Trademark: 79373966
Word
EVIDEN
Status
Pending
Status Code
681
Status Date
Tuesday, March 26, 2024
Serial Number
79373966
Mark Type
4000
Filing Date
Tuesday, March 21, 2023
Published for Opposition
Tuesday, April 30, 2024

Trademark Owner History
EVIDEN - 1st New Owner Before Publication
BULL SAS - Original Applicant

Classifications
9 Electronic Encryption units; security token hardware; data networks, namely, data processors and downloadable and recorded computer software for transmission and reception of data; interactive data transfer apparatus in the nature of network routers; computers; process calculators; calculating machines; supercomputers; computer servers; computer terminals; Computer display screens; cloud servers being computer network servers; Downloadable cloud computing server operating software; Downloadable application software for cloud computing; Downloadable computer software packages comprised of downloadable computer cybersecurity software, software for use in computer access control, namely, software for imposing access restrictions, software for high performance computing, namely, software that assists computers in deploying parallel applications and performing parallel computations, software for operating quantum computers, software for operating artificial intelligence computers, and software for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems; Downloadable computer software for encryption; computer systems being computers; information processing apparatus being central processing units for processing information; Downloadable computer cybersecurity software, downloadable software for use in computer access control, namely, software for imposing access restrictions, downloadable software for high performance computing, namely, software that assists computers in deploying parallel applications and performing parallel computations, downloadable software for operating quantum computers, downloadable software for operating artificial intelligence computers, and downloadable software for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems; Downloadable computer software for providing network, Internet, and computer security, namely, downloadable software for network and computer access control; Downloadable computer software for database management; Downloadable computer software, namely downloadable computer utility software, downloadable cybersecurity software for protecting data, and downloadable cryptographic software for generating cryptographic keys for receiving and spending cryptographic currency; downloadable software for testing software reliability, namely, software for testing and monitoring the privacy, data security, data vulnerability of other software programs; Recorded computer operating system software; Downloadable computer anti-virus software; Downloadable computer software for word processing; Downloadable cloud computing software for cybersecurity, downloadable cloud computing software for use in computer access control, namely, software for imposing access restrictions, downloadable cloud computing software for high performance computing, namely, software that assists computers in deploying parallel applications and performing parallel computations, downloadable cloud computing software for operating quantum computers, downloadable cloud computing software for operating artificial intelligence computers, and downloadable cloud computing software for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems; Downloadable authentication software for authenticating user identification; Downloadable computer software for protection against spyware, namely, downloadable anti-spyware software; Downloadable network access server operating software; Downloadable computer cybersecurity software, downloadable computer software for use in computer access control, namely, software for imposing access restrictions, downloadable computer software for high performance computing, namely, software that assists computers in deploying parallel applications and performing parallel computations, downloadable computer software for operating quantum computers, downloadable computer software for operating artificial intelligence computers, and downloadable computer software for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems; Downloadable computer software for data encryption; Downloadable computer application software for cybersecurity, downloadable computer application software for use in computer access control, namely, software for imposing access restrictions, downloadable computer application software for high performance computing, namely, software that assists computers in deploying parallel applications and performing parallel computations, downloadable computer application software for operating quantum computers, downloadable computer application software for operating artificial intelligence computers, and downloadable computer application software for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems; Downloadable speech recognition software; Downloadable facial recognition software, namely, downloadable computer programs using artificial intelligence for facial recognition; Downloadable artificial intelligence software for cybersecurity, downloadable artificial intelligence software for use in computer access control, namely, software for imposing access restrictions, downloadable artificial intelligence software for high performance computing, namely, software that assists computers in deploying parallel applications and performing parallel computations, downloadable artificial intelligence software for operating quantum computers, downloadable artificial intelligence software for operating artificial intelligence computers, and downloadable artificial intelligence software for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems; Downloadable computer software designed to be deployed on web servers for cybersecurity, downloadable computer software designed to be deployed on web servers for use in computer access control, namely, software for imposing access restrictions, downloadable computer software designed to be deployed on web servers for high performance computing, namely, software that assists computers in deploying parallel applications and performing parallel computations, downloadable computer software designed to be deployed on web servers quantum computers, downloadable computer software designed to be deployed on web servers for operating artificial intelligence computers, and downloadable computer software designed to be deployed on web servers for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems; Downloadable data communication software, namely, software enabling computers to communicate by sending data; Downloadable data processing software, namely downloadable software for processing images, graphics and text; Downloadable cloud-based software for cybersecurity, downloadable cloud-based software for use in computer access control, namely, software for imposing access restrictions, downloadable cloud-based software for high performance computing, namely, software that assists computers in deploying parallel applications and performing parallel computations, downloadable cloud-based software for operating quantum computers, downloadable cloud-based software for operating artificial intelligence computers, and downloadable cloud-based software for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems; Downloadable computer software for the creation of firewalls; downloadable computer software for providing network security; Downloadable collaborative software platforms for cybersecurity, downloadable collaborative software platforms for use in computer access control, namely, software for imposing access restrictions, downloadable collaborative software platforms for high performance computing, namely, software that assists computers in deploying parallel applications and performing parallel computations, downloadable collaborative software platforms for operating quantum computers, downloadable collaborative software platforms for operating artificial intelligence computers, and downloadable collaborative software platforms for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems; Downloadable communications software for connecting computer servers; Downloadable communication software for processing images, graphics, and text; Downloadable operating software for main frame computers; apparatus and instruments for electric and electronic security, namely fob-like devices used by an authorized user of a computer system to facilitate authentication; Electronic target monitoring apparatus, namely, wireless controllers to monitor and control the functioning of other electronic devices, excluding gaming apparatus; Recorded computer cybersecurity software, Recorded software for use in computer access control, namely, software for imposing access restrictions, Recorded software for high performance computing, namely, software that assists computers in deploying parallel applications and performing parallel computations, Recorded software for operating quantum computers, Recorded software for operating artificial intelligence computers, and Recorded software for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems; Downloadable smartphone software for cybersecurity, downloadable smartphone software for use in computer access control, namely, software for imposing access restrictions, downloadable smartphone software for high performance computing, namely, software that assists computers in deploying parallel applications and performing parallel computations, downloadable smartphone software for operating quantum computers, downloadable smartphone software for operating artificial intelligence computers, and downloadable smartphone software for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems; Downloadable software for tablet computers for cybersecurity, downloadable software for tablet computers for use in computer access control, namely, software for imposing access restrictions, downloadable software for tablet computers for high performance computing, namely, software that assists computers in deploying parallel applications and performing parallel computations, downloadable software for tablet computers for operating quantum computers, downloadable software for tablet computers for operating artificial intelligence computers, and downloadable software for tablet computers for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems; Downloadable software for accessing digital content in the fields of entertainment, travel, hotels, and restaurants via electronic and optical communications networks; Downloadable software for performance testing of computer hardware; Downloadable software that assists computers in deploying parallel applications and performing parallel computations; monitors being downloadable software for monitoring and controlling communication between computers and automated machine systems; Downloadable software for migration between various computer network operating systems; Downloadable software for testing computer hardware reliability; Downloadable software for maintenance and operation of computer system; Downloadable software for the integration of artificial intelligence and machine learning in the field of megadata; downloadable computer software for use as an application programming interface (API); Downloadable computer software for creating searchable databases of information and data; Downloadable software for providing information in the field of cybersecurity and access restrictions, high performance computing, quantum computers, artificial intelligence computers, business computing services, and cloud computing services; Downloadable computer software for transmitting electronic media via communication networks; downloadable software for remotely accessing and controlling a computer; Downloadable computer software for application and database integration; Downloadable computer software for controlling and managing access server applications; Downloadable software for the operational management of portable magnetic and electronic cards; Downloadable software for collecting and analyzing real-time location data to predict the spread of an illness in a community; Downloadable security software for protecting data through detection of threats against computer networks; utility software, namely downloadable software for performing computer system diagnostics; Downloadable software for monitoring the operation of audio and video devices in the field of security; downloadable software for remote monitoring and analysis of computer systems; Downloadable application software designed to be deployed on web servers for monitoring computer security incidents and running reports on cloud computing configuration and metadata; Downloadable and recorded computer platform software for cybersecurity, downloadable and recorded computer platform software for tablet computers for use in computer access control, namely, software for imposing access restrictions, downloadable and recorded computer platform software for tablet computers for high performance computing, namely, software that assists computers in deploying parallel applications and performing parallel computations, downloadable and recorded computer platform software for tablet computers for operating quantum computers, downloadable and recorded computer platform software for tablet computers for operating artificial intelligence computers, and downloadable and recorded computer platform software for tablet computers for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems; Downloadable software for providing information in the field of cybersecurity and access restrictions, high performance computing, quantum computers, artificial intelligence computers, business computing services, and cloud computing services via the Internet; Downloadable application software for portable computer devices for cybersecurity, application software for portable computer devices for use in computer access control, namely, software for imposing access restrictions, downloadable application software for portable computer devices for high performance computing, namely, software that assists computers in deploying parallel applications and performing parallel computations, downloadable application software for portable computer devices for operating quantum computers, downloadable application software for portable computer devices for operating artificial intelligence computers, and downloadable application software for portable computer devices for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems; Downloadable software for data searching and data retrieval; Downloadable software for system cleaning and optimization; Downloadable software for network security and computer units, namely, downloadable computer software for detecting threats against computer networks; Downloadable computer software for authorizing access to databases; calculating devices being calculating machines
38 Telecommunications access services; Telecommunications access services for electronic sites, namely, providing access to electronic sites; Providing electronic transmission of secure electronic mail; computer aided transmission of messages, data and images; providing access to databases; leasing access time to a computer database, namely, rental of access time to global computer networks; advisory services concerning the rental or leasing of communication equipment; communication services for information transmission, namely, providing electronic transmission of information stored in a database via interactively communicating computer systems; electronic communication services, namely, electronic data transmission; Assistance, namely, advisory, information and consulting services in the field of telecommunications services, namely, transmission of voice, data, and documents via telecommunications networks; remote transmission of data via telecommunications network; secure transmission of data, sound and images
42 Software as a Service (SaaS) services featuring software for cybersecurity, software for use in computer access control, namely, software for imposing access restrictions, software for high performance computing, namely, software that assists computers in deploying parallel applications and performing parallel computations, software for operating quantum computers, software for operating artificial intelligence computers, and software for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems; computer Platform as a Service (PaaS) services featuring computer software platforms for cybersecurity, computer software platforms for use in computer access control, namely, software platforms for imposing access restrictions, computer software platforms for high performance computing, namely, software platforms that assist computers in deploying parallel applications and performing parallel computations, computer software platforms for operating quantum computers, computer software platforms for operating artificial intelligence computers, and computer software platforms for accessing cloud computing systems and quantum computing systems, namely, software platforms for authorizing access to cloud computing systems and quantum computing systems; Software as a Service (SaaS) services featuring software using artificial intelligence for cybersecurity, software using artificial intelligence for use in computer access control, namely, software for imposing access restrictions, software using artificial intelligence for high performance computing, namely, software that assists computers in deploying parallel applications and performing parallel computations, software using artificial intelligence for operating quantum computers, software using artificial intelligence for operating artificial intelligence computers, and software using artificial intelligence for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems; computer programming for others; programming of computer software for others; design, maintenance, development and updating of computer software; design and development of computers; development of computer platforms; duplication of computer programs; computer code writing; quantum computing services namely, providing temporary use of online non-downloadable cloud-based quantum computing software systems and online non-downloadable software development platforms for use in the development of quantum computing software; consulting services relating to computer systems analysis; consulting services for analyzing information systems namely, planning, design and management of information technology systems; computer programming services for data processing; software engineering services for data processing; consulting services in the field of computer system integration; technological advice relating to digital transformation; outsource service provider in the field of information technology consulting relating to installation, maintenance and repair of computer software for cybersecurity and access restrictions, high performance computing, quantum computers, artificial intelligence computers, business computing services, cloud computing services, and for accessing cloud computing systems and quantum and computing systems; rental of computers and computer software for cybersecurity, computer software for use in computer access control, namely, software for imposing access restrictions, computer software for high performance computing, namely, software that assists computers in deploying parallel applications and performing parallel computations, computer software for operating quantum computers, computer software for operating artificial intelligence computers, and computer software for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems; rental of computer hardware and computer software for cybersecurity, computer software for use in computer access control, namely, software for imposing access restrictions, computer software for high performance computing, namely, software that assists computers in deploying parallel applications and performing parallel computations, computer software for operating quantum computers, computer software for operating artificial intelligence computers, and computer software for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems; technological research in the field of cybersecurity and access restrictions, high performance computing, quantum computers, artificial intelligence computers, business computing services, cloud computing services, and for accessing cloud computing systems and quantum and computing systems; cloud seeding; cloud computing featuring software for cybersecurity, software for use in computer access control, namely, software for imposing access restrictions, software for high performance computing, namely, software that assists computers in deploying parallel applications and performing parallel computations, software for operating quantum computers, software for operating artificial intelligence computers, and software for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems; Computer services, namely, cloud hosting provider services; providing temporary use of on-line non-downloadable software using artificial-intelligence for cybersecurity, on-line non-downloadable software using artificial-intelligence for use in computer access control, namely, software for imposing access restrictions, on-line non-downloadable software using artificial-intelligence for high performance computing, namely, software that assists computers in deploying parallel applications and performing parallel computations, on-line non-downloadable software using artificial-intelligence for operating quantum computers, on-line non-downloadable software using artificial-intelligence for operating artificial intelligence computers, and on-line non-downloadable software using artificial-intelligence for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems; development of computer hardware; Software as a Service (SaaS) services featuring software using artificial intelligence for machine learning, deep learning and creation of deep learning networks; Software as a Service (SaaS) services featuring software for digital asset management; hosting of digital content on the internet; electronic data storage; digital compression of computer data; data encryption and decoding services; data security consultancy; consultant services with respect to data security; computer programming services for data storage; computer services concerning electronic data storage, namely, cybersecurity services and access restrictions, namely, restricting unauthorized access to computer systems, business computing services, namely, consulting services in the design and implementation of computer-based information systems for businesses, cloud computing services featuring software for use in database management; development of data storage systems, namely, software for cloud storage of data; technical data analysis services for protecting data by assessing computer security threats, namely, computer security threat analysis for protecting data; data mining; computer programming services for electronic data security; security services for computer networks, computer access and computer-based transactions, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer security services for protection against unauthorized network access, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; monitoring of computer systems for the detection of unauthorized access or data protection breaches; electronic monitoring of personally identification information for the detection of identity theft via the Internet; user authentication services using single sign-on technology for online software applications; technological advice in the fields of selection, implementation, and use of computer programs being software; Access Control as a Service (ACaaS) featuring software for cybersecurity, software for use in computer access control, namely, software for imposing access restrictions, software for high performance computing, namely, software that assists computers in deploying parallel applications and performing parallel computations, software for operating quantum computers, software for operating artificial intelligence computers, and software for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems; application service provider (ASP) featuring software for cybersecurity, software for use in computer access control, namely, software for imposing access restrictions, software for high performance computing, namely, software that assists computers in deploying parallel applications and performing parallel computations, software for operating quantum computers, software for operating artificial intelligence computers, and software for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems; providing virtual computer systems through cloud computing; conversion of computer programs and data, other than physical conversion; recovery of computer data; cloud-stored data protection services in the nature of providing temporary use of online, non-downloadable software for protecting data stored in the cloud; electronic storage services for archiving databases, images and other electronic data; rental of computer software for data stream reading; consultancy, advisory and information services in relation to information technology relating to installation, maintenance and repair of computer software; computer services for the security, protection and restoration of information technology namely, computer security services in the nature of restricting unauthorized access to computer networks, computer security threat analysis for protecting data, and computer data recovery services; computer security services, namely, providing user authentication services using biometric hardware and software technology for hardware and software systems vulnerability testing; Technical support services, namely, troubleshooting in the nature of diagnosing problems with computer hardware and software, data communication systems; Telecommunications network security consultancy; computer security threat analysis for protecting data; monitoring computer systems for security purposes, namely, monitoring of computer systems for detecting unauthorized access or data breach; computer services for data protection, namely design and development of computer software for cybersecurity, software for use in computer access control, namely, software for imposing access restrictions, software for high performance computing, namely, software that assists computers in deploying parallel applications and performing parallel computations, software for operating quantum computers, software for operating artificial intelligence computers, and software for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems; computer system monitoring services, namely, monitoring of computer systems for detecting unauthorized access or data breach; computer services, namely, data recovery services; computer virus protection services; programming of computer software in the field of internet security for others; consultation with respect to computer security; information security services, namely, installation, maintenance, and repair of firewall software systems; security technology testing services, namely, testing of security systems; Technological advice in the field of artificial intelligence; design and development of software for evaluation and calculation of data; IT services, namely, development, programming and implementation of software for cybersecurity, software for use in computer access control, namely, software for imposing access restrictions, software for high performance computing, namely, software that assists computers in deploying parallel applications and performing parallel computations, software for operating quantum computers, software for operating artificial intelligence computers, and software for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems; design and development of supercomputers, and number crunchers being data processing apparatus

Trademark Events
Apr 10, 2024
Notification Of Possible Opposition Sent To Ib
Apr 10, 2024
Notification Of Notice Of Publication E-Mailed
Apr 10, 2024
Notice Of Start Of Opposition Period Created, To Be Sent To Ib
Mar 25, 2024
Approved For Pub - Principal Register
Mar 14, 2024
Examiner's Amendment Entered
Mar 14, 2024
Notification Of Examiners Amendment E-Mailed
Mar 14, 2024
Examiners Amendment E-Mailed
Mar 14, 2024
Examiners Amendment -Written
Feb 19, 2024
Teas/Email Correspondence Entered
Feb 19, 2024
Correspondence Received In Law Office
Feb 19, 2024
Teas Response To Office Action Received
Feb 13, 2024
Limitation From The Ib - Request Exam Review
Feb 8, 2024
Teas Change Of Correspondence Received
Feb 8, 2024
Teas Change Of Domestic Representatives Address
Feb 8, 2024
Attorney/Dom.Rep.Revoked And/Or Appointed
Feb 8, 2024
Teas Revoke/App/Change Addr Of Atty/Dom Rep Received
Feb 8, 2024
Applicant/Correspondence Changes (Non-Responsive) Entered
Feb 8, 2024
Teas Change Of Owner Address Received
Dec 2, 2023
Limitation Of Goods Received From Ib
Oct 6, 2023
Change Of Owner Received From Ib
Oct 5, 2023
Refusal Processed By Ib
Sep 6, 2023
Non-Final Action Mailed - Refusal Sent To Ib
Sep 6, 2023
Refusal Processed By Mpu
Aug 16, 2023
Non-Final Action (Ib Refusal) Prepared For Review
Aug 15, 2023
Non-Final Action Written
Aug 14, 2023
Assigned To Examiner
Jul 18, 2023
Application Filing Receipt Mailed
Jul 14, 2023
New Application Office Supplied Data Entered
Jul 13, 2023
Sn Assigned For Sect 66a Appl From Ib

Trademark Alertz updated from USPTO on 2030-01-24