About 880 Trademarks found for “*ult”
Filters
Also try searching for:
ult*
Mark | Details | Status | Class/Description | |
---|---|---|---|---|
Come Join The Cult Hottieco pty ltd 2450453 21 May 2024 | Registered: Registered/protected | hot-water bottles; hot water bottles; electric hot-water bottles; elec... Class 011 Class 011 Environmental Control Instrument Products lighting heating cooling cooking hot-water bottles; hot water bottles; electric hot-water bottles; electric hot water bottles; fitted fabric covers for hot water bottles Class 025 Class 025 Clothing Products clothing | ||
Estate Vault 2451246 17 May 2024 | Registered: Registered/protected | fiction electronic books, downloadable; downloadable digital content i... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products fiction electronic books, downloadable; downloadable digital content in the form of electronic publications of books; non-fiction electronic books recorded on computer media; digital book readers; audiobooks; downloadable fiction e-books; electronic book readers; downloadable series of children's books; non-fiction electronic books, downloadable; e-book readers; downloadable non-fiction e-books; downloadable electronic books; downloadable digital books; downloadable electronic books featuring educational materials for children and parents; digital books, downloadable; digital books downloadable from the Internet; electronic books, downloadable; non-fiction e-books recorded on computer media; audio books featuring educational materials for children and parents; fiction e-books recorded on computer media; books recorded on tape; talking children's books; audio books; books recorded on disc; electronic books; e-books; talking books Class 016 Class 016 Paper Goods and Printed Material books; writing books; books for children; bookkeeping books; children's books; printed books; non-fiction books; series of fiction and non-fiction books; books featuring stories, games and learning activities; information books; series of non-fiction books; series of fiction books; writing or drawing books; fiction books; series of children's books; drawing books; educational books; cookery books; religious books; manuscript books; novels; cook books; reference books; story books; log books [book-keeping]; series of story books; series of fiction and non-fiction books on a variety of topics; log books [ship's log]; coffee table books; bill books; series of babies' books; gift books; travel books; baby books [story books]; telephone books; wirebound books; baby books [storybooks]; picture books; log books; sticker books; children's storybooks; bath books; account books; guide books; coloring books; school writing books; logbooks [book-keeping]; check books; coupon books; series of storybooks; brag books [photo albums]; wedding books; note books; books, magazines, newspapers and printed matter; copy books; resource books; commemorative books; children's activity books; baby books [memory books]; storybooks; cheque books; date books; books, magazines [periodicals], newspapers and printed matter; book-cover paper; cookbooks; song books; children's interactive educational books; sketch books; pocket books [printed publications]; prayer books; bookbinding articles; coloring books [picture books]; birthday books; ledger books; index books; scrap books; colouring books [picture books]; pop-up books; memory books [photo albums]; book covers; bookbinding material; book jackets; data books; workbooks [study guides]; books for autographs; voucher books; signature books; colouring books; covers for books; composition books; print-braille children's books; textbooks; ledgers [books]; bookbinding materials; book binders; copybooks; autograph books; comic books; receipt books; dictation books; tutorial books in the field of lifestyle; covers of paper for books; romance novels; exercise books; pocketbooks [printed publications]; score-books; flip books; children's pop-up books; book jackets of paper; checkbooks; log books [aviation]; tutorial books in the field of leadership development; check book cases; bookbinding tape; tutorial books in the field of concept design; leather bookmarkers; encyclopedias; sketchbooks; tutorial books in the field of yoga; book holders [stationery]; protective book covers; datebooks; pen calligraphy copy books; pocketbooks [stationery]; check book covers; booklets; tutorial books in the field of beauty and fashion; handbooks [manuals]; tutorial books in the field of business strategy; bookmarkers of leather; bookbinding cloth; printed books in the field of music education; book ends; bookbinding wire; printed manuals; fabrics for bookbinding; engagement books; wallpaper sample books; tutorial books in the field of gardening; scratch books for drawing; writing brush calligraphy copy books; score books; manuals [handbooks]; paper book jackets; bookmarks; printed booklets; memorandum books; paper for covering books; cash receipt books; workbooks [blank]; printed handbooks; baby memory books; logbooks [ship's log]; artists' sketch books; stenographers' note books; telephone number books; hymn books; protective covers for books; logbooks; address books; memory books [photograph albums]; book covers made of paper; book wrappings; bookends; business record books; guest books; recipe books; books in the field of golf instruction; printed autograph books; log books [car title deeds]; paper book covers; anniversary books; exercise books [blank]; bookmarkers; appointment books; printed music books; colouring books for adults; activity books; brag books [photograph albums]; leather book covers; graphic novels; jackets of paper for books; reporters' note books; blank journal books; expense books; scrapbooks; coloring books for adults; dictionaries; book covers of paper; vinyl bath books; book plates; pocket books [stationery]; binding materials for books and papers ... Class 036 Insurance & Financial Services estate planning; estate trust planning; estate planning services; estate trust management; real estate management; real estate consultancy; real estate investment consultancy; real estate and property management; real estate and housing management; real estate management consultancy; real-estate and housing management; real estate consulting services; real estate insurance consultancy; real estate property management; multi-family property management; real estate affairs; estate trust management services; real estate management services relating to housing estates; real estate investment; real estate services; real estate consultation; real estate investment management; real estate multiple listing services; real-estate affairs; real estate management consultation; real estate listing services; management of real estate | ||
UnoLock CybVault TechSologic Incorporated 2443306 16 Apr 2024 | Registered: Registered/protected | downloadable computer security software for encrypted security and cry... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products downloadable computer security software for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer application software for mobile telephones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable application software for smartphones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; smartphone software applications, downloadable for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer software applications for smartphones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable software applications for cell phones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer software applications for mobile telephones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable applications for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer utility programs for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; computer software applications, downloadable for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer software applications for cellular phones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer application software for cellular phones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable software applications for smartphones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable software applications for mobile telephones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable cloud-based software for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable smartphone apps [software] for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer application software for cellular telephones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; computer application software for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer software for tablets for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable apps for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer security software for encrypted security and cryptographic protection of digital assets and sensitive data, tailored for integration within a Data Self-Governance compliant digital vault environment; downloadable computer application software for mobile telephones for encrypted security and cryptographic protection of digital assets and sensitive data, designed to support Data Self-Governance principles; downloadable application software for smartphones for encrypted security and cryptographic protection of digital assets and sensitive data, ensuring adherence to Data Self-Governance as a Service protocols; smartphone software applications, downloadable for encrypted security and cryptographic protection of digital assets and sensitive data, suitable for use within Data Self-Governancesecured environments; downloadable computer software applications for smartphones for encrypted security and cryptographic protection of digital assets and sensitive data, customized for Data Self-Governance compliance; downloadable software applications for cell phones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring compliance with Data Self-Governance standards; downloadable computer software applications for mobile telephones for encrypted security and cryptographic protection of digital assets and sensitive data, developed under Data Self-Governance guidelines; downloadable applications for encrypted security and cryptographic protection of digital assets and sensitive data, aligned with the principles of Data Self-Governance and Data Self-Governance as a Service; downloadable computer utility programs for encrypted security and cryptographic protection of digital assets and sensitive data, integrated within a Data Self-Governance framework; computer software applications, downloadable for encrypted security and cryptographic protection of digital assets and sensitive data, tailored for operation within digital vaults that adhere to Data Self-Governance protocols; downloadable computer software applications for cellular phones for encrypted security and cryptographic protection of digital assets and sensitive data, optimized for Data Self-Governance compliant secure environments; downloadable computer application software for cellular phones for encrypted security and cryptographic protection of digital assets and sensitive data, developed to facilitate Data Self-Governance and Data Self-Governance as a Service implementations; downloadable software applications for smartphones for encrypted security and cryptographic protection of digital assets and sensitive data, designed to enhance security measures under Data Self-Governance standards; downloadable software applications for mobile telephones for encrypted security and cryptographic protection of digital assets and sensitive data, ensuring compliance with Data Self-Governance and Data Self-Governance as a Service requirements; downloadable cloudbased software for encrypted security and cryptographic protection of digital assets and sensitive data, supporting Data Self-Governance principles through cloud technologies; downloadable smartphone apps [software] for encrypted security and cryptographic protection of digital assets and sensitive data, structured to conform to Data Self-Governance operational protocols; downloadable computer application software for cellular telephones for encrypted security and cryptographic protection of digital assets and sensitive data, built to align with Data Self-Governance and Data Self-Governance as a Service frameworks; computer application software for encrypted security and cryptographic protection of digital assets and sensitive data, integrating Data Self-Governance compliant mechanisms; downloadable computer software for tablets for encrypted security and cryptographic protection of digital assets and sensitive data, customized to support Data Self-Governance compliance in digital asset management; downloadable apps for encrypted security and cryptographic protection of digital assets and sensitive data, designed to function within environments regulated by Data Self-Governance principles; all the foregoing limited to digital security software on the secure management, storage, and encryption of digital assets and sensitive data, and which facilitates the encryption, backup, recovery, and secure storage of critical and sensitive digital information, and not in respect of general consumer software, entertainment, or unrelated technological fields. Class 042 Class 042 Computer & Software Services & Scientific Services computer software programming for scanning or reading a QR code via mobile devices, tailored specifically for secure digital asset management environments, enhancing security protocols; computer programming of software for scanning or reading a bar code via mobile devices, tailored specifically for secure digital asset management environments, enhancing security protocols; computer programming of software for scanning or reading a QR code via mobile devices, tailored specifically for secure digital asset management environments, enhancing security protocols; programming of computer software for scanning or reading a QR code via mobile devices, tailored specifically for secure digital asset management environments, enhancing security protocols; computer programming of computer software for scanning or reading a bar code via mobile devices, tailored specifically for secure digital asset management environments, enhancing security protocols; computer programming of computer software for scanning or reading a QR code via mobile devices, tailored specifically for secure digital asset management environments, enhancing security protocols; computer software programming for scanning or reading a QR code via computer networks, tailored specifically for secure digital asset management environments, enhancing security protocols; user authentication services using single sign-on technology for online software applications, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; user authentication services using biometric hardware and software technology for access control, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; user authentication services using biometric hardware and software technology for managing human identification, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; user authentication services using biometric hardware and software technology for password management, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; providing user authentication services using biometric hardware and software technology for access control, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; providing user authentication services using biometric hardware and software technology for managing human identification, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; user authentication services using biometric hardware and software technology for managing identification of things, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; providing user authentication services using biometric hardware and software technology for password management, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; providing user authentication services using biometric hardware and software technology for managing identification of things, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; providing user authentication services using biometric hardware and software technology for e-commerce transactions, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; authentication services for computer security, offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; electronic signature verification services using technology to authenticate user identity, offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; electronic cryptology services in the nature of electronic data encryption services, providing advanced encryption services for digital images and data to secure sensitive information during transmission and storage; computer security services in the nature of providing authentication, issuance, validation, and revocation of digital keys, offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; computer security services for managing digital certificates, offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; digital signature verification services [electronic cryptology services], offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; identity verification services [computer security], offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; identity verification [computer security], offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; authentication, issuance and validation of digital keys, offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; providing authentication of personal identification information [computer security services], offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; encryption, decryption, and authentication of information, messages, and data, offering enhanced encryption technologies to secure digital communications and sensitive information against unauthorized access and data breaches; cryptographic engineering, providing specialized encryption services tailored to secure sensitive and critical information, including but not limited to digital assets and personal data; digital image encryption services, focused on providing high-security solutions for protecting digital images from unauthorized access and tampering; encryption of digital images, ensuring the security and integrity of digital visual content through advanced encryption standards; electronic storage of digital video files, providing secure digital storage solutions with advanced encryption and access controls to ensure data privacy and integrity; electronic storage of digital videos, focused on maintaining high security and data integrity in digital video storage through encrypted services; electronic storage of digital images, providing secure cloud-based solutions for storing sensitive visual content, ensuring data integrity and preventing unauthorized access; electronic storage of digital audio files, offering encrypted storage services that safeguard audio data against unauthorized access and corruption; electronic storage of digital photographs, ensuring the secure archiving of digital photo data with comprehensive encryption and secure access protocols; electronic storage of digital music, providing secure storage solutions that protect musical digital files from piracy and unauthorized distribution; electronic storage of images and videos, offering robust digital archiving services with advanced security measures to ensure the safety and confidentiality of multimedia files; electronic storage services for archiving electronic data, providing secure cloud-based solutions for businesses and individuals to safely store and manage their digital information with full encryption and access control; electronic storage of files and documents, focused on providing secure and encrypted storage solutions tailored for sensitive and critical business and personal documents; electronic storage services for archiving databases, offering secure database management solutions with strong encryption and real-time backup capabilities; electronic data storage and data backup services, providing comprehensive solutions for securely backing up and restoring digital assets and sensitive data in the event of data loss or system failure; electronic storage and retrieval services for archiving biological data, offering specialized storage solutions tailored for sensitive biological and medical data with enhanced security measures; electronic data log storage, providing secure and encrypted logging services to ensure the integrity and confidentiality of transaction logs and other sensitive data entries; computerised data storage services, offering advanced digital storage solutions that include encrypted data management and secure access systems to ensure data safety and privacy; online data storage and on-line data storage services, providing cloud-based solutions for secure and accessible online storage of digital assets, allowing for secure management and retrieval of data from anywhere; authentication services for computer security featuring advanced biometric capabilities, utilizing fingerprint, facial recognition, iris scanning, and other biometric technologies to ensure secure user verification and access control; authentication services for computer security incorporating multi-factor authentication, combining biometrics, hardware tokens, security keys, and PINs to enhance the security layers protecting user data and access points; authentication services for computer security utilizing device-based recognition systems, where access is granted based on the authentication of a registered device, adding an extra layer of security by linking user access specifically to their hardware; authentication services for computer security that integrate traditional security methods such as security keys and PINs with modern biometric verification, providing a robust, hybrid security solution that covers both physical and digital authentication mechanisms; user authentication services using biometric hardware and software technology for access control, specifically designed for legacy planning and secure transfer of digital asset control to designated beneficiaries under predefined conditions; user authentication services using biometric hardware and software technology for access control, tailored for the seamless and secure inheritance of digital assets, ensuring that biometric data and other secure access methods are transferable according to the user's estate plans; user authentication services using biometric hardware and software technology for access control, incorporating advanced encryption and secure protocols to facilitate the transition of access rights to digital assets from the original owner to heirs or designated entities; user authentication services using biometric hardware and software technology for access control that includes features to manage digital assets posthumously, enabling executors or legal representatives to access or transfer assets securely, adhering to the wishes of the deceased; authentication, issuance, and validation of digital keys, designed with redundant key systems to prevent lockouts, ensuring users have multiple ways to authenticate and gain access to their digital vaults without compromising security; authentication, issuance, and validation of digital keys that include advanced recovery options, such as biometrically enabled recovery processes or multi-factor authentication steps, to restore access in case primary keys are lost or compromised; authentication, issuance, and validation of digital keys, allowing trusted individuals or entities to access the vault under strict conditions defined by the original user; authentication and issuance of digital keys that include self-recovery options through rigorous identity verification processes, allowing users to regain access through steps that securely confirm their identity without external intervention; authentication, issuance, and validation of digital keys with integrated time-lock features, allowing vault owners to set specific time windows for access, thereby restricting entry to the vault outside these predefined periods; software as a Service (SaaS) providing encrypted security and cryptographic protection for digital assets and sensitive data, with features including advanced access control through biometric, PIN, security key, and device-based authentication systems tailored for enhanced user security; software as a service (SaaS) featuring secure management and cryptographic protection of digital assets and sensitive information, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring database management software providing advanced encryption and access controls for digital asset protection, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software for use in database management with robust security features tailored for digital assets and sensitive data management, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring artificial intelligence software for facial and speech recognition technologies for secure identity verification and authentication in managing digital assets, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring artificial intelligence software for face and speech recognition tools designed to enhance security protocols for digital asset access and management, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring word processing software with integrated security features for encrypted document creation and management, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring artificial intelligence software for use in facial and speech recognition technologies for facial and speech recognition, ensuring secure user authentication and data protection, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software using artificial intelligence for facial and speech recognition capabilities, focusing on secure and encrypted access to digital resources, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software using artificial intelligence for face and speech recognition services, aimed at strengthening security measures for digital asset handling, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software using artificial intelligence for use in facial and speech recognition to bolster secure access controls for sensitive digital environments, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring artificial intelligence software for use in face and speech recognition, designed to authenticate and secure access to digital assets, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software using artificial intelligence for use in face and speech recognition to support secure user authentication through face and speech recognition for digital asset management, specifically tailored for use within a digital vault environment; computer security services for managing digital certificates with enhanced security for authentication and data integrity in digital asset transactions, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software for use as a word processor offering encryption and secure access features for safeguarding sensitive information, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software for use in word processing tools that include data protection and security measures tailored for confidentiality, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software for use as a spreadsheet with integrated security functions for managing and protecting sensitive financial and asset data, specifically tailored for use within a digital vault environment; computer security services in the nature of providing digital certificates to authenticate and secure digital transactions and communications, specifically tailored for use within a digital vault environment; computer security services providing comprehensive security services for the protection and management of digital assets and sensitive data, specifically tailored for use within a digital vault environment; digital signature verification services (electronic cryptology services) offering digital signature verification to ensure the security and integrity of electronic transactions involving digital assets, specifically tailored for use within a digital vault environment; data security services providing data security solutions focused on the encrypted storage and safe handling of digital assets and sensitive information, specifically tailored for use within a digital vault environment; digital archiving services offering digital archiving solutions with advanced security features to protect and preserve digital assets over long periods, specifically tailored for use within a digital vault environment; identity verification services (computer security) providing identity verification services using advanced biometric and cryptographic technologies to ensure secure access to digital systems, specifically tailored for use within a digital vault environment; electronic cryptology services in the nature of digital certificate and digital signature verification services offering cryptology services focused on the verification of digital certificates and signatures to secure digital transactions, specifically tailored for use within a digital vault environment; quality control and authentication services providing quality control and authentication services to ensure the security and authenticity of digital transactions and asset management, specifically tailored for use within a digital vault environment; digital music encryption services offering encryption services specifically for digital music to ensure secure storage and transmission, specifically tailored for use within a digital vault environment; authentication services for computer security providing authentication services designed to secure access to computer systems and protect digital assets, specifically tailored for use within a digital vault environment; platform as a service (PaaS) that includes tools and services for secure digital asset management and protection, specifically tailored for use within a digital vault environment; user authentication services using biometric hardware and software technology for point-of-sale transactions providing user authentication services at point-of-sale using biometric technology to secure transactions involving digital assets, specifically tailored for use within a digital vault environment; IT services for data protection specifically focused on the protection of digital assets and sensitive data through advanced security measures, specifically tailored for use within a digital vault environment; information technology services for data protection providing information technology services that emphasize the secure management and protection of digital assets and sensitive information, specifically tailored for use within a digital vault environment; computer software programming for scanning or reading a QR code via mobile devices, tailored specifically for secure digital asset management environments adhering to Data Self-Governance and Data Self-Governance as a Service protocols, enhancing security protocols; computer programming of software for scanning or reading a bar code via mobile devices, developed to facilitate Data Self-Governance and Data Self-Governance as a Service implementations, enhancing security protocols within secure digital asset management environments; computer programming of software for scanning or reading a QR code via mobile devices, optimized for environments that comply with Data Self-Governance and Data Self-Governance as a Service standards, enhancing security protocols; programming of computer software for scanning or reading a QR code via mobile devices, integrated within a Data Self-Governance framework to enhance security protocols in secure digital asset management environments; computer programming of computer software for scanning or reading a QR code via mobile devices, developed specifically for secure digital asset management environments that adhere to Data Self-Governance and Data Self-Governance as a Service standards, thereby enhancing security protocols; computer software programming for scanning or reading a QR code via computer networks, optimized for integration within digital vault environments regulated by Data Self-Governance principles, aiming to enhance security protocols; user authentication services using single sign-on technology for online software applications, tailored to secure user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems, compliant with Data Self-Governance requirements; user authentication services using biometric hardware and software technology for access control, designed to secure user access to digital assets and sensitive information in environments adhering to Data Self-Governance and Data Self-Governance as a Service frameworks; user authentication services using biometric hardware and software technology for managing human identification, structured to enhance the security protocols within digital asset management systems that operate under strict Data Self-Governance standards; user authentication services using biometric hardware and software technology for password management, focused on providing robust security solutions for the management of digital assets and sensitive information within Data Self-Governance compliant environments; providing user authentication services using biometric hardware and software technology for access control, designed specifically to secure user access to digital assets and sensitive information, leveraging advanced multi-factor and biometric authentication systems compliant with Data Self-Governance principles; providing user authentication services using biometric hardware and software technology for managing human identification, optimized to enhance security measures in managing digital assets and sensitive information through the use of advanced multi-factor and biometric authentication systems, aligned with Data Self-Governance and Data Self-Governance as a Service protocols; user authentication services using biometric hardware and software technology for managing identification of things, tailored to ensure robust security for digital assets and sensitive information by incorporating advanced multi-factor and biometric authentication systems, within a Data Self-Governance regulated environment; providing user authentication services using biometric hardware and software technology for password management, focused on securing user access and enhancing protection of digital assets and sensitive data through comprehensive multi-factor and biometric authentication strategies, compliant with Data Self-Governance standards; providing user authentication services using biometric hardware and software technology for managing identification of things, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems, aligned with Data Self-Governance protocols for enhanced asset management security; providing user authentication services using biometric hardware and software technology for e-commerce transactions, tailored to ensure secure transactions by utilizing advanced multi-factor and biometric authentication systems, supporting Data Self-Governance standards in safeguarding digital assets and sensitive e-commerce interactions; authentication services for computer security, offering enhanced security measures for the protection and management of digital assets, incorporating cryptographic solutions and digital signature validation specifically tailored for financial and personal data protection under Data Self-Governance frameworks; electronic signature verification services using technology to authenticate user identity, designed to offer robust security measures for digital asset management, featuring cryptographic solutions and digital signature validation in compliance with Data Self-Governance standards for financial and personal data security; electronic cryptology services in the nature of electronic data encryption services, providing state-of-the-art encryption for digital images and data to secure sensitive information during transmission and storage, fully integrated with Data Self-Governance measures for comprehensive information security; computer security services in the nature of providing authentication, issuance, validation, and revocation of digital keys, offering enhanced security measures for digital asset management, including cryptographic solutions and digital signature validation, developed to meet Data Self-Governance requirements for protecting financial and personal data; computer security services for managing digital certificates, providing rigorous security protocols for digital asset protection, including cryptographic solutions and digital signature validation, tailored to support the stringent requirements of Data Self-Governance and safeguard sensitive financial and personal information; digital signature verification services [electronic cryptology services], providing enhanced security measures for digital assets management, including cryptographic solutions and digital signature validation specifically tailored for financial and personal data protection under Data Self-Governance standards; identity verification services [computer security], delivering advanced security protocols for digital asset management, incorporating cryptographic solutions and digital signature validation designed to meet Data Self-Governance guidelines; identity verification [computer security], offering stringent security measures to protect and manage digital assets, enhanced by cryptographic solutions and digital signature validation in compliance with Data Self-Governance practices; Authentication, issuance, and validation of digital keys, providing robust security measures for digital asset management, featuring cryptographic solutions and digital signature validation to support the principles of Data Self-Governance; providing authentication of personal identification information [computer security services], ensuring enhanced protection of digital assets with cryptographic solutions and digital signature validation developed to adhere to Data Self-Governance standards; encryption, decryption, and authentication of information, messages, and data, deploying advanced encryption technologies to secure digital communications and sensitive information against unauthorized access and breaches, aligned with Data Self-Governance protocols; cryptographic engineering, offering specialized encryption services tailored to secure sensitive and critical information, including digital assets and personal data, ensuring compliance with Data Self-Governance requirements; digital image encryption services, focused on providing high-security encryption solutions to protect digital images from unauthorized access and tampering, within a Data Self-Governance compliant environment; encryption of digital images, ensuring the security and integrity of digital visual content through advanced encryption standards, tailored for secure digital asset management under Data Self-Governance frameworks; electronic storage of digital video files, providing secure digital storage solutions with advanced encryption and access controls to ensure data privacy and integrity, fully compliant with Data Self-Governance protocols; electronic storage of digital videos, ensuring high-security and data integrity through encrypted storage services, tailored for DSG-compliant digital asset management; electronic storage of digital images, providing secure cloud-based solutions for storing sensitive visual content, aligned with DSG standards to ensure data integrity and prevent unauthorized access; electronic storage of digital audio files, offering encrypted storage services designed to safeguard audio data against unauthorized access and corruption, compliant with Data Self-Governance protocols; electronic storage of digital photographs, ensuring the secure archiving of digital photo data with comprehensive encryption and secure access protocols, adhering to DSG requirements; electronic storage of digital music, providing secure storage solutions that protect musical digital files from piracy and unauthorized distribution, consistent with Data Self-Governance principles; electronic storage of images and videos, offering robust digital archiving services with advanced security measures to ensure the safety and confidentiality of multimedia files, tailored for Data Self-Governance; electronic storage services for archiving electronic data, delivering secure cloud-based solutions for businesses and individuals to safely store and manage their digital information with full encryption and access control, designed under DSG protocols; electronic storage of files and documents, focused on providing secure and encrypted storage solutions tailored for sensitive and critical business and personal documents, ensuring compliance with Data Self-Governance standards; electronic storage services for archiving databases, offering secure database management solutions with strong encryption and real-time backup capabilities, optimized for Data Self-Governance compliant environments; electronic data storage and data backup services, providing comprehensive solutions for securely backing up and restoring digital assets and sensitive data in event of data loss or system failure, aligned with DSG; electronic storage and retrieval services for archiving biological data, delivering specialized storage solutions tailored for sensitive biological and medical data with enhanced security measures, compliant with Data Self-Governance frameworks; electronic data log storage, offering secure and encrypted logging services to ensure the integrity and confidentiality of transaction logs and other sensitive data entries, aligned with DSG standards; computerized data storage services, providing advanced digital storage solutions that include encrypted data management and secure access systems, designed to ensure data safety and compliance with Data Self-Governance; online data storage and on-line data storage services, offering cloud-based solutions for secure and accessible online storage of digital assets, allowing for secure management and retrieval of data from anywhere, under DSG frameworks; authentication services for computer security featuring advanced biometric capabilities, utilizing fingerprint, facial recognition, iris scanning, and other biometric technologies to ensure secure user verification and access control, fully integrated within a Data Self-Governance compliant system; authentication services for computer security, incorporating multi-factor authentication that combines biometrics, hardware tokens, security keys, and PINs, enhancing security layers to protect user data and access points, in alignment with Data Self-Governance standards; authentication services for computer security, utilizing device-based recognition systems where access is granted based on the authentication of a registered device, adding an extra layer of security by linking user access specifically to their hardware, compliant with Data Self-Governance requirements; authentication services for computer security, integrating traditional security methods such as security keys and PINs with modern biometric verification to provide a robust, hybrid security solution covering both physical and digital authentication mechanisms, designed for Data Self-Governance compliance; user authentication services using biometric hardware and software technology for access control, specifically designed for legacy planning and secure transfer of digital asset control to designated beneficiaries under predefined conditions, ensuring adherence to Data Self-Governance protocols; user authentication services using biometric hardware and software technology for access control, tailored for the seamless and secure inheritance of digital assets, ensuring that biometric data and other secure access methods are transferable according to the user's estate plans, fully compliant with Data Self-Governance; user authentication services using biometric hardware and software technology for access control, incorporating advanced encryption and secure protocols to facilitate the transition of access rights to digital assets from the original owner to heirs or designated entities, in line with Data Self-Governance principles; user authentication services using biometric hardware and software technology for access control, including features to manage digital assets posthumously, enabling executors or legal representatives to access or transfer assets securely, adhering to the wishes of the deceased, and aligned with Data Self-Governance standards; authentication, issuance, and validation of digital keys, designed with redundant key systems to prevent lockouts, ensuring users have multiple ways to authenticate and gain access to their digital vaults without compromising security, developed to meet Data Self-Governance guidelines; authentication, issuance, and validation of digital keys that include advanced recovery options, such as biometrically enabled recovery processes or multi-factor authentication steps, to restore access in case primary keys are lost or compromised, ensuring compliance with Data Self-Governance frameworks; authentication, issuance, and validation of digital keys, allowing trusted individuals or entities to access the vault under strict conditions defined by the original user, crafted to support the principles of Data Self-Governance; authentication and issuance of digital keys that include self-recovery options through rigorous identity verification processes, allowing users to regain access through steps that securely confirm their identity without external intervention, aligned with Data Self-Governance standards; authentication, issuance, and validation of digital keys with integrated time-lock features, allowing vault owners to set specific time windows for access, thereby restricting entry to the vault outside these predefined periods, tailored for use within a digital vault environment influenced by Data Self-Governance; software as a Service (SaaS) providing encrypted security and cryptographic protection for digital assets and sensitive data, with features including advanced access control through biometric, PIN, security key, and device-based authentication systems tailored for enhanced user security, fully compliant with Data Self-Governance requirements; software as a service (SaaS) featuring secure management and cryptographic protection of digital assets and sensitive information, specifically tailored for use within a digital vault environment, developed under Data Self-Governance guidelines; software as a service (SaaS) featuring database management software providing advanced encryption and access controls for digital asset protection, specifically tailored for use within a digital vault environment to meet Data Self-Governance protocols; software as a service (SaaS) featuring software for use in database management with robust security features tailored for digital assets and sensitive data management, specifically tailored for use within a digital vault environment, ensuring adherence to Data Self-Governance principles; software as a service (SaaS) featuring artificial intelligence software for facial and speech recognition technologies for secure identity verification and authentication in managing digital assets, specifically tailored for use within a digital vault environment to enhance Data Self-Governance compliance; software as a service (SaaS) featuring artificial intelligence software for face and speech recognition tools designed to enhance security protocols for digital asset access and management, specifically tailored for use within a digital vault environment, in alignment with Data Self-Governance frameworks; software as a service (SaaS) featuring word processing software with integrated security features for encrypted document creation and management, specifically tailored for use within a digital vault environment, compatible with Data Self-Governance standards; software as a service (SaaS) featuring artificial intelligence software for use in facial and speech recognition technologies for facial and speech recognition, ensuring secure user authentication and data protection, specifically tailored for use within a digital vault environment, crafted to meet the needs of Data Self-Governance; software as a service (SaaS) featuring software using artificial intelligence for facial and speech recognition capabilities, focusing on secure and encrypted access to digital resources, specifically tailored for use within a digital vault environment adhering to Data Self-Governance standards; software as a service (SaaS) featuring software using artificial intelligence for face and speech recognition services, aimed at strengthening security measures for digital asset handling, specifically designed for operation within Data Self-Governance compliant digital vault environments; software as a service (SaaS) featuring software using artificial intelligence for use in facial and speech recognition to bolster secure access controls for sensitive digital environments, specifically tailored for integration within digital vaults governed by Data Self-Governance protocols; software as a service (SaaS) featuring artificial intelligence software for use in face and speech recognition, designed to authenticate and secure access to digital assets, specifically developed for digital vaults adhering to Data Self-Governance; software as a service (SaaS) featuring software using artificial intelligence for use in face and speech recognition to support secure user authentication through face and speech recognition for digital asset management, specifically tailored for use within Data Self-Governance structured digital vaults; computer security services for managing digital certificates with enhanced security for authentication and data integrity in digital asset transactions, specifically tailored for use within digital vault environments focused on Data Self-Governance; software as a service (SaaS) featuring software for use as a word processor offering encryption and secure access features for safeguarding sensitive information, specifically designed for use within digital vaults that follow Data Self-Governance frameworks; software as a service (SaaS) featuring software for use in word processing tools that include data protection and security measures tailored for confidentiality, specifically designed for secure operations within digital vaults adhering to Data Self-Governance standards; software as a service (SaaS) featuring software for use as a spreadsheet with integrated security functions for managing and protecting sensitive financial and asset data, specifically developed for use within digital vaults that enforce Data Self-Governance principles; computer security services in the nature of providing digital certificates to authenticate and secure digital transactions and communications, specifically tailored for secure operations within digital vaults adhering to Data Self-Governance; computer security services providing comprehensive security services for the protection and management of digital assets and sensitive data, specifically designed for deployment within digital vault environments that are governed by Data Self-Governance protocols; digital signature verification services (electronic cryptology services) offering digital signature verification to ensure the security and integrity of electronic transactions involving digital assets, specifically tailored for operations within digital vaults that prioritize Data Self-Governance; data security services providing data security solutions focused on the encrypted storage and safe handling of digital assets and sensitive information, specifically designed for secure operations within a digital vault environment that adheres to Data Self-Governance standards; digital archiving services offering digital archiving solutions with advanced security features to protect and preserve digital assets over long periods, tailored for integration within digital vault environments that implement Data Self-Governance protocols; identity verification services (computer security) providing identity verification services using advanced biometric and cryptographic technologies to ensure secure access to digital systems, specifically developed for use within digital vaults focused on Data Self-Governance; electronic cryptology services in the nature of digital certificate and digital signature verification services offering cryptology solutions focused on the verification of digital certificates and signatures to secure digital transactions, specifically tailored for digital vault environments enforcing Data Self-Governance; quality control and authentication services providing quality control and authentication services to ensure the security and authenticity of digital transactions and asset management, tailored for secure operations within digital vaults that follow Data Self-Governance practices; digital music encryption services offering encryption services specifically for digital music to ensure secure storage and transmission, designed to integrate seamlessly into digital vault environments that prioritize Data Self-Governance; authentication services for computer security providing authentication services designed to secure access to computer systems and protect digital assets, specifically developed for deployment within digital vaults that adhere to Data Self-Governance frameworks; platform as a Service (PaaS) that includes tools and services for secure digital asset management and protection, specifically tailored for use within digital vault environments that implement Data Self-Governance protocols; user authentication services using biometric hardware and software technology for point-of-sale transactions providing user authentication services at point-of-sale using biometric technology to secure transactions involving digital assets, specifically tailored for integration within digital vault environments governed by Data Self-Governance; IT services for data protection specifically focused on the protection of digital assets and sensitive data through advanced security measures, tailored for secure operations within digital vault environments that enforce Data Self-Governance; information technology services for data protection providing IT services that emphasize the secure management and protection of digital assets and sensitive information, specifically designed for use within digital vault environments committed to Data Self-Governance; all the foregoing limited to digital security services on the secure management, storage, and encryption of digital assets and sensitive data, and which facilitate the encryption, backup, recovery, and secure storage of critical and sensitive digital information, and not in respect of general consumer software, entertainment, or unrelated technological fields. | ||
Bid Vault 2440140 6 Apr 2024 | Registered: Registered/protected | real estate advertising; real estate marketing; real estate sales mana... Class 035 Class 035 Advertising, Business & Retail Services real estate advertising; real estate marketing; real estate sales management services; real estate marketing analysis; business management of real estate companies; real estate marketing services; advertising of real estate; business administration and management services relating to real estate; real estate auctioneering; conducting of auction sales; online auctioneering; online auction services via the internet; providing online auction services; on-line auction services; online auctioneering via the internet; provision of on-line auction services; auctioneering services; online auctioneering services; organisation of internet auctions; organizing and conducting charity auctions for charitable fundraising purposes; auction and reverse auction services; provision of on-line auctioneering; real estate auctions; auctioning of vehicles; auction services; arranging of auction sales; auctioneering; auctioneering of property; online auction services; conducting of auctions; arranging and conducting of auctions; arranging and conducting auctions; arranging and conducting of auction sales; auctioning of property; arranging of auctions; online auction bidding for others; negotiation of contracts relating to the purchase and sale of goods | ||
RACE RESULT race result AG 2418250 23 Nov 2023 | Protected: Registered/protected | Radio-frequency identification (RFID) readers; radio-frequency identif... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Radio-frequency identification (RFID) readers; radio-frequency identification (RFID) tags; radio frequency identification devices [transponders]; all afore-mentioned goods in the field of timekeeping for sports events, except motor-sports events; none of the afore-mentioned goods in the field of jewelry and horological instruments. Class 014 Class 014 Jewelry Products Horological instruments for sports, not including wristwatches and clocks, not in the field of motorsports. ... Class 040 Treatment & Processing of Materials Services Printing, except printing services, in relation to the following fields: motorsports. Class 041 Education and Entertainment Services Timing of sports events, other than timing of motorsports events. Class 042 Computer & Software Services & Scientific Services Software as a service [SaaS], other than in the field of motorsports. | ||
NINJA FROSTVAULT SharkNinja Operating LLC 2405920 10 Oct 2023 | Protected: Registered/protected | Portable coolers, non-electric. Class 021 Class 021 Houseware and Glass Products Portable coolers, non-electric. | ||
LawVault LAWADVISOR LTD 2447360 4 Oct 2023 | Protected: Registered/protected | Computer software for project management; computer software for team m... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Computer software for project management; computer software for team management; computer software for information management; computer software for document management; computer software for project management, team management, information management and document management; computer software for project management, team management, information management and document management for legal projects; application software for project management; application software for team management; application software for information management; application software for document management; application software for project management, team management, information management and document management; application software for project management, team management, information management and document management for legal projects; downloadable software for project management; downloadable software for team management; downloadable software for information management; downloadable software for document management; downloadable software for project management, team management, information management and document management; downloadable software for project management, team management, information management and document management for legal projects; database management software; collaboration management software platforms; workflow management system software; business process management software; collaboration software; software for the management of external advisors; software for the management of groups of external advisors; software for the management of groups of advisors. Class 038 Class 038 Communications Services Telecommunications services; electronic transmission of documents; digital communications services; electronic transmission of messages, data and documents; electronic transmission of data and documents via computer terminals and electronic devices; transmission of digital files; communication services, namely, electronic transmission of data and documents among users of computers; provision of access to Internet platforms for the purpose of exchanging digital files; electronic data communications; digital transmission services for audio and video data; provision of communications facilities for the interchange of digital data; providing access to electronic communications networks and electronic databases; transmission of computerised documents; transmission of digital information; provision of access to data or documents stored electronically in central files for remote consultation; information, advisory and consultancy services in relation to the aforesaid. ... Class 042 Computer & Software Services & Scientific Services Design and development of computer software; design and development of computer software for use in law firms and/or legal departments of companies or other organisations; design and development of computer software for use in management of legal teams; design and development of computer software for use in management of external advisors; design and development of computer software for use in management of teams; design and development of computer software for use in management of groups of external legal advisors and/or groups of external law firms; design and development of computer software for use in management of external legal advisors and/or external law firms; design and development of computer software for database management; design and development of computer software for use in management of legal projects; design and development of computer software for use in management of legal documents and/or information projects; design and development of computer software for use in project management and/or document management and/or information management; providing temporary use of on-line non-downloadable software for use in project management and/or document management and/or information management; providing temporary use of on-line non-downloadable software for use in management of legal projects; providing temporary use of on-line non-downloadable software for use in management of legal documents and/or information projects; providing temporary use of on-line non-downloadable cloud computing software for use in project management and/or document management and/or information management; providing temporary use of on-line non-downloadable cloud computing software for use in management of legal projects; providing temporary use of on-line non-downloadable cloud computing software for use in management of legal documents and/or information projects; technology related project management services; providing temporary use of on-line non-downloadable software that delivers reports, allows users to review reports, create charts, and collaborate with others; updating and maintaining cloud-based computer software through on-line updates, enhancements and patches; application service provider services; application service provider services, namely, hosting, managing, developing, analysing, and maintaining applications, software and web sites of others relating to management of legal projects; application service provider [ASP], namely, hosting computer software applications of others in the field of knowledge management for creating searchable databases of information and data; leasing of software for use in the management of legal projects; leasing of software for use in project management and/or document management and/or information management; providing temporary use of a non-downloadable web application for sharing web-based documents; providing temporary use of a non-downloadable web application for collaborating on shared documents; leasing of software for database management; information, advisory and consultancy services in relation to the aforesaid. | ||
CheckVault CheckIP Pty Ltd 2389044 15 Sept 2023 | Registered: Registered/protected | The provision of payment and financial services relating to tenders, i... Class 036 Class 036 Insurance & Financial Services The provision of payment and financial services relating to tenders, including processing and transmission of invoices and progress payments; related payment services; providing guaranteed payment delivery, and the clearing and reconciliation of financial transactions via electronic communication networks; escrow services; payment security services being secure payment services in the form of the conducting and facilitating of financial transactions for third parties | ||
SCALPCONSULT L'OREAL 2427927 14 Sept 2023 | Protected: Registered/protected | Hair preparations and treatments.,Cosmetic utensils. Class 003 Class 003 Cosmetics and Cleaning Products Hair preparations and treatments. Class 021 Class 021 Houseware and Glass Products Cosmetic utensils. | ||
H2O VAULT H2O VAULT PTY LTD 2387802 12 Sept 2023 | Registered: Registered/protected | Heat pumps; Heating installations; Heat pumps for energy processing Class 011 Class 011 Environmental Control Instrument Products lighting heating cooling cooking Heat pumps; Heating installations; Heat pumps for energy processing |
Hottieco pty ltd
2450453 · 21 May 2024
011
Class 011
Environmental Control Instrument Products lighting heating cooling cooking
hot-water bottles; hot water bottles; electric hot-water bottles; electric hot water bottles; fitted fabric covers for hot water bottles
025
Class 025
Clothing Products
clothing
hot-water bottles; hot water bottles; electric hot-water bottles; elec...
2451246 · 17 May 2024
009
Class 009
Computer & Software Products & Electrical & Scientific Products
fiction electronic books, downloadable; downloadable digital content in the form of electronic publications of books; non-fiction electronic books recorded on computer media; digital book readers; audiobooks; downloadable fiction e-books; electronic book readers; downloadable series of children's books; non-fiction electronic books, downloadable; e-book readers; downloadable non-fiction e-books; downloadable electronic books; downloadable digital books; downloadable electronic books featuring educational materials for children and parents; digital books, downloadable; digital books downloadable from the Internet; electronic books, downloadable; non-fiction e-books recorded on computer media; audio books featuring educational materials for children and parents; fiction e-books recorded on computer media; books recorded on tape; talking children's books; audio books; books recorded on disc; electronic books; e-books; talking books
016
Class 016
Paper Goods and Printed Material
books; writing books; books for children; bookkeeping books; children's books; printed books; non-fiction books; series of fiction and non-fiction books; books featuring stories, games and learning activities; information books; series of non-fiction books; series of fiction books; writing or drawing books; fiction books; series of children's books; drawing books; educational books; cookery books; religious books; manuscript books; novels; cook books; reference books; story books; log books [book-keeping]; series of story books; series of fiction and non-fiction books on a variety of topics; log books [ship's log]; coffee table books; bill books; series of babies' books; gift books; travel books; baby books [story books]; telephone books; wirebound books; baby books [storybooks]; picture books; log books; sticker books; children's storybooks; bath books; account books; guide books; coloring books; school writing books; logbooks [book-keeping]; check books; coupon books; series of storybooks; brag books [photo albums]; wedding books; note books; books, magazines, newspapers and printed matter; copy books; resource books; commemorative books; children's activity books; baby books [memory books]; storybooks; cheque books; date books; books, magazines [periodicals], newspapers and printed matter; book-cover paper; cookbooks; song books; children's interactive educational books; sketch books; pocket books [printed publications]; prayer books; bookbinding articles; coloring books [picture books]; birthday books; ledger books; index books; scrap books; colouring books [picture books]; pop-up books; memory books [photo albums]; book covers; bookbinding material; book jackets; data books; workbooks [study guides]; books for autographs; voucher books; signature books; colouring books; covers for books; composition books; print-braille children's books; textbooks; ledgers [books]; bookbinding materials; book binders; copybooks; autograph books; comic books; receipt books; dictation books; tutorial books in the field of lifestyle; covers of paper for books; romance novels; exercise books; pocketbooks [printed publications]; score-books; flip books; children's pop-up books; book jackets of paper; checkbooks; log books [aviation]; tutorial books in the field of leadership development; check book cases; bookbinding tape; tutorial books in the field of concept design; leather bookmarkers; encyclopedias; sketchbooks; tutorial books in the field of yoga; book holders [stationery]; protective book covers; datebooks; pen calligraphy copy books; pocketbooks [stationery]; check book covers; booklets; tutorial books in the field of beauty and fashion; handbooks [manuals]; tutorial books in the field of business strategy; bookmarkers of leather; bookbinding cloth; printed books in the field of music education; book ends; bookbinding wire; printed manuals; fabrics for bookbinding; engagement books; wallpaper sample books; tutorial books in the field of gardening; scratch books for drawing; writing brush calligraphy copy books; score books; manuals [handbooks]; paper book jackets; bookmarks; printed booklets; memorandum books; paper for covering books; cash receipt books; workbooks [blank]; printed handbooks; baby memory books; logbooks [ship's log]; artists' sketch books; stenographers' note books; telephone number books; hymn books; protective covers for books; logbooks; address books; memory books [photograph albums]; book covers made of paper; book wrappings; bookends; business record books; guest books; recipe books; books in the field of golf instruction; printed autograph books; log books [car title deeds]; paper book covers; anniversary books; exercise books [blank]; bookmarkers; appointment books; printed music books; colouring books for adults; activity books; brag books [photograph albums]; leather book covers; graphic novels; jackets of paper for books; reporters' note books; blank journal books; expense books; scrapbooks; coloring books for adults; dictionaries; book covers of paper; vinyl bath books; book plates; pocket books [stationery]; binding materials for books and papers
...
Class 036
Insurance & Financial Services
estate planning; estate trust planning; estate planning services; estate trust management; real estate management; real estate consultancy; real estate investment consultancy; real estate and property management; real estate and housing management; real estate management consultancy; real-estate and housing management; real estate consulting services; real estate insurance consultancy; real estate property management; multi-family property management; real estate affairs; estate trust management services; real estate management services relating to housing estates; real estate investment; real estate services; real estate consultation; real estate investment management; real estate multiple listing services; real-estate affairs; real estate management consultation; real estate listing services; management of real estate
fiction electronic books, downloadable; downloadable digital content i...
TechSologic Incorporated
2443306 · 16 Apr 2024
009
Class 009
Computer & Software Products & Electrical & Scientific Products
downloadable computer security software for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer application software for mobile telephones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable application software for smartphones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; smartphone software applications, downloadable for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer software applications for smartphones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable software applications for cell phones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer software applications for mobile telephones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable applications for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer utility programs for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; computer software applications, downloadable for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer software applications for cellular phones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer application software for cellular phones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable software applications for smartphones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable software applications for mobile telephones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable cloud-based software for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable smartphone apps [software] for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer application software for cellular telephones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; computer application software for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer software for tablets for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable apps for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer security software for encrypted security and cryptographic protection of digital assets and sensitive data, tailored for integration within a Data Self-Governance compliant digital vault environment; downloadable computer application software for mobile telephones for encrypted security and cryptographic protection of digital assets and sensitive data, designed to support Data Self-Governance principles; downloadable application software for smartphones for encrypted security and cryptographic protection of digital assets and sensitive data, ensuring adherence to Data Self-Governance as a Service protocols; smartphone software applications, downloadable for encrypted security and cryptographic protection of digital assets and sensitive data, suitable for use within Data Self-Governancesecured environments; downloadable computer software applications for smartphones for encrypted security and cryptographic protection of digital assets and sensitive data, customized for Data Self-Governance compliance; downloadable software applications for cell phones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring compliance with Data Self-Governance standards; downloadable computer software applications for mobile telephones for encrypted security and cryptographic protection of digital assets and sensitive data, developed under Data Self-Governance guidelines; downloadable applications for encrypted security and cryptographic protection of digital assets and sensitive data, aligned with the principles of Data Self-Governance and Data Self-Governance as a Service; downloadable computer utility programs for encrypted security and cryptographic protection of digital assets and sensitive data, integrated within a Data Self-Governance framework; computer software applications, downloadable for encrypted security and cryptographic protection of digital assets and sensitive data, tailored for operation within digital vaults that adhere to Data Self-Governance protocols; downloadable computer software applications for cellular phones for encrypted security and cryptographic protection of digital assets and sensitive data, optimized for Data Self-Governance compliant secure environments; downloadable computer application software for cellular phones for encrypted security and cryptographic protection of digital assets and sensitive data, developed to facilitate Data Self-Governance and Data Self-Governance as a Service implementations; downloadable software applications for smartphones for encrypted security and cryptographic protection of digital assets and sensitive data, designed to enhance security measures under Data Self-Governance standards; downloadable software applications for mobile telephones for encrypted security and cryptographic protection of digital assets and sensitive data, ensuring compliance with Data Self-Governance and Data Self-Governance as a Service requirements; downloadable cloudbased software for encrypted security and cryptographic protection of digital assets and sensitive data, supporting Data Self-Governance principles through cloud technologies; downloadable smartphone apps [software] for encrypted security and cryptographic protection of digital assets and sensitive data, structured to conform to Data Self-Governance operational protocols; downloadable computer application software for cellular telephones for encrypted security and cryptographic protection of digital assets and sensitive data, built to align with Data Self-Governance and Data Self-Governance as a Service frameworks; computer application software for encrypted security and cryptographic protection of digital assets and sensitive data, integrating Data Self-Governance compliant mechanisms; downloadable computer software for tablets for encrypted security and cryptographic protection of digital assets and sensitive data, customized to support Data Self-Governance compliance in digital asset management; downloadable apps for encrypted security and cryptographic protection of digital assets and sensitive data, designed to function within environments regulated by Data Self-Governance principles; all the foregoing limited to digital security software on the secure management, storage, and encryption of digital assets and sensitive data, and which facilitates the encryption, backup, recovery, and secure storage of critical and sensitive digital information, and not in respect of general consumer software, entertainment, or unrelated technological fields.
042
Class 042
Computer & Software Services & Scientific Services
computer software programming for scanning or reading a QR code via mobile devices, tailored specifically for secure digital asset management environments, enhancing security protocols; computer programming of software for scanning or reading a bar code via mobile devices, tailored specifically for secure digital asset management environments, enhancing security protocols; computer programming of software for scanning or reading a QR code via mobile devices, tailored specifically for secure digital asset management environments, enhancing security protocols; programming of computer software for scanning or reading a QR code via mobile devices, tailored specifically for secure digital asset management environments, enhancing security protocols; computer programming of computer software for scanning or reading a bar code via mobile devices, tailored specifically for secure digital asset management environments, enhancing security protocols; computer programming of computer software for scanning or reading a QR code via mobile devices, tailored specifically for secure digital asset management environments, enhancing security protocols; computer software programming for scanning or reading a QR code via computer networks, tailored specifically for secure digital asset management environments, enhancing security protocols; user authentication services using single sign-on technology for online software applications, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; user authentication services using biometric hardware and software technology for access control, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; user authentication services using biometric hardware and software technology for managing human identification, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; user authentication services using biometric hardware and software technology for password management, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; providing user authentication services using biometric hardware and software technology for access control, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; providing user authentication services using biometric hardware and software technology for managing human identification, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; user authentication services using biometric hardware and software technology for managing identification of things, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; providing user authentication services using biometric hardware and software technology for password management, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; providing user authentication services using biometric hardware and software technology for managing identification of things, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; providing user authentication services using biometric hardware and software technology for e-commerce transactions, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; authentication services for computer security, offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; electronic signature verification services using technology to authenticate user identity, offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; electronic cryptology services in the nature of electronic data encryption services, providing advanced encryption services for digital images and data to secure sensitive information during transmission and storage; computer security services in the nature of providing authentication, issuance, validation, and revocation of digital keys, offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; computer security services for managing digital certificates, offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; digital signature verification services [electronic cryptology services], offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; identity verification services [computer security], offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; identity verification [computer security], offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; authentication, issuance and validation of digital keys, offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; providing authentication of personal identification information [computer security services], offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; encryption, decryption, and authentication of information, messages, and data, offering enhanced encryption technologies to secure digital communications and sensitive information against unauthorized access and data breaches; cryptographic engineering, providing specialized encryption services tailored to secure sensitive and critical information, including but not limited to digital assets and personal data; digital image encryption services, focused on providing high-security solutions for protecting digital images from unauthorized access and tampering; encryption of digital images, ensuring the security and integrity of digital visual content through advanced encryption standards; electronic storage of digital video files, providing secure digital storage solutions with advanced encryption and access controls to ensure data privacy and integrity; electronic storage of digital videos, focused on maintaining high security and data integrity in digital video storage through encrypted services; electronic storage of digital images, providing secure cloud-based solutions for storing sensitive visual content, ensuring data integrity and preventing unauthorized access; electronic storage of digital audio files, offering encrypted storage services that safeguard audio data against unauthorized access and corruption; electronic storage of digital photographs, ensuring the secure archiving of digital photo data with comprehensive encryption and secure access protocols; electronic storage of digital music, providing secure storage solutions that protect musical digital files from piracy and unauthorized distribution; electronic storage of images and videos, offering robust digital archiving services with advanced security measures to ensure the safety and confidentiality of multimedia files; electronic storage services for archiving electronic data, providing secure cloud-based solutions for businesses and individuals to safely store and manage their digital information with full encryption and access control; electronic storage of files and documents, focused on providing secure and encrypted storage solutions tailored for sensitive and critical business and personal documents; electronic storage services for archiving databases, offering secure database management solutions with strong encryption and real-time backup capabilities; electronic data storage and data backup services, providing comprehensive solutions for securely backing up and restoring digital assets and sensitive data in the event of data loss or system failure; electronic storage and retrieval services for archiving biological data, offering specialized storage solutions tailored for sensitive biological and medical data with enhanced security measures; electronic data log storage, providing secure and encrypted logging services to ensure the integrity and confidentiality of transaction logs and other sensitive data entries; computerised data storage services, offering advanced digital storage solutions that include encrypted data management and secure access systems to ensure data safety and privacy; online data storage and on-line data storage services, providing cloud-based solutions for secure and accessible online storage of digital assets, allowing for secure management and retrieval of data from anywhere; authentication services for computer security featuring advanced biometric capabilities, utilizing fingerprint, facial recognition, iris scanning, and other biometric technologies to ensure secure user verification and access control; authentication services for computer security incorporating multi-factor authentication, combining biometrics, hardware tokens, security keys, and PINs to enhance the security layers protecting user data and access points; authentication services for computer security utilizing device-based recognition systems, where access is granted based on the authentication of a registered device, adding an extra layer of security by linking user access specifically to their hardware; authentication services for computer security that integrate traditional security methods such as security keys and PINs with modern biometric verification, providing a robust, hybrid security solution that covers both physical and digital authentication mechanisms; user authentication services using biometric hardware and software technology for access control, specifically designed for legacy planning and secure transfer of digital asset control to designated beneficiaries under predefined conditions; user authentication services using biometric hardware and software technology for access control, tailored for the seamless and secure inheritance of digital assets, ensuring that biometric data and other secure access methods are transferable according to the user's estate plans; user authentication services using biometric hardware and software technology for access control, incorporating advanced encryption and secure protocols to facilitate the transition of access rights to digital assets from the original owner to heirs or designated entities; user authentication services using biometric hardware and software technology for access control that includes features to manage digital assets posthumously, enabling executors or legal representatives to access or transfer assets securely, adhering to the wishes of the deceased; authentication, issuance, and validation of digital keys, designed with redundant key systems to prevent lockouts, ensuring users have multiple ways to authenticate and gain access to their digital vaults without compromising security; authentication, issuance, and validation of digital keys that include advanced recovery options, such as biometrically enabled recovery processes or multi-factor authentication steps, to restore access in case primary keys are lost or compromised; authentication, issuance, and validation of digital keys, allowing trusted individuals or entities to access the vault under strict conditions defined by the original user; authentication and issuance of digital keys that include self-recovery options through rigorous identity verification processes, allowing users to regain access through steps that securely confirm their identity without external intervention; authentication, issuance, and validation of digital keys with integrated time-lock features, allowing vault owners to set specific time windows for access, thereby restricting entry to the vault outside these predefined periods; software as a Service (SaaS) providing encrypted security and cryptographic protection for digital assets and sensitive data, with features including advanced access control through biometric, PIN, security key, and device-based authentication systems tailored for enhanced user security; software as a service (SaaS) featuring secure management and cryptographic protection of digital assets and sensitive information, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring database management software providing advanced encryption and access controls for digital asset protection, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software for use in database management with robust security features tailored for digital assets and sensitive data management, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring artificial intelligence software for facial and speech recognition technologies for secure identity verification and authentication in managing digital assets, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring artificial intelligence software for face and speech recognition tools designed to enhance security protocols for digital asset access and management, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring word processing software with integrated security features for encrypted document creation and management, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring artificial intelligence software for use in facial and speech recognition technologies for facial and speech recognition, ensuring secure user authentication and data protection, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software using artificial intelligence for facial and speech recognition capabilities, focusing on secure and encrypted access to digital resources, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software using artificial intelligence for face and speech recognition services, aimed at strengthening security measures for digital asset handling, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software using artificial intelligence for use in facial and speech recognition to bolster secure access controls for sensitive digital environments, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring artificial intelligence software for use in face and speech recognition, designed to authenticate and secure access to digital assets, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software using artificial intelligence for use in face and speech recognition to support secure user authentication through face and speech recognition for digital asset management, specifically tailored for use within a digital vault environment; computer security services for managing digital certificates with enhanced security for authentication and data integrity in digital asset transactions, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software for use as a word processor offering encryption and secure access features for safeguarding sensitive information, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software for use in word processing tools that include data protection and security measures tailored for confidentiality, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software for use as a spreadsheet with integrated security functions for managing and protecting sensitive financial and asset data, specifically tailored for use within a digital vault environment; computer security services in the nature of providing digital certificates to authenticate and secure digital transactions and communications, specifically tailored for use within a digital vault environment; computer security services providing comprehensive security services for the protection and management of digital assets and sensitive data, specifically tailored for use within a digital vault environment; digital signature verification services (electronic cryptology services) offering digital signature verification to ensure the security and integrity of electronic transactions involving digital assets, specifically tailored for use within a digital vault environment; data security services providing data security solutions focused on the encrypted storage and safe handling of digital assets and sensitive information, specifically tailored for use within a digital vault environment; digital archiving services offering digital archiving solutions with advanced security features to protect and preserve digital assets over long periods, specifically tailored for use within a digital vault environment; identity verification services (computer security) providing identity verification services using advanced biometric and cryptographic technologies to ensure secure access to digital systems, specifically tailored for use within a digital vault environment; electronic cryptology services in the nature of digital certificate and digital signature verification services offering cryptology services focused on the verification of digital certificates and signatures to secure digital transactions, specifically tailored for use within a digital vault environment; quality control and authentication services providing quality control and authentication services to ensure the security and authenticity of digital transactions and asset management, specifically tailored for use within a digital vault environment; digital music encryption services offering encryption services specifically for digital music to ensure secure storage and transmission, specifically tailored for use within a digital vault environment; authentication services for computer security providing authentication services designed to secure access to computer systems and protect digital assets, specifically tailored for use within a digital vault environment; platform as a service (PaaS) that includes tools and services for secure digital asset management and protection, specifically tailored for use within a digital vault environment; user authentication services using biometric hardware and software technology for point-of-sale transactions providing user authentication services at point-of-sale using biometric technology to secure transactions involving digital assets, specifically tailored for use within a digital vault environment; IT services for data protection specifically focused on the protection of digital assets and sensitive data through advanced security measures, specifically tailored for use within a digital vault environment; information technology services for data protection providing information technology services that emphasize the secure management and protection of digital assets and sensitive information, specifically tailored for use within a digital vault environment; computer software programming for scanning or reading a QR code via mobile devices, tailored specifically for secure digital asset management environments adhering to Data Self-Governance and Data Self-Governance as a Service protocols, enhancing security protocols; computer programming of software for scanning or reading a bar code via mobile devices, developed to facilitate Data Self-Governance and Data Self-Governance as a Service implementations, enhancing security protocols within secure digital asset management environments; computer programming of software for scanning or reading a QR code via mobile devices, optimized for environments that comply with Data Self-Governance and Data Self-Governance as a Service standards, enhancing security protocols; programming of computer software for scanning or reading a QR code via mobile devices, integrated within a Data Self-Governance framework to enhance security protocols in secure digital asset management environments; computer programming of computer software for scanning or reading a QR code via mobile devices, developed specifically for secure digital asset management environments that adhere to Data Self-Governance and Data Self-Governance as a Service standards, thereby enhancing security protocols; computer software programming for scanning or reading a QR code via computer networks, optimized for integration within digital vault environments regulated by Data Self-Governance principles, aiming to enhance security protocols; user authentication services using single sign-on technology for online software applications, tailored to secure user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems, compliant with Data Self-Governance requirements; user authentication services using biometric hardware and software technology for access control, designed to secure user access to digital assets and sensitive information in environments adhering to Data Self-Governance and Data Self-Governance as a Service frameworks; user authentication services using biometric hardware and software technology for managing human identification, structured to enhance the security protocols within digital asset management systems that operate under strict Data Self-Governance standards; user authentication services using biometric hardware and software technology for password management, focused on providing robust security solutions for the management of digital assets and sensitive information within Data Self-Governance compliant environments; providing user authentication services using biometric hardware and software technology for access control, designed specifically to secure user access to digital assets and sensitive information, leveraging advanced multi-factor and biometric authentication systems compliant with Data Self-Governance principles; providing user authentication services using biometric hardware and software technology for managing human identification, optimized to enhance security measures in managing digital assets and sensitive information through the use of advanced multi-factor and biometric authentication systems, aligned with Data Self-Governance and Data Self-Governance as a Service protocols; user authentication services using biometric hardware and software technology for managing identification of things, tailored to ensure robust security for digital assets and sensitive information by incorporating advanced multi-factor and biometric authentication systems, within a Data Self-Governance regulated environment; providing user authentication services using biometric hardware and software technology for password management, focused on securing user access and enhancing protection of digital assets and sensitive data through comprehensive multi-factor and biometric authentication strategies, compliant with Data Self-Governance standards; providing user authentication services using biometric hardware and software technology for managing identification of things, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems, aligned with Data Self-Governance protocols for enhanced asset management security; providing user authentication services using biometric hardware and software technology for e-commerce transactions, tailored to ensure secure transactions by utilizing advanced multi-factor and biometric authentication systems, supporting Data Self-Governance standards in safeguarding digital assets and sensitive e-commerce interactions; authentication services for computer security, offering enhanced security measures for the protection and management of digital assets, incorporating cryptographic solutions and digital signature validation specifically tailored for financial and personal data protection under Data Self-Governance frameworks; electronic signature verification services using technology to authenticate user identity, designed to offer robust security measures for digital asset management, featuring cryptographic solutions and digital signature validation in compliance with Data Self-Governance standards for financial and personal data security; electronic cryptology services in the nature of electronic data encryption services, providing state-of-the-art encryption for digital images and data to secure sensitive information during transmission and storage, fully integrated with Data Self-Governance measures for comprehensive information security; computer security services in the nature of providing authentication, issuance, validation, and revocation of digital keys, offering enhanced security measures for digital asset management, including cryptographic solutions and digital signature validation, developed to meet Data Self-Governance requirements for protecting financial and personal data; computer security services for managing digital certificates, providing rigorous security protocols for digital asset protection, including cryptographic solutions and digital signature validation, tailored to support the stringent requirements of Data Self-Governance and safeguard sensitive financial and personal information; digital signature verification services [electronic cryptology services], providing enhanced security measures for digital assets management, including cryptographic solutions and digital signature validation specifically tailored for financial and personal data protection under Data Self-Governance standards; identity verification services [computer security], delivering advanced security protocols for digital asset management, incorporating cryptographic solutions and digital signature validation designed to meet Data Self-Governance guidelines; identity verification [computer security], offering stringent security measures to protect and manage digital assets, enhanced by cryptographic solutions and digital signature validation in compliance with Data Self-Governance practices; Authentication, issuance, and validation of digital keys, providing robust security measures for digital asset management, featuring cryptographic solutions and digital signature validation to support the principles of Data Self-Governance; providing authentication of personal identification information [computer security services], ensuring enhanced protection of digital assets with cryptographic solutions and digital signature validation developed to adhere to Data Self-Governance standards; encryption, decryption, and authentication of information, messages, and data, deploying advanced encryption technologies to secure digital communications and sensitive information against unauthorized access and breaches, aligned with Data Self-Governance protocols; cryptographic engineering, offering specialized encryption services tailored to secure sensitive and critical information, including digital assets and personal data, ensuring compliance with Data Self-Governance requirements; digital image encryption services, focused on providing high-security encryption solutions to protect digital images from unauthorized access and tampering, within a Data Self-Governance compliant environment; encryption of digital images, ensuring the security and integrity of digital visual content through advanced encryption standards, tailored for secure digital asset management under Data Self-Governance frameworks; electronic storage of digital video files, providing secure digital storage solutions with advanced encryption and access controls to ensure data privacy and integrity, fully compliant with Data Self-Governance protocols; electronic storage of digital videos, ensuring high-security and data integrity through encrypted storage services, tailored for DSG-compliant digital asset management; electronic storage of digital images, providing secure cloud-based solutions for storing sensitive visual content, aligned with DSG standards to ensure data integrity and prevent unauthorized access; electronic storage of digital audio files, offering encrypted storage services designed to safeguard audio data against unauthorized access and corruption, compliant with Data Self-Governance protocols; electronic storage of digital photographs, ensuring the secure archiving of digital photo data with comprehensive encryption and secure access protocols, adhering to DSG requirements; electronic storage of digital music, providing secure storage solutions that protect musical digital files from piracy and unauthorized distribution, consistent with Data Self-Governance principles; electronic storage of images and videos, offering robust digital archiving services with advanced security measures to ensure the safety and confidentiality of multimedia files, tailored for Data Self-Governance; electronic storage services for archiving electronic data, delivering secure cloud-based solutions for businesses and individuals to safely store and manage their digital information with full encryption and access control, designed under DSG protocols; electronic storage of files and documents, focused on providing secure and encrypted storage solutions tailored for sensitive and critical business and personal documents, ensuring compliance with Data Self-Governance standards; electronic storage services for archiving databases, offering secure database management solutions with strong encryption and real-time backup capabilities, optimized for Data Self-Governance compliant environments; electronic data storage and data backup services, providing comprehensive solutions for securely backing up and restoring digital assets and sensitive data in event of data loss or system failure, aligned with DSG; electronic storage and retrieval services for archiving biological data, delivering specialized storage solutions tailored for sensitive biological and medical data with enhanced security measures, compliant with Data Self-Governance frameworks; electronic data log storage, offering secure and encrypted logging services to ensure the integrity and confidentiality of transaction logs and other sensitive data entries, aligned with DSG standards; computerized data storage services, providing advanced digital storage solutions that include encrypted data management and secure access systems, designed to ensure data safety and compliance with Data Self-Governance; online data storage and on-line data storage services, offering cloud-based solutions for secure and accessible online storage of digital assets, allowing for secure management and retrieval of data from anywhere, under DSG frameworks; authentication services for computer security featuring advanced biometric capabilities, utilizing fingerprint, facial recognition, iris scanning, and other biometric technologies to ensure secure user verification and access control, fully integrated within a Data Self-Governance compliant system; authentication services for computer security, incorporating multi-factor authentication that combines biometrics, hardware tokens, security keys, and PINs, enhancing security layers to protect user data and access points, in alignment with Data Self-Governance standards; authentication services for computer security, utilizing device-based recognition systems where access is granted based on the authentication of a registered device, adding an extra layer of security by linking user access specifically to their hardware, compliant with Data Self-Governance requirements; authentication services for computer security, integrating traditional security methods such as security keys and PINs with modern biometric verification to provide a robust, hybrid security solution covering both physical and digital authentication mechanisms, designed for Data Self-Governance compliance; user authentication services using biometric hardware and software technology for access control, specifically designed for legacy planning and secure transfer of digital asset control to designated beneficiaries under predefined conditions, ensuring adherence to Data Self-Governance protocols; user authentication services using biometric hardware and software technology for access control, tailored for the seamless and secure inheritance of digital assets, ensuring that biometric data and other secure access methods are transferable according to the user's estate plans, fully compliant with Data Self-Governance; user authentication services using biometric hardware and software technology for access control, incorporating advanced encryption and secure protocols to facilitate the transition of access rights to digital assets from the original owner to heirs or designated entities, in line with Data Self-Governance principles; user authentication services using biometric hardware and software technology for access control, including features to manage digital assets posthumously, enabling executors or legal representatives to access or transfer assets securely, adhering to the wishes of the deceased, and aligned with Data Self-Governance standards; authentication, issuance, and validation of digital keys, designed with redundant key systems to prevent lockouts, ensuring users have multiple ways to authenticate and gain access to their digital vaults without compromising security, developed to meet Data Self-Governance guidelines; authentication, issuance, and validation of digital keys that include advanced recovery options, such as biometrically enabled recovery processes or multi-factor authentication steps, to restore access in case primary keys are lost or compromised, ensuring compliance with Data Self-Governance frameworks; authentication, issuance, and validation of digital keys, allowing trusted individuals or entities to access the vault under strict conditions defined by the original user, crafted to support the principles of Data Self-Governance; authentication and issuance of digital keys that include self-recovery options through rigorous identity verification processes, allowing users to regain access through steps that securely confirm their identity without external intervention, aligned with Data Self-Governance standards; authentication, issuance, and validation of digital keys with integrated time-lock features, allowing vault owners to set specific time windows for access, thereby restricting entry to the vault outside these predefined periods, tailored for use within a digital vault environment influenced by Data Self-Governance; software as a Service (SaaS) providing encrypted security and cryptographic protection for digital assets and sensitive data, with features including advanced access control through biometric, PIN, security key, and device-based authentication systems tailored for enhanced user security, fully compliant with Data Self-Governance requirements; software as a service (SaaS) featuring secure management and cryptographic protection of digital assets and sensitive information, specifically tailored for use within a digital vault environment, developed under Data Self-Governance guidelines; software as a service (SaaS) featuring database management software providing advanced encryption and access controls for digital asset protection, specifically tailored for use within a digital vault environment to meet Data Self-Governance protocols; software as a service (SaaS) featuring software for use in database management with robust security features tailored for digital assets and sensitive data management, specifically tailored for use within a digital vault environment, ensuring adherence to Data Self-Governance principles; software as a service (SaaS) featuring artificial intelligence software for facial and speech recognition technologies for secure identity verification and authentication in managing digital assets, specifically tailored for use within a digital vault environment to enhance Data Self-Governance compliance; software as a service (SaaS) featuring artificial intelligence software for face and speech recognition tools designed to enhance security protocols for digital asset access and management, specifically tailored for use within a digital vault environment, in alignment with Data Self-Governance frameworks; software as a service (SaaS) featuring word processing software with integrated security features for encrypted document creation and management, specifically tailored for use within a digital vault environment, compatible with Data Self-Governance standards; software as a service (SaaS) featuring artificial intelligence software for use in facial and speech recognition technologies for facial and speech recognition, ensuring secure user authentication and data protection, specifically tailored for use within a digital vault environment, crafted to meet the needs of Data Self-Governance; software as a service (SaaS) featuring software using artificial intelligence for facial and speech recognition capabilities, focusing on secure and encrypted access to digital resources, specifically tailored for use within a digital vault environment adhering to Data Self-Governance standards; software as a service (SaaS) featuring software using artificial intelligence for face and speech recognition services, aimed at strengthening security measures for digital asset handling, specifically designed for operation within Data Self-Governance compliant digital vault environments; software as a service (SaaS) featuring software using artificial intelligence for use in facial and speech recognition to bolster secure access controls for sensitive digital environments, specifically tailored for integration within digital vaults governed by Data Self-Governance protocols; software as a service (SaaS) featuring artificial intelligence software for use in face and speech recognition, designed to authenticate and secure access to digital assets, specifically developed for digital vaults adhering to Data Self-Governance; software as a service (SaaS) featuring software using artificial intelligence for use in face and speech recognition to support secure user authentication through face and speech recognition for digital asset management, specifically tailored for use within Data Self-Governance structured digital vaults; computer security services for managing digital certificates with enhanced security for authentication and data integrity in digital asset transactions, specifically tailored for use within digital vault environments focused on Data Self-Governance; software as a service (SaaS) featuring software for use as a word processor offering encryption and secure access features for safeguarding sensitive information, specifically designed for use within digital vaults that follow Data Self-Governance frameworks; software as a service (SaaS) featuring software for use in word processing tools that include data protection and security measures tailored for confidentiality, specifically designed for secure operations within digital vaults adhering to Data Self-Governance standards; software as a service (SaaS) featuring software for use as a spreadsheet with integrated security functions for managing and protecting sensitive financial and asset data, specifically developed for use within digital vaults that enforce Data Self-Governance principles; computer security services in the nature of providing digital certificates to authenticate and secure digital transactions and communications, specifically tailored for secure operations within digital vaults adhering to Data Self-Governance; computer security services providing comprehensive security services for the protection and management of digital assets and sensitive data, specifically designed for deployment within digital vault environments that are governed by Data Self-Governance protocols; digital signature verification services (electronic cryptology services) offering digital signature verification to ensure the security and integrity of electronic transactions involving digital assets, specifically tailored for operations within digital vaults that prioritize Data Self-Governance; data security services providing data security solutions focused on the encrypted storage and safe handling of digital assets and sensitive information, specifically designed for secure operations within a digital vault environment that adheres to Data Self-Governance standards; digital archiving services offering digital archiving solutions with advanced security features to protect and preserve digital assets over long periods, tailored for integration within digital vault environments that implement Data Self-Governance protocols; identity verification services (computer security) providing identity verification services using advanced biometric and cryptographic technologies to ensure secure access to digital systems, specifically developed for use within digital vaults focused on Data Self-Governance; electronic cryptology services in the nature of digital certificate and digital signature verification services offering cryptology solutions focused on the verification of digital certificates and signatures to secure digital transactions, specifically tailored for digital vault environments enforcing Data Self-Governance; quality control and authentication services providing quality control and authentication services to ensure the security and authenticity of digital transactions and asset management, tailored for secure operations within digital vaults that follow Data Self-Governance practices; digital music encryption services offering encryption services specifically for digital music to ensure secure storage and transmission, designed to integrate seamlessly into digital vault environments that prioritize Data Self-Governance; authentication services for computer security providing authentication services designed to secure access to computer systems and protect digital assets, specifically developed for deployment within digital vaults that adhere to Data Self-Governance frameworks; platform as a Service (PaaS) that includes tools and services for secure digital asset management and protection, specifically tailored for use within digital vault environments that implement Data Self-Governance protocols; user authentication services using biometric hardware and software technology for point-of-sale transactions providing user authentication services at point-of-sale using biometric technology to secure transactions involving digital assets, specifically tailored for integration within digital vault environments governed by Data Self-Governance; IT services for data protection specifically focused on the protection of digital assets and sensitive data through advanced security measures, tailored for secure operations within digital vault environments that enforce Data Self-Governance; information technology services for data protection providing IT services that emphasize the secure management and protection of digital assets and sensitive information, specifically designed for use within digital vault environments committed to Data Self-Governance; all the foregoing limited to digital security services on the secure management, storage, and encryption of digital assets and sensitive data, and which facilitate the encryption, backup, recovery, and secure storage of critical and sensitive digital information, and not in respect of general consumer software, entertainment, or unrelated technological fields.
downloadable computer security software for encrypted security and cry...
2440140 · 6 Apr 2024
035
Class 035
Advertising, Business & Retail Services
real estate advertising; real estate marketing; real estate sales management services; real estate marketing analysis; business management of real estate companies; real estate marketing services; advertising of real estate; business administration and management services relating to real estate; real estate auctioneering; conducting of auction sales; online auctioneering; online auction services via the internet; providing online auction services; on-line auction services; online auctioneering via the internet; provision of on-line auction services; auctioneering services; online auctioneering services; organisation of internet auctions; organizing and conducting charity auctions for charitable fundraising purposes; auction and reverse auction services; provision of on-line auctioneering; real estate auctions; auctioning of vehicles; auction services; arranging of auction sales; auctioneering; auctioneering of property; online auction services; conducting of auctions; arranging and conducting of auctions; arranging and conducting auctions; arranging and conducting of auction sales; auctioning of property; arranging of auctions; online auction bidding for others; negotiation of contracts relating to the purchase and sale of goods
real estate advertising; real estate marketing; real estate sales mana...
race result AG
2418250 · 23 Nov 2023
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Radio-frequency identification (RFID) readers; radio-frequency identification (RFID) tags; radio frequency identification devices [transponders]; all afore-mentioned goods in the field of timekeeping for sports events, except motor-sports events; none of the afore-mentioned goods in the field of jewelry and horological instruments.
014
Class 014
Jewelry Products
Horological instruments for sports, not including wristwatches and clocks, not in the field of motorsports.
...
Class 040
Treatment & Processing of Materials Services
Printing, except printing services, in relation to the following fields: motorsports.
Class 041
Education and Entertainment Services
Timing of sports events, other than timing of motorsports events.
Class 042
Computer & Software Services & Scientific Services
Software as a service [SaaS], other than in the field of motorsports.
Radio-frequency identification (RFID) readers; radio-frequency identif...
SharkNinja Operating LLC
2405920 · 10 Oct 2023
021
Class 021
Houseware and Glass Products
Portable coolers, non-electric.
Portable coolers, non-electric.
LAWADVISOR LTD
2447360 · 4 Oct 2023
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Computer software for project management; computer software for team management; computer software for information management; computer software for document management; computer software for project management, team management, information management and document management; computer software for project management, team management, information management and document management for legal projects; application software for project management; application software for team management; application software for information management; application software for document management; application software for project management, team management, information management and document management; application software for project management, team management, information management and document management for legal projects; downloadable software for project management; downloadable software for team management; downloadable software for information management; downloadable software for document management; downloadable software for project management, team management, information management and document management; downloadable software for project management, team management, information management and document management for legal projects; database management software; collaboration management software platforms; workflow management system software; business process management software; collaboration software; software for the management of external advisors; software for the management of groups of external advisors; software for the management of groups of advisors.
038
Class 038
Communications Services
Telecommunications services; electronic transmission of documents; digital communications services; electronic transmission of messages, data and documents; electronic transmission of data and documents via computer terminals and electronic devices; transmission of digital files; communication services, namely, electronic transmission of data and documents among users of computers; provision of access to Internet platforms for the purpose of exchanging digital files; electronic data communications; digital transmission services for audio and video data; provision of communications facilities for the interchange of digital data; providing access to electronic communications networks and electronic databases; transmission of computerised documents; transmission of digital information; provision of access to data or documents stored electronically in central files for remote consultation; information, advisory and consultancy services in relation to the aforesaid.
...
Class 042
Computer & Software Services & Scientific Services
Design and development of computer software; design and development of computer software for use in law firms and/or legal departments of companies or other organisations; design and development of computer software for use in management of legal teams; design and development of computer software for use in management of external advisors; design and development of computer software for use in management of teams; design and development of computer software for use in management of groups of external legal advisors and/or groups of external law firms; design and development of computer software for use in management of external legal advisors and/or external law firms; design and development of computer software for database management; design and development of computer software for use in management of legal projects; design and development of computer software for use in management of legal documents and/or information projects; design and development of computer software for use in project management and/or document management and/or information management; providing temporary use of on-line non-downloadable software for use in project management and/or document management and/or information management; providing temporary use of on-line non-downloadable software for use in management of legal projects; providing temporary use of on-line non-downloadable software for use in management of legal documents and/or information projects; providing temporary use of on-line non-downloadable cloud computing software for use in project management and/or document management and/or information management; providing temporary use of on-line non-downloadable cloud computing software for use in management of legal projects; providing temporary use of on-line non-downloadable cloud computing software for use in management of legal documents and/or information projects; technology related project management services; providing temporary use of on-line non-downloadable software that delivers reports, allows users to review reports, create charts, and collaborate with others; updating and maintaining cloud-based computer software through on-line updates, enhancements and patches; application service provider services; application service provider services, namely, hosting, managing, developing, analysing, and maintaining applications, software and web sites of others relating to management of legal projects; application service provider [ASP], namely, hosting computer software applications of others in the field of knowledge management for creating searchable databases of information and data; leasing of software for use in the management of legal projects; leasing of software for use in project management and/or document management and/or information management; providing temporary use of a non-downloadable web application for sharing web-based documents; providing temporary use of a non-downloadable web application for collaborating on shared documents; leasing of software for database management; information, advisory and consultancy services in relation to the aforesaid.
Computer software for project management; computer software for team m...
CheckIP Pty Ltd
2389044 · 15 Sept 2023
036
Class 036
Insurance & Financial Services
The provision of payment and financial services relating to tenders, including processing and transmission of invoices and progress payments; related payment services; providing guaranteed payment delivery, and the clearing and reconciliation of financial transactions via electronic communication networks; escrow services; payment security services being secure payment services in the form of the conducting and facilitating of financial transactions for third parties
The provision of payment and financial services relating to tenders, i...
L'OREAL
2427927 · 14 Sept 2023
003
Class 003
Cosmetics and Cleaning Products
Hair preparations and treatments.
021
Class 021
Houseware and Glass Products
Cosmetic utensils.
Hair preparations and treatments.,Cosmetic utensils.
H2O VAULT PTY LTD
2387802 · 12 Sept 2023
011
Class 011
Environmental Control Instrument Products lighting heating cooling cooking
Heat pumps; Heating installations; Heat pumps for energy processing
Heat pumps; Heating installations; Heat pumps for energy processing
Owners
Douglas benson spong (12)
Vault holdings pty ltd (8)
Kabushiki kaisha yakult honsha (7)
Aristocrat technologies australia pty ltd (6)
Rainsmart solutions pty ltd (6)
Bluevault pty ltd (5)
Glaxo group limited (5)
Lion nathan limited (5)
Ozisurf-safe international pty ltd (5)
Catapult group international ltd (4)
Instant consult pty ltd (4)
Maryan trademark gmbh (4)
Renault s.A.S. (4)
Stemcell technologies canada inc. (4)
Aidian oy (3)
Church & dwight (australia) pty ltd (3)
Data vault services pty ltd (3)
Electronique serge dassault (3)
Etablissements d. porthault s.A. (3)
Fagerhults belysning ab (3)
Lucasfilm entertainment company ltd. llc a california limited liability company (3)
Master lock company llc a delaware limited liability company (3)
Merck kgaa (3)
Microsoft corporation a washington corporation (3)
National storage (operations) pty ltd (3)
Progeni systems ltd. (3)
Spel environmental pty ltd (3)
Secure systems limited (3)
Secured worldwide, llc (3)
Signum international ag (3)
Smith & cult, llc (3)
Sony kabushiki kaisha (3)
Sportsmaster programs (3)
Yakult honsha k.K. (3)
A2z consult pty ltd (2)
Afks holdings pty ltd (2)
Ahrens group pty ltd (2)
Aristocrat technologies, inc. (2)
Aus merchant holdings pty ltd (2)
Advanced detailing and design applications holdings pty limited (2)
Ajax safe co. (2)
Aland holdings pty ltd (2)
Aston consult pty ltd (2)
Astral property pty limited (2)
Bev.Con aps (2)
Blue sultans pty ltd (2)
Bayer corporation an indiana corporation (2)
Biometric security limited (2)
Boehringer mannheim gmbh. (2)
Broderna rickardsson a.B. (2)
Brooks sports, inc. (2)
Bunnings group limited (2)
Corporate culture australia pty ltd (2)
Carl zeiss vision gmbh (2)
Convault, inc. (2)
Critical role llc (2)
Digiconsult pty ltd (2)
Derrick corporation a delaware corporation (2)
Drainvault australia pty ltd (2)
E3 consulting australia pty ltd as trustee for the e3 unit trust (2)
Ebulen consult pty ltd (2)
Emc corporation (2)
Energy vault, inc. (2)
Eracom pty ltd (2)
Galmarley limited (2)
Graphic prints inc. pty ltd (2)
Greenwood sales pty ltd (2)
Gunnebo australia pty ltd (2)
H2o vault pty ltd (2)
Holcim (australia) pty limited (2)
Idexx laboratories, inc. a delaware corporation (2)
Igt (a nevada corporation) (2)
Infor ip holdings, llc (2)
Jdihc limited (2)
K. bon pty ltd (2)
Kabushiki kaisha yakult honsha (also trading as yakult honsha co., ltd.) a japanese joint stock company (2)
Light & wonder, inc (2)
Memories group limited (2)
Microsoft corporation (2)
Mozzarella australia pty ltd (2)
Masque fashion accessories pty ltd (2)
Melton city council (2)
Mistral windsurfing ag (2)
Monster energy company (2)
Netapp, inc. (2)
Norton llc a minnesota limited liability company (2)
Powerplan engineers pty ltd (2)
Result clothing limited (2)
Regie nationale des usines renault (2)
Reserve vault holdings pty ltd (2)
Sttm holdings pty ltd (2)
Smith kline & french laboratories (australia) ltd (2)
Spare room holding company pty limited (2)
Sports concussion australasia pty ltd (2)
Storage technology of australia pty ltd (2)
Super brands company pte. ltd. (2)
Techvault pty ltd (2)
Toolstream limited (2)
Tuki tuki farms limited (2)
Ultracult media group pty ltd (2)
Unilever plc (2)
Vault systems pty. ltd. (2)
Van nelle tabak nederland bv (2)
Vault mortgage corporation pty ltd (2)
Voixla trading gmbh (2)
Woolworths group limited (2)
Legal.Consult pty ltd (2)
"Xcult" ltd (1)
1000 feet deep pty ltd (1)
A&e television networks, llc united states (1)
A. royale & co. aust pty ltd (1)
Aai limited (1)
Aakonsult pty ltd (1)
Ac and sp curlewis pty ltd (1)
Adflex marketing pty ltd (1)
Adm protexin limited (1)
Advancy groupe sas france (1)
Aeci mining limited (1)
Ael mining services limited inc.Orporated in south africa (1)
Aldi foods pty ltd. (1)
All purpose pumps holdings pty ltd (1)
Amgrow pty ltd (1)
And then pty ltd (1)
Axichem pty ltd (1)
Abacus black pty ltd (1)
Accolade wines fwp pty ltd (1)
Accountants first choice business services pty ltd (1)
Achieve life sciences, inc. (1)
Advance metal products (aust) pty ltd (1)
Advanced asset solutions pty ltd (1)
Aerial assault inc. (1)
Albury wodonga lingerie pty ltd (1)
Alienvault, inc. (1)
Alienvault, inc. a delaware corporation (1)
Allegiance marketing (gourmet plus) pte. ltd. (1)
Altigi gmbh (1)
Amazon technologies, inc. (1)
Amcom telecommunications limited (1)
Amgen inc. (1)
Amgrow pty ltd (1)
Ancami, inc. (1)
Andi's liquor bargains pty ltd (1)
Andreas stihl ag & co. kg (1)
Anni co pty ltd (1)
Apple inc. (1)
Aquavault llc (1)
Armor defense inc. inc.Orporated in the state of delaware (1)
Arysta lifescience inc., (1)
Astral property pty. limited (1)
Attache software australia pty limited (1)
Austcom international pty ltd (1)
Australian academy of sales pty ltd (1)
Australian postal corporation (1)
Australian video systems (1)
Australian water systems pty ltd (1)
Automed kiosk pty ltd (1)
Backupit pty. ltd. (1)
Baller nation holdings pty limited (1)
Basf agricultural specialties pty ltd (1)
Basf corporation (1)
Ble services pty ltd as the trustee for ble services trust (1)
Brewstertainment pty ltd (1)
Bare recruit and consult pty ltd (1)
Bausch & lomb incorporated (1)
Bayer ag (1)
Becker-underwood, inc. (1)
Bentley systems, incorporated (1)
Bessie blu, llc (1)
Blueleaf consulting pty ltd as trustee for blueleaf unit trust (1)
Boehringer ingelheim animal health usa inc. (1)
Bongrain s.A. (1)
Booyah inc. (1)
Borne cult pty ltd (1)
Bourgault industries limited (1)
Bradley james fafara and anahstasia fafara (1)
Brewcult brewing company pty limited (1)
Broadcast electronics, inc. a rhode island corporation (1)
Bullion express limited (1)
Bushnell inc. (1)
Buy default pty ltd (1)
C.C.A. australia pty ltd (1)
Casey block services pty ltd (1)
Cemex australia pty limited (1)
Checkip pty ltd (1)
Chem2i n.V. (1)
Chu services pty ltd (1)
Command hub pty ltd (1)
Cult organic products pty ltd (1)
Carbine chemicals pty ltd (1)
Carbine construction services pty ltd (1)
Carbonite gmbh (1)
Cardiac pacemakers, inc. (1)
Cardsconsult pty ltd (1)
Catapult craft ltd. (1)
Catapult group international pty ltd (1)
Cetana foundation (1)
Chase security equipment pty ltd (1)
Checkip pty ltd (1)
Checkip pty ltd (1)
Chubb australia limited (1)
Chubb safe and vault pty ltd (1)
Church & dwight co., inc. (1)
Clarke associates pty ltd (1)
Climate vault, inc. (1)
Cochlear limited (1)
Coffeecult srl unipersonale (1)
Cognac ferrand (1)
Coles group limited (1)
Combined communications network pty ltd (1)
Commvault systems, inc. delaware corporation (1)
Commvault systems, inc. a delaware corporation (1)
Commsecure pty limited (1)
Compasscorp pty ltd (1)
Consolidated australian holdings pty ltd (1)
Contextual communications pty ltd (1)
Coops pty ltd (1)
Copytech(uk) limited t/a printondemand-worldwide (1)
Coveris flexibles (gainsborough) uk limited (1)
Cryptovault pty ltd (1)
Customhouse safe deposits limited (1)
D. porthault (1)
Da designa accessories pty limited (1)
Destiny design coaching and consulting pty ltd (1)
Diageo brands b.V. (1)
Dq international pty ltd (1)
Dyno nobel inc. (1)
Datavaultalliance holdings, llc (1)
Dault products llc (1)
David james robert bunyan (1)
Decisionvault llc (1)
Dell inc. (1)
Deluxe products pty ltd (1)
Direct health pty ltd (1)
Docuvault delaware valley, llc (1)
Duplicity consulting pty ltd as trustee for the burrows ip trust (1)
Dynamo house pty ltd (1)
Dyno nobel asia pacific pty limited (1)
Elevare energy pty ltd (1)
Eqonex limited (1)
Econsult management consultants (1)
Elanco us inc. (1)
Elemetal vault, llc (1)
Emitline pty ltd (1)
Energyconsult pty ltd (1)
Entegra trading pty ltd (1)
Equus (wa) pty ltd (1)
Eugenio s. ynion, jr. (1)
Executive leasing australia pty limited (1)
F 2 f - s.P.A. (1)
Fernando de salas nestares (1)
Finhaus labs pty. ltd. (1)
Fix-a-tap australia pty limited (1)
Fmp group (australia) pty limited (1)
Ftr, ltd. (1)
Fagerhults belysning aktiebolag (1)
Categories
Class 9 (219)
Class 42 (178)
Class 35 (142)
Class 41 (95)
Class 25 (88)
Class 36 (60)
Class 28 (44)
Class 38 (44)
Class 5 (40)
Class 16 (35)
Class 45 (35)
Class 3 (34)
Class 6 (32)
Class 1 (31)
Class 44 (31)
Class 39 (27)
Class 37 (23)
Class 11 (22)
Class 18 (22)
Class 19 (22)
Class 33 (22)
Class 20 (18)
Class 12 (17)
Class 14 (15)
Class 32 (15)
Class 30 (13)
Class 7 (12)
Class 29 (12)
Class 40 (10)
Class 24 (9)
Class 8 (7)
Class 21 (7)
Class 10 (6)
Class 34 (6)
Class 4 (4)
Class 22 (4)
Class 43 (3)
Class 31 (2)
Class 2 (1)
Class 13 (1)
Class 15 (1)
Class 17 (1)
Class 26 (1)
Class 27 (1)
Correspondents
Refer to wipo address for correspondence (80)
Spruson & ferguson (56)
Davies collison cave pty ltd (48)
Griffith hack (47)
Herbert smith freehills (27)
King & wood mallesons (17)
Pizzeys patent and trade mark attorneys pty ltd (15)
Allens patent & trade mark attorneys (13)
Ip wealth pty ltd (11)
Phillips ormonde fitzpatrick (11)
Ip solved (anz) pty. ltd. (10)
Madderns pty ltd (10)
Aristocrat technologies australia pty ltd (8)
Fb rice pty ltd (6)
Legalvision ilp pty. ltd. (6)
Ashurst australia (5)
Baxter patent attorneys pty ltd (5)
Bluevault pty ltd (5)
Collison & co (5)
Halfords ip (5)
K&l gates (5)
Norton rose fulbright australia (5)
Wrays pty ltd (5)
Adams pluck (4)
Banki haddock fiora (4)
Clayton utz (4)
Go trademarks (4)
Gilbert + tobin lawyers (4)
Hwl ebsworth lawyers (4)
Minter ellison (4)
Ahearn fox (3)
Bird & bird (3)
Brett brett oaten (3)
Corrs chambers westgarth (3)
Dentons australia limited (3)
Electronique serge dassault (3)
Ip monitor pty ltd (3)
Legal.Consult pty ltd (3)
Maxwells patent & trade mark attorneys pty ltd (3)
National storage (operations) pty ltd (3)
Seneworth legal partners (3)
Wrays (3)
A2z consult pty ltd (2)
Afks holdings pty ltd (2)
Aj park (2)