Athene

WIPO WIPO 2019

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The International trademark Athene was filed as Word mark on 09/26/2019 at the World Intellectual Property Organization.

Trademark Details Last update: February 16, 2023

Trademark form Word mark
File reference 1520543
Register number 302019104019
Countries Canada European Community Japan South Korea United States of America (USA) Switzerland China
Base trademark DE No. 30 2019 104 019, May 21, 2019
Application date September 26, 2019
Expiration date September 26, 2029

Trademark owner

goods and services

09 Antispyware software; antivirus software; security surveillance apparatus; scientific research and laboratory apparatus, educational apparatus and simulators; recorded data; authentication software; banking software; biometric software; business intelligence software; computers; computer peripheral devices; computer programs; computer software for computer aided software engineering; computer software for the detection of threats to computer networks; computer software for the creation of firewalls; computer software for encryption; dashboard software; databases; data management software; privacy software; data processing apparatus; debugging software; utility, security and cryptography software; digital telephone systems and software; embedded software; integrated software packages; electronic security systems for home network; electronic encryption units; computer firewall software; downloadable computer security software; downloadable software applications; industrial controls incorporating software; wireless controllers to remotely monitor and control the function and status of security systems; artificial intelligence software for surveillance; artificial intelligence software for driverless cars; artificial intelligence software for vehicles; artificial intelligence and machine learning software; artificial intelligence software for analysis, in particular cybersecurity; mail server software; measuring, detecting and monitoring instruments, indicators and controllers; middleware for management of software functions on electronic devices; networking software; production support software; proxy server software; sensors and detectors; sensors and detectors, in particular for security purposes; server-side software; security control apparatus; security software; security warning apparatus; safety, security, protection and signaling devices; data protection backup units; software; software for providers of digital solutions; operational risk management software; computer software for biometric systems for the identification and authentication of persons; electronic commerce and electronic payment software; internet access software; software for the development of secure software, hardware, devices, systems and networks; industrial automation software; cloud network monitoring software; software for mobile device management; software for mobile device management, in particular in relation to cybersecurity; intrusion detection system software; software for diagnostics and troubleshooting; content control software; software for card readers; artificial intelligence software; machine learning software; machine learning software for surveillance; machine learning software for analysis; mobile software; software for network and device security; software for online messaging; software for security testing of hardware, software, devices, systems and networks; software for smartphones; software for traffic management systems; software and devices for controlling access to systems, devices and data; software, hardware and data processing equipment for the administration of software, hardware, devices, systems and networks, in particular with respect to cybersecurity properties; software, hardware and data processing equipment for the detection and extraction of embedded marks in data, in particular recognition and extraction of watermarks in multimedia data; software, hardware and data processing equipment for the detection and visualization of security-related information and events in software, hardware, devices, systems and networks; software, hardware and data processing equipment for marking data, in particular watermarks in multimedia data; software and devices for security analysis of software, hardware, devices, systems and networks; software and devices for security analysis of software, hardware, devices, systems and networks by means of mass analysis; software, hardware and data processing equipment for searching, detecting and extracting data traces and data from security-related events in software, hardware, devices, systems and networks; software, hardware and data processing equipment relating to cybersecurity; software, hardware and data processing equipment related to IT forensics; software, hardware and data processing equipment for the protection of software, hardware, devices, systems, networks and data, in particular for the protection of confidentiality and against tampering; privacy protection software; hardware testing software; electronic payment software; threat detection software; software for facilitating secure credit card trans-actions; computer software to maintain and operate computer systems; risk detection software; software for ensuring the security of electronic mails; instant messaging software; software for software analysis; electronic mail and messaging software; computer software packages; software programmable microprocessors; cards encoded with security features for identification purposes; encryption apparatus; computer software for encryption
35 Market analysis and research; business consultancy and advisory services, in particular conducting trend analyses to support decisions
38 Telecommunication gateway services; telecommunication services provided via internet platforms and portals; providing access to platforms and portals on the internet; transmission of encrypted communications; transmission of encrypted messages and images; providing access to information on the internet; providing user access to computer programs in data networks; providing access to databases; computer communication and internet access; telecommunications services between computer networks; telecommunications services, namely services that support the secure transmission of messages; secure e-mail services; secure transmission of data, sound or images; providing users with secure remote access to private computer networks via the internet; provision of wireless application protocol [WAP] services including those utilizing a secure communication channel; providing virtual private network (VPN) services
41 Further education; advanced training; training and further training; organization of continuing educational seminars; provision of training courses in personal development; education services for management staff; educational services provided to industry; organization of seminars; consultancy relating to education and training; providing information relating to continuing education via the internet; providing of continuous training courses; technical training relating to security; providing non-downloadable electronic publications via a global computer network or the internet; training services in the field of computer software development; training services in the field of development of computer software systems; training in the field of design of software systems; provision of instruction related to data processing; education in the field of computing; conducting of training courses on the use and application of data processing programs; conducting of training courses in the field of data processing; conducting of training courses relating to data processing techniques; analyzing educational test scores and data for others; education services relating to computers; training services relating to the maintenance of computer controlled test systems; training services relating to the repair of computer controlled test systems; training services relating to the installation of computer controlled test systems; education and training relating to cybersecurity of equipment, networks, software, hardware, data and services; education and training related to basic techniques of applied cybersecurity; education and training related to privacy; education and training related to the secure operation of networks; education and training related to security analysis of equipment, networks, software, hardware, data and services; further education, in particular with respect to cybersecurity; education and training, in particular with respect to cybersecurity; conducting of training courses, in particular with respect to cybersecurity; further education, in particular with respect to privacy; education and training, in particular with respect to privacy; conducting of training courses, in particular with respect to privacy
42 Updating of software for embedded devices; maintenance and updating of computer software; updating of computer software relating to computer security and prevention of computer risks; updating of software for communication systems; computer security threat analysis for protecting data; authentication services for computer security; internet security consultancy; consultancy in the field of software design; advisory services relating to computer software; advisory services relating to the design and development of computer hardware; consultancy services relating to software used in the field of electronic commerce; consultancy in the field of security software; provision of computer security risk management programs; provision of security services for computer networks, computer access and computerized transactions; computer firewall services; computer programming services for electronic data security; computer security consultancy; computer security services for administration of digital certificates; design of software for embedded devices; services for the secure operation of networks and services using information and communication technology; data security services [firewalls]; anti-spamming services; computer virus protection services; services for analyzing cybersecurity characteristics of equipment, networks, software, hardware, data and services; computer security services for protection against illegal network access; services for the development of devices, networks, software, hardware and services in the field of information and communication technology with enhanced cybersecurity capabilities; technical measuring; electronic data storage and data back-up services; electronic monitoring of personally identifying information to detect identity theft via the internet; development and testing of computing methods, algorithms and software; development and testing of software; development of operating system software; development of computer firmware; development of computer peripheral devices; development of computer programs; development of measuring and testing methods; development of software for communication systems; development of software solutions for internet providers and internet users; development of technologies for the protection of electronic networks; development of driver software; software development, programming and implementation; design and development of computer hardware and computer software; design and development of internet security programs; design and development of software in the field of mobile applications; design and development of systems for data input, output, processing, display and storage; design, development and implementation of software; preparation of scientific reports; surveying; creation, maintenance and adaptation of software; technical research; research relating to computer programs; research in the field of telecommunications technology; research in the field of computer hardware; research in the field of information technology; research related to networks, in particular research relating to the security of networks; research relating to security; computer software research; computer software research, in particular research relating to the security of software; research related to systems, in particular research relating to system security; research and development services; consultancy services related to the design, development and use of computer hardware and software; hosting services, software as a service, and rental of software; industrial analysis and research services related to cybersecurity; industrial research; engineering research; installation and maintenance of internet access software; information technology consultancy, advisory and information services; information technology consultancy services relating to the development and use of information and communication technologies and services, in particular with regard to cybersecurity; information technology services; information technology security, protection and recovery; computer analysis and computer diagnostic services; configuration of computer networks by software; configuring computer hardware using software; design and development of electronic data security systems; custom design of software packages; maintenance of computer software relating to computer security and prevention of computer risks; maintenance of computer software relating to communication protocols; maintenance of software for communication systems; maintenance, implementation and installation of software; programming of internet security programs; programming of software for internet platforms; testing, authentication and quality control; consumer product security testing and consultancy; product security testing; computer software consultancy; computer software design, in particular for secure software; software engineering; software engineering, in particular for secure software; software development; software development, in particular for secure software; technical advice relating to security; technical development and research of new products for others; technical research; technical measurement services; technological analysis services; conducting technical and scientific project planning; technological research; technological research relating to computers; technological security testing services; monitoring of computer systems for security purposes; monitoring of computer systems for detecting unauthorized access or data breach; rental of internet security programs; rental of software for internet access; encryption of digital images; encryption of digital music; encryption, decryption and authentication of information, messages and data; maintenance and updating of computer software; maintenance and repair of software; maintenance of software for internet access; maintenance of software for internet access related to cybersecurity; scientific research; scientific research and analysis; scientific and industrial research; advisory services relating to science; technological consultancy; science and technology services and research relating to cybersecurity, privacy and data protection; science and technology services and research and design related thereto
45 Providing reconnaissance and surveillance services; information services related to health and safety; closed-circuit surveillance; security consultancy; advisory services related to the law; advisory services related to security; consultancy in the field of data theft and identity theft; consulting services in the field of national security; safety, rescue, security and enforcement services; security guard services for the protection of property and individuals; electronic monitoring services for security purposes; preparation of legal reports; legal information services; security assessment of risks; information services relating to safety; legal advice; legal services; licensing of computer software [legal services]; licensing of databases [legal services]; licensing of wireless communication system; licensing of research and development [legal services]; licensing of computer software; copyright licensing [legal services]; licensing of intellectual property; opening of locks [locksmiths' services]; legal aid services; safety evaluation; security guarding for facilities; security services for the protection of property; security services for the protection of individuals; security services for the protection of property and individuals; security inspection services; security inspection services for others; monitoring of security systems; surveillance services; rental of equipment for safety, rescue, security and enforcement; rental of security equipment; rental of security apparatus; rental of security surveillance apparatus; copyright and industrial property rights management; providing information on industrial property rights; provision of expert legal opinions; legal services related to cybersecurity; legal services related to data protection; legal services related to technical protective measures

Trademark history

Date Document number Area Entry
January 18, 2023 2023/7 Gaz US RAW: Rule 18ter(2)(ii) GP following a provisional refusal
May 10, 2022 2022/20 Gaz CA Rejection
March 24, 2022 2022/12 Gaz JP RAW: Rule 18ter(2)(i) GP following a provisional refusal
October 1, 2021 2021/40 Gaz KR Rejection
August 16, 2021 2021/36 Gaz CH RAW: Rule 18ter(2)(ii) GP following a provisional refusal
August 12, 2021 2021/49 Gaz RAW: Limitation
July 30, 2021 2021/32 Gaz CA Rejection
May 13, 2021 2021/19 Gaz JP Rejection
April 7, 2021 2021/14 Gaz KR Rejection
February 12, 2021 2021/8 Gaz CH Rejection
September 25, 2020 2020/41 Gaz Deletion
August 11, 2020 2020/33 Gaz EM Rejection
August 11, 2020 2020/35 Gaz CN Rejection
April 15, 2020 2020/16 Gaz US Rejection
September 26, 2019 2020/10 Gaz DE Registration

ID: 141520543