EUTM file information

010362903

SealPath


October 23, 2011

Trademark Summary

The trademark application SealPath was filed by SEALPATH TECHNOLOGIES, S.L., a corporation established under the laws of the Kingdom of Spain (the "Applicant"). The application was published for oppositions on December 20, 2011, and it was registered by office on March 28, 2012 without any oppositions.

The application was filed in Spanish (English was selected as the second language).

The renewal of the trademark was recorded by the office on October 3, 2021.

Change of name and professional address of the trademark registration was recorded on October 22, 2018.


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments
    2. Apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity
    3. Apparatus for recording, transmission or reproduction of sound or images
    4. Magnetic data carriers, recording discs
    5. Automatic vending machines and mechanisms for coin-operated apparatus
    6. Cash registers, calculating machies, Data processing equipment and computers, Anti-virus software
    7. Computer software and hardware relating to anti-virus
    8. Anti-malware computer programmes
    9. Computer software and hardware relating to anti-malware
    10. Computer programmes relating to computer security
    11. Computer software and hardware relating to computer security
    12. Computer programmes for computer risk prevention
    13. Computer software and hardware relating to computer risk prevention, computer software for providing security for networks, for global computer networks and for computers, computer software for ensuring online transaction security, downloadable computer software, downloadable electronic publications, computer software for use in the field of business information management, computer programs for data communication applications and for the encoding and authentication of electronic information
    14. Computer hardware and software for authenticating users and for maintaining and managing access to computer data, computer content, electronic communications and Computer networks and Global computer networks
    15. Embedded software for network monitoring and security
    16. Embedded software for authenticating users and maintaining and managing access to computer data, computer content, electronic communications, and computer networks
    17. Computer software, namely, content management software which filters, monitors, reports on and controls use of and access to locations on computer systems and networks and on global communication networks
    18. Electronic mail and news group filtering software which prevents or shunts delivery of defined categories or origins of electronic mail messages and news postings
    19. Protection software which detects electronic inquiries for information from computer systems or of users of computer systems and organizes, monitors, controls and prevents provision of such information
    20. Privacy management software which prevents, monitors, certifies, aggregates and reports on the distribution and use of personal identification information on computer systems and networks and on global communications networks
    21. File transfer filtering software which prevents, monitors or shunts, or reports on, delivery of categories, origins, volumes or timeframes of electronic files and chat filtering software which prevents, monitors, analyses or shunts, and reports on, delivery of defined categories, senders, recipients, origins, volumes or timeframes of conversations transmitted or stored electronically
    22. Computer software
    23. Computer software in the field of cryptographic network security and data security functions
    24. Computer software for integration of information logic and data between computer networks
    25. Computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks
    26. Computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices
    27. Computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services
    28. Computer software for use in analysis and reporting of firewall log data
    29. Computer software for identity security
    30. Authentication software and identity management information security
    31. Computer software for digital information and data access
    32. Computer software for detecting identity fraud
    33. Computer software and firmware for the management, transmission and storage of data and information
    34. Computer software for use in monitoring computers for security purposes, computer software for use with computer servers for controlling and managing server applications
    35. Software for the protection of documents and files
    36. Software for monitoring access and traceability of actions performed on documents
    37. Software for the identification and classification of confidential information
    38. Software for minimising leaks of confidential information
    39. Software for the secure sharing of documents via electronic media
    40. Fire-extinguishing apparatus.
  • The mark was filed in class 42 with following description of goods:
    1. Scientific and technological services and research and design relating thereto
    2. Industrial analysis and research services
    3. Design and development of computer hardware and software, Computer services
    4. Technical support with regard to computer software
    5. Computer virus protection
    6. Network and Internet security services
    7. Computer consultation
    8. Computer consultation in the field of computer security
    9. Computer diagnostic services
    10. Computer services, development, updating and maintenance of software for networks and stand-alone computers in the field of security and monitoring of computer security systems
    11. Computer services, development, updating and maintenance of software for the administration of databases and anti-virus protection
    12. Providing of information on network security and global computer network security
    13. Monitoring the computer systems of others and providing back-up computer programs and facilities
    14. Integration of computer systems and networks
    15. Computer services, namely providing information concerning the encryption and authentication of electronic data
    16. Consultancy services in the fields of digital media, data encryption, computer security, communication security and computer software
    17. Encryption and decryption of data and communications
    18. Web content categorization and filtering services
    19. Providing authentication of identity
    20. Issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith
    21. Development, design, application, testing, analysis and consultancy in the field of security, access, authorisation, authentication, encryption and identification systems for computers, computer hardware and computer networks
    22. Development, integration and operation of computer systems to support issuance and management of digital certificates
    23. Creation and implementation of procedures and practices for issuance and management of digital certificates
    24. Computer-related services, namely managed computer network services and global computer network security services, namely public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and company software integration
    25. Computer services, namely, providing search engines for obtaining data on a global computer network
    26. Computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization of Internet and network firewall software for others
    27. Computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security
    28. Security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability
    29. Computer software consultation services for the development of software applications
    30. Designing and programming computer controlled communications systems
    31. Providing data conversion services
    32. Provision of security services for virtual private computer networks (VPNs)
    33. Application hosting
    34. Computer services, namely,Providing of a computer software platform for bridging Internet and telephony services and enabling users to communicate and carry out business transactions faster across multiple networks via cable telephones, portable telephones, Monitoring of computer systems for security purposes
    35. Providing systems for managing security threats, namely supervision and monitoring of security risks and problems relating to the providing of information in the fields of global computer network and local area network security, preventing computer viruses and threats, computer hardware and software applications relating to security.
  • The mark was filed in class 45 with following description of goods:
    1. Legal services
    2. Security services for the protection of property and individuals
    3. Personal and social services provided by others to meet the needs of individuals
    4. Identity verification
    5. Security consultancy
    6. Licensing of technology, source code, computer software and other intellectual property
    7. Licensing of computer software for the protection of computers, computer systems, computer networks and internet websites against attacks from computer viruses, hackers, tampering, unauthorized intrusion and unauthorized manipulation of data
    8. Licensing of software for the protection of documents and files
    9. Licensing of software for monitoring access and traceability of actions performed on documents
    10. Licensing of software for the identification and classification of confidential information
    11. Licensing of software for minimising leaks of confidential information
    12. Licensing of software for the secure sharing of documents via electronic media.