K Trademark
Serial Number: 77099321 • Registration: 3816052
Trademark Classes
Owner Contact Info
Trademark Details
Filing Date
February 5, 2007
Registration Date
July 13, 2010
Published for Opposition
April 27, 2010
Cancellation Date
February 17, 2017
Goods & Services
Computer software for obtaining digital signatures, applying digital signatures, certifying email, signing email, asserting a digital identity, retrieving digital identities, managing digital identities and signatures, retrieving public keys, generating requests for authentication, encryption, decryption and proof-of-delivery; computer software for processing email, email attachments and files, verifying digital signatures and digital identities; computer software for authenticating email, email senders, parties, email attachments, files, digital signatures and digital identities; computer software for encrypting and decrypting email, email attachments and files, manipulating encrypted data, triggering delivery of proof-of-delivery receipts, storing digital identities, processing results, verification results, public keys, symmetric keys and passwords, filtering email, email attachments and files, scanning data for spam and viruses, administrating digital signatures, digital identities, user information, public keys, symmetric keys and passwords, communicating with remote servers or hosts to carry out the foregoing; computer software for managing the integration and use of digital identities, certification, authentication, email signatures, encryption, decryption and proof-of-delivery in computer networks; computer software for controlling user access to signing, authentication, verification, validation, encryption, decryption, proof-of-delivery, filtering, spam-scanning and virus-scanning services, communicating with remote servers or hosts to carry out the foregoing; computer hardware for implementing the foregoing; instruction manuals in connection therewith sold as a unit with the identified computer hardware and software
Computer services, namely, providing software interfaces available over various types of networks for creating digital identities, managing digital identities, obtaining digital identities, obtaining digital signatures, filtering, spam-scanning, virus-scanning, asserting digital identities, rating users with existing digital identities, generating public and private keys, signing public keys, storing public keys, obtaining public keys, validating digital identities, encryption, decryption, and requesting and generating proof-of-delivery receipts