The trademark application keyscaler was filed by Device Authority Limited, a corporation established under the laws of the United Kingdom of Great Britain and Northern Ireland (the "Applicant"). The application was published for oppositions on February 21, 2021, and it was registered by office on May 31, 2021 without any oppositions.
The application was filed in English (German was selected as the second language).
Appointment and Replacement of representative of the trademark registration was recorded on January 20, 2021. Appointment and Replacement of representative of the trademark registration was recorded on January 3, 2023. Appointment and Replacement of representative of the trademark registration was recorded on January 26, 2023. Appointment and Replacement of representative of the trademark registration was recorded on October 1, 2023.
Goods And Services
The mark was filed in class 9 with following description of goods:
Magnetic data carriers, recording discs in relation to cyber security and privacy
Compact discs, DVD's and other digital recording media in relation to cyber security and privacy
Computer software in relation to cyber security and privacy
Software and applications for mobile devices in relation to cyber security and privacy
Pre-recorded software in relation to cyber security and privacy
Computer interface software in relation to cyber security and privacy
Computer software platforms in relation to cyber security and privacy
Privacy protection software
Computer cards for connecting portable computer devices to computer networks [local area network]
Application software for social networking services via internet in relation to cyber security and privacy
Security software
Security tokens [encryption devices]
Security warning apparatus
Software for ensuring the security of electronic mail
Downloadable applications for multimedia devices in relation to cyber security and privacy
Downloadable electronic publications in relation to cyber security and privacy
Downloadable podcasts in relation to cyber security and privacy
Speakers
Computer hardware
Computer hardware for telecommunications
Electrical and electronic telecommunications, radio telephones, mobile and fixed telephones
Telephonic and communications apparatus and instruments
Data communication apparatus and instruments in relation to cyber security and privacy
Apparatus and instruments for the processing, transmission, storage, logging, reception and retrieval of data being in the form of encoded data, text, audio, graphic images or video or a combination of these formats
Computer software, including computer software supplied from a computer database, the internet or other electronic network in relation to cyber security and privacy
Personal digital assistants in relation to cyber security and privacy
Apparatus for downloading audio, video and data from the internet in relation to cyber security and privacy
Electrical and electronic accessories and peripheral equipment designed and adapted for use with telecommunications and communications apparatus and instruments, computers and audio-visual apparatus in relation to cyber security and privacy
Circuit boards
Communications computers
Computer software development tools in relation to cyber security and privacy
Computer software for encryption in relation to cyber security and privacy
Computer software for the creation of firewalls
Wireless digital electronic apparatus to secure and protect data on all forms of wireless equipment
VPN (virtual private network) hardware
VPN (virtual private network) operating software
Computer software and computer application software related to home and office cyber security systems
Computer hardware, namely, firewalls
Computer hardware and software for the monitoring and analysis of network traffic in relation to cyber security and privacy, and detection and prevention of cyber threats
Downloadable application software for monitoring and controlling home network security and privacy
Downloadable cloud-based computing software for the monitoring and analysis of network traffic and data in relation to cyber security and privacy, and detection and prevention of cyber threats
Computer anti-virus software
Parts and fittings for all the aforesaid goods.
The mark was filed in class 35 with following description of goods:
Business management in the field of cyber security and privacy
Business administration in the field of cyber security and privacy
Office functions in the field of cyber security and privacy
Data processing
Data search in computer files for others in the field of cyber security and privacy
Computerised data verification
On-line data processing services in the field of cyber security and privacy
Business data analysis services in the field of cyber security and privacy
Business information and research services in the field of cyber security and privacy
Business information services provided on-line from a computer database or the internet in the field of cyber security and privacy
Business information services relating to cyber security matters
Preparation of business surveys in the field of cyber security and privacy
Provision of information relating to data processing in the field of cyber security and privacy
Presentation of companies and their goods and services on the internet in the field of cyber security and privacy
Management of customer loyalty, incentive or promotional schemes in the field of cyber security and privacy
Search engine optimisation for sales promotion in the field of cyber security and privacy
Promotion of business opportunities in the field of cyber security and privacy
Advertising, marketing and promotion services in the field of home and office cyber security systems
Marketing the goods and services of others by means of push notification technology in the field of cyber security and privacy
Business administration in the field of cyber security and privacy
Analysing and compiling business data in the field of cyber security and privacy
Systemisation of data in computer databases in the field of cyber security and privacy
Business information in the field of cyber security and privacy but not in the field of economics
Business administration of consumer loyalty programs in the field of cyber security and privacy
Business research in the field of cyber security and privacy but not in the field of economics
Compilation of information into computer databases in the field of cyber security and privacy but not in the field of economics
Compilation of statistics in the field of cyber security and privacy
Computerised file management in the field of cyber security and privacy
Demonstration of goods in the field of cyber security and privacy
On-line advertising on a computer network in the field of cyber security and privacy
On-line customer-based social media brand marketing services in the field of cyber security and privacy
On-line retail store services in relation to computer software in the field of cyber security and privacy
On-line retail store services in relation to computer hardware in the field of cyber security and privacy
On-line retail store services in relation to information technology equipment in the field of cyber security and privacy
Updating and maintenance of data in computer databases in the field of cyber security and privacy
Web site traffic optimisation in the field of cyber security and privacy
Information, advisory and consultancy services relating to all the aforesaid services in the field of cyber security and privacy.
The mark was filed in class 42 with following description of goods:
Scientific and technological services and research and design relating thereto in relation to cyber security and privacy
Industrial analysis and research services in relation to cyber security and privacy
Design and development of computer hardware and software in relation to cyber security and privacy
Design and development of new technology for others in relation to cyber security and privacy
Research in the field of data processing technology in relation to cyber security and privacy
Application service provider
Computer virus protection services
Computer programming services for electronic data security
Computer security services for protection against illegal network access
Computer security services in the nature of administering digital certificates
Computer security system monitoring services
Computer security threat analysis for protecting data
Consultancy in the field of security software
Data security services
Data security services [firewalls]
Design and development of internet security programs
Programming of internet security programs
Provision of security services for computer networks, computer access and computerised transactions
Rental of internet security programs
Research relating to cyber security
Updating of computer software relating to computer security and prevention of computer risks
Design and development of wireless computer networks in relation to cyber security and privacy
Providing virtual computer systems and virtual computer environments through cloud computing
Computer security consultancy
Computer system analysis
Electronic data storage
Off-site data backup
Research and development of new products for others in relation to cyber security and privacy
Server hosting
Design and development of electronic data security systems
Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials
Technical support, namely, monitoring technological functions of computer network systems
Providing technology information updates for home cyber security systems via the global computer network
Research in the field of intelligence and security technology
Development of software for secure network operations
Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities
Maintenance of computer software relating to computer security and prevention of computer risks
Computer security service, for the monitoring and analysis of network traffic, and detection and prevention of cyber threats
Technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts
Platform as a service (PAAS) featuring software platforms for the monitoring and analysis of network traffic, and detection and prevention of cyber threats
Software as a service (SAAS) services featuring software for the monitoring and analysis of network traffic, and detection and prevention of cyber threats
Consulting services in the field of software as a service (SAAS)
Application service provider (ASP) featuring software for monitoring and controlling home network security and privacy
Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorised data and programs on computers and electronic devices
Monitoring of computer systems for security purposes
Consulting services in the field of maintaining the security and integrity of databases
Advisory services in the field of home network security systems
Computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of point of sale activity indicating theft, fraud, or other criminal activity
Information, advisory and consultancy services relating to all the aforesaid services.
The mark was filed in class 45 with following description of goods:
Legal services
Cyber security services for the physical protection of tangible property and individuals
Licensing of technology
On-line social networking services
Security consultancy
Internet-based social networking services
Licensing of computer software (legal services)
Social networking services provided via online computer databases and online searchable databases
Online social networking services accessible by means of downloadable mobile applications
Information, advisory and consultancy services relating to all the aforesaid services.