TREND

USPTO USPTO 2006 ABANDONED - NO STATEMENT OF USE FILED

Schützen Sie diese Marke vor Nachahmern!

Mit unserer Markenüberwachung werden Sie automatisch per E-Mail über Nachahmer und Trittbrettfahrer benachrichtigt.

Die US-Marke TREND wurde als Wortmarke am 03.10.2006 beim Amerikanischen Patent- und Markenamt angemeldet. Der aktuelle Status der Marke ist "ABANDONED - NO STATEMENT OF USE FILED".

Markendetails Letztes Update: 24. Mai 2018

Markenform Wortmarke
Aktenzeichen 77013017
Anmeldedatum 03. Oktober 2006
Veröffentlichungsdatum 01. April 2008

Markeninhaber

Shinjuku MAYNDS Tower 27F, 2-1-1 Yoyogi
151-0053 Tokyo
JP

Markenvertreter

Waren und Dienstleistungen

9 computer security software; computer antivirus software; malicious code and malicious content screening software; firewall software; software for monitoring, filtering and modifying messages, files, programs and data retrieved or received from computer and communication networks; computer software for use in scanning, detecting, quarantining and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; computer software for use in repairing damage from viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; computer software for network security and network management; computer software for securing wireless computer networks; anti-spam, anti-fraud, and anti-phishing computer software; computer software for enforcing content policies for electronic mail, instant messaging, and web usage; computer utility software; electronic software updates, namely, downloadable computer software and associated data files for updating computer software in the fields of computer and network security, provided via computer and communication networks; computer hardware, not including ethernet cards or ethernet hubs; computer network security appliances not including ethernet cards or ethernet hubs, namely computer hardware preinstalled with security software, in Class 9
16 data sheets, quick start guides, installation instructions, troubleshooting guides, technical reference manuals, pamphlets, books, booklets, training manuals, instructional manuals, all in the fields of computers, computer hardware, computer software, information technology, computer programs, computer security, and information security
38 electronic mail management services for others
42 computer services, namely, online scanning, detecting, quarantining and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; providing temporary use of non-downloadable software for scanning, detecting, quarantining and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; computer virus protection services; providing online computer databases in the fields of computer software, computer and data security and computer system management; providing information relating to computer software, computer and data security and computer system management via the Internet and other computer and communications networks; provision of information relating to viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices via the Internet and other computer and communications networks; technical consultation in the field of computers, computer systems, computer software, and computer and communication networks; technical support services, namely, troubleshooting of computer hardware and software problems via telephone and electronic mail; computer programming for others; filtering electronic mail for others; provision of electronic mail security services for others, namely blocking, rejecting or quarantining spam and other unwanted messages, and cleaning messages of viruses, trojans, and malware; providing reputation services, namely information and databases regarding the association of sender identity information with network abuse, including the sending of spam electronic mail
45 scanning and monitoring of computer systems for security purposes; providing information in the fields of global computer network and local area network security, preventing computer viruses, computer hardware and software applications in security; providing enterprise security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computers, computer data, software products and computer networks; computer security services, namely, intrusion detection services, intrusion prevention services, vulnerability assessment services; computer security services, namely services in the nature of detecting and removing computer viruses worms, trojans, spyware, adware, malware and unauthorized data and programs and threats
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen

ID: 1377013017