SECURITY ENTROPY Trademark
Serial Number: 85514450
Trademark Classes
Class 9 - Computers & Electronics
Scientific, nautical, surveying, photographic, cinematographic, optical apparatus and instruments
Class 42 - Computer & Scientific
Scientific and technological services; industrial analysis and research services
Class 45 - Legal & Security Services
Legal services; security services for the protection of property and individuals
Owner Contact Info
Legal Representation
Trademark Details
Filing Date
January 11, 2012
Registration Date
Not Registered
Published for Opposition
December 25, 2012
Goods & Services
Computer software platforms for the implementation and managed operation of controlled access systems, RFID systems, networked systems, and virtual systems; computer software, hardware and firmware for the development and implementation of controlled access systems, RFID systems, networked systems, and virtual systems; Computer software for issuing and managing encrypted and digitally signed and authenticated identity representation data for use in the field of physical and logical access control, stored value transactions, transactions involving secure identity, and transactions involving biometric data. Computer software for generating and managing secure identity representation data
Digital signature authentication services for identity representation data for others; Providing for others encrypted and digitally signed and authenticated identity representation data for use in electronic physical access control and logical access control stored value transactions, transactions involving secure identity, and transactions involving biometric data; Data lifecycle security management services for others, namely, validation of digital certificates and administration of digital keys and digital certificates for physical and logical access control systems
Development of controlled access systems, RFID systems, networked systems and virtual systems for others, all systems consisting of credentials and credential readers, used in the fields of security and access control; implementation of controlled access systems, RFID systems, networked systems, and virtual systems, namely, testing, analysis and evaluation of the controlled access systems, RFID systems, networked systems and virtual systems for the purpose of certifying the systems to meet government or industry operation or performance standards; Data encryption services for identity representation data for others