SUPERMASSIVE

WIPO WIPO 2011

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The International trademark SUPERMASSIVE was filed as Word mark on 08/15/2011 at the World Intellectual Property Organization.

Trademark Details Last update: October 10, 2022

Trademark form Word mark
File reference 1107620
Countries Australia China European Community United Kingdom Israel Japan Norway Russia Singapore
Base trademark US No. 85243745, February 16, 2011
Application date August 15, 2011
Expiration date August 15, 2031

Trademark owner

2300B, Building 2000, City Gate,
Mahon, Cork
IE

Trademark representatives

ECKERT SEAMANS CHERIN & MELLOTT, LLC, US

goods and services

09 Firewalls comprising of firmware, hardware and software; computer hardware; computer software; computer software platforms; computer software platforms for computer security; computer security software; vpn hardware; vpn operating software; network security appliances comprised of computer hardware and computer anti-virus, anti-spam, anti-spyware, content filtering, intrusion detection, intrusion prevention, and network policy enforcement software; email security appliances comprised of computer hardware and software; computer hardware and software for providing secure remote access to computer and communication networks; computer hardware, namely, wireless access point (wap) devices; computer hardware and software for use in securing computers, data and computer networks; computer hardware and software for use in providing secure remote access solutions; computer hardware and software for use in providing data backup and recovery; computer software for use in monitoring, creating, generating, maintaining, modifying and updating network security algorithms employed by devices in a network environment, responsive to detected network anomalies and attacks; computer software for use in enhancing, optimizing, securing, accelerating, monitoring, accessing, modifying and managing computer network traffic, applications communicating across networks, and network related products; computer networking hardware; computer software for use in enhancing, optimizing, securing, accelerating, monitoring, and managing computer network traffic and applications communicating across networks; computer network operating system featuring network security, network management, processing of network traffic, provision of network security based applications and application enhancement; computer software and firmware for protecting the integrity of computer hardware, software, networks and electronic data; computer software and firmware for analyzing and filtering of network traffic and for the detection, filtering, and/or removal of computer intrusions, viruses, spam, or other malicious applications or threats, and for providing virtual private networking and security functions; computer software and firmware for monitoring, analyzing or reporting of network information, data and traffic; electronic software updates, namely, downloadable computer software and associated data files for updating computer software in the fields of computer intrusions, viruses, spam, or other malicious applications or threats and security functions protecting the integrity of computer hardware, software, networks and electronic data, provided via computer and communication networks; instruction manuals supplied as a unit with the foregoing
42 Providing online computer databases in the fields of technical information about computer hardware, computer software, computer and data security and computer system management; providing information relating to computer hardware, computer software, computer and data security and computer system management via the internet and other computer and communications networks; provision of information relating to viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices via the internet and other computer and communications networks; technical consultation in the field of computers, computer hardware, computer systems, computer software, and computer and communication networks; technical support services, namely, troubleshooting of computer hardware and software problems and monitoring of network systems; computer services, namely, data backup and recovery services; computer consulting services; computer software and network security research and development services; computer software and network security management and analysis; technical support services related to the provision of antivirus, anti-spam, anti-spyware, anti-malware, web-content filtering and/or intrusion detection and prevention for network and computer security; maintenance, upgrading, and updating of computer software; computer services, namely, providing a web-based system comprised of the temporary use of non-downloadable software to be used by others in the monitoring of computer systems for security purposes; computer software and network security management and analysis, namely, remote and on-line system management and analysis of the information technology (it) systems and networks of others; computer software and network security management and analysis services that allows users to view risk posture and network performance, to track network activity and to access reports regarding the same; computer network security management and analysis, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer network security management and analysis in the field of updating of computer software relating to computer security and prevention of computer risks; monitoring of network systems; software as a service (saas) featuring computer software; software as a service (saas) featuring computer software platforms; software as a service (saas) featuring computer software platforms for computer security; software as a service (saas) featuring computer security software; software as a service (saas) featuring vpn operating software; software as a service (saas) featuring network security appliances comprised of computer anti-virus, anti-spam, anti-spyware, content filtering, intrusion detection, intrusion prevention, and network policy enforcement software; software as a service (saas) featuring email security appliances comprised of computer software; software as a service (saas) featuring software for providing secure remote access to computer and communication networks; software as a service (saas) featuring software for use in securing computers, data and computer networks; software as a service (saas) featuring software for use in providing secure remote access solutions; software as a service (saas) featuring software for use in providing data backup and recovery; software as a service (saas) featuring computer software for use in monitoring, creating, generating, maintaining, modifying and updating network security algorithms employed by devices in a network environment, responsive to detected network anomalies and attacks; software as a service (saas) featuring computer software for use in enhancing, optimizing, securing, accelerating, monitoring, accessing, modifying and managing computer network traffic, applications communicating across networks, and network related products; software as a service (saas) featuring computer software for use in enhancing, optimizing, securing, accelerating, monitoring, and managing computer network traffic and applications communicating across networks; software as a service (saas) featuring computer software for protecting the integrity of computer hardware, software, networks and electronic data; software as a service (saas) featuring computer software for analyzing and filtering of network traffic and for the detection, filtering, and/or removal of computer intrusions, viruses, spam, or other malicious applications or threats, and for providing virtual private networking and security functions; software as a service (saas) featuring computer software for monitoring, analyzing or reporting of network information, data and traffic

Trademark history

Date Document number Area Entry
July 20, 2022 2022/29 Gaz GB Rejection
March 10, 2022 2022/10 Gaz EM Rejection
January 18, 2022 2022/5 Gaz RAW: Limitation
August 16, 2021 2021/40 Gaz Correction
June 9, 2021 2021/35 Gaz Extension
August 4, 2015 2015/40 Gaz US RAW: Partial Ceasing Effect
August 14, 2014 2014/38 Gaz SG RAW: Rule 18ter(2)(ii) GP following a provisional refusal
September 30, 2013 2013/45 Gaz CH Rejection
September 27, 2013 2013/40 Gaz NO RAW: Rule 18ter(2)(ii) GP following a provisional refusal
July 2, 2013 2013/29 Gaz IL Rejection
March 11, 2013 2013/12 Gaz CH Rejection
February 25, 2013 2013/9 Gaz AU RAW: Rule 18ter(2)(i) GP following a provisional refusal
February 7, 2013 2013/6 Gaz JP RAW: Rule 18ter(2)(ii) GP following a provisional refusal
January 30, 2013 2013/5 Gaz KR Rejection
December 17, 2012 2013/3 Gaz RU Rejection
December 10, 2012 2012/50 Gaz CN Rejection
September 24, 2012 2012/39 Gaz KR Rejection
September 5, 2012 2012/39 Gaz NO Rejection
August 30, 2012 2012/35 Gaz JP Rejection
May 17, 2012 2012/22 Gaz SG Rejection
March 22, 2012 2012/12 Gaz AU Rejection
August 15, 2011 2012/8 Gaz US Registration
Partial deletion

ID: 141107620