PEAKFLOW

EUIPO EUIPO 2010 Trademark registered

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The Union trademark PEAKFLOW was filed as Word mark on 06/24/2010 at the European Union Intellectual Property Office.
It was registered as a trademark on 12/10/2010. The current status of the mark is "Trademark registered".

Trademark Details Last update: March 23, 2021

Trademark form Word mark
File reference 009198425
Application date June 24, 2010
Publication date August 27, 2010
Entry date December 10, 2010
Expiration date June 24, 2030

Trademark owner

310 Littleton Road
01886 Westford
US

Trademark representatives

Immeuble PALATIN 2, 3 Cours du Triangle, CS 80165, 92939 PARIS LA DEFENSE CEDEX FR

goods and services

9 Anti-spyware software; Computer anti-virus software; Computer hardware; Computer hardware and computer peripheral devices; Computer hardware and computer peripherals; Computer hardware and peripheral devices; Computer hardware and peripherals; Computer hardware and peripherals therefor; Computer hardware and software for setting up and configuring local area networks; Computer hardware and software for setting up and configuring wide area networks; Computer hardware and software sold as a unit for testing of embedded computer systems; Computer hardware, namely, firewalls; Computer network adapters; Computer network adapters, switches, routers and hubs; Computer network hubs; Computer network hubs, switches and routers; Computer network interface devices; Computer network switches; Computer networking hardware; Computer operating software; Computer programs for searching remotely for content on computers and computer networks; Computer programs for searching the contents of computers and computer networks by remote control; Computer search engine software; Computer software for accessing information directories that may be downloaded from the global computer network; Computer software for computer system and application development, deployment and management; Computer software for controlling and managing access server applications; Computer software for creating searchable databases of information and data; Computer software for encryption; Computer software for providing an on-line database in the field of transaction processing to upload transactional data, provide statistical analysis, and produce notifications and reports; Computer software for the creation of firewalls; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files Computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software that provides real-time, integrated business management intelligence by combining information from various databases and presenting it in an easy-to-understand user interface; Computer software to automate data warehousing; Decoder software; Enterprise software in the nature of a database for non-transactional data and a search engine for database content; Gateway routers in the nature of computer control hardware; Network access server hardware; Network access server operating software; Software for ensuring the security of electronic mail
42 Application service provider (ASP), namely, hosting computer software applications of others; Application service provider featuring software for providing an on-line database in the field of transaction processing to upload transactional data, provide statistical analysis, and produce notifications and reports; Computer consultation in the field of computer security; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, hard drive erasure; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer service, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating searchable databases of information and data; Computer service, namely, acting as an application service provider in the field of knowledge management to host computer application software for searching and retrieving information from databases and computer networks; Computer software consultancy; Computer software consultation; Computer software consulting; Computer software development; Computer systems integration services; Computer virus protection services; Consultation services in the field of search engine optimization; Consultation services in the fields of selection, implementation and use of computer hardware and software systems for others; Consulting in the field of configuration management for computer hardware and software; Creating of computer programs; Customization of computer hardware and software; Customized software development services; Data automation and collection service using proprietary software to evaluate, analyze and collect service data Data conversion of electronic information; Data encryption and decoding services; Data encryption services; Data migration services; Design and development of computer hardware; Design and development of computer hardware and software; Design and development of computer software; Design and development of electronic data security systems; Design, creation, hosting, maintenance of websites for others; Design, deployment and management of wireless networks for others; Design, development and consulting services in the field of software for content management; Design, development and implementation of software; Design, development, installation and maintenance of computer software; Design, installation, updating and maintenance of computer software; Design, maintenance, development and updating of computer software; Designing and developing computer game software and video game software for use with computers, video game program systems and computer networks; Developing and hosting a server on a global computer network for the purpose of facilitating e-commerce via such a server; Developing and implementing customized plans for improving security and preventing criminal activity for businesses and governmental agencies; Developing and updating computer software; Developing computer software; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of security systems and contingency planning for information systems; Development of software for secure network operations; Maintenance of computer software relating to computer security and prevention of computer risks; On-line security services, namely, providing security and anonymity for electronically transmitted credit card transactions Technical support services, namely, 24x7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Technical support, namely, monitoring of network systems; Updating of computer software relating to computer security and prevention of computer risks

Trademark history

Date Document number Area Entry
March 22, 2021 Change Representative, Published
January 20, 2021 RAW: Representative - Deletion of the representative, Published
January 8, 2020 Extension, Trade mark renewed
July 25, 2019 Transfer / Change of address, Published
July 8, 2019 Change Representative, Published
March 13, 2013 Change Representative, Published

ID: 11009198425