The trademark application SealPath was filed by SEALPATH TECHNOLOGIES, S.L., a corporation established under the laws of the Kingdom of Spain (the "Applicant"). The application was published for oppositions on December 20, 2011, and it was registered by office on March 28, 2012 without any oppositions.
The application was filed in Spanish (English was selected as the second language).
The renewal of the trademark was recorded by the office on October 3, 2021.
Change of name and professional address of the trademark registration was recorded on October 22, 2018.
Goods And Services
The mark was filed in class 9 with following description of goods:
Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments
Apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity
Apparatus for recording, transmission or reproduction of sound or images
Magnetic data carriers, recording discs
Automatic vending machines and mechanisms for coin-operated apparatus
Cash registers, calculating machies, Data processing equipment and computers, Anti-virus software
Computer software and hardware relating to anti-virus
Anti-malware computer programmes
Computer software and hardware relating to anti-malware
Computer programmes relating to computer security
Computer software and hardware relating to computer security
Computer programmes for computer risk prevention
Computer software and hardware relating to computer risk prevention, computer software for providing security for networks, for global computer networks and for computers, computer software for ensuring online transaction security, downloadable computer software, downloadable electronic publications, computer software for use in the field of business information management, computer programs for data communication applications and for the encoding and authentication of electronic information
Computer hardware and software for authenticating users and for maintaining and managing access to computer data, computer content, electronic communications and Computer networks and Global computer networks
Embedded software for network monitoring and security
Embedded software for authenticating users and maintaining and managing access to computer data, computer content, electronic communications, and computer networks
Computer software, namely, content management software which filters, monitors, reports on and controls use of and access to locations on computer systems and networks and on global communication networks
Electronic mail and news group filtering software which prevents or shunts delivery of defined categories or origins of electronic mail messages and news postings
Protection software which detects electronic inquiries for information from computer systems or of users of computer systems and organizes, monitors, controls and prevents provision of such information
Privacy management software which prevents, monitors, certifies, aggregates and reports on the distribution and use of personal identification information on computer systems and networks and on global communications networks
File transfer filtering software which prevents, monitors or shunts, or reports on, delivery of categories, origins, volumes or timeframes of electronic files and chat filtering software which prevents, monitors, analyses or shunts, and reports on, delivery of defined categories, senders, recipients, origins, volumes or timeframes of conversations transmitted or stored electronically
Computer software
Computer software in the field of cryptographic network security and data security functions
Computer software for integration of information logic and data between computer networks
Computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks
Computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices
Computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services
Computer software for use in analysis and reporting of firewall log data
Computer software for identity security
Authentication software and identity management information security
Computer software for digital information and data access
Computer software for detecting identity fraud
Computer software and firmware for the management, transmission and storage of data and information
Computer software for use in monitoring computers for security purposes, computer software for use with computer servers for controlling and managing server applications
Software for the protection of documents and files
Software for monitoring access and traceability of actions performed on documents
Software for the identification and classification of confidential information
Software for minimising leaks of confidential information
Software for the secure sharing of documents via electronic media
Fire-extinguishing apparatus.
The mark was filed in class 42 with following description of goods:
Scientific and technological services and research and design relating thereto
Industrial analysis and research services
Design and development of computer hardware and software, Computer services
Technical support with regard to computer software
Computer virus protection
Network and Internet security services
Computer consultation
Computer consultation in the field of computer security
Computer diagnostic services
Computer services, development, updating and maintenance of software for networks and stand-alone computers in the field of security and monitoring of computer security systems
Computer services, development, updating and maintenance of software for the administration of databases and anti-virus protection
Providing of information on network security and global computer network security
Monitoring the computer systems of others and providing back-up computer programs and facilities
Integration of computer systems and networks
Computer services, namely providing information concerning the encryption and authentication of electronic data
Consultancy services in the fields of digital media, data encryption, computer security, communication security and computer software
Encryption and decryption of data and communications
Web content categorization and filtering services
Providing authentication of identity
Issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith
Development, design, application, testing, analysis and consultancy in the field of security, access, authorisation, authentication, encryption and identification systems for computers, computer hardware and computer networks
Development, integration and operation of computer systems to support issuance and management of digital certificates
Creation and implementation of procedures and practices for issuance and management of digital certificates
Computer-related services, namely managed computer network services and global computer network security services, namely public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and company software integration
Computer services, namely, providing search engines for obtaining data on a global computer network
Computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization of Internet and network firewall software for others
Computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security
Security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability
Computer software consultation services for the development of software applications
Designing and programming computer controlled communications systems
Providing data conversion services
Provision of security services for virtual private computer networks (VPNs)
Application hosting
Computer services, namely,Providing of a computer software platform for bridging Internet and telephony services and enabling users to communicate and carry out business transactions faster across multiple networks via cable telephones, portable telephones, Monitoring of computer systems for security purposes
Providing systems for managing security threats, namely supervision and monitoring of security risks and problems relating to the providing of information in the fields of global computer network and local area network security, preventing computer viruses and threats, computer hardware and software applications relating to security.
The mark was filed in class 45 with following description of goods:
Legal services
Security services for the protection of property and individuals
Personal and social services provided by others to meet the needs of individuals
Identity verification
Security consultancy
Licensing of technology, source code, computer software and other intellectual property
Licensing of computer software for the protection of computers, computer systems, computer networks and internet websites against attacks from computer viruses, hackers, tampering, unauthorized intrusion and unauthorized manipulation of data
Licensing of software for the protection of documents and files
Licensing of software for monitoring access and traceability of actions performed on documents
Licensing of software for the identification and classification of confidential information
Licensing of software for minimising leaks of confidential information
Licensing of software for the secure sharing of documents via electronic media.