; Software for behavioral biometrics, namely, for recording and analyzing dynamic keystrokes and swiping finger patterns on mobile device input screens; Software for capturing, analyzing and verifying geolocation data; Electronic apparatus and software for providing cyber security, internet security, computer security, computer network security, data security and cryptography; Electronic apparatus, namely, authentication security token hardware and smart card readers and software, computer server software and mobile application software for data encryption and authentication in the fields of security, data security, and user authentication; Electronic apparatus hardware and software for providing multi-factor user authentication for security purposes; Electronic apparatus, namely, hardware and software for providing layered security to protect data; Electronic apparatus, namely, hardware and software for continuous, transparent and frictionless user authentication for identification purposes; software for coordinating and orchestrating user authentication and cyber security for authenticating, enforcing, restricting and controlling access privileges to users of mobile devices and applications; Electronic apparatus, namely, hardware and software for protecting computer networks by authenticating, enforcing, restricting and controlling access privileges to users of computer networks, mobile devices and applications; Electronic apparatus, namely, hardware and software for securing telecommunications, data communications, electronic communications and digital communications by authenticating, enforcing, restricting and controlling access privileges to users of computer networks, mobile devices and applications; Electronic apparatus, namely, hardware and software for securing access to and operation on the Internet by authenticating, enforcing, restricting and controlling access privileges to users of computers, mobile devices and applications; Electronic apparatus, namely, hardware and software for secure data-transfer by electronic means and via computer networks; Electronic apparatus, namely, hardware and software for identification of persons; electronic apparatus, namely, hardware and software for providing, verifying and proving the identity of persons; Electronic apparatus, namely, hardware and computer software used to identify and authenticate users of intranet and internet websites and used to authenticate user access to intranet and internet sites, wide area networks (WAN) and local area networks (LAN) in order to secure online communications and transactions; Electronic apparatus, namely, hardware and software for limiting access control to physical and virtual spaces, to electronic systems, to computers, to electronic networks, to websites, to computer based applications and to electronic databases; Electronic apparatus, namely, hardware and computer software used for remote control of access to computers, computer based applications and telecommunications networks; Electronic apparatus, namely, hardware and software for digital certificate and encryption key management in the field of Public Key Infrastructures (PKI); Electronic apparatus, namely, hardware and software used for securing electronic and online transactions; Electronic apparatus, namely, hardware and software for providing of irrevocable and authenticated electronic and online transactions; Electronic apparatus, namely, hardware and software for the certification of orders given via computer and certifying electronic instructions for transactions; Electronic apparatus, namely, hardware and software for secure electronic transaction authentication for use in the field of banking and online consumer transactions; Electronic apparatus, namely, hardware and software used for ensuring the security of electronic banking operations and bank transactions; Electronic apparatus, namely, hardware and software for securing internet banking electronic transactions; Electronic apparatus, namely, hardware and software used for ensuring the security and authentication of sales orders transactions given by computer; Electronic apparatus, namely, hardware and software for use in the field of risk analysis, namely, risk analysis of electronic and remote electronic transactions, electronic transaction requests, and electronic network, account and computer access requests; software for assessing the security risk associated with end user identities; Electronic apparatus, namely, hardware and software in the field of fraud detection, risk detection, risk management, fraud management, risk analysis, fraud analysis and fraud prevention, all related to electronic, digital, online and remote electronic transactions; Electronic apparatus, namely, hardware and software for securing and protecting access to virtual, electronic and digital assets; Electronic apparatus, namely, hardware and software for creating, managing and transferring digital money, electronic and digital currencies and cryptocurrencies; Electronic apparatus, namely, hardware and software for creating, managing and transferring distributed ledgers and blockchains; Electronic apparatus, namely, hardware and software for creating, managing and transferring digital data; Electronic apparatus, namely, hardware and software for authenticating, certifying and controlling access to digital data; Electronic apparatus, namely, hardware and software for creating, managing, controlling the use, modification, and distribution of copyrighted works; Electronic apparatus, namely, hardware and software for storing, managing, encrypting, and protecting access to personal data; Electronic apparatus, namely, hardware and software for storing, managing and controlling access to personal identity information; software for use for customer enrollment, customer management and electronic transactions; Electronic apparatus, namely, hardware and transactional software for securing electronic payment services, internet banking and mobile banking services; Electronic apparatus, namely, hardware and software for governments to communicate with and provide services to citizens; software for creating and managing electronic signature applications and systems, including administrative and user applications and digital storage systems; Software programs allowing users to electronically approve documents using secure electronic signatures; Electronic apparatus, namely, hardware and software for the security, the encoding of sound, images and data, including via the Internet; Software for capturing an approval of an electronic or online electronic transaction; software for generating and capturing electronic proof of authorization of electronic and online electronic transactions and documents; software for generating electronic signatures; software for electronically signing electronic and online electronic transactions; software for signing electronic documents; software for capturing electronic document signatures; Software for electronic document management; software allowing users to electronically send, sign, receive and manage documents as part of an electronic business transaction; software for authenticating and certifying the legal enforceability, regulatory compliance and auditability of documents or transactions; software for securing electronic forensic evidence relating to the business transaction process and documents; Electronic signature and transaction management software programs allowing users to electronically send, sign, receive and manage documents as part of an electronic business transaction, to ensure the legal enforceability, regulatory compliance and auditability of the documents and transactions, and to obtain secure electronic forensic evidence relating to the business transaction process and documents; software for capturing and storing electronic data; software for capturing and storing audit trail data of electronic, digital and online transactions; Software for capturing and storing electronic signature data; software for capturing and storing electronic evidence data that allows reproducing exactly what a signer saw and did regarding an electronic signature; software for capturing and storing audit trail data of electronic, digital and online transactions that allows reproducing exactly what a signer of an electronic document saw and did in making the electronic signature; Software for capturing and storing data documenting an electronic signature process; software for capturing and storing data documenting electronic delivery of documents and information; Software for viewing and reviewing electronic evidence data files; software for viewing and reviewing audit trail data files; software for viewing and reviewing electronic signature data; Software for viewing and reviewing electronic evidence data that allows reproducing exactly what a signer saw and did regarding an electronic signature or transaction; software for viewing and reviewing audit trail data files that allows reproducing exactly what a signer of an electronic document saw and did when using a document; software for viewing and reviewing data files documenting an electronic signature process; software for viewing and reviewing data documenting electronic delivery of documents and information; software for reviewing and verifying electronic forensic evidence data files; document management software for reproducing an authorization and approval process of electronic transactions and documents; document management software for reproducing a signing process of electronic transactions and documents; Software for securely storing electronic document files; electronic vaulting software, namely, software for securely storing electronic document files; all the aforementioned to the exception of computer hardware and computer software for formal verification (this does not include personal identity verification and authentication) and sequential equivalence checking, in particular in the field of semiconductor production
038
Class 038
Communications Services
Providing access to telecommunications networks; Providing private and secure real time electronic communication over a computer network; providing access to telecommunications networks especially through secured telecommunication networks by means of online authentication of electronic signatures and online generation and verification of authentication credentials and electronic signatures; Services of providing access to telecommunication networks; Information, advisory and consultancy services in relation to all the aforesaid services; all the aforementioned services to the exception of education, providing of training, arranging and conducting of workshops and training courses, computer training; all of the aforementioned exceptions only for formal verification, this does not include personal identity verification and authentication, and sequential equivalence checking purposes, in particular in the field of semiconductor production
...
Class 042
Computer & Software Services & Scientific Services
ONE SPAN
Mobile application software for automating and securing the interactio...
on 13 Jul 2020
ONESPAN NORTH AMERICA INC.
75676467 · 07 Apr 1999
13 Jun 2030
009
Class 009
Computer & Software Products & Electrical & Scientific Products
DIGITAL PASS
DIGITAL PASS,electronic device for controlling user access to electron...
on 17 Jun 2020
ONESPAN NORTH AMERICA INC.
77637716 · 22 Dec 2008
27 May 2030
009
Class 009
Computer & Software Products & Electrical & Scientific Products
The mark consists of a football shaped oval design of an electronic security token featuring a single button shaped along the curve of the token's outer edge and a display window in the center of the token. The display and button depicted in broken lines are not claimed as features of the mark.
The mark consists of a football shaped oval design of an electronic se...
on 01 Jul 2019
ONESPAN NORTH AMERICA INC.
77529365 · 23 Jul 2008
28 May 2029
009
Class 009
Computer & Software Products & Electrical & Scientific Products
authentication tokens and software used for the protection of on-line transactions and data transfer by electronic means; authentication tokens and software for access control to computers, electronic networks, databases, and physical spaces; authentication tokens and software for electronic generation of authentication credentials and signatures; smart card readers and encoded smart cards containing programs used for performing cryptographic functions, generating or verifying credentials; all of the above excluding document scanners, software for use in document scanners or for use with document scanners
042
Class 042
Computer & Software Services & Scientific Services
authentication tokens and software used for the protection of on-line transactions and data transfer by electronic means; authentication tokens and software for access control to computers, electronic networks, databases, and physical spaces; authentication tokens and software for electronic generation of authentication credentials and signatures; smart card readers and encoded smart cards containing programs used for performing cryptographic functions, generating or verifying credentials; all of the above excluding document scanners, software for use in document scanners or for use with document scanners
authentication tokens and software used for the protection of on-line ...
on 29 Jun 2019
ONESPAN NORTH AMERICA INC.
77529628 · 23 Jul 2008
28 May 2029
009
Class 009
Computer & Software Products & Electrical & Scientific Products
[ software used for the protection of on-line transactions and data transfer by electronic means; ] devices for the protection of on-line transactions and data transfer by electronic means, namely, authentication tokens, [ encoded smart cards containing programs for performing cryptographic functions, generating or verifying credentials, smart card readers, and security appliances; software for access control to computers, computer systems, electronic networks, and databases; ] devices for controlling access to computers, computer systems, electronic networks, and databases, namely, authentication tokens [ encoded smart cards containing programs for performing cryptographic functions, generating or verifying credentials, smart card readers, and security appliances ]
042
Class 042
Computer & Software Services & Scientific Services
The mark consists of a stylized "V" surrounded by stylized parentheses.
The mark consists of a stylized "V" surrounded by stylized parentheses...
on 11 May 2019
ONESPAN NORTH AMERICA INC.
77529661 · 23 Jul 2008
28 May 2029
009
Class 009
Computer & Software Products & Electrical & Scientific Products
software used for the protection of on-line transactions and data transfer by electronic means; devices for the protection of on-line transactions and data transfer by electronic means, namely, authentication tokens, encoded smart cards containing programs for performing cryptographic functions, generating or verifying credentials, smart card readers, and security appliances; software for access control to computers, computer systems, electronic networks, and databases; devices for controlling access to computers, computer systems, electronic networks, and databases, namely, authentication tokens, encoded smart cards containing programs for performing cryptographic functions, generating or verifying credentials, smart card readers, and security appliances
042
Class 042
Computer & Software Services & Scientific Services
computer consultation, namely, consultation in the field of data security; computer security services, namely, restricting access to and by computer networks to and of undesired web sites, media, and individuals; security of data transmission and of transactions via computer networks
software used for the protection of on-line transactions and data tran...
on 04 Dec 2024
ONESPAN NORTH AMERICA INC.
97620156 · 05 Oct 2022
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Recorded or downloadable mobile application software for automating and securing the interaction between users and computer based business applications; recorded or downloadable software in the field of machine learning and artificial intelligence for automating and securing the interaction between users and computer based business applications; recorded or downloadable cyber security software; downloadable computer security software for restricting unauthorized access to computers, computer networks, websites, computer-based applications and for ensuring authenticity and integrity of electronic transactions; recorded or downloadable software for network and device security for restricting unauthorized access to computers, computer networks, websites, computer-based applications; software for application, transaction and identity security related to mobile device applications for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and for ensuring authenticity and integrity of transactions submitted by users of mobile device applications; recorded or downloadable software for data security for authenticating, enforcing, restricting and controlling access privileges to users and for ensuring authenticity and integrity of transactions submitted by users; recorded or downloadable software for ensuring the security of electronic mail by authenticating, enforcing, restricting and controlling access privileges to users; recorded or downloadable software for computer virus tracking and computer virus neutralization; electronic publications, namely, journals, books, manuals, magazines, brochures, downloadable, relating to the field of cyber security, internet security, computer security, computer network security, data security and cryptography; downloadable software development kits (SDK); downloadable computer security software development kits (SDK); downloadable mobile application software security development kits (SDK); downloadable software development kits (SDK) for authentication of user identities; downloadable software development kits (SDK) for biometric security software; recorded or downloadable real-time fraud prevention software for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and computer-based applications and for ensuring authenticity and integrity of transactions submitted by users of computer-based applications; recorded or downloadable software for monitoring, detecting and blocking of fraudulent electronic transactions submitted to computer-based applications; recorded or downloadable software for logging, monitoring and securing computer software applications hosted by server computers and accessible via computer networks, including the internet and mobile networks; recorded or downloadable software for analyzing, and detecting unusual patterns in user and transaction data including behavioral and contextual data; recorded or downloadable software for behavioral analytics for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and computer-based applications and for ensuring authenticity and integrity of transactions submitted by users of mobile device applications and computer-based applications; recorded or downloadable mobile application security software for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and computer-based applications and for ensuring authenticity and integrity of transactions submitted by users of mobile device applications and computer-based applications; recorded or downloadable software for protecting mobile applications against cyber threats, computer viruses, phishing attacks, computer malware, man-in-the-middle attacks; recorded or downloadable software for detecting, preventing and reporting mobile cyber attacks against computer-based applications; recorded or downloadable computer anti- malware software; runtime application self-protection software, namely, computer anti-malware software; recorded or downloadable tamper detection software, namely, software for detecting illegitimate tampering by unauthorized entities with electronic devices or software; recorded or downloadable device identification and device binding software, namely, software for identifying an individual electronic device, and software for binding a software application instance to an individual electronic device; recorded or downloadable device fingerprinting software, namely, software for collecting information about the hardware utilized by a website visitor and creating a profile to identify the visitor; recorded or downloadable secure storage software, namely, software for secure electronic storage of data; recorded or downloadable secure communications software, namely, software for monitoring and controlling communication between computers and automated machine systems; electronic apparatus, namely, smart card readers, USB tokens and authentication tokens for enabling secure telecommunications in the nature of security token hardware; computer peripheral equipment; smart card readers; USB hardware; USB smart card readers; USB tokens, namely, USB computer access control key; blank smart cards embedded with transponders; encoded smart cards containing program instructions used to authenticate users or to store PKI certificates; replacement parts and fittings for all the aforesaid goods; electronic apparatus, namely, hardware authentication tokens, USB hardware, USB security tokens, and encoded smart cards, all the foregoing containing programming used for security, authentication and encryption; cards encoded with security features for identification purposes; electronic security tags; radio frequency identification (RFID) tags; electronic apparatus, namely, hardware authentication tokens, computer peripheral equipment, USB hardware, USB security tokens containing program instructions used to store, generate or use personal identification or authentication data, personal identification numbers, PKI certificates, and encryption keys, smart cards encoded with program instructions used to store personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and recorded or downloadable software, recorded or downloadable computer server software and mobile application software, all containing program instructions used to store, generate or use personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys or encryption keys all for use in the field of cyber security, internet security, computer security, computer network security and cryptography; electronic apparatus, namely, computer peripheral equipment, USB hardware, USB security tokens, smart cards encoded with program instructions used to store, generate or use, personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and recorded or downloadable software, recorded or downloadable computer server software and mobile application software, used all for the protection of online transactions and data transfer by electronic means; electronic apparatus, namely, computer peripheral equipment, USB hardware, USB security tokens, smart cards encoded with program instructions used to store, generate or use, personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and recorded or downloadable software, recorded or downloadable computer software and mobile application software, all for electronic generation and verification of authentication credentials and signatures; electronic apparatus, namely, computer peripheral equipment, USB hardware, USB security tokens, smart cards encoded with program instructions used to store, generate or use personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and recorded or downloadable software, recorded or downloadable computer server software and mobile application software, all for use in, for connecting to and for providing public key infrastructures (PKI); electronic identification hardware, namely, authentication tokens, programmed with specific parameters to obtain an authentication code for securing electronic transactions, bank operations, remote application access and securing data transfers; electronic security tokens in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication to access computers, web sites, remote computer based applications, electronic networks and databases; recorded or downloadable software, mobile application software, and authentication security token hardware and smart card readers, all for optically capturing digital information; recorded or downloadable software, mobile application software, and authentication security token hardware and smart card readers, all for capturing and decoding 2D-barcodes; electronic apparatus, namely, fingerprint scanners and biometric retinal scanners, and recorded or downloadable software for use in the field of biometric identify verification; electronic apparatus, namely, fingerprint scanners and biometric retinal scanners, and recorded or downloadable software for biometric systems for the identification and authentication of persons; electronic apparatus, namely, fingerprint scanners and biometric retinal scanners, and recorded or downloadable software for capturing, analyzing and verifying biometric traits; electronic apparatus, namely, fingerprint scanners and biometric retinal scanners, and recorded or downloadable software for capturing, analyzing and verifying fingerprints, retinal scan, voice, heartbeat, gait and vein patterns; biometric readers, namely, fingerprint scanners and biometric retinal scanners; face recognition software; recorded or downloadable software for capturing, analyzing and verifying behavioral biometrics; behavioral authentication software, namely, recorded or downloadable software for authenticating users based on the behavioral biometrics of these users; recorded or downloadable software for behavioral biometrics, namely, for recording and analyzing dynamic keystrokes and swiping finger patterns on mobile device input screens; recorded or downloadable software for capturing, analyzing and verifying geolocation data; electronic apparatus and recorded or downloadable software for recording, processing, manipulating and analyzing sounds and images; electronic apparatus, namely, computer hardware and recorded or downloadable software for providing cyber security, internet security, computer security, computer network security, data security and cryptography; electronic apparatus, namely, authentication security token hardware and smart card readers and recorded or downloadable software, computer server software and mobile application software for data encryption and authentication in the fields of security, data security, and user authentication; electronic apparatus, namely, computer hardware and recorded or downloadable software for providing multi-factor user authentication for security purposes; electronic apparatus, namely, computer hardware and recorded or downloadable software for providing layered security to protect data; electronic apparatus, namely, computer hardware and recorded or downloadable software for continuous, transparent and frictionless user authentication for identification purposes; recorded or downloadable software for coordinating and orchestrating user authentication and cyber security for authenticating, enforcing, restricting and controlling access privileges to users of mobile devices and applications; electronic apparatus, namely, computer hardware and recorded or downloadable software for protecting computer networks by authenticating, enforcing, restricting and controlling access privileges to users of computer networks, mobile devices and applications; electronic apparatus, namely, computer hardware and recorded or downloadable software for securing telecommunications, data communications, electronic communications and digital communications by authenticating, enforcing, restricting and controlling access privileges to users of computer networks, mobile devices and applications; electronic apparatus, namely, computer hardware and recorded or downloadable software for securing access to and operation on the internet by authenticating, enforcing, restricting and controlling access privileges to users of computers, mobile devices and applications; electronic apparatus, namely, computer hardware and recorded or downloadable software for secure data- transfer by electronic means and via computer networks; electronic apparatus, namely, computer hardware and recorded or downloadable software for identification of persons; electronic apparatus, namely, computer hardware and recorded or downloadable software for providing, verifying and proving the identity of persons; electronic apparatus, namely, computer hardware and recorded or downloadable computer software used to identify and authenticate users of intranet and internet websites and used to authenticate user access to intranet and internet sites, wide area networks (WAN) and local area networks (LAN) in order to secure online communications and transactions; electronic apparatus, namely, computer hardware and recorded or downloadable software for limiting access control to physical and virtual spaces, to electronic systems, to computers, to electronic networks, to websites, to computer based applications and to electronic databases; electronic apparatus, namely, computer hardware and recorded or downloadable computer software used for remote control of access to computers, computer based applications and telecommunications networks; electronic apparatus, namely, computer hardware and recorded or downloadable software for digital certificate and encryption key management in the field of public key infrastructures (PKI); electronic apparatus, namely, computer hardware and recorded or downloadable software used for securing electronic and online transactions; electronic apparatus, namely, computer hardware and recorded or downloadable software for providing of irrevocable and authenticated electronic and online transactions; electronic apparatus, namely, computer hardware and recorded or downloadable software for the certification of orders given via computer and certifying electronic instructions for transactions; electronic apparatus, namely, computer hardware and recorded or downloadable software for secure electronic transaction authentication for use in the field of banking and online consumer transactions; electronic apparatus, namely, computer hardware and recorded or downloadable software used for ensuring the security of electronic banking operations and bank transactions; electronic apparatus, namely, computer hardware and recorded or downloadable software for securing internet banking electronic transactions; electronic apparatus, namely, computer hardware and recorded or downloadable software used for ensuring the security and authentication of purchase orders transactions given by computer; electronic apparatus, namely, computer hardware and recorded or downloadable software for use in the field of risk analysis, namely, risk analysis of electronic and remote electronic transactions, electronic transaction requests, and electronic network, account and computer access requests; recorded or downloadable software for assessing the security risk associated with end user identities; electronic apparatus, namely, computer hardware and recorded or downloadable software in the field of fraud detection, risk detection, risk management, fraud management, risk analysis, fraud analysis and fraud prevention, all related to electronic, digital, online and remote electronic transactions; electronic apparatus, namely, computer hardware and recorded or downloadable software for securing and protecting access to virtual, electronic and digital assets; electronic apparatus, namely, computer hardware and recorded or downloadable software for creating, managing and transferring digital money, electronic and digital currencies and cryptocurrencies; electronic apparatus, namely, computer hardware and recorded or downloadable software for creating, managing and transferring distributed ledgers and blockchains; electronic apparatus, namely, computer hardware and recorded or downloadable software for creating, managing and transferring digital data; electronic apparatus, namely, computer hardware and recorded or downloadable software for authenticating, certifying and controlling access to digital data; electronic apparatus, namely, computer hardware and recorded or downloadable software for creating, managing, controlling the use, modification, and distribution of copyrighted works; electronic apparatus, namely, computer hardware and recorded or downloadable software for storing, managing, encrypting, and protecting access to personal data; electronic apparatus, namely, computer hardware and recorded or downloadable software for storing, managing and controlling access to personal identity information; recorded or downloadable software for use for customer enrollment, customer management and electronic transactions; electronic apparatus, namely, computer hardware and recorded or downloadable transactional software for securing electronic payment services, internet banking and mobile banking services; electronic apparatus, namely, computer hardware and recorded or downloadable software for governments to communicate and interact with citizens; recorded or downloadable software for creating and managing electronic signature applications and systems, including administrative and user applications and digital storage systems; recorded or downloadable software programs allowing users to electronically approve documents using secure electronic signatures; electronic apparatus, namely, computer hardware and recorded or downloadable software for the recording, the manipulation, the archiving, the security, the encoding of sound, images and data, including via the internet; recorded or downloadable software for capturing an approval of an electronic or online electronic transaction; recorded or downloadable software for generating and capturing electronic proof of authorization of electronic and online electronic transactions and documents; recorded or downloadable software for generating electronic signatures; software for electronically signing electronic and online electronic transactions; recorded or downloadable software for signing electronic documents; recorded or downloadable software for capturing electronic document signatures; recorded or downloadable software for electronic document management; software allowing users to electronically send, sign, receive and manage documents as part of an electronic business transaction; recorded or downloadable software for authenticating and certifying the legal enforceability, regulatory compliance and auditability of documents or transactions; recorded or downloadable software for securing electronic forensic evidence relating to the business transaction process and documents; recorded or downloadable electronic signature and transaction management software programs allowing users to electronically send, sign, receive and manage documents as part of an electronic business transaction, to ensure the legal enforceability, regulatory compliance and auditability of the documents and transactions, and to obtain secure electronic forensic evidence relating to the business transaction process and documents; recorded or downloadable software for capturing and storing electronic data; software for capturing and storing audit trail data of electronic, digital and online transactions; recorded or downloadable software for capturing and storing electronic signature data; software for capturing and storing electronic evidence data that allows reproducing exactly what a signer saw and did regarding an electronic signature; recorded or downloadable software for capturing and storing audit trail data of electronic, digital and online transactions that allows reproducing exactly what a signer of an electronic document saw and did in making the electronic signature; recorded or downloadable software for capturing and storing data documenting an electronic signature process; recorded or downloadable software for capturing and storing data documenting electronic delivery of documents and information; recorded or downloadable software for viewing and reviewing electronic evidence data files; software for viewing and reviewing audit trail data files; recorded or downloadable software for viewing and reviewing electronic signature data; recorded or downloadable software for viewing and reviewing electronic evidence data that allows reproducing exactly what a signer saw and did regarding an electronic signature or transaction; recorded or downloadable software for viewing and reviewing audit trail data files that allows reproducing exactly what a signer of an electronic document saw and did when using a document; software for viewing and reviewing data files documenting an electronic signature process; recorded or downloadable software for viewing and reviewing data documenting electronic delivery of documents and information; recorded or downloadable software for reviewing and verifying electronic forensic evidence data files; recorded or downloadable document management software for reproducing an authorization and approval process of electronic transactions and documents; recorded or downloadable document management software for reproducing a signing process of electronic transactions and documents; recorded or downloadable software for securely storing electronic document files; electronic vaulting software, namely, software for securely storing electronic document files
038
Class 038
Communications Services
The mark consists of stylized "O" with a shadow beneath.
...
Class 042
Computer & Software Services & Scientific Services
Telecommunication services, namely, data transfer via the Internet and via computer networks; secure data-transfer via computer networks; consultancy concerning securing telecommunication for secure data transfer via telecommunications; providing access to telecommunications networks; providing private and secure real time electronic communication over a computer network; providing access to telecommunications networks especially through secured telecommunication networks by means of online authentication of electronic signatures and online generation and verification of authentication credentials and electronic signatures; providing transmission of secured online transactions and secured data transfer by electronic means; secure transfer of data by telecommunications; services of providing access to telecommunication networks; providing electronic communication by computer networks; providing electronic transmission of secure e-mail; secure automatic transmission of digital data using telecommunications channels; providing virtual private network (VPN) services, namely, private and secure electronic communications over a private or public computer network of information by electronic means; secure data transmission services; secure digital transmission of data via the internet; secure electronic transmission and retransmission of sounds, images, documents, messages and data; secured data, sound and image transmission services; transmission of coded messages and images; transmission of encrypted communications; information, advisory and consultancy services in relation to all the aforesaid services; telecommunication consultation in the nature of technical consulting in the field of audio, text and visual data transmission and communication
The mark consists of stylized "O" with a shadow beneath.,Recorded or d...
on 20 Jan 2023
ONESPAN NORTH AMERICA INC.
75613599 · 30 Dec 1998
009
Class 009
Computer & Software Products & Electrical & Scientific Products
COMPUTER SOFTWARE USED TO IDENTIFY AND AUTHENTICATE USERS OF INTRANET AND INTERNET WEBSITES AND USED TO AUTHENTICATE USER ACCESS TO INTRANET AND INTERNET SITES, WIDE AREA NETWORKS (WAN) AND LOCAL AREA NETWORKS (LAN) IN ORDER TO SECURE ONLINE COMMUNICATIONS AND TRANSACTIONS; [ ELECTRONIC PUBLICATIONS FOR BUSINESS, HOME AND EDUCATIONAL USE NAMELY MULTI-MEDIA REFERENCE BOOKS FEATURING INFORMATION RELATING TO COMPUTER SOFTWARE AND INFORMATION RELATING TO SECURITY IN COMMUNICATION SYSTEMS AND IDENTIFICATION AND AUTHENTICATION OF USERS OF COMMUNICATION SYSTEMS RECORDED ON CD-ROM, FLOPPY DISKS, HARD DISKS AND DIGITAL VERSATILE DISKS; COMPUTER PROGRAMS FOR PROVIDING ACCESS TO AND MANAGING WIRELESS COMMUNICATION NETWORKS; COMPUTER SOFTWARE USED TO ACCESS AND DISPLAY INFORMATION OBTAINED OVER A GLOBAL COMPUTER NETWORK, NAMELY, NEWS, ENTERTAINMENT, TRAFFIC AND INFORMATION RELATING TO COMPUTER SOFTWARE AND INFORMATION RELATING TO SECURITY IN COMMUNICATION SYSTEMS AND IDENTIFICATION AND AUTHENTICATION OF USERS OF COMMUNICATION SYSTEMS; COMPUTER SOFTWARE WHICH PROVIDES ENHANCED AUDIO AND VIDEO FEATURES TO OPTICAL DISC PLAYERS; COMPUTER SOFTWARE FOR FACILITATING TEXT, VOICE, AND PEN INPUT PROCESSING; COMPUTER OPERATING SYSTEM PROGRAMS AND COMPUTER UTILITY PROGRAMS; ELECTRONIC MAIL SOFTWARE; NOTE TAKING PROGRAMS; COMPUTER PROGRAMS FOR MAPPING AND NAVIGATION; COMPUTER PROGRAMS USED FOR MAINTAINING PERSONAL DIRECTORIES, ADDRESS, TELEPHONE AND CONTACT LISTS; COMPUTER SOFTWARE USED FOR MONITORING VEHICLE PERFORMANCE; COMPUTER PROGRAMS USED TO OPERATE PHONES AND PAGERS; COMPUTER SOFTWARE FOR WALLET-SIZED PERSONAL COMPUTERS FEATURING PERSONAL INFORMATION MANAGER PROGRAMS WITH CALENDARS, DIARIES, INFORMATION FILES AND AGENDA LISTS, AND FOR USE AND IN THE DEVELOPMENT OF OTHER PROGRAMS FOR WALLET-SIZED PERSONAL COMPUTERS; OPERATING SYSTEMS, UTILITY PROGRAMS AND BUSINESS APPLICATION PROGRAMS FOR USE WITH HAND-HELD COMPUTERS; MANUALS SOLD AS A UNIT WITH THE FOREGOING; MEMORY STORAGE DEVICES NAMELY HARD DISK DRIVES, CD-ROMS, FLOPPY DISKS, AND DIGITAL VERSATILE DISKS ]
COMPUTER SOFTWARE USED TO IDENTIFY AND AUTHENTICATE USERS OF INTRANET ...
AI Trademark Registrability
Image Search
Drag and drop or upload to search any image
Page 1 of 2