Filters
on 15 Oct 2024
BULL SAS
79373987 · 21 Mar 2023
15 Oct 2030
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Telecommunications access services; Telecommunications access services for electronic sites, namely, providing access toelectronic sites; Providing electronic transmission of secure electronic mail; computer aided transmission of messages, data andimages; providing access to databases; leasing access time to a computer database, namely, rental of access time to globalcomputer networks; advisory services concerning the rental or leasing of communication equipment; communication services forinformation transmission, namely, providing electronic transmission of information stored in a database via interactivelycommunicating computer systems; electronic communication services, namely, electronic data transmission; Assistance, namely,advisory, information and consulting services in the field of telecommunications services, namely, transmission of voice, data, anddocuments via telecommunications networks; remote transmission of data via telecommunications network; secure transmissionof data, sound and images
038
Class 038
Communications Services
Electronic Encryption units; security token hardware; data networks, namely, data processors and downloadable and recordedcomputer software for transmission and reception of data; interactive data transfer apparatus in the nature of network routers;computers; process calculators; calculating machines; supercomputers; computer servers; computer terminals; Computer displayscreens; cloud servers being computer network servers; Downloadable cloud computing server operating software; Downloadableapplication software for cloud computing; Downloadable computer software packages comprised of downloadable computercybersecurity software, software for use in computer access control, namely, software for imposing access restrictions, softwarefor high performance computing, namely, software that assists computers in deploying parallel applications and performingparallel computations, software for operating quantum computers, software for operating artificial intelligence computers, and software for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access tocloud computing systems and quantum computing systems; Downloadable computer software for encryption; computer systemsbeing computers; information processing apparatus being central processing units for processing information; Downloadablecomputer cybersecurity software, downloadable software for use in computer access control, namely, software for imposingaccess restrictions, downloadable software for high performance computing, namely, software that assists computers in deployingparallel applications and performing parallel computations, downloadable software for operating quantum computers,downloadable software for operating artificial intelligence computers, and downloadable software for accessing cloud computingsystems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantumcomputing systems; Downloadable computer software for providing network, Internet, and computer security, namely,downloadable software for network and computer access control; Downloadable computer software for database management;Downloadable computer software, namely downloadable computer utility software, downloadable cybersecurity software forprotecting data, and downloadable cryptographic software for generating cryptographic keys for receiving and spendingcryptographic currency; downloadable software for testing software reliability, namely, software for testing and monitoring theprivacy, data security, data vulnerability of other software programs; Recorded computer operating system software;Downloadable computer anti-virus software; Downloadable computer software for word processing; Downloadable cloudcomputing software for cybersecurity, downloadable cloud computing software for use in computer access control, namely,software for imposing access restrictions, downloadable cloud computing software for high performance computing, namely,software that assists computers in deploying parallel applications and performing parallel computations, downloadable cloudcomputing software for operating quantum computers, downloadable cloud computing software for operating artificial intelligencecomputers, and downloadable cloud computing software for accessing cloud computing systems and quantum computingsystems, namely, software for authorizing access to cloud computing systems and quantum computing systems; Downloadableauthentication software for authenticating user identification; Downloadable computer software for protection against spyware,namely, downloadable anti-spyware software; Downloadable network access server operating software; Downloadable computercybersecurity software, downloadable computer software for use in computer access control, namely, software for imposingaccess restrictions, downloadable computer software for high performance computing, namely, software that assists computers indeploying parallel applications and performing parallel computations, downloadable computer software for operating quantumcomputers, downloadable computer software for operating artificial intelligence computers, and downloadable computer softwarefor accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloudcomputing systems and quantum computing systems; Downloadable computer software for data encryption; Downloadablecomputer application software for cybersecurity, downloadable computer application software for use in computer access control,namely, software for imposing access restrictions, downloadable computer application software for high performance computing,namely, software that assists computers in deploying parallel applications and performing parallel computations, downloadablecomputer application software for operating quantum computers, downloadable computer application software for operatingartificial intelligence computers, and downloadable computer application software for accessing cloud computing systems andquantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computingsystems; Downloadable speech recognition software; Downloadable facial recognition software, namely, downloadable computerprograms using artificial intelligence for facial recognition; Downloadable artificial intelligence software for cybersecurity,downloadable artificial intelligence software for use in computer access control, namely, software for imposing access restrictions,downloadable artificial intelligence software for high performance computing, namely, software that assists computers in deployingparallel applications and performing parallel computations, downloadable artificial intelligence software for operating quantumcomputers, downloadable artificial intelligence software for operating artificial intelligence computers, and downloadable artificialintelligence software for accessing cloud computing systems and quantum computing systems, namely, software for authorizingaccess to cloud computing systems and quantum computing systems; Downloadable computer software designed to be deployedon web servers for cybersecurity, downloadable computer software designed to be deployed on web servers for use in computeraccess control, namely, software for imposing access restrictions, downloadable computer software designed to be deployed onweb servers for high performance computing, namely, software that assists computers in deploying parallel applications andperforming parallel computations, downloadable computer software designed to be deployed on web servers quantum computers,downloadable computer software designed to be deployed on web servers for operating artificial intelligence computers, anddownloadable computer software designed to be deployed on web servers for accessing cloud computing systems and quantumcomputing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems;Downloadable data communication software, namely, software enabling computers to communicate by sending data;Downloadable data processing software, namely downloadable software for processing images, graphics and text; Downloadablecloud-based software for cybersecurity, downloadable cloud-based software for use in computer access control, namely, softwarefor imposing access restrictions, downloadable cloud-based software for high performance computing, namely, software thatassists computers in deploying parallel applications and performing parallel computations, downloadable cloud-based software foroperating quantum computers, downloadable cloud-based software for operating artificial intelligence computers, anddownloadable cloud-based software for accessing cloud computing systems and quantum computing systems, namely, softwarefor authorizing access to cloud computing systems and quantum computing systems; Downloadable computer software for thecreation of firewalls; downloadable computer software for providing network security; Downloadable collaborative softwareplatforms for cybersecurity, downloadable collaborative software platforms for use in computer access control, namely, softwarefor imposing access restrictions, downloadable collaborative software platforms for high performance computing, namely, softwarethat assists computers in deploying parallel applications and performing parallel computations, downloadable collaborativesoftware platforms for operating quantum computers, downloadable collaborative software platforms for operating artificialintelligence computers, and downloadable collaborative software platforms for accessing cloud computing systems and quantumcomputing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems;Downloadable communications software for connecting computer servers; Downloadable communication software for processingimages, graphics, and text; Downloadable operating software for main frame computers; apparatus and instruments for electricand electronic security, namely fob-like devices used by an authorized user of a computer system to facilitate authentication;Electronic target monitoring apparatus, namely, wireless controllers to monitor and control the functioning of other electronicdevices, excluding gaming apparatus; Recorded computer cybersecurity software, Recorded software for use in computer accesscontrol, namely, software for imposing access restrictions, Recorded software for high performance computing, namely, softwarethat assists computers in deploying parallel applications and performing parallel computations, Recorded software for operatingquantum computers, Recorded software for operating artificial intelligence computers, and Recorded software for accessing cloudcomputing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems andquantum computing systems; Downloadable smartphone software for cybersecurity, downloadable smartphone software for usein computer access control, namely, software for imposing access restrictions, downloadable smartphone software for highperformance computing, namely, software that assists computers in deploying parallel applications and performing parallelcomputations, downloadable smartphone software for operating quantum computers, downloadable smartphone software foroperating artificial intelligence computers, and downloadable smartphone software for accessing cloud computing systems andquantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computingsystems; Downloadable software for tablet computers for cybersecurity, downloadable software for tablet computers for use incomputer access control, namely, software for imposing access restrictions, downloadable software for tablet computers for highperformance computing, namely, software that assists computers in deploying parallel applications and performing parallelcomputations, downloadable software for tablet computers for operating quantum computers, downloadable software for tabletcomputers for operating artificial intelligence computers, and downloadable software for tablet computers for accessing cloudcomputing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems andquantum computing systems; Downloadable software for accessing digital content in the fields of entertainment, travel, hotels,and restaurants via electronic and optical communications networks; Downloadable software for performance testing of computerhardware; Downloadable software that assists computers in deploying parallel applications and performing parallel computations;monitors being downloadable software for monitoring and controlling communication between computers and automated machinesystems; Downloadable software for migration between various computer network operating systems; Downloadable software fortesting computer hardware reliability; Downloadable software for maintenance and operation of computer system; Downloadablesoftware for the integration of artificial intelligence and machine learning in the field of megadata; downloadable computersoftware for use as an application programming interface (API); Downloadable computer software for creating searchabledatabases of information and data; Downloadable software for providing information in the field of cybersecurity and accessrestrictions, high performance computing, quantum computers, artificial intelligence computers, business computing services, andcloud computing services; Downloadable computer software for transmitting electronic media via communication networks;downloadable software for remotely accessing and controlling a computer; Downloadable computer software for application anddatabase integration; Downloadable computer software for controlling and managing access server applications; Downloadablesoftware for the operational management of portable magnetic and electronic cards; Downloadable software for collecting andanalyzing real-time location data to predict the spread of an illness in a community; Downloadable security software for protectingdata through detection of threats against computer networks; utility software, namely downloadable software for performingcomputer system diagnostics; Downloadable software for monitoring the operation of audio and video devices in the field ofsecurity; downloadable software for remote monitoring and analysis of computer systems; Downloadable application softwaredesigned to be deployed on web servers for monitoring computer security incidents and running reports on cloud computingconfiguration and metadata; Downloadable and recorded computer platform software for cybersecurity, downloadable andrecorded computer platform software for tablet computers for use in computer access control, namely, software for imposingaccess restrictions, downloadable and recorded computer platform software for tablet computers for high performance computing,namely, software that assists computers in deploying parallel applications and performing parallel computations, downloadableand recorded computer platform software for tablet computers for operating quantum computers, downloadable and recordedcomputer platform software for tablet computers for operating artificial intelligence computers, and downloadable and recordedcomputer platform software for tablet computers for accessing cloud computing systems and quantum computing systems,namely, software for authorizing access to cloud computing systems and quantum computing systems; Downloadable software forproviding information in the field of cybersecurity and access restrictions, high performance computing, quantum computers,artificial intelligence computers, business computing services, and cloud computing services via the Internet; Downloadableapplication software for portable computer devices for cybersecurity, application software for portable computer devices for use incomputer access control, namely, software for imposing access restrictions, downloadable application software for portablecomputer devices for high performance computing, namely, software that assists computers in deploying parallel applications andperforming parallel computations, downloadable application software for portable computer devices for operating quantumcomputers, downloadable application software for portable computer devices for operating artificial intelligence computers, anddownloadable application software for portable computer devices for accessing cloud computing systems and quantum computingsystems, namely, software for authorizing access to cloud computing systems and quantum computing systems; Downloadablesoftware for data searching and data retrieval; Downloadable software for system cleaning and optimization; Downloadablesoftware for network security and computer units, namely, downloadable computer software for detecting threats againstcomputer networks; Downloadable computer software for authorizing access to databases; calculating devices being calculating machines
...
Class 042
Computer & Software Services & Scientific Services
Software as a Service (SaaS) services featuring software for cybersecurity, software for use in computer access control, namely,software for imposing access restrictions, software for high performance computing, namely, software that assists computers indeploying parallel applications and performing parallel computations, software for operating quantum computers, software foroperating artificial intelligence computers, and software for accessing cloud computing systems and quantum computing systems,namely, software for authorizing access to cloud computing systems and quantum computing systems; computer Platform as aService (PaaS) services featuring computer software platforms for cybersecurity, computer software platforms for use in computeraccess control, namely, software platforms for imposing access restrictions, computer software platforms for high performancecomputing, namely, software platforms that assist computers in deploying parallel applications and performing parallelcomputations, computer software platforms for operating quantum computers, computer software platforms for operating artificialintelligence computers, and computer software platforms for accessing cloud computing systems and quantum computingsystems, namely, software platforms for authorizing access to cloud computing systems and quantum computing systems;Software as a Service (SaaS) services featuring software using artificial intelligence for cybersecurity, software using artificialintelligence for use in computer access control, namely, software for imposing access restrictions, software using artificialintelligence for high performance computing, namely, software that assists computers in deploying parallel applications andperforming parallel computations, software using artificial intelligence for operating quantum computers, software using artificialintelligence for operating artificial intelligence computers, and software using artificial intelligence for accessing cloud computingsystems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantumcomputing systems; computer programming for others; programming of computer software for others; design, maintenance,development and updating of computer software; design and development of computers; development of computer platforms;duplication of computer programs; computer code writing; quantum computing services namely, providing temporary use of onlinenon-downloadable cloud-based quantum computing software systems and online non-downloadable software developmentplatforms for use in the development of quantum computing software; consulting services relating to computer systems analysis;consulting services for analyzing information systems namely, planning, design and management of information technologysystems; computer programming services for data processing; software engineering services for data processing; consultingservices in the field of computer system integration; technological advice relating to digital transformation; outsource serviceprovider in the field of information technology consulting relating to installation, maintenance and repair of computer software forcybersecurity and access restrictions, high performance computing, quantum computers, artificial intelligence computers,business computing services, cloud computing services, and for accessing cloud computing systems and quantum and computingsystems; rental of computers and computer software for cybersecurity, computer software for use in computer access control,namely, software for imposing access restrictions, computer software for high performance computing, namely, software thatassists computers in deploying parallel applications and performing parallel computations, computer software for operatingquantum computers, computer software for operating artificial intelligence computers, and computer software for accessing cloudcomputing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems andquantum computing systems; rental of computer hardware and computer software for cybersecurity, computer software for use incomputer access control, namely, software for imposing access restrictions, computer software for high performance computing,namely, software that assists computers in deploying parallel applications and performing parallel computations, computersoftware for operating quantum computers, computer software for operating artificial intelligence computers, and computersoftware for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access tocloud computing systems and quantum computing systems; technological research in the field of cybersecurity and accessrestrictions, high performance computing, quantum computers, artificial intelligence computers, business computing services,cloud computing services, and for accessing cloud computing systems and quantum and computing systems; cloud seeding;cloud computing featuring software for cybersecurity, software for use in computer access control, namely, software for imposingaccess restrictions, software for high performance computing, namely, software that assists computers in deploying parallelapplications and performing parallel computations, software for operating quantum computers, software for operating artificialintelligence computers, and software for accessing cloud computing systems and quantum computing systems, namely, softwarefor authorizing access to cloud computing systems and quantum computing systems; Computer services, namely, cloud hostingprovider services; providing temporary use of on-line non-downloadable software using artificial-intelligence for cybersecurity, online non-downloadable software using artificial-intelligence for use in computer access control, namely, software for imposingaccess restrictions, on-line non-downloadable software using artificial-intelligence for high performance computing, namely,software that assists computers in deploying parallel applications and performing parallel computations, on-line non-downloadablesoftware using artificial-intelligence for operating quantum computers, on-line non-downloadable software using artificial intelligence for operating artificial intelligence computers, and on-line non-downloadable software using artificial-intelligence foraccessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloudcomputing systems and quantum computing systems; development of computer hardware; Software as a Service (SaaS) servicesfeaturing software using artificial intelligence for machine learning, deep learning and creation of deep learning networks; Softwareas a Service (SaaS) services featuring software for digital asset management; hosting of digital content on the internet; electronicdata storage; digital compression of computer data; data encryption and decoding services; data security consultancy; consultantservices with respect to data security; computer programming services for data storage; computer services concerning electronicdata storage, namely, cybersecurity services and access restrictions, namely, restricting unauthorized access to computersystems, business computing services, namely, consulting services in the design and implementation of computer-basedinformation systems for businesses, cloud computing services featuring software for use in database management; developmentof data storage systems, namely, software for cloud storage of data; technical data analysis services for protecting data byassessing computer security threats, namely, computer security threat analysis for protecting data; data mining; computerprogramming services for electronic data security; security services for computer networks, computer access and computer-basedtransactions, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile ornetwork resources based on assigned credentials; computer security services for protection against unauthorized network access,namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or networkresources based on assigned credentials; monitoring of computer systems for the detection of unauthorized access or dataprotection breaches; electronic monitoring of personally identification information for the detection of identity theft via the Internet;user authentication services using single sign-on technology for online software applications; technological advice in the fields ofselection, implementation, and use of computer programs being software; Access Control as a Service (ACaaS) featuringsoftware for cybersecurity, software for use in computer access control, namely, software for imposing access restrictions,software for high performance computing, namely, software that assists computers in deploying parallel applications andperforming parallel computations, software for operating quantum computers, software for operating artificial intelligencecomputers, and software for accessing cloud computing systems and quantum computing systems, namely, software forauthorizing access to cloud computing systems and quantum computing systems; application service provider (ASP) featuringsoftware for cybersecurity, software for use in computer access control, namely, software for imposing access restrictions,software for high performance computing, namely, software that assists computers in deploying parallel applications andperforming parallel computations, software for operating quantum computers, software for operating artificial intelligencecomputers, and software for accessing cloud computing systems and quantum computing systems, namely, software forauthorizing access to cloud computing systems and quantum computing systems; providing virtual computer systems throughcloud computing; conversion of computer programs and data, other than physical conversion; recovery of computer data; cloud stored data protection services in the nature of providing temporary use of online, non-downloadable software for protecting datastored in the cloud; electronic storage services for archiving databases, images and other electronic data; rental of computersoftware for data stream reading; consultancy, advisory and information services in relation to information technology relating toinstallation, maintenance and repair of computer software; computer services for the security, protection and restoration ofinformation technology namely, computer security services in the nature of restricting unauthorized access to computer networks,computer security threat analysis for protecting data, and computer data recovery services; computer security services, namely,providing user authentication services using biometric hardware and software technology for hardware and software systemsvulnerability testing; Technical support services, namely, troubleshooting in the nature of diagnosing problems with computerhardware and software, data communication systems; Telecommunications network security consultancy; computer securitythreat analysis for protecting data; monitoring computer systems for security purposes, namely, monitoring of computer systemsfor detecting unauthorized access or data breach; computer services for data protection, namely design and development ofcomputer software for cybersecurity, software for use in computer access control, namely, software for imposing accessrestrictions, software for high performance computing, namely, software that assists computers in deploying parallel applicationsand performing parallel computations, software for operating quantum computers, software for operating artificial intelligencecomputers, and software for accessing cloud computing systems and quantum computing systems, namely, software forauthorizing access to cloud computing systems and quantum computing systems; computer system monitoring services, namely,monitoring of computer systems for detecting unauthorized access or data breach; computer services, namely, data recoveryservices; computer virus protection services; programming of computer software in the field of internet security for others;consultation with respect to computer security; information security services, namely, installation, maintenance, and repair offirewall software systems; security technology testing services, namely, testing of security systems; Technological advice in thefield of artificial intelligence; design and development of software for evaluation and calculation of data; IT services, namely,development, programming and implementation of software for cybersecurity, software for use in computer access control,namely, software for imposing access restrictions, software for high performance computing, namely, software that assistscomputers in deploying parallel applications and performing parallel computations, software for operating quantum computers,software for operating artificial intelligence computers, and software for accessing cloud computing systems and quantumcomputing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems;design and development of supercomputers, and number crunchers being data processing apparatus
Electronic Encryption units; security token hardware; data networks, n...
on 15 Oct 2024
BULL SAS
79374233 · 21 Mar 2023
15 Oct 2030
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Telecommunications access services; Telecommunications access services for electronic sites, namely, providing access toelectronic sites; Providing electronic transmission of secure electronic mail; computer aided transmission of messages, data andimages; providing access to databases; leasing access time to a computer database, namely, rental of access time to globalcomputer networks; advisory services concerning the rental or leasing of communication equipment; communication services forinformation transmission, namely, providing electronic transmission of information stored in a database via interactivelycommunicating computer systems; electronic communication services, namely, electronic data transmission; Assistance, namely,advisory, information and consulting services in the field of telecommunications services, namely, transmission of voice, data, anddocuments via telecommunications networks; remote transmission of data via telecommunications network; secure transmissionof data, sound and images
038
Class 038
Communications Services
Electronic Encryption units; security token hardware; data networks, namely, data processors and downloadable and recordedcomputer software for transmission and reception of data; interactive data transfer apparatus in the nature of network routers;computers; process calculators; calculating machines; supercomputers; computer servers; computer terminals; Computer displayscreens; cloud servers being computer network servers; Downloadable cloud computing server operating software; Downloadableapplication software for cloud computing; Downloadable computer software packages comprised of downloadable computercybersecurity software, software for use in computer access control, namely, software for imposing access restrictions, softwarefor high performance computing, namely, software that assists computers in deploying parallel applications and performingparallel computations, software for operating quantum computers, software for operating artificial intelligence computers, andsoftware for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access tocloud computing systems and quantum computing systems; Downloadable computer software for encryption; computer systemsbeing computers; information processing apparatus being central processing units for processing information; Downloadable computer cybersecurity software, downloadable software for use in computer access control, namely, software for imposingaccess restrictions, downloadable software for high performance computing, namely, software that assists computers in deployingparallel applications and performing parallel computations, downloadable software for operating quantum computers,downloadable software for operating artificial intelligence computers, and downloadable software for accessing cloud computingsystems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantumcomputing systems; Downloadable computer software for providing network, Internet, and computer security, namely,downloadable software for network and computer access control; Downloadable computer software for database management;Downloadable computer software, namely downloadable computer utility software, downloadable cybersecurity software forprotecting data, and downloadable cryptographic software for generating cryptographic keys for receiving and spendingcryptographic currency; downloadable software for testing software reliability, namely, software for testing and monitoring theprivacy, data security, data vulnerability of other software programs; Recorded computer operating system software;Downloadable computer anti-virus software; Downloadable computer software for word processing; Downloadable cloudcomputing software for cybersecurity, downloadable cloud computing software for use in computer access control, namely,software for imposing access restrictions, downloadable cloud computing software for high performance computing, namely,software that assists computers in deploying parallel applications and performing parallel computations, downloadable cloudcomputing software for operating quantum computers, downloadable cloud computing software for operating artificial intelligencecomputers, and downloadable cloud computing software for accessing cloud computing systems and quantum computingsystems, namely, software for authorizing access to cloud computing systems and quantum computing systems; Downloadableauthentication software for authenticating user identification; Downloadable computer software for protection against spyware,namely, downloadable anti-spyware software; Downloadable network access server operating software; Downloadable computercybersecurity software, downloadable computer software for use in computer access control, namely, software for imposingaccess restrictions, downloadable computer software for high performance computing, namely, software that assists computers indeploying parallel applications and performing parallel computations, downloadable computer software for operating quantumcomputers, downloadable computer software for operating artificial intelligence computers, and downloadable computer softwarefor accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloudcomputing systems and quantum computing systems; Downloadable computer software for data encryption; Downloadablecomputer application software for cybersecurity, downloadable computer application software for use in computer access control,namely, software for imposing access restrictions, downloadable computer application software for high performance computing,namely, software that assists computers in deploying parallel applications and performing parallel computations, downloadablecomputer application software for operating quantum computers, downloadable computer application software for operatingartificial intelligence computers, and downloadable computer application software for accessing cloud computing systems andquantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computingsystems; Downloadable speech recognition software; Downloadable facial recognition software, namely, downloadable computerprograms using artificial intelligence for facial recognition; Downloadable artificial intelligence software for cybersecurity,downloadable artificial intelligence software for use in computer access control, namely, software for imposing access restrictions,downloadable artificial intelligence software for high performance computing, namely, software that assists computers in deployingparallel applications and performing parallel computations, downloadable artificial intelligence software for operating quantumcomputers, downloadable artificial intelligence software for operating artificial intelligence computers, and downloadable artificialintelligence software for accessing cloud computing systems and quantum computing systems, namely, software for authorizingaccess to cloud computing systems and quantum computing systems; Downloadable computer software designed to be deployedon web servers for cybersecurity, downloadable computer software designed to be deployed on web servers for use in computeraccess control, namely, software for imposing access restrictions, downloadable computer software designed to be deployed onweb servers for high performance computing, namely, software that assists computers in deploying parallel applications andperforming parallel computations, downloadable computer software designed to be deployed on web servers quantum computers,downloadable computer software designed to be deployed on web servers for operating artificial intelligence computers, anddownloadable computer software designed to be deployed on web servers for accessing cloud computing systems and quantumcomputing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems;Downloadable data communication software, namely, software enabling computers to communicate by sending data;Downloadable data processing software, namely downloadable software for processing images, graphics and text; Downloadablecloud-based software for cybersecurity, downloadable cloud-based software for use in computer access control, namely, softwarefor imposing access restrictions, downloadable cloud-based software for high performance computing, namely, software thatassists computers in deploying parallel applications and performing parallel computations, downloadable cloud-based software foroperating quantum computers, downloadable cloud-based software for operating artificial intelligence computers, anddownloadable cloud-based software for accessing cloud computing systems and quantum computing systems, namely, softwarefor authorizing access to cloud computing systems and quantum computing systems; Downloadable computer software for thecreation of firewalls; downloadable computer software for providing network security; Downloadable collaborative softwareplatforms for cybersecurity, downloadable collaborative software platforms for use in computer access control, namely, softwarefor imposing access restrictions, downloadable collaborative software platforms for high performance computing, namely, softwarethat assists computers in deploying parallel applications and performing parallel computations, downloadable collaborativesoftware platforms for operating quantum computers, downloadable collaborative software platforms for operating artificialintelligence computers, and downloadable collaborative software platforms for accessing cloud computing systems and quantumcomputing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems;Downloadable communications software for connecting computer servers; Downloadable communication software for processingimages, graphics, and text; Downloadable operating software for main frame computers; apparatus and instruments for electricand electronic security, namely fob-like devices used by an authorized user of a computer system to facilitate authentication;Electronic target monitoring apparatus, namely, wireless controllers to monitor and control the functioning of other electronicdevices, excluding gaming apparatus; Recorded computer cybersecurity software, Recorded software for use in computer accesscontrol, namely, software for imposing access restrictions, Recorded software for high performance computing, namely, softwarethat assists computers in deploying parallel applications and performing parallel computations, Recorded software for operatingquantum computers, Recorded software for operating artificial intelligence computers, and Recorded software for accessing cloudcomputing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems andquantum computing systems; Downloadable smartphone software for cybersecurity, downloadable smartphone software for usein computer access control, namely, software for imposing access restrictions, downloadable smartphone software for highperformance computing, namely, software that assists computers in deploying parallel applications and performing parallelcomputations, downloadable smartphone software for operating quantum computers, downloadable smartphone software foroperating artificial intelligence computers, and downloadable smartphone software for accessing cloud computing systems andquantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computingsystems; Downloadable software for tablet computers for cybersecurity, downloadable software for tablet computers for use incomputer access control, namely, software for imposing access restrictions, downloadable software for tablet computers for highperformance computing, namely, software that assists computers in deploying parallel applications and performing parallelcomputations, downloadable software for tablet computers for operating quantum computers, downloadable software for tabletcomputers for operating artificial intelligence computers, and downloadable software for tablet computers for accessing cloudcomputing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems andquantum computing systems; Downloadable software for accessing digital content in the fields of entertainment, travel, hotels,and restaurants via electronic and optical communications networks; Downloadable software for performance testing of computerhardware; Downloadable software that assists computers in deploying parallel applications and performing parallel computations;monitors being downloadable software for monitoring and controlling communication between computers and automated machinesystems; Downloadable software for migration between various computer network operating systems; Downloadable software fortesting computer hardware reliability; Downloadable software for maintenance and operation of computer system; Downloadablesoftware for the integration of artificial intelligence and machine learning in the field of mega data; downloadable computersoftware for use as an application programming interface (API); Downloadable computer software for creating searchabledatabases of information and data; Downloadable software for providing information in the field of cybersecurity and accessrestrictions, high performance computing, quantum computers, artificial intelligence computers, business computing services, andcloud computing services; Downloadable computer software for transmitting electronic media via communication networks;downloadable software for remotely accessing and controlling a computer; Downloadable computer software for application anddatabase integration; Downloadable computer software for controlling and managing access server applications; Downloadablesoftware for the operational management of portable magnetic and electronic cards; Downloadable software for collecting andanalyzing real-time location data to predict the spread of an illness in a community; Downloadable security software for protectingdata through detection of threats against computer networks; utility software, namely downloadable software for performingcomputer system diagnostics; Downloadable software for monitoring the operation of audio and video devices in the field ofsecurity; downloadable software for remote monitoring and analysis of computer systems; Downloadable application softwaredesigned to be deployed on web servers for monitoring computer security incidents and running reports on cloud computingconfiguration and metadata; Downloadable and recorded computer platform software for cybersecurity, downloadable andrecorded computer platform software for tablet computers for use in computer access control, namely, software for imposingaccess restrictions, downloadable and recorded computer platform software for tablet computers for high performance computing,namely, software that assists computers in deploying parallel applications and performing parallel computations, downloadableand recorded computer platform software for tablet computers for operating quantum computers, downloadable and recordedcomputer platform software for tablet computers for operating artificial intelligence computers, and downloadable and recordedcomputer platform software for tablet computers for accessing cloud computing systems and quantum computing systems,namely, software for authorizing access to cloud computing systems and quantum computing systems; Downloadable software forproviding information in the field of cybersecurity and access restrictions, high performance computing, quantum computers,artificial intelligence computers, business computing services, and cloud computing services via the Internet; Downloadableapplication software for portable computer devices for cybersecurity, application software for portable computer devices for use incomputer access control, namely, software for imposing access restrictions, downloadable application software for portablecomputer devices for high performance computing, namely, software that assists computers in deploying parallel applications andperforming parallel computations, downloadable application software for portable computer devices for operating quantumcomputers, downloadable application software for portable computer devices for operating artificial intelligence computers, anddownloadable application software for portable computer devices for accessing cloud computing systems and quantum computingsystems, namely, software for authorizing access to cloud computing systems and quantum computing systems; Downloadablesoftware for data searching and data retrieval; Downloadable software for system cleaning and optimization; Downloadablesoftware for network security and computer units, namely, downloadable computer software for detecting threats againstcomputer networks; Downloadable computer software for authorizing access to databases; calculating devices being calculating machines
...
Class 042
Computer & Software Services & Scientific Services
Software as a Service (SaaS) services featuring software for cybersecurity, software for use in computer access control, namely,software for imposing access restrictions, software for high performance computing, namely, software that assists computers indeploying parallel applications and performing parallel computations, software for operating quantum computers, software foroperating artificial intelligence computers, and software for accessing cloud computing systems and quantum computing systems,namely, software for authorizing access to cloud computing systems and quantum computing systems; computer Platform as aService (PaaS) services featuring computer software platforms for cybersecurity, computer software platforms for use in computeraccess control, namely, software platforms for imposing access restrictions, computer software platforms for high performancecomputing, namely, software platforms that assist computers in deploying parallel applications and performing parallelcomputations, computer software platforms for operating quantum computers, computer software platforms for operating artificialintelligence computers, and computer software platforms for accessing cloud computing systems and quantum computingsystems, namely, software platforms for authorizing access to cloud computing systems and quantum computing systems;Software as a Service (SaaS) services featuring software using artificial intelligence for cybersecurity, software using artificialintelligence for use in computer access control, namely, software for imposing access restrictions, software using artificialintelligence for high performance computing, namely, software that assists computers in deploying parallel applications andperforming parallel computations, software using artificial intelligence for operating quantum computers, software using artificialintelligence for operating artificial intelligence computers, and software using artificial intelligence for accessing cloud computingsystems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantumcomputing systems; computer programming for others; programming of computer software for others; design, maintenance,development and updating of computer software; design and development of computers; development of computer platforms;duplication of computer programs; computer code writing; quantum computing services namely, providing temporary use of onlinenon-downloadable cloud-based quantum computing software systems and online non-downloadable software developmentplatforms for use in the development of quantum computing software; consulting services relating to computer systems analysis;consulting services for analyzing information systems namely, planning, design and management of information technologysystems; computer programming services for data processing; software engineering services for data processing; consultingservices in the field of computer system integration; technological advice relating to digital transformation; outsource serviceprovider in the field of information technology consulting relating to installation, maintenance and repair of computer software forcybersecurity and access restrictions, high performance computing, quantum computers, artificial intelligence computers,business computing services, cloud computing services, and for accessing cloud computing systems and quantum and computingsystems; rental of computers and computer software for cybersecurity, computer software for use in computer access control,namely, software for imposing access restrictions, computer software for high performance computing, namely, software thatassists computers in deploying parallel applications and performing parallel computations, computer software for operatingquantum computers, computer software for operating artificial intelligence computers, and computer software for accessing cloudcomputing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems andquantum computing systems; rental of computer hardware and computer software for cybersecurity, computer software for use incomputer access control, namely, software for imposing access restrictions, computer software for high performance computing,namely, software that assists computers in deploying parallel applications and performing parallel computations, computersoftware for operating quantum computers, computer software for operating artificial intelligence computers, and computersoftware for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access tocloud computing systems and quantum computing systems; technological research in the field of cybersecurity and accessrestrictions, high performance computing, quantum computers, artificial intelligence computers, business computing services,cloud computing services, and for accessing cloud computing systems and quantum and computing systems; cloud seeding;cloud computing featuring software for cybersecurity, software for use in computer access control, namely, software for imposingaccess restrictions, software for high performance computing, namely, software that assists computers in deploying parallelapplications and performing parallel computations, software for operating quantum computers, software for operating artificialintelligence computers, and software for accessing cloud computing systems and quantum computing systems, namely, softwarefor authorizing access to cloud computing systems and quantum computing systems; Computer services, namely, cloud hostingprovider services; providing temporary use of on-line non-downloadable software using artificial-intelligence for cybersecurity, online non-downloadable software using artificial-intelligence for use in computer access control, namely, software for imposingaccess restrictions, on-line non-downloadable software using artificial-intelligence for high performance computing, namely,software that assists computers in deploying parallel applications and performing parallel computations, on-line non-downloadablesoftware using artificial-intelligence for operating quantum computers, on-line non-downloadable software using artificial-intelligence for operating artificial intelligence computers, and on-line non-downloadable software using artificial-intelligence foraccessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloudcomputing systems and quantum computing systems; development of computer hardware; Software as a Service (SaaS) servicesfeaturing software using artificial intelligence for machine learning, deep learning and creation of deep learning networks; Softwareas a Service (SaaS) services featuring software for digital asset management; hosting of digital content on the internet; electronicdata storage; digital compression of computer data; data encryption and decoding services; data security consultancy; consultantservices with respect to data security; computer programming services for data storage; computer services concerning electronicdata storage, namely, cybersecurity services and access restrictions, namely, restricting unauthorized access to computersystems, business computing services, namely, consulting services in the design and implementation of computer-basedinformation systems for businesses, cloud computing services featuring software for use in database management; developmentof data storage systems, namely, software for cloud storage of data; technical data analysis services for protecting data byassessing computer security threats, namely, computer security threat analysis for protecting data; data mining; computerprogramming services for electronic data security; security services for computer networks, computer access and computer-basedtransactions, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile ornetwork resources based on assigned credentials; computer security services for protection against unauthorized network access,namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or networkresources based on assigned credentials; monitoring of computer systems for the detection of unauthorized access or dataprotection breaches; electronic monitoring of personally identification information for the detection of identity theft via the Internet;user authentication services using single sign-on technology for online software applications; technological advice in the fields ofselection, implementation, and use of computer programs being software; Access Control as a Service (ACaaS) featuringsoftware for cybersecurity, software for use in computer access control, namely, software for imposing access restrictions,software for high performance computing, namely, software that assists computers in deploying parallel applications andperforming parallel computations, software for operating quantum computers, software for operating artificial intelligencecomputers, and software for accessing cloud computing systems and quantum computing systems, namely, software forauthorizing access to cloud computing systems and quantum computing systems; application service provider (ASP) featuringsoftware for cybersecurity, software for use in computer access control, namely, software for imposing access restrictions,software for high performance computing, namely, software that assists computers in deploying parallel applications andperforming parallel computations, software for operating quantum computers, software for operating artificial intelligencecomputers, and software for accessing cloud computing systems and quantum computing systems, namely, software forauthorizing access to cloud computing systems and quantum computing systems; providing virtual computer systems throughcloud computing; conversion of computer programs and data, other than physical conversion; recovery of computer data; cloud stored data protection services in the nature of providing temporary use of online, non-downloadable software for protecting datastored in the cloud; electronic storage services for archiving databases, images and other electronic data; rental of computersoftware for data stream reading; consultancy, advisory and information services in relation to information technology relating toinstallation, maintenance and repair of computer software; computer services for the security, protection and restoration ofinformation technology namely, computer security services in the nature of restricting unauthorized access to computer networks,computer security threat analysis for protecting data, and computer data recovery services; computer security services, namely,providing user authentication services using biometric hardware and software technology for hardware and software systemsvulnerability testing; Technical support services, namely, troubleshooting in the nature of diagnosing problems with computerhardware and software, data communication systems; Telecommunications network security consultancy; computer securitythreat analysis for protecting data; monitoring computer systems for security purposes, namely, monitoring of computer systemsfor detecting unauthorized access or data breach; computer services for data protection, namely design and development ofcomputer software for cybersecurity, software for use in computer access control, namely, software for imposing accessrestrictions, software for high performance computing, namely, software that assists computers in deploying parallel applicationsand performing parallel computations, software for operating quantum computers, software for operating artificial intelligencecomputers, and software for accessing cloud computing systems and quantum computing systems, namely, software forauthorizing access to cloud computing systems and quantum computing systems; computer system monitoring services, namely,monitoring of computer systems for detecting unauthorized access or data breach; computer services, namely, data recoveryservices; computer virus protection services; programming of computer software in the field of internet security for others;consultation with respect to computer security; information security services, namely, installation, maintenance, and repair offirewall software systems; security technology testing services, namely, testing of security systems; Technological advice in thefield of artificial intelligence; design and development of software for evaluation and calculation of data; IT services, namely,development, programming and implementation of software for cybersecurity, software for use in computer access control,namely, software for imposing access restrictions, software for high performance computing, namely, software that assistscomputers in deploying parallel applications and performing parallel computations, software for operating quantum computers,software for operating artificial intelligence computers, and software for accessing cloud computing systems and quantumcomputing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems; design and development of supercomputers, and number crunchers being data processing apparatus
Electronic Encryption units; security token hardware; data networks, n...
on 12 Nov 2019
Sarkisyan, Garegin
88399701 · 24 Apr 2019
12 Nov 2025
014
Class 014
Jewelry Products
The mark consists of a crown design above the stylized letter "S", stylized "T", and stylized letter "G". The word "TIGRANI" is below.
The mark consists of a crown design above the stylized letter "S", sty...
on 27 Aug 2024
Goat Gang LLC
98176448 · 12 Sep 2023
27 Aug 2030
041
Class 041
Education and Entertainment Services
Life coaching services in the field of landscaping business and entrepreneurship; Providing a web site featuring non-downloadable instructional videos in the field of landscaping, entrepreneurship
Life coaching services in the field of landscaping business and entrep...
on 21 Oct 2016
Lebanese Arak Corporation
78774479 · 15 Dec 2005
31 Oct 2016
033
Class 033
Wines and Spirits Products
The mark consists of a profile image of Tigran The Great in an oval frame with the stylized words "Tigran The Great" below the frame.
The mark consists of a profile image of Tigran The Great in an oval fr...
on 22 Feb 2019
Tigran Technologies AB
77488491 · 02 Jun 2008
010
Class 010
Medical Instrument Products
Porous titanium granules for medical purposes, namely, bone regeneration
Porous titanium granules for medical purposes, namely, bone regenerati...
on 16 May 2009
LANKA LTD.
75404558 · 12 Dec 1997
005
Class 005
Pharmaceutical Products
Education and training services in the nature of seminars, conferences and courses in the field of implantation surgery and techniques
010
Class 010
Medical Instrument Products
Custom manufacture of dental and other prosthetics
...
Class 040
Treatment & Processing of Materials Services
Fillings for teeth, dental impression materials, and dental and bone restoration compounds for use in dental crowns and in restoration of teeth
Class 041
Education and Entertainment Services
Dental crown; dental bridgework; surgical cutlery; medical and surgical apparatus and instruments for use in performing plastic surgical and implementation surgical procedures, namely scalpels, blades and staples; odontological apparatus, namely dental articulator, veterinary apparatus and instruments for diagnostics and treatment, surgery and implantation, namely scalpels, blades, staples and probes; artificial limbs, eyes and teeth; orthopaedic articles, namely orthopaedic belts, braces and footwear; sutures; bones and ocular implants
Class 042
Computer & Software Services & Scientific Services
Research and development of new products for others in the field of surgery, medicine and odontology, health care services; chemical analysis and research; cosmetic and plastic surgery; dental surgery; veterinary surgery; medical and dental clinics; medical implantation surgery; and dental laboratories
Education and training services in the nature of seminars, conferences...
Country
US
Status
All
Registered
Pending
Abandoned
Other
Owners
Bull sas (2)
Goat gang llc (1)
Lanka ltd (1)
Lebanese arak corporation (1)
Sarkisyan garegin (1)
Tigran technologies ab (1)
Categories
Class 42 (3)
Class 9 (2)
Class 10 (2)
Class 38 (2)
Class 41 (2)
Class 5 (1)
Class 14 (1)
Class 33 (1)
Class 40 (1)
Attorney
Mary margaret l odonnell (2)
Barry d rein (1)
Donna l mirman (1)
Rafi ourfalian (1)
Scott d woldow (1)
Correspondents
Mary margaret l odonnell blue filament law pllc (2)
Barry d rein (1)
Lz legal services llc (1)
Rafi ourfalian (1)
Sarkisyan garegin (1)
Smith gambrell russell llp (1)
AI Trademark Registrability
Image Search
Drag and drop or upload to search any image