HONEYBOX

EUIPO EUIPO 2013 Trademark registered

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The Union trademark HONEYBOX was filed as Word mark on 03/12/2013 at the European Union Intellectual Property Office.
It was registered as a trademark on 09/25/2013. The current status of the mark is "Trademark registered".

Trademark Details Last update: February 20, 2023

Trademark form Word mark
File reference 011647112
Application date March 12, 2013
Publication date June 18, 2013
Entry date September 25, 2013
Expiration date March 12, 2033

Trademark owner

Kiefernstraße 38
85649 Brunnthal-Hofolding
DE

Trademark representatives

Giselastr. 28 80802 München DE

goods and services

9 Apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; Electric and electronic apparatus for security solutions in the field of information technology, included in class 9; Electric and electronic components, in particular for security solutions in the field of information technology, included in class 9; Data processing equipment, in particular for security solutions in the field of information technology, included in class 9; Computer hardware for preventing hacking into computers, networks, data processing systems, computer hardware for detecting hacker attacks, for tracing hacker attacks, for detecting weak spots in data processing systems; Computer hardware for detecting and protecting against viruses, worms, trojans and similar malware; Computer hardware for security management in information technology; Computer modules and computer parts, in particular for computer, network and data processing security; Computer modules and computer parts for detecting hacker attacks, for tracing hacker attacks, for detecting weak spots in data processing systems; Computer servers, in particular for security solutions in the field of information technology, included in class 9; Computer software, in particular for security solutions in the field of information technology; Computer software for securing computers, networks, data processing systems; Computer software for preventing hacking into computers, networks, data processing systems; Computer software for detecting hacker attacks, for tracing hacker attacks, for detecting weak spots in data processing systems; Computer software for detecting and protecting against viruses, worms, trojans and similar malware; Computer software for security management in information technology; Interactive computer hardware and computer software for security solutions in the field of information technology; Compact discs, DVDs and other digital recording media with software stored thereon, in particular for security solutions in the field of information technology
37 Installation, maintenance, repair of electric and electronic equipment, in particular in the field of computer, network and data processing security; Installation, assembly, maintenance and repair of computer hardware, in particular for security solutions in the field of information technology; Installation, assembly, maintenance and repair of computer hardware for preventing hacking into computers, networks, data processing systems; Installation, assembly, maintenance and repair of computer hardware for detecting hacker attacks, for tracing hacker attacks, for detecting weak spots in data processing systems; Installation, assembly, maintenance and repair of computer hardware for detecting and protecting against viruses, worms, trojans and similar malware; Installation, maintenance and repair of computers; Installation, maintenance and repair of computer systems, in particular for security solutions in the field of information technology; Installation, maintenance and repair of security systems for computer, network and data processing security; Installation, maintenance and repair of security systems for detecting hacker attacks, for tracing hacker attacks, for detecting weak spots in data processing systems; Installation, maintenance and repair of security systems for detecting and protecting against viruses, worms, trojans and similar malware; Installation services and maintenance services, in particular in the field of computer, network and data processing security
38 Communications, in particular via digital networks; Internet-based telecommunications services; Data transmission, in particular via digital networks; Interactive transmission and communication; Transmission of digital files; Electronic transmission of computer programs via digital networks; Providing access to websites on the Internet; Providing electronic telecommunications networks and electronic databases; Communication services for access to databases; Connection services for databases
41 Providing of training, in particular in the field of computer, network and data processing security; Providing of training in relation to the detection of hacker attacks, the tracing of hacker attacks, the detection of weak spots in data processing systems; Providing of training in relation to security management in information technology; Arranging and conducting of training courses, courses, seminars, workshops, lectures, in particular in the field of computer, network and data processing security; Arranging and conducting of training courses, courses, seminars, workshops, lectures in relation to the detection of hacker attacks, the tracing of hacker attacks, the detection of weak spots in data processing systems; Sporting and cultural activities
42 Scientific and technological services and research and design relating thereto, In particular in the field of computer, network and data processing security; Industrial analysis and research services, in particular in the field of computer, network and data processing security; Consultancy in the field of computer hardware and computer software, in particular in relation to security solutions in the field of information technology; Professional consultancy relating to computer security; Provision of security services for computer networks, computer access and computerised transactions; Technological security testing in the field of computer, network and data processing security; Design and development of computer hardware and software, in particular for computer, network and data processing security; Design and development of computer hardware and software for detecting hacker attacks, for tracing hacker attacks, for detecting weak spots in data processing systems; Design and development of computer hardware and software for detecting and protecting against viruses, worms, trojans and similar malware; Statements, Implementation, The installation, Servicing, Care, Updating and Adaptation of software, In particular in the field of computer, network and data processing security; Creating, implementing, installation, maintenance, upkeep, updating and adapting of software for detecting and protecting against viruses, worms, trojans and similar malware; computer software technical support services; software customization services, In particular in the field of computer, network and data processing security; Conducting technical project studies, In particular in the field of computer, network and data processing security; Technical project studies and technical project management, In particular in the field of computer, network and data processing security; Technical project planning and technical project management for preventing hacking into computers, networks and data processing systems; Technical project planning and technical project management for detecting hacker attacks, for tracing hacker attacks, for detecting weak spots in data processing systems

Trademark history

Date Document number Area Entry
February 16, 2023 Extension, Trade mark renewed
January 5, 2021 Change Representative, Published
December 9, 2020 Change Representative, Published
March 30, 2017 Change Representative, Published

ID: 11011647112