Trademark: 79248449
Word
LIBERATE
Status
Registered
Status Code
700
Status Date
Tuesday, January 7, 2020
Serial Number
79248449
Registration Number
5952248
Registration Date
Tuesday, January 7, 2020
Mark Type
4000
Filing Date
Friday, October 20, 2017
Published for Opposition
Tuesday, October 22, 2019

Trademark Owner History
Jisc - Original Registrant

Classifications
9 Downloadable computer software that facilitates identity federation, facilitates multi-factor and strong authentication, facilitates access control for web, mobile and application programmable interface (API); downloadable computer software that facilitates directory, identity provisioning and identity administration services, facilitates identity services auditing and reporting, and facilitates other identity and access management services in the field of digital security and identity verification; downloadable software for API traffic security; downloadable software for API activity monitoring and attack detection and reporting; security software, being downloadable, for data, applications, and computer systems accessed via API or other programmatic methods; downloadable software for computer network security; downloadable software for cloud-based computer security; downloadable software for monitoring computer networks; downloadable software for detecting computer network intrusion; downloadable software for monitoring and maintaining network security; downloadable computer software for use in the safeguarding of network data or network services; downloadable computer software for detecting security threat; downloadable software for securing API traffic across hybrid clouds; downloadable software for protecting computers and network services from attack; computer software for the detection and removal of computer viruses and threats; computer software for managing and filtering electronic and wireless communications; computer software for protecting and securing the integrity of data computer networks, mobile devices, electronic and wireless communications and applications; anti-virus software; computer software for creating and maintaining firewalls to prevent unauthorized access to and use of computer networks and systems; computer software for providing security for email, internal and other electronic communications, for identifying and blocking potentially dangerous or undesirable electronic communications and content, for identifying and blocking electronic communications from illegitimate sources, and for identifying and blocking computer and electronic mail viruses, spam, spyware, malware, and other undesirable content; computer software for tracking, locating, locking and wiping lost or stolen computers, tablets, mobile devices and other digital devices; computer software for secure storage and management of usernames and passwords; computer hardware and software used to allow individuals to upload and download information, software, programs, media or documents from an online digital network, cloud network or server; computer hardware and software for publishing data to digital and cloud networks
45 Licensing of computer software for the protection of computers, computer systems, computer networks and internet websites against attacks from computer viruses, hackers, tampering, unauthorized intrusion and unauthorized manipulation of data
42 Computer security consultancy; computer security consulting services in the fields of information security, computer security, network security, cyber security, internet security, and data security; monitoring of computer systems for security purposes for the protection of information and data; computer security consulting services in the field of incident response to information, computer, network and internet security breaches; computer network security services and computer security services in the nature of network intrusion protection testing, computer testing for vulnerability management and assessment, risk management and assessment, data breach threat analysis, network threat analysis, all of the foregoing for the protection of information and data; cybersecurity services, namely, penetration testing of computers and information systems and networks for vulnerability assessment and management, risk assessment in the nature of testing of information systems to determine vulnerability, data breach threat analysis, and network threat analysis, all of the foregoing for the protection of information and data; consulting in the field of computer security and electronic data security services, namely, providing cyber threat data intelligence collection and analysis services and solutions therefor; computer security services in the nature of providing an internet trust centre; computer security assurance; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; authentication, issuance and validation of digital certificates; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the internet;computer security services in the nature of detecting, reporting, investigating and resolving security incidents of network abuse and email abuse; computer security services in the nature of providing an internet trust centre, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; managed computer network and internet security services; computer security services in the nature of filtering content on the internet; software as a service namely, hosting non-downloadable computer software for use by others that scans networks and websites to detect and identify vulnerabilities and malware; online services, namely, providing internet-based and network-based computer virus protection services for others; security verification of computer network firewalls, servers and other network devices from unauthorized access; computer services, namely, detection of viruses and threats; Providing user authentication services using single sign-on technology for online software applications; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates identity federation, multi-factor and strong authentication of computer users and identity verification protocols, and access control for web, mobile and application programmable interfaces (API); Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates directory, identity provisioning and identity administration services, facilitates identity services auditing and reporting, and facilitates other identity and access management services in the field of digital security and identity verification, Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates API traffic security; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates API activity monitoring and attack detection and reporting; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates computer network security; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates cloud-based computer security; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates monitoring computer networks; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates the detection of computer network intrusion; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others for monitoring and maintaining network security; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates safeguarding of network data or network services; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates the detection of security threat; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates the protection of computers and network services from attack; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates the detection and removal of computer viruses and threats; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others for managing and filtering electronic and wireless communications; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates the protection and securing the integrity of data computer networks, mobile devices, electronic and wireless communications and applications; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others for creating and maintaining firewalls to prevent unauthorized access to and use of computer networks and systems; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates security for email, internal and other electronic communications, for identifying and blocking potentially dangerous or undesirable electronic communications and content, for identifying and blocking electronic communications from illegitimate sources, and for identifying and blocking computer and electronic mail viruses, spam, spyware, malware, and other undesirable content; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates tracking, locating, locking and wiping lost or stolen computers, tablets, mobile devices and other digital devices; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others for secure storage and management of usernames and passwords; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates the upload and download of information, software, programs, media or documents from an online digital network, cloud network or server; identity verification services, namely, providing user authentication between two or more entities using digital certificates, multi factor authentication and strong identification protocols in the field of digital security for allowing user access to web, mobile and application programmable interfaces (API)

Trademark Events
Apr 21, 2023
Change Of Name/Address Rec'd From Ib
Mar 24, 2023
New Representative At Ib Received
May 8, 2020
Final Decision Transaction Processed By Ib
Apr 18, 2020
Final Disposition Notice Sent To Ib
Apr 18, 2020
Final Disposition Processed
Apr 7, 2020
Final Disposition Notice Created, To Be Sent To Ib
Feb 6, 2020
New Representative At Ib Received
Jan 7, 2020
Registered-Principal Register
Oct 22, 2019
Official Gazette Publication Confirmation E-Mailed
Oct 22, 2019
Published For Opposition
Oct 19, 2019
Notification Processed By Ib
Oct 2, 2019
Notification Of Possible Opposition Sent To Ib
Oct 2, 2019
Notice Of Start Of Opposition Period Created, To Be Sent To Ib
Oct 2, 2019
Notification Of Notice Of Publication E-Mailed
Sep 17, 2019
Approved For Pub - Principal Register
Aug 5, 2019
Teas/Email Correspondence Entered
Aug 5, 2019
Correspondence Received In Law Office
Aug 5, 2019
Teas Response To Office Action Received
Feb 22, 2019
Refusal Processed By Ib
Feb 4, 2019
Non-Final Action Mailed - Refusal Sent To Ib
Feb 4, 2019
Refusal Processed By Mpu
Jan 23, 2019
Non-Final Action (Ib Refusal) Prepared For Review
Jan 22, 2019
Non-Final Action Written
Jan 10, 2019
Application Filing Receipt Mailed
Jan 6, 2019
Assigned To Examiner
Jan 6, 2019
New Application Office Supplied Data Entered
Dec 27, 2018
Sn Assigned For Sect 66a Appl From Ib

Trademark Alertz updated from USPTO on 2030-01-24