| LET'S ENCRYPT Internet Security Research Group 2107650 19 Jun 2020 | Protected: Registered/protected | Certificate transparency (CT) log services, namely, providing electron... Class 042 Class 042 Computer & Software Services & Scientific Services Certificate transparency (CT) log services, namely, providing electronic logs that record digital certificates issued by publicly trusted certificate authorities, allowing identification of mistakenly or maliciously issued certificates for computer security purposes; computer security services, namely, maintaining a cryptographically assured, publicly auditable, append-only record of digital security certificates, to which third parties may submit certificates, and which can be queried by third parties to verify that the log is correct or to verify that a particular certificate has been logged. | |
| LET'S ENCRYPT Internet Security Research Group 1999579 11 Dec 2018 | Protected: Registered/protected | Development, integration, and operation of computer systems to support... Class 042 Class 042 Computer & Software Services & Scientific Services Development, integration, and operation of computer systems to support issuance and management of digital keys and digital certificates by and to third parties; computer security services in the nature of managing public key infrastructure services, namely authentication, issuance, and validation of digital keys and digital certificates; computer security services, namely, issuance of digital keys and digital certificates for authentication; computer security services, namely, providing digital keys and digital certificates that authenticate the identity of websites and secure information sent using secure socket layer (SSL) and transport layer security (TLS) technologies. | |
| LET'S ENCRYPT Internet Security Research Group 1860253 19 Aug 2016 | Protected: Registered/protected | Development, integration, and operation of computer systems to support... Class 042 Class 042 Computer & Software Services & Scientific Services Development, integration, and operation of computer systems to support issuance and management of digital keys and digital certificates by and to third parties; computer security services in the nature of managing public key infrastructure services, namely, authentication, issuance, and validation of digital keys and digital certificates; computer security services, namely, issuance of digital keys and digital certificates for authentication; computer security services, namely, providing digital keys and digital certificates that authenticate the identity of websites and secure information sent using secure socket layer (SSL) and transport layer security (TLS) technologies | |