DRAGOS

WIPO WIPO 2021

Schützen Sie diese Marke vor Nachahmern!

Mit unserer Markenüberwachung werden Sie automatisch per E-Mail über Nachahmer und Trittbrettfahrer benachrichtigt.

Die Internationale Marke DRAGOS wurde als Wortmarke am 07.02.2021 bei der Weltorganisation für geistiges Eigentum angemeldet.

Markendetails Letztes Update: 24. März 2023

Markenform Wortmarke
Aktenzeichen 1605642
Länder Bahrain Brasilien Israel Indien Japan Südkorea Russland
Basismarke US Nr. 90342905, 25. November 2020
Anmeldedatum 07. Februar 2021
Ablaufdatum 07. Februar 2031

Markeninhaber

1745 Dorsey Rd., Suite R
Hanover MD 21076
US

Markenvertreter

2475 Hanover Street Palo Alto CA 94304 US

Waren und Dienstleistungen

09 Software; downloadable and recorded software; cybersecurity software; downloadable and recorded software for providing network, internet, and computer security; downloadable and recorded software for use in the management, monitoring, evaluation, optimization, maintenance, recovery, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices; downloadable and recorded software for computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention, security and dysfunction incident remediation, computer security vulnerability assessment, prioritization, mitigation, and remediation; downloadable and recorded software for the encryption and authentication of electronic and digital information and data; downloadable and recorded computer software for identity security; downloadable and recorded software for authentication and identity management information security; downloadable and recorded software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the internet and other computer networks; downloadable and recorded software for providing data analytics, business analytics, business intelligence and for collecting and analyzing data; downloadable electronic data files featuring data for computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention, security and dysfunction incident remediation; computer hardware; optical and image sensor hardware; computer hardware for use in management, monitoring, evaluation, analysis, investigation and security of computer systems, industrial control systems, and networked devices; sensors for use in management, monitoring, evaluation, analysis, investigation and security of computer systems, industrial control systems, and networked devices
41 Educational services; educational services in the field of cybersecurity; training services in the field of cybersecurity; providing online, non-downloadable educational publications, articles, webinars, whitepapers, solution briefs, reports, and datasheets in the field of cybersecurity
42 Software as a service (saas) services; platform as a service (paas) services; software as a service (saas) services featuring cybersecurity software; platform as a service (paas) services featuring cybersecurity software; non-downloadable software for providing network, internet, and computer security (terms too vague in the opinion of the International Bureau – Rule 13 (2) (b) of the Regulations); non-downloadable software for use in management, monitoring, evaluation, optimization, maintenance, recovery, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices (terms too vague in the opinion of the International Bureau – Rule 13 (2) (b) of the Regulations); non-downloadable software for computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention security and dysfunction incident remediation, computer security vulnerability assessment, prioritization, mitigation, and remediation (terms too vague in the opinion of the International Bureau – Rule 13 (2) (b) of the Regulations); non-downloadable software for the encryption and authentication of electronic and digital information and data (terms too vague in the opinion of the International Bureau – Rule 13 (2) (b) of the Regulations); non-downloadable software for identity security (terms too vague in the opinion of the International Bureau – Rule 13 (2) (b) of the Regulations); non-downloadable software for authentication and identity management information security (terms too vague in the opinion of the International Bureau – Rule 13 (2) (b) of the Regulations); non-downloadable software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the internet and other computer networks (terms too vague in the opinion of the International Bureau – Rule 13 (2) (b) of the Regulations); non-downloadable software for providing data analytics, business analytics, business intelligence and for collecting and analyzing data (terms too vague in the opinion of the International Bureau – Rule 13 (2) (b) of the Regulations); providing an online portal for use in management, monitoring, evaluation, optimization, maintenance, recovery, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices (terms too vague in the opinion of the International Bureau – Rule 13 (2) (b) of the Regulations); providing an online portal for computer security, internet security, network security, security monitoring, network asset identification, threat detection, threat intelligence, security integration, network architecture, encryption technology, authentication technology, intrusion detection and prevention, security and dysfunction incident remediation (terms too vague in the opinion of the International Bureau – Rule 13 (2) (b) of the Regulations); electronic storage of data; information technology consulting services; consulting services in the field of cybersecurity; consulting services in the field of management, monitoring, evaluation, control, analysis, investigation and security of computer systems, industrial control systems, and networked devices; providing information concerning the encryption and authentication of electronic and digital data; authentication, issuance and validation of digital certificates; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the internet and other computer networks; design, development, installation, and customization of software; design and development of cybersecurity systems; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; updating of computer software; computer diagnostic services; technical support services; technical support services in the nature of monitoring, detecting, diagnosing, remediating, mitigating and resolving cybersecurity issues; technical support services in the nature of architecture reviews, vulnerability assessments, device and application penetration tests, network penetration tests, and threat hunting for of computer systems, industrial control systems, and networked devices
45 Monitoring services (terms too vague in the opinion of the International Bureau – Rule 13 (2) (b) of the Regulations); monitoring of computer systems, industrial control systems, and networked devices for security purposes; monitoring and tracking of security vulnerabilities and problems in computer software products and computer networks; investigation services (terms too vague in the opinion of the International Bureau – Rule 13 (2) (b) of the Regulations); investigation of security threats to computer systems, industrial control systems, and networked devices for security purposes; investigation of security vulnerabilities and problems in computer systems, industrial control systems, and networked devices for security purposes; computer emergency response team services, namely, monitoring, tracking, and investigation of security vulnerabilities and problems in computer software products and computer networks
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen

Markenhistorie

Datum Belegnummer Bereich Eintrag
02. März 2023 2023/12 Gaz IL RAW: Rule 18ter(2)(ii) GP following a provisional refusal
23. Dezember 2022 2023/1 Gaz KR RAW: Rule 18ter(2)(ii) GP following a provisional refusal
10. November 2022 2022/46 Gaz JP RAW: Rule 18ter(2)(ii) GP following a provisional refusal
17. Oktober 2022 2022/45 Gaz IN RAW: Rule 18ter(2)(i) GP following a provisional refusal
17. Juli 2022 2022/29 Gaz RU RAW: Rule 18ter(2)(ii) GP following a provisional refusal
22. Juni 2022 2022/26 Gaz BR RAW: Rule 18ter(2)(i) GP following a provisional refusal
16. Mai 2022 2022/20 Gaz KR Ablehnung
28. April 2022 2022/17 Gaz JP Ablehnung
15. März 2022 2022/12 Gaz BR Ablehnung
01. Dezember 2021 2021/49 Gaz IL Ablehnung
25. Oktober 2021 2021/43 Gaz RU Ablehnung
19. August 2021 2021/34 Gaz IN Ablehnung
07. Februar 2021 2021/29 Gaz US Eintragung

ID: 141605642