MUGI

USPTO USPTO 2008 ABANDONED - NO STATEMENT OF USE FILED

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The US trademark MUGI was filed as Word mark on 05/28/2008 at the U.S. Patent and Trademark Office. The current status of the mark is "ABANDONED - NO STATEMENT OF USE FILED".

Trademark Details Last update: June 10, 2018

Trademark form Word mark
File reference 77484716
Application date May 28, 2008
Publication date December 16, 2008

Trademark owner

6-6, Marunouchi 1-chome Chiyoda-ku
Tokyo
JP

Trademark representatives

goods and services

9 Computer security products for use in the field of data security, namely, computer hardware and computer software that encrypts data; computer hardware and computer software that decrypts data; computer hardware and computer software that permit access to data by generating access codes and by verifying access codes, computer hardware and computer software that authenticate users, computer hardware and computer software that issue and manage digital user identities and access privileges for electronic commerce and security, and computer hardware and computer software that integrate cryptographic security features into other software applications; computer software and electronic documentation, namely, software development tools and products, namely, algorithms used in encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity; computer software, namely, for use in electronic transmission and authentication of information in the field of communications; computer firmware, namely, for use in encryption, decryption, authentication and transmission of information; computer hardware for use in encryption, decryption, authentication and transmission of information and data communication, information and data transactions, networking, cryptography, digital signatures and public and private key generation, security functions, namely, encryption, decryption, certification, authorization, authentication, verification, ensuring of data privacy, confidentiality and data integrity; integrated circuits; computer software storage media, namely, pre-recorded CD-ROMS and computer diskettes featuring computer software and documentation for providing encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity; computer networking software for cryptography, digital signatures and private and public key generation, and security functions, namely, encryption, decryption, certification, authentication, verification, ensuring data privacy confidentiality and data integrity; radio pagers; modems; cellular telephones telecommunications equipment, namely, radio transmitters, telephone transmitters, satellite transmitters, receivers, namely, telephone, audio receivers, video receivers and data receivers, namely PCI cards, set top boxes and satellite receivers, PC cards, LAN cards, and WLAN cards; electric switches; computer networks, local area networks, wide area networks, virtual private networks, and wireless computer networks used in encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity all comprised of telephones, laptop computers, personal computers, servers, modems, PC cards, set-up boxes and network interface cards; wireless communication processors, namely, satellite processors, cellular telephony base stations, signal processors, two-way radio pagers, radio and satellite telephones, wireless handheld computers, magnetic coded cards and plastic cards with embedded integrated circuits and stored information and data, namely, smart cards used in encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity, namely, network integrity; computer terminals for use with credit cards, debit cards and smart cards, namely, magnetic coded card readers and smart cards readers; watermarking computer software algorithms for computer software verification, steganography computer software algorithms for computer software verification; stored value smart cards, namely, encoded integrated circuit cards containing programming used for encryption, decryption, certification of user, authorization of user, authentication of user, verification of user; magnetically encoded credit cards

ID: 1377484716