ANGOKA

EUIPO EUIPO 2020 Trademark registered

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The Union trademark ANGOKA was filed as Word mark on 12/08/2020 at the European Union Intellectual Property Office.
It was registered as a trademark on 04/29/2021. The current status of the mark is "Trademark registered".

Trademark Details Last update: February 27, 2024

Trademark form Word mark
File reference 018350341
Application date December 8, 2020
Publication date January 20, 2021
Entry date April 29, 2021
Expiration date December 8, 2030

Trademark owner

6 Annadale Avenue
BT7 3 JH Belfast
GB

Trademark representatives

Gedempt Hamerkanaal 257 1021 KP Amsterdam NL

goods and services

9 Recorded software for identification and authentication; downloadable software for identification and authentication; computer software platforms for identification and authentication; computer software for use as an application programming interface for identification and authentication; recorded software for identification of network devices; downloadable software for identification of network devices; computer software platforms for identification of network devices; computer software for use as an application programming interface for identification of network devices; recorded software for authentication of network devices; downloadable software for authentication of network devices; computer software platforms for authentication of network devices; computer software for use as an application programming interface for authentication of network devices; recorded software for monitoring of network devices; downloadable software for monitoring of network devices; computer software platforms for monitoring of network devices; computer software for use as an application programming interface for monitoring of network devices; recorded software for maintenance of network devices; downloadable software for maintenance of network devices; computer software platforms for maintenance of network devices; computer software for use as an application programming interface for maintenance of network devices; recorded computer software for network security; downloadable computer software for network security; computer software platforms for network security; recorded computer software for network device security; downloadable computer software for network device security; computer software platforms for network device security; recorded computer software for cyber security; downloadable computer software for cyber security; computer software platforms for cyber security; recorded computer software for cyber security of machine to machine communications and machine to machine communication networks; downloadable computer software for cyber security of machine to machine communications and machine to machine communication networks; computer software platforms for cyber security of machine to machine communications and machine to machine communication networks; recorded computer software for cyber security of vehicle to vehicle communications and vehicle to vehicle communication networks and vehicle to everything communications and vehicle to everything communication networks; downloadable computer software for cyber security of vehicle to vehicle communications and vehicle to vehicle communication networks and vehicle to everything communications and vehicle to everything communication networks; computer software platforms for cyber security of vehicle to vehicle communications and vehicle to vehicle communication networks and vehicle to everything communications and vehicle to everything communication networks; recorded computer software for cyber security of satellite communications and satellite communication networks; downloadable computer software for cyber security of satellite communications and satellite communication networks; computer software platforms for cyber security of satellite communications and satellite communication networks; recorded computer software for cyber security of drone communications and drone communication networks; downloadable computer software for cyber security of drone communications and drone communication networks; computer software platforms for cyber security of drone communications and drone communication networks; recorded computer software for cyber security of critical infrastructure; downloadable computer software for cyber security of critical infrastructure; computer software platforms for cyber security of critical infrastructure; recorded computer software for cyber security of smart homes and smart factories and smart cities; downloadable computer software for cyber security smart homes and smart factories and smart cities; computer software platforms for cyber security smart homes and smart factories and smart cities; recorded computer software for cyber security of manufacturing systems; downloadable computer software for cyber security of manufacturing systems; computer software platforms for cyber security of manufacturing systems; recorded computer software for cyber security of logistics systems; downloadable computer software for cyber security of logistics systems; computer software platforms for cyber security of logistics systems; recorded computer software for cyber security of medical devices; downloadable computer software for cyber security of medical devices; computer software platforms for cyber security of medical devices; recorded computer software for cyber security of unmanned vehicles; downloadable computer software for cyber security of unmanned vehicles; computer software platforms for cyber security of unmanned vehicles; recorded cryptography software; downloadable cryptography software; computer software platforms for cryptography; recorded cryptographic protocol software; downloadable cryptographic protocol software; hardware customised to execute software for identification and authentication; hardware customised to execute software for identification of network devices; hardware customised to execute software for authentication of network devices; hardware customised to execute software for monitoring of network devices; hardware customised to execute software for maintenance of network devices; hardware customised to execute software for network security; hardware customised to execute software for network device security; hardware customised to execute software for cyber security; hardware customised to execute cryptography software; hardware customised to execute cryptographic protocol software; microchips customised to execute software for identification and authentication; microchips customised to execute software for identification of network devices; microchips customised to execute software for authentication of network devices; microchips customised to execute software for monitoring of network devices; microchips customised to execute software for maintenance of network devices; microchips customised to execute software for network security; microchips customised to execute software for network device security; microchips customised to execute software for cyber security; microchips customised to execute cryptography software; microchips customised to execute cryptographic protocol software
41 Education, provision of training, education information, all relating to cyber security; education, provision of training, education information, all relating to cryptography; education, provision of training, education information, all relating to identification and authentication; education, provision of training, education information, all relating to identification and authentication of network devices; education, provision of training, education information, all relating to monitoring and maintenance of network devices
42 Consultancy in the field of cyber security; consultancy in the field of network security; consultancy in the field of cryptography; consultancy in the field of identification and authentication; consultancy in the field of identification and authentication of network devices; consultancy in the field of monitoring and maintenance of network devices; design and development of computer software for cyber security; design and development of computer software for network security; design and development of computer software for cryptography; design and development of computer software for identification and authentication; design and development of computer software for identification and authentication of network devices; design and development of computer software for monitoring and maintenance of network devices; adaptation and updating of computer software for cyber security; adaptation and updating of computer software for network security; adaptation and updating of computer software for cryptography; adaptation and updating of computer software for identification and authentication; adaptation and updating of computer software for identification and authentication of network devices; maintenance and support of computer software for cyber security; maintenance and support of computer software for network security; maintenance and support of computer software for cryptography; maintenance and support of computer software for identification and authentication; maintenance and support of computer software for identification and authentication of network devices
45 Licensing of computer software for cyber security; licensing of computer software for network security; licensing of computer software for cryptography; licensing of computer software for identification and authentication; licensing of computer software for identification and authentication of network devices; licensing of computer software for monitoring and maintenance of network devices

Trademark history

Date Document number Area Entry
February 26, 2024 Change Representative, Published
April 13, 2022 Change Representative, Published
May 11, 2021 RAW: Representative - Deletion of the representative, Published

ID: 11018350341