on 13 Aug 2024
Last Applicant/ Owned by
4th Floor, C/O Brecher LLP London W1K 7DA
GB
Serial Number
79367547 filed on 31st Jan 2023
Registration Number
7470250 registered on 13th Aug 2024
Filing Basis
1. filing basis filed as 66 a
Disclaimer
NO DATA
Design and development of computer software and computer systems; design and development of computer software and computer systems for monitoring computer network behavioural patterns to detect and remove computer viruses and security threats; computer programming; consultancy, design, testing, research and advisory services, all relating to computer programming, computer security software and com Read More
Design and development of computer software and computer systems; design and development of computer software and computer systems for monitoring computer network behavioural patterns to detect and remove computer viruses and security threats; computer programming; consultancy, design, testing, research and advisory services, all relating to computer programming, computer security software and computer software networks; technical support services relating to computer software, computer security, computer networks and the internet, namely, monitoring of technological functions of network systems, servers and other devices in the nature of computer network system linked to the network, and web and database applications, and notification of related events and alerts, and installation, administration, and troubleshooting of web and database applications; troubleshooting in the nature of detecting being diagnosing and diagnosing computer hardware, software and network hardware and software security problems and vulnerabilities being problems related to computer hardware and software diagnostics being diagnosing computer software problems; computer software engineering consultancy, testing, research and advisory services in the field of risk, vulnerability analysis and security for computers, computer systems and computer networks; computer security services for enhancing the performance, function and security of computer networks, namely, computer software engineering consultation and research in the field of computer hardware, computer software, network transactions and network security, maintenance of computer software relating to computer security and prevention of computer risks, and updating the software of others; computer security services, namely, restricting access to and by computer networks to undesired websites, media and individuals and facilities; computer network security services, namely, information technology security services in the nature of developing security systems and contingency planning for information systems by providing network access to cyber-threat intelligence, to cyber-attack verification, and to security analyses of network traffic, emails, files, media computer software, and mobile applications; cyber security services for the development and provision of cyber threat intelligence, namely, cybersecurity services in the nature of restricting and detecting unauthorized access to computer systems, resolving existing cyber security problems, design of cybersecurity policy and the development of cybersecurity tools; design and development of computer simulated models for the simulation of real-world architectures, and connected hardware, including digital twins; maintenance and repair of computer software and computer networks, namely, maintenance of computer software relating to computer security and prevention of computer risks; design of computer systems, namely, design of computer hardware; computer security services for enhancing the performance, function and security of computer networks, namely, testing of computer hardware in the nature of computer diagnostic services; advisory services relating to computer systems security, namely, computer security consultation services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security systems for others; software as a service (SaaS) services featuring software for monitoring and analyzing unauthorized user access attempts for use in computer network security; software as a service (SaaS) services featuring software for use in network traffic analysis; software as a service (SaaS) featuring software using cloud-based technology and artificial intelligence for monitoring and analyzing unauthorized user access attempts for network security, endpoint security and cloud security; monitoring of computer systems for security purposes in the nature of cybersecurity, unauthorized access, data breach and detection, namely, monitoring of computer systems for detecting unauthorized access or data breach; design and development of computer hardware; designing and developing government mandated and voluntary standards for others in the design and implementation of computer software, computer hardware and telecommunications equipment; providing temporary use of on-line non-downloadable software for machine vision, machine learning, deep machine learning, machine learning using artificial intelligence, natural language processing, developing learning algorithms, data analysis, neuromorphic computing and quantum computing; computer services, namely, providing temporary use of on-line non-downloadable software, application service provider featuring application programming interface (API) software, and temporary use of online, non-downloadable software in the nature of a widget, all for machine learning, data mining, data query, data analysis, machine vision, machine learning, deep machine learning, machine learning using artificial intelligence, natural language processing, developing learning algorithms, data analysis, neuromorphic computing and quantum computing; providing temporary use of online non-downloadable software development kits comprised of non-downloadable computer software for application development in the fields of for machine vision, machine learning, deep learning, artificial intelligence, natural language processing, learning algorithms, data analysis, neuromorphic computing and quantum computing; software consulting and providing information on software as a service (SaaS) programming; data security services, namely, monitoring of computer systems for security purposes and vulnerabilities in the nature of detecting network and system vulnerabilities; monitoring of computer network behavioural patterns for security purposes for detecting, classifying and removing computer viruses and security threats, namely, monitoring of computer systems for detecting unauthorized access or data breach; data security consultancy services, namely, advisory services relating to monitoring computer systems for security purposes with respect to computer and network vulnerabilities and the improvement and verification of procedures and processes relating thereto
N/A
N/A
Provision of on-line, non-downloadable manuals, articles, tutorials, newsletters, books, magazines, journals, brochures, research papers and white papers in the field of risk, vulnerability analysis and security for computers, computer systems and computer networks; publication of educational and training materials in the field of risk, vulnerability analysis and security for computers, computer systems and computer networks; provision of education in the nature of courses of instruction and training in the field of risk, vulnerability analysis and security for computers, computer systems and computer networks; providing online non-downloadable electronic publications in the nature of newsletters and books in the field of risk, vulnerability analysis and security for computers, computer systems and computer networks; production of radio, television and Internet-based radio and television programmes in the field of risk, vulnerability analysis and security for computers, computer systems and computer networks; organising and conducting events in the nature of workshops, educational exhibitions, workshops, courses, seminars, training and conferences in the field of risk, vulnerability analysis and security for computers, computer systems and computer networks; arranging and conducting competitions, quizzes in the nature of game shows and lotteries in the field of risk, vulnerability analysis and security for computers, computer systems and computer networks; audio-visual content provided on-line via a global computer network or internet, namely, providing on-line, non-downloadable videos in the field of risk, vulnerability analysis and security for computers, computer systems and computer networks; provision of online, non-downloadable manuals, articles, tutorials, newsletters, books, magazines, journals, brochures, research papers and white papers in the area of computer hardware and software, telecommunication equipment, machine learning, deep learning, artificial intelligence, natural language processing, learning algorithms, data analysis, neuromorphic computing and quantum computing; publication of educational and training materials in the area of computer hardware and software, telecommunication equipment, machine learning, deep learning, artificial intelligence, natural language processing, learning algorithms, data analysis, neuromorphic computing and quantum computing; provision of education in the nature of courses of instruction and training in the area of computer hardware and software, telecommunication equipment, machine learning, deep learning, artificial intelligence, natural language processing, learning algorithms, data analysis, neuromorphic computing and quantum computing; providing online non-downloadable electronic publications, namely, books and magazines in the area of computer hardware and software, telecommunication equipment, machine learning, deep learning, artificial intelligence, natural language processing, learning algorithms, data analysis, neuromorphic computing and quantum computing; production of radio, television and Internet-based radio and television programmes in the area of computer hardware and software, telecommunication equipment, machine learning, deep learning, artificial intelligence, natural language processing, learning algorithms, data analysis, neuromorphic computing and quantum computing; organising and conducting events in the nature of workshops, educational exhibitions, workshops, courses, seminars, training and conferences in the area of computer hardware and software, telecommunication equipment, machine learning, deep learning, artificial intelligence, natural language processing, learning algorithms, data analysis, neuromorphic computing and quantum computing; arranging and conducting competitions, quizzes in the nature of game shows and lotteries in the area of computer hardware and software, telecommunication equipment, machine learning, deep learning, artificial intelligence, natural language processing, learning algorithms, data analysis, neuromorphic computing and quantum computing; audio-visual content provided on-line via a global computer network or internet, namely, providing on-line, nondownloadable videos in the area of computer hardware and software, telecommunication equipment, machine learning, deep learning, artificial intelligence, natural language processing, learning algorithms, data analysis, neuromorphic computing and quantum computing
N/A
N/A
Installation and maintenance of computer hardware for enhancing the performance, function and security of computer networks; troubleshooting of computer hardware, namely, troubleshooting in the nature of the repair of computer hardware; maintenance and repair of computer hardware; installation and maintenance of computer hardware for enhancing the performance, function and security of AI being artificial intelligence
N/A
N/A
Downloadable computer software and computer systems comprised of downloadable computer software and computer hardware for predicting and monitoring behavioural patterns across computer architectures and computer networks, software, security software, servers, endpoints, mobile devices and internet of things (IoT) enabled devices to prevent, detect and remove computer viruses and security threats; downloadable computer software and computer systems comprised of downloadable computer software and computer hardware for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and Internet of things (IoT) enabled devices; downloadable computer software for managing and filtering electronic communications; downloadable computer software for modelling the behaviour of known, and unknown, cyber security threats; downloadable computer software for simulating and visualising computer architectures, the impact of changes to that architecture and the impact of cyber attacks; downloadable computer software for assessing and managing cyber security risk across a computer architecture and network; downloadable computer software for assessing and categorising known cyber security threats; computer hardware and downloadable software for encrypting and authenticating data; downloadable computer software for detecting software which needs to be updated, repairing and updating computer software, computer hardware, and computer network problems; downloadable computer software and computer systems comprised of downloadable computer software and computer hardware for ingesting multiple data sources, and monitoring for patterns and trends across them; downloadable computer software for the acquisition of data and data from machine and human-generated data generated data sets; downloadable computer software for monitoring and control of communication between computers in automatic machine systems; downloadable computer software platform for the acquisition, organization, distribution and analysis of data, automation, diagnostics and optimization of processes in the fields of computer security and big data analysis; computer chips, silicon chips, microprocessor chips, semiconductor chips, integrated circuit chips, semiconductors, integrated circuits, logic circuits, downloadable software for operating computer chips, computers, add-in computer chips for secure processing, robotics computer hardware, add on computer chips for secure processing for computers, computer interface cards being printed circuits; computer hardware and downloadable software for use in machine vision being machine learning, machine learning, deep machine learning, machine learning using artificial intelligence, natural language processing, developing learning algorithms, data analysis, neuromorphic computing and quantum computing; computer software development kits comprised of downloadable computer software for application development in the fields of machine vision, machine learning, deep learning, artificial intelligence, natural language processing, learning algorithms, data analysis, neuromorphic computing and quantum computing
N/A
N/A
No 79367547
No Service Mark
No CARP-2024003
No
No
No
No
Yes
Yes
No
No
Status Date | Action Taken |
---|---|
13th Nov 2024 | FINAL DISPOSITION NOTICE CREATED, TO BE SENT TO IB |
13th Aug 2024 | NOTICE OF REGISTRATION CONFIRMATION EMAILED |
13th Aug 2024 | REGISTERED-PRINCIPAL REGISTER |
28th May 2024 | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED |
28th May 2024 | PUBLISHED FOR OPPOSITION |
08th May 2024 | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED |
23rd Apr 2024 | EXAMINER'S AMENDMENT ENTERED |
23rd Apr 2024 | NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED |
23rd Apr 2024 | EXAMINERS AMENDMENT E-MAILED |
23rd Apr 2024 | EXAMINERS AMENDMENT -WRITTEN |