TALEA

EUIPO EUIPO 2014 Trademark registered

The displayed mark can be extended.
Click here, to extend trademark protection for a further 10 years.

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The Union trademark TALEA was filed as Word mark on 08/28/2014 at the European Union Intellectual Property Office.
It was registered as a trademark on 06/20/2018. The current status of the mark is "Trademark registered".

Extend brand

Trademark Details Last update: March 1, 2024

Trademark form Word mark
File reference 013208161
Application date August 28, 2014
Publication date December 22, 2014
Entry date June 20, 2018
Expiration date August 28, 2024

Trademark owner

3500 S. DuPont Highway
19901 Dover
US

Trademark representatives

Montgelasstr. 2 81679 München DE

Objection / Complaint

03/19/2015: Likelihood of confusion Unfair advantage /detriment to distinctiveness or repute
Applicant
THALES

goods and services

9 Computer software for encryption; computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; computer software programs and downloadable software for security, encryption, digital signatures, authentication, fraud detection, interception, and jamming across operating environments, multiple platforms and net protocols, websites and mobile devices; electronic optical data encryption units; electronic text message encryption units for wireless phones and pocket PCs; electronic encryption units; external computer hard drives featuring software for data encryption; electronic transmitters for jamming signals; computer software for jamming solutions; computer hardware, filters and components in the nature of signal processors for use in processing incoming telecommunications signal data in order to detect, identify, isolate and eliminate jamming signals and interference; integration of optical systems and computer hardware for network performance monitoring, network security, cyber security, and lawful interception; software for the management of optical systems and computer hardware for the purpose of network performance monitoring, network security, cyber security, and lawful interception; computer software for Internet security and lawful interception; computer hardware and software for content filtering and lawful interception tools into computer networks and network infrastructure
35 Business management consulting; business marketing and management analysis consulting; social media strategy and marketing consultancy focusing on helping clients create and extend their product and brand strategies by building virally engaging marketing solutions; compiling data and customer user information for social media platforms and purposes
41 Computer education training services; training in the field of cyber-security and data science systems, tools, software, and analytical techniques used in data science and cyber security, policies and procedures and how to evaluate and solve cyber security and data science
42 Computer services, namely, remote management of information technology (IT) systems for others; computer technology support services, namely, help desk services; providing cyber technology solutions, namely, developing, maintaining, managing, advising, consulting and implementing IT programs for third parties; consulting in the field of information technology; computer forensic services, including providing strategy, design and implementation of forensic laboratories; technical support and consulting services in the fields of computer security, vulnerability of computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical and consulting services related to developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security software systems for others; information technology security services in the nature of providing cyber-threat intelligence, cyber-attack verification, and security analysis of network traffic, emails, files, media computer software, and mobile applications; providing technology solutions related to cyber-security, namely, advising, consulting, and implementing security measures to ensure confidentiality, integrity and availability of data and information transmitted, stored and shared on computers, computer software, computer hardware and electronic devices; data analytics for social media; providing social media analytics, including storing data, allowing users to identify trends and setup alerts

Trademark history

Date Document number Area Entry
January 31, 2024 Extension, Notification of expiry of trade mark
June 22, 2017 Change Representative, Registered
April 6, 2017 RAW: Representative - Deletion of the representative, Registered
October 7, 2015 Change Representative, Published
February 18, 2015 Change Representative, Published

ID: 11013208161