Serial Number
86959609
Owner
FORTRA, LLCAttorney
John PickerillFirst Use Date
Mar 28, 2017
Filing Date
Mar 31, 2016
CORE SECURITY Trademark
Serial Number: 86959609 • Registration: 5237929
Trademark Classes
Owner Contact Info
1000 HOLCOMB WOODS PARKWAY, SUITE 401
ROSEWELL, GA 30076
Entity Type: 03
Legal Representation
Correspondence Address
John Pickerill FREDRIKSON & BYRON, P.A.
60 SOUTH SIXTH STREET, SUITE 1500
Minneapolis, MN 55402-4400
UNITED STATES
Trademark Details
Filing Date
March 31, 2016
Registration Date
July 4, 2017
First Use Anywhere
March 28, 2017
First Use in Commerce
March 28, 2017
Published for Opposition
August 23, 2016
Goods & Services
Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external connections; computer software for implementing security methodology involving encryption of payment card numbers over a global computer network; Computer software for use to compile, manage, encrypt and store personal information; Computer software for use to access, collect and modify network user identification; Computer software for workflow, helpdesk and network security management; Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; Computer software for registering and authenticating digital certificates; Computer software for accessing, creating and modifying network user identification information; computer software for workflow management, help desk management, and network security; Computer software which provides analysis of data being accessed within a network; computer software which enables users of other computer products to access and use customer help and customer support functions
Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products; Software as a service (SAAS) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information; providing temporary use of online computer software for use to access, collect and modify network user identification; providing temporary use of online computer software for workflow, helpdesk and network security management; providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks; and to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks; providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications; providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks; providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization; providing temporary use of online computer software for registering and authenticating digital certificates; providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security; providing temporary use of online computer software which provides analysis of data being accessed within a network