CERTICOM SECURE

Welcome to the Brand page for “CERTICOM SECURE”, which is offered here for The mark consists of the word certicom in lower case bold evofont style directly above the word secure in bold typeface. centered above the words are eight diamond shape figures positioned in three levels, with two diamonds in the first and third levels and four diamonds in the second level. the diamond shapes have rounded edges and are gradually shaded light to dark from the upper right to the lower left flat sides of each diamond shape.;(based on 44(e)) computer software and software development tools, software development tools, comprised of code based computer programs, computer software used for public key encryption, certification, access control and digital rights management, verification, privacy, confidentiality and integrity of voice and text, wired and wireless transmission of voice, web services and text of encrypted information in the field of communications and authentication of encrypted information in the field of communications; computer firmware, for use in encryption, authentication and wired and wireless transmission of voice, web services and text; computer hardware for use in the encryption, decryption, authentication and wired and wireless transmission of voice, web services and text of encrypted information in the field of communications and authentication of encrypted information in the field of communications, device to device communication, cryptography, digital signatures and public and private key generation, security functions, encryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity; integrated circuits; computer software storage media, pre-recorded cd-roms and computer diskettes featuring computer software and documentation for providing encryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity, computer networking, cryptography, digital signatures and private and public key generation, and security functions, encryption, certification, authentication, verification, data privacy confidentiality and data integrity; radio pagers; modems; cellular telephones; telecommunications equipment, radio transmitters, telephone transmitters, satellite transmitters, receivers, telephone receivers, audio receivers, video receivers and data receivers, electric switches, computer networks, local area networks hardware, wide area networks hardware, virtual private networks hardware, telephones, wireless computer networks, networks comprised of client and server devices, wireless devices in the nature of devices for wireless radio transmission, wireless network devices in the nature or wireless network extenders and their respective trust center devices, integrated circuits, wireless mesh network devices, computer network interface devices and their associated coordinator access points, and wireless local area network, wireless communication processors, satellite processors, cellular telephony base stations, cellular telephone apparatus, digital signal processors, two-way radio pagers, radio and satellite telephones, wireless handheld computers, magnetic coded and plastic smart cards, electronic circuit cards with an embedded integrated circuit and stored information and data in the field of silicon semiconductors and intellectual property cores; computer terminals for use with credit cards, debit cards and plastic smart cards with an embedded integrated circuit or stored information and data, magnetic coded card readers and readers of plastic smart cards with an embedded integrated circuit and stored information or data in the field of silicon semiconductors and intellectual property cores; plastic smart cards, electronic circuit cards with an embedded integrated circuit and stored information and data; magnetically encoded credit cards;(based on 44(e)) credit cards without magnetic coding; debit cards without magnetic encoding; printed materials relating to educational and training programs in information technology, educational and training books, guides, user manuals and marketing collateral, advertising pamphlets;color is not claimed as a feature of the mark.;(based on 44(e)) technology licensing of cryptographic methods and protocols; technology licensing of security hardware and software;secure;(based on use in commerce) (based on 44(e)) information technology services, cryptographic and information security consulting; providing on-line non-downloadable computer software for systems integration relating to information security for others; design of computer systems for others; security analysis services, computer security consultancy;.

Its status is currently believed to be active. Its class is unavailable. “CERTICOM SECURE” is believed to be currently owned by “Certicom Corp.”


Owner:
CERTICOM CORP.
Owner Details
Description:
The mark consists of the word CERTICOM in lower case bold evofont style directly above the word SECURE in bold typeface. Centered above the words are eight diamond shape figures positioned in three levels, with two diamonds in the first and third levels and four diamonds in the second level. The diamond shapes have rounded edges and are gradually shaded light to dark from the upper right to the lower left flat sides of each diamond shape.;(Based on 44(e)) Computer software and software development tools, software development tools, comprised of code based computer programs, computer software used for public key encryption, certification, access control and digital rights management, verification, privacy, confidentiality and integrity of voice and text, wired and wireless transmission of voice, web services and text of encrypted information in the field of communications and authentication of encrypted information in the field of communications; computer firmware, for use in encryption, authentication and wired and wireless transmission of voice, web services and text; computer hardware for use in the encryption, decryption, authentication and wired and wireless transmission of voice, web services and text of encrypted information in the field of communications and authentication of encrypted information in the field of communications, device to device communication, cryptography, digital signatures and public and private key generation, security functions, encryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity; integrated circuits; computer software storage media, pre-recorded CD-ROMS and computer diskettes featuring computer software and documentation for providing encryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity, computer networking, cryptography, digital signatures and private and public key generation, and security functions, encryption, certification, authentication, verification, data privacy confidentiality and data integrity; radio pagers; modems; cellular telephones; telecommunications equipment, radio transmitters, telephone transmitters, satellite transmitters, receivers, telephone receivers, audio receivers, video receivers and data receivers, electric switches, computer networks, local area networks hardware, wide area networks hardware, virtual private networks hardware, telephones, wireless computer networks, networks comprised of client and server devices, wireless devices in the nature of devices for wireless radio transmission, wireless network devices in the nature or wireless network extenders and their respective trust center devices, integrated circuits, wireless mesh network devices, computer network interface devices and their associated coordinator access points, and wireless local area network, wireless communication processors, satellite processors, cellular telephony base stations, cellular telephone apparatus, digital signal processors, two-way radio pagers, radio and satellite telephones, wireless handheld computers, magnetic coded and plastic smart cards, electronic circuit cards with an embedded integrated circuit and stored information and data in the field of silicon semiconductors and intellectual property cores; computer terminals for use with credit cards, debit cards and plastic smart cards with an embedded integrated circuit or stored information and data, magnetic coded card readers and readers of plastic smart cards with an embedded integrated circuit and stored information or data in the field of silicon semiconductors and intellectual property cores; plastic smart cards, electronic circuit cards with an embedded integrated circuit and stored information and data; magnetically encoded credit cards;(Based on 44(e)) Credit cards without magnetic coding; debit cards without magnetic encoding; printed materials relating to educational and training programs in information technology, educational and training books, guides, user manuals and marketing collateral, advertising pamphlets;Color is not claimed as a feature of the mark.;(Based on 44(e)) Technology licensing of cryptographic methods and protocols; technology licensing of security hardware and software;SECURE;(Based on Use in Commerce) (Based on 44(e)) Information technology services, cryptographic and information security consulting; providing on-line non-downloadable computer software for systems integration relating to information security for others; design of computer systems for others; security analysis services, computer security consultancy;
Categories: