undefined
EUTM file information

018252845

Keyscaler


June 10, 2020

Trademark Summary

The trademark application keyscaler was filed by Device Authority Limited, a corporation established under the laws of the United Kingdom of Great Britain and Northern Ireland (the "Applicant"). The application was published for oppositions on February 21, 2021, and it was registered by office on May 31, 2021 without any oppositions.

The application was filed in English (German was selected as the second language).

Appointment and Replacement of representative of the trademark registration was recorded on January 20, 2021. Appointment and Replacement of representative of the trademark registration was recorded on January 3, 2023. Appointment and Replacement of representative of the trademark registration was recorded on January 26, 2023. Appointment and Replacement of representative of the trademark registration was recorded on October 1, 2023.


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Magnetic data carriers, recording discs in relation to cyber security and privacy
    2. Compact discs, DVD's and other digital recording media in relation to cyber security and privacy
    3. Computer software in relation to cyber security and privacy
    4. Software and applications for mobile devices in relation to cyber security and privacy
    5. Pre-recorded software in relation to cyber security and privacy
    6. Computer interface software in relation to cyber security and privacy
    7. Computer software platforms in relation to cyber security and privacy
    8. Privacy protection software
    9. Computer cards for connecting portable computer devices to computer networks [local area network]
    10. Application software for social networking services via internet in relation to cyber security and privacy
    11. Security software
    12. Security tokens [encryption devices]
    13. Security warning apparatus
    14. Software for ensuring the security of electronic mail
    15. Downloadable applications for multimedia devices in relation to cyber security and privacy
    16. Downloadable electronic publications in relation to cyber security and privacy
    17. Downloadable podcasts in relation to cyber security and privacy
    18. Speakers
    19. Computer hardware
    20. Computer hardware for telecommunications
    21. Electrical and electronic telecommunications, radio telephones, mobile and fixed telephones
    22. Telephonic and communications apparatus and instruments
    23. Data communication apparatus and instruments in relation to cyber security and privacy
    24. Apparatus and instruments for the processing, transmission, storage, logging, reception and retrieval of data being in the form of encoded data, text, audio, graphic images or video or a combination of these formats
    25. Computer software, including computer software supplied from a computer database, the internet or other electronic network in relation to cyber security and privacy
    26. Personal digital assistants in relation to cyber security and privacy
    27. Apparatus for downloading audio, video and data from the internet in relation to cyber security and privacy
    28. Electrical and electronic accessories and peripheral equipment designed and adapted for use with telecommunications and communications apparatus and instruments, computers and audio-visual apparatus in relation to cyber security and privacy
    29. Circuit boards
    30. Communications computers
    31. Computer software development tools in relation to cyber security and privacy
    32. Computer software for encryption in relation to cyber security and privacy
    33. Computer software for the creation of firewalls
    34. Wireless digital electronic apparatus to secure and protect data on all forms of wireless equipment
    35. VPN (virtual private network) hardware
    36. VPN (virtual private network) operating software
    37. Computer software and computer application software related to home and office cyber security systems
    38. Computer hardware, namely, firewalls
    39. Computer hardware and software for the monitoring and analysis of network traffic in relation to cyber security and privacy, and detection and prevention of cyber threats
    40. Downloadable application software for monitoring and controlling home network security and privacy
    41. Downloadable cloud-based computing software for the monitoring and analysis of network traffic and data in relation to cyber security and privacy, and detection and prevention of cyber threats
    42. Computer anti-virus software
    43. Parts and fittings for all the aforesaid goods.
  • The mark was filed in class 35 with following description of goods:
    1. Business management in the field of cyber security and privacy
    2. Business administration in the field of cyber security and privacy
    3. Office functions in the field of cyber security and privacy
    4. Data processing
    5. Data search in computer files for others in the field of cyber security and privacy
    6. Computerised data verification
    7. On-line data processing services in the field of cyber security and privacy
    8. Business data analysis services in the field of cyber security and privacy
    9. Business information and research services in the field of cyber security and privacy
    10. Business information services provided on-line from a computer database or the internet in the field of cyber security and privacy
    11. Business information services relating to cyber security matters
    12. Preparation of business surveys in the field of cyber security and privacy
    13. Provision of information relating to data processing in the field of cyber security and privacy
    14. Presentation of companies and their goods and services on the internet in the field of cyber security and privacy
    15. Management of customer loyalty, incentive or promotional schemes in the field of cyber security and privacy
    16. Search engine optimisation for sales promotion in the field of cyber security and privacy
    17. Promotion of business opportunities in the field of cyber security and privacy
    18. Advertising, marketing and promotion services in the field of home and office cyber security systems
    19. Marketing the goods and services of others by means of push notification technology in the field of cyber security and privacy
    20. Business administration in the field of cyber security and privacy
    21. Analysing and compiling business data in the field of cyber security and privacy
    22. Systemisation of data in computer databases in the field of cyber security and privacy
    23. Business information in the field of cyber security and privacy but not in the field of economics
    24. Business administration of consumer loyalty programs in the field of cyber security and privacy
    25. Business research in the field of cyber security and privacy but not in the field of economics
    26. Compilation of information into computer databases in the field of cyber security and privacy but not in the field of economics
    27. Compilation of statistics in the field of cyber security and privacy
    28. Computerised file management in the field of cyber security and privacy
    29. Demonstration of goods in the field of cyber security and privacy
    30. On-line advertising on a computer network in the field of cyber security and privacy
    31. On-line customer-based social media brand marketing services in the field of cyber security and privacy
    32. On-line retail store services in relation to computer software in the field of cyber security and privacy
    33. On-line retail store services in relation to computer hardware in the field of cyber security and privacy
    34. On-line retail store services in relation to information technology equipment in the field of cyber security and privacy
    35. Updating and maintenance of data in computer databases in the field of cyber security and privacy
    36. Web site traffic optimisation in the field of cyber security and privacy
    37. Information, advisory and consultancy services relating to all the aforesaid services in the field of cyber security and privacy.
  • The mark was filed in class 42 with following description of goods:
    1. Scientific and technological services and research and design relating thereto in relation to cyber security and privacy
    2. Industrial analysis and research services in relation to cyber security and privacy
    3. Design and development of computer hardware and software in relation to cyber security and privacy
    4. Design and development of new technology for others in relation to cyber security and privacy
    5. Research in the field of data processing technology in relation to cyber security and privacy
    6. Application service provider
    7. Computer virus protection services
    8. Computer programming services for electronic data security
    9. Computer security services for protection against illegal network access
    10. Computer security services in the nature of administering digital certificates
    11. Computer security system monitoring services
    12. Computer security threat analysis for protecting data
    13. Consultancy in the field of security software
    14. Data security services
    15. Data security services [firewalls]
    16. Design and development of internet security programs
    17. Programming of internet security programs
    18. Provision of security services for computer networks, computer access and computerised transactions
    19. Rental of internet security programs
    20. Research relating to cyber security
    21. Updating of computer software relating to computer security and prevention of computer risks
    22. Design and development of wireless computer networks in relation to cyber security and privacy
    23. Cloud seeding
    24. Computer services, namely, cloud hosting provider services
    25. Providing virtual computer systems and virtual computer environments through cloud computing
    26. Computer security consultancy
    27. Computer system analysis
    28. Electronic data storage
    29. Off-site data backup
    30. Research and development of new products for others in relation to cyber security and privacy
    31. Server hosting
    32. Design and development of electronic data security systems
    33. Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials
    34. Technical support, namely, monitoring technological functions of computer network systems
    35. Providing technology information updates for home cyber security systems via the global computer network
    36. Research in the field of intelligence and security technology
    37. Development of software for secure network operations
    38. Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities
    39. Maintenance of computer software relating to computer security and prevention of computer risks
    40. Computer security service, for the monitoring and analysis of network traffic, and detection and prevention of cyber threats
    41. Technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts
    42. Platform as a service (PAAS) featuring software platforms for the monitoring and analysis of network traffic, and detection and prevention of cyber threats
    43. Software as a service (SAAS) services featuring software for the monitoring and analysis of network traffic, and detection and prevention of cyber threats
    44. Consulting services in the field of software as a service (SAAS)
    45. Application service provider (ASP) featuring software for monitoring and controlling home network security and privacy
    46. Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorised data and programs on computers and electronic devices
    47. Monitoring of computer systems for security purposes
    48. Consulting services in the field of maintaining the security and integrity of databases
    49. Advisory services in the field of home network security systems
    50. Computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of point of sale activity indicating theft, fraud, or other criminal activity
    51. Information, advisory and consultancy services relating to all the aforesaid services.
  • The mark was filed in class 45 with following description of goods:
    1. Legal services
    2. Cyber security services for the physical protection of tangible property and individuals
    3. Licensing of technology
    4. On-line social networking services
    5. Security consultancy
    6. Internet-based social networking services
    7. Licensing of computer software (legal services)
    8. Social networking services provided via online computer databases and online searchable databases
    9. Online social networking services accessible by means of downloadable mobile applications
    10. Information, advisory and consultancy services relating to all the aforesaid services.