About 115,180 Trademarks found for “*t”
Filters
Also try searching for:
t*
Mark | Details | Status | Class/Description | |
---|---|---|---|---|
EMCAT Emsland-Stärke Gesellschaft mit beschränkterHaftung 2342649 25 Apr 2024 | FORMALIZED on 7 Aug 2024 | Chemicals based on starch for the paper industry; chemicals for indust... Class 001 Class 001 Chemical Products Chemicals based on starch for the paper industry; chemicals for industrial use, namely auxiliary agents being sizing and glueing agents as well as binding agents for use in the manufacture of mineral fibreboard; starches for use in manufacturing and industry; potato and pea starch for industrial use; starch for use in the manufacture of paper; cationic starch for use in the production of paper. | ||
![]() | asendia BY LA POSTE & SWISS POST ASENDIA MANAGEMENT 2336502 25 Apr 2024 | FORMALIZED on 3 Jul 2024 | Location d'unités de stockage; location de conteneurs; location de con... Class 039 Class 039 Transportation & Storage Services Location d'unités de stockage; location de conteneurs; location de conteneurs d'expédition isothermes pour le transport de produits y compris de produits alimentaires et pharmaceutiques à température ambiante, réfrigérés et congelés; services de transport; transport de marchandises et de colis par voie aérienne, ferroviaire, fluviale, maritime et routière; services d'affrètement; services d'entreposage, de conditionnement, d'emballage, de collecte, de chargement, d'expédition, de transport, de déchargement, d'entreposage, et de livraison de produits, de colis, de fret et de marchandises, en ce compris les produits alimentaires et pharmaceutiques sous température dirigée ou contrôlée, ou à température ambiante; ramassage (collecte) de lettres, documents, colis et marchandises; distribution de courrier, de journaux, de colis, de marchandises; transport et mise en entrepôt de marchandises en tant que services logistiques; services de logistique en matière de ramassage, de transport, d'entreposage et de livraison; informations et conseils en matière de ramassage, de transport, d'entreposage et de livraison; expédition et livraison de marchandises commandées par correspondance; messagerie (courrier et marchandises); suivi de l'envoi par détermination électronique de la localisation de marchandises et de biens, en particulier de paquets, colis; services informatisés de suivi et de pistage de colis en cours d'acheminement [informations en matière de transport]; localisation et suivi de cargaison dans le cadre des transports; mise à disposition d'informations en matière de localisation d'articles en transit; affranchissement de produits, en particulier paquets et colis; services de coursiers; services de courtage de transport; services de courtage de fret; services de livraison de colis dans un réseau de commerçants; transport de colis; services d'expédition de marchandises; livraison de marchandises; fourniture d'informations en matière d'expédition et de livraison. | |
UnoLock CybVault TechSologic Incorporated 2340163 25 Apr 2024 | FORMALIZED on 24 Jul 2024 | Downloadable computer security software for encrypted security and cry... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Downloadable computer security software for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer application software for mobile telephones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable application software for smartphones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; smartphone software applications, downloadable for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer software applications for smartphones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable software applications for cell phones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer software applications for mobile telephones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable applications for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer utility programs for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; computer software applications, downloadable for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer software applications for cellular phones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer application software for cellular phones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable software applications for smartphones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable software applications for mobile telephones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable cloud-based software for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable smartphone apps [software] for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer application software for cellular telephones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; computer application software for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer software for tablets for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable apps for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer security software for encrypted security and cryptographic protection of digital assets and sensitive data, tailored for integration within a Data Self-Governance compliant digital vault environment; downloadable computer application software for mobile telephones for encrypted security and cryptographic protection of digital assets and sensitive data, designed to support Data Self-Governance principles; downloadable application software for smartphones for encrypted security and cryptographic protection of digital assets and sensitive data, ensuring adherence to Data Self-Governance as a Service protocols; smartphone software applications, downloadable for encrypted security and cryptographic protection of digital assets and sensitive data, suitable for use within Data Self-Governance secured environments; downloadable computer software applications for smartphones for encrypted security and cryptographic protection of digital assets and sensitive data, customized for Data Self-Governance compliance; downloadable software applications for cell phones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring compliance with Data Self-Governance standards; downloadable computer software applications for mobile telephones for encrypted security and cryptographic protection of digital assets and sensitive data, developed under Data Self-Governance guidelines; downloadable applications for encrypted security and cryptographic protection of digital assets and sensitive data, aligned with the principles of Data Self-Governance and Data Self-Governance as a Service; downloadable computer utility programs for encrypted security and cryptographic protection of digital assets and sensitive data, integrated within a Data Self-Governance framework; computer software applications, downloadable for encrypted security and cryptographic protection of digital assets and sensitive data, tailored for operation within digital vaults that adhere to Data Self-Governance protocols; downloadable computer software applications for cellular phones for encrypted security and cryptographic protection of digital assets and sensitive data, optimized for Data Self-Governance compliant secure environments; downloadable computer application software for cellular phones for encrypted security and cryptographic protection of digital assets and sensitive data, developed to facilitate Data Self-Governance and Data Self-Governance as a Service implementations; downloadable software applications for smartphones for encrypted security and cryptographic protection of digital assets and sensitive data, designed to enhance security measures under Data Self-Governance standards; downloadable software applications for mobile telephones for encrypted security and cryptographic protection of digital assets and sensitive data, ensuring compliance with Data Self-Governance and Data Self-Governance as a Service requirements; downloadable cloudbased software for encrypted security and cryptographic protection of digital assets and sensitive data, supporting Data Self-Governance principles through cloud technologies; downloadable smartphone apps [software] for encrypted security and cryptographic protection of digital assets and sensitive data, structured to conform to Data Self-Governance operational protocols; downloadable computer application software for cellular telephones for encrypted security and cryptographic protection of digital assets and sensitive data, built to align with Data Self-Governance and Data Self-Governance as a Service frameworks; computer application software for encrypted security and cryptographic protection of digital assets and sensitive data, integrating Data Self-Governance compliant mechanisms; downloadable computer software for tablets for encrypted security and cryptographic protection of digital assets and sensitive data, customized to support Data Self-Governance compliance in digital asset management; downloadable apps for encrypted security and cryptographic protection of digital assets and sensitive data, designed to function within environments regulated by Data Self-Governance principles; all the foregoing limited to digital security software on the secure management, storage, and encryption of digital assets and sensitive data, and which facilitates the encryption, backup, recovery, and secure storage of critical and sensitive digital information, and not in respect of general consumer software, entertainment, or unrelated technological fields. Class 042 Class 042 Computer & Software Services & Scientific Services Computer software programming for scanning or reading a QR code via mobile devices, tailored specifically for secure digital asset management environments, enhancing security protocols; computer programming of software for scanning or reading a bar code via mobile devices, tailored specifically for secure digital asset management environments, enhancing security protocols; computer programming of software for scanning or reading a QR code via mobile devices, tailored specifically for secure digital asset management environments, enhancing security protocols; programming of computer software for scanning or reading a QR code via mobile devices, tailored specifically for secure digital asset management environments, enhancing security protocols; computer programming of computer software for scanning or reading a bar code via mobile devices, tailored specifically for secure digital asset management environments, enhancing security protocols; computer programming of computer software for scanning or reading a QR code via mobile devices, tailored specifically for secure digital asset management environments, enhancing security protocols; computer software programming for scanning or reading a QR code via computer networks, tailored specifically for secure digital asset management environments, enhancing security protocols; user authentication services using single sign-on technology for online software applications, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; user authentication services using biometric hardware and software technology for access control, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; user authentication services using biometric hardware and software technology for managing human identification, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; user authentication services using biometric hardware and software technology for password management, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; providing user authentication services using biometric hardware and software technology for access control, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; providing user authentication services using biometric hardware and software technology for managing human identification, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; user authentication services using biometric hardware and software technology for managing identification of things, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; providing user authentication services using biometric hardware and software technology for password management, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; providing user authentication services using biometric hardware and software technology for managing identification of things, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; providing user authentication services using biometric hardware and software technology for e-commerce transactions, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; authentication services for computer security, offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; electronic signature verification services using technology to authenticate user identity, offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; electronic cryptology services in the nature of electronic data encryption services, providing advanced encryption services for digital images and data to secure sensitive information during transmission and storage; computer security services in the nature of providing authentication, issuance, validation, and revocation of digital keys, offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; computer security services for managing digital certificates, offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; digital signature verification services [electronic cryptology services], offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; identity verification services [computer security], offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; identity verification [computer security], offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; authentication, issuance and validation of digital keys, offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; providing authentication of personal identification information [computer security services], offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; encryption, decryption, and authentication of information, messages, and data, offering enhanced encryption technologies to secure digital communications and sensitive information against unauthorized access and data breaches; cryptographic engineering, providing specialized encryption services tailored to secure sensitive and critical information, including but not limited to digital assets and personal data; digital image encryption services, focused on providing high-security solutions for protecting digital images from unauthorized access and tampering; encryption of digital images, ensuring the security and integrity of digital visual content through advanced encryption standards; electronic storage of digital video files, providing secure digital storage solutions with advanced encryption and access controls to ensure data privacy and integrity; electronic storage of digital videos, focused on maintaining high security and data integrity in digital video storage through encrypted services; electronic storage of digital images, providing secure cloud-based solutions for storing sensitive visual content, ensuring data integrity and preventing unauthorized access; electronic storage of digital audio files, offering encrypted storage services that safeguard audio data against unauthorized access and corruption; electronic storage of digital photographs, ensuring the secure archiving of digital photo data with comprehensive encryption and secure access protocols; electronic storage of digital music, providing secure storage solutions that protect musical digital files from piracy and unauthorized distribution; electronic storage of images and videos, offering robust digital archiving services with advanced security measures to ensure the safety and confidentiality of multimedia files; electronic storage services for archiving electronic data, providing secure cloud-based solutions for businesses and individuals to safely store and manage their digital information with full encryption and access control; electronic storage of files and documents, focused on providing secure and encrypted storage solutions tailored for sensitive and critical business and personal documents; electronic storage services for archiving databases, offering secure database management solutions with strong encryption and real-time backup capabilities; electronic data storage and data backup services, providing comprehensive solutions for securely backing up and restoring digital assets and sensitive data in the event of data loss or system failure; electronic storage and retrieval services for archiving biological data, offering specialized storage solutions tailored for sensitive biological and medical data with enhanced security measures; electronic data log storage, providing secure and encrypted logging services to ensure the integrity and confidentiality of transaction logs and other sensitive data entries; computerised data storage services, offering advanced digital storage solutions that include encrypted data management and secure access systems to ensure data safety and privacy; online data storage and on-line data storage services, providing cloud-based solutions for secure and accessible online storage of digital assets, allowing for secure management and retrieval of data from anywhere; authentication services for computer security featuring advanced biometric capabilities, utilizing fingerprint, facial recognition, iris scanning, and other biometric technologies to ensure secure user verification and access control; authentication services for computer security incorporating multi-factor authentication, combining biometrics, hardware tokens, security keys, and PINs to enhance the security layers protecting user data and access points; authentication services for computer security utilizing device-based recognition systems, where access is granted based on the authentication of a registered device, adding an extra layer of security by linking user access specifically to their hardware; authentication services for computer security that integrate traditional security methods such as security keys and PINs with modern biometric verification, providing a robust, hybrid security solution that covers both physical and digital authentication mechanisms; user authentication services using biometric hardware and software technology for access control, specifically designed for legacy planning and secure transfer of digital asset control to designated beneficiaries under predefined conditions; user authentication services using biometric hardware and software technology for access control, tailored for the seamless and secure inheritance of digital assets, ensuring that biometric data and other secure access methods are transferable according to the user's estate plans; user authentication services using biometric hardware and software technology for access control, incorporating advanced encryption and secure protocols to facilitate the transition of access rights to digital assets from the original owner to heirs or designated entities; user authentication services using biometric hardware and software technology for access control that includes features to manage digital assets posthumously, enabling executors or legal representatives to access or transfer assets securely, adhering to the wishes of the deceased; authentication, issuance, and validation of digital keys, designed with redundant key systems to prevent lockouts, ensuring users have multiple ways to authenticate and gain access to their digital vaults without compromising security; authentication, issuance, and validation of digital keys that include advanced recovery options, such as biometrically enabled recovery processes or multi-factor authentication steps, to restore access in case primary keys are lost or compromised; authentication, issuance, and validation of digital keys, allowing trusted individuals or entities to access the vault under strict conditions defined by the original user; authentication and issuance of digital keys that include self-recovery options through rigorous identity verification processes, allowing users to regain access through steps that securely confirm their identity without external intervention; authentication, issuance, and validation of digital keys with integrated time-lock features, allowing vault owners to set specific time windows for access, thereby restricting entry to the vault outside these predefined periods; software as a Service (SaaS) providing encrypted security and cryptographic protection for digital assets and sensitive data, with features including advanced access control through biometric, PIN, security key, and device-based authentication systems tailored for enhanced user security; software as a service (SaaS) featuring secure management and cryptographic protection of digital assets and sensitive information, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring database management software providing advanced encryption and access controls for digital asset protection, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software for use in database management with robust security features tailored for digital assets and sensitive data management, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring artificial intelligence software for facial and speech recognition technologies for secure identity verification and authentication in managing digital assets, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring artificial intelligence software for face and speech recognition tools designed to enhance security protocols for digital asset access and management, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring word processing software with integrated security features for encrypted document creation and management, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring artificial intelligence software for use in facial and speech recognition technologies for facial and speech recognition, ensuring secure user authentication and data protection, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software using artificial intelligence for facial and speech recognition capabilities, focusing on secure and encrypted access to digital resources, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software using artificial intelligence for face and speech recognition services, aimed at strengthening security measures for digital asset handling, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software using artificial intelligence for use in facial and speech recognition to bolster secure access controls for sensitive digital environments, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring artificial intelligence software for use in face and speech recognition, designed to authenticate and secure access to digital assets, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software using artificial intelligence for use in face and speech recognition to support secure user authentication through face and speech recognition for digital asset management, specifically tailored for use within a digital vault environment; computer security services for managing digital certificates with enhanced security for authentication and data integrity in digital asset transactions, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software for use as a word processor offering encryption and secure access features for safeguarding sensitive information, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software for use in word processing tools that include data protection and security measures tailored for confidentiality, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software for use as a spreadsheet with integrated security functions for managing and protecting sensitive financial and asset data, specifically tailored for use within a digital vault environment; computer security services in the nature of providing digital certificates to authenticate and secure digital transactions and communications, specifically tailored for use within a digital vault environment; computer security services providing comprehensive security services for the protection and management of digital assets and sensitive data, specifically tailored for use within a digital vault environment; digital signature verification services (electronic cryptology services) offering digital signature verification to ensure the security and integrity of electronic transactions involving digital assets, specifically tailored for use within a digital vault environment; data security services providing data security solutions focused on the encrypted storage and safe handling of digital assets and sensitive information, specifically tailored for use within a digital vault environment; digital archiving services offering digital archiving solutions with advanced security features to protect and preserve digital assets over long periods, specifically tailored for use within a digital vault environment; identity verification services (computer security) providing identity verification services using advanced biometric and cryptographic technologies to ensure secure access to digital systems, specifically tailored for use within a digital vault environment; electronic cryptology services in the nature of digital certificate and digital signature verification services offering cryptology services focused on the verification of digital certificates and signatures to secure digital transactions, specifically tailored for use within a digital vault environment; quality control and authentication services providing quality control and authentication services to ensure the security and authenticity of digital transactions and asset management, specifically tailored for use within a digital vault environment; digital music encryption services offering encryption services specifically for digital music to ensure secure storage and transmission, specifically tailored for use within a digital vault environment; authentication services for computer security providing authentication services designed to secure access to computer systems and protect digital assets, specifically tailored for use within a digital vault environment; platform as a service (PaaS) that includes tools and services for secure digital asset management and protection, specifically tailored for use within a digital vault environment; user authentication services using biometric hardware and software technology for point-of-sale transactions providing user authentication services at point-of-sale using biometric technology to secure transactions involving digital assets, specifically tailored for use within a digital vault environment; IT services for data protection specifically focused on the protection of digital assets and sensitive data through advanced security measures, specifically tailored for use within a digital vault environment; information technology services for data protection providing information technology services that emphasize the secure management and protection of digital assets and sensitive information, specifically tailored for use within a digital vault environment; computer software programming for scanning or reading a QR code via mobile devices, tailored specifically for secure digital asset management environments adhering to Data Self-Governance and Data Self-Governance as a Service protocols, enhancing security protocols; computer programming of software for scanning or reading a bar code via mobile devices, developed to facilitate Data Self-Governance and Data Self-Governance as a Service implementations, enhancing security protocols within secure digital asset management environments; computer programming of software for scanning or reading a QR code via mobile devices, optimized for environments that comply with Data Self-Governance and Data Self-Governance as a Service standards, enhancing security protocols; programming of computer software for scanning or reading a QR code via mobile devices, integrated within a Data Self-Governance framework to enhance security protocols in secure digital asset management environments; computer programming of computer software for scanning or reading a QR code via mobile devices, developed specifically for secure digital asset management environments that adhere to Data Self-Governance and Data Self-Governance as a Service standards, thereby enhancing security protocols; computer software programming for scanning or reading a QR code via computer networks, optimized for integration within digital vault environments regulated by Data Self-Governance principles, aiming to enhance security protocols; user authentication services using single sign-on technology for online software applications, tailored to secure user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems, compliant with Data Self-Governance requirements; user authentication services using biometric hardware and software technology for access control, designed to secure user access to digital assets and sensitive information in environments adhering to Data Self-Governance and Data Self-Governance as a Service frameworks; user authentication services using biometric hardware and software technology for managing human identification, structured to enhance the security protocols within digital asset management systems that operate under strict Data Self-Governance standards; user authentication services using biometric hardware and software technology for password management, focused on providing robust security solutions for the management of digital assets and sensitive information within Data Self-Governance compliant environments; providing user authentication services using biometric hardware and software technology for access control, designed specifically to secure user access to digital assets and sensitive information, leveraging advanced multi-factor and biometric authentication systems compliant with Data Self-Governance principles; providing user authentication services using biometric hardware and software technology for managing human identification, optimized to enhance security measures in managing digital assets and sensitive information through the use of advanced multi-factor and biometric authentication systems, aligned with Data Self-Governance and Data Self-Governance as a Service protocols; user authentication services using biometric hardware and software technology for managing identification of things, tailored to ensure robust security for digital assets and sensitive information by incorporating advanced multi-factor and biometric authentication systems, within a Data Self-Governance regulated environment; providing user authentication services using biometric hardware and software technology for password management, focused on securing user access and enhancing protection of digital assets and sensitive data through comprehensive multi-factor and biometric authentication strategies, compliant with Data Self-Governance standards; providing user authentication services using biometric hardware and software technology for managing identification of things, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems, aligned with Data Self-Governance protocols for enhanced asset management security; providing user authentication services using biometric hardware and software technology for e-commerce transactions, tailored to ensure secure transactions by utilizing advanced multi-factor and biometric authentication systems, supporting Data Self-Governance standards in safeguarding digital assets and sensitive e-commerce interactions; authentication services for computer security, offering enhanced security measures for the protection and management of digital assets, incorporating cryptographic solutions and digital signature validation specifically tailored for financial and personal data protection under Data Self-Governance frameworks; electronic signature verification services using technology to authenticate user identity, designed to offer robust security measures for digital asset management, featuring cryptographic solutions and digital signature validation in compliance with Data Self-Governance standards for financial and personal data security; electronic cryptology services in the nature of electronic data encryption services, providing state-of-the-art encryption for digital images and data to secure sensitive information during transmission and storage, fully integrated with Data Self-Governance measures for comprehensive information security; computer security services in the nature of providing authentication, issuance, validation, and revocation of digital keys, offering enhanced security measures for digital asset management, including cryptographic solutions and digital signature validation, developed to meet Data Self-Governance requirements for protecting financial and personal data; computer security services for managing digital certificates, providing rigorous security protocols for digital asset protection, including cryptographic solutions and digital signature validation, tailored to support the stringent requirements of Data Self-Governance and safeguard sensitive financial and personal information; digital signature verification services [electronic cryptology services], providing enhanced security measures for digital assets management, including cryptographic solutions and digital signature validation specifically tailored for financial and personal data protection under Data Self-Governance standards; identity verification services [computer security], delivering advanced security protocols for digital asset management, incorporating cryptographic solutions and digital signature validation designed to meet Data Self-Governance guidelines; identity verification [computer security], offering stringent security measures to protect and manage digital assets, enhanced by cryptographic solutions and digital signature validation in compliance with Data Self-Governance practices; Authentication, issuance, and validation of digital keys, providing robust security measures for digital asset management, featuring cryptographic solutions and digital signature validation to support the principles of Data Self-Governance; providing authentication of personal identification information [computer security services], ensuring enhanced protection of digital assets with cryptographic solutions and digital signature validation developed to adhere to Data Self-Governance standards; encryption, decryption, and authentication of information, messages, and data, deploying advanced encryption technologies to secure digital communications and sensitive information against unauthorized access and breaches, aligned with Data Self-Governance protocols; cryptographic engineering, offering specialized encryption services tailored to secure sensitive and critical information, including digital assets and personal data, ensuring compliance with Data Self-Governance requirements; digital image encryption services, focused on providing high-security encryption solutions to protect digital images from unauthorized access and tampering, within a Data Self-Governance compliant environment; encryption of digital images, ensuring the security and integrity of digital visual content through advanced encryption standards, tailored for secure digital asset management under Data Self-Governance frameworks; electronic storage of digital video files, providing secure digital storage solutions with advanced encryption and access controls to ensure data privacy and integrity, fully compliant with Data Self-Governance protocols; electronic storage of digital videos, ensuring high-security and data integrity through encrypted storage services, tailored for DSG-compliant digital asset management; electronic storage of digital images, providing secure cloud-based solutions for storing sensitive visual content, aligned with DSG standards to ensure data integrity and prevent unauthorized access; electronic storage of digital audio files, offering encrypted storage services designed to safeguard audio data against unauthorized access and corruption, compliant with Data Self-Governance protocols; electronic storage of digital photographs, ensuring the secure archiving of digital photo data with comprehensive encryption and secure access protocols, adhering to DSG requirements; electronic storage of digital music, providing secure storage solutions that protect musical digital files from piracy and unauthorized distribution, consistent with Data Self-Governance principles; electronic storage of images and videos, offering robust digital archiving services with advanced security measures to ensure the safety and confidentiality of multimedia files, tailored for Data Self-Governance; electronic storage services for archiving electronic data, delivering secure cloud-based solutions for businesses and individuals to safely store and manage their digital information with full encryption and access control, designed under DSG protocols; electronic storage of files and documents, focused on providing secure and encrypted storage solutions tailored for sensitive and critical business and personal documents, ensuring compliance with Data Self-Governance standards; electronic storage services for archiving databases, offering secure database management solutions with strong encryption and real-time backup capabilities, optimized for Data Self-Governance compliant environments; electronic data storage and data backup services, providing comprehensive solutions for securely backing up and restoring digital assets and sensitive data in event of data loss or system failure, aligned with DSG; electronic storage and retrieval services for archiving biological data, delivering specialized storage solutions tailored for sensitive biological and medical data with enhanced security measures, compliant with Data Self-Governance frameworks; electronic data log storage, offering secure and encrypted logging services to ensure the integrity and confidentiality of transaction logs and other sensitive data entries, aligned with DSG standards; computerized data storage services, providing advanced digital storage solutions that include encrypted data management and secure access systems, designed to ensure data safety and compliance with Data Self-Governance; online data storage and on-line data storage services, offering cloud-based solutions for secure and accessible online storage of digital assets, allowing for secure management and retrieval of data from anywhere, under DSG frameworks; authentication services for computer security featuring advanced biometric capabilities, utilizing fingerprint, facial recognition, iris scanning, and other biometric technologies to ensure secure user verification and access control, fully integrated within a Data Self-Governance compliant system; authentication services for computer security, incorporating multi-factor authentication that combines biometrics, hardware tokens, security keys, and PINs, enhancing security layers to protect user data and access points, in alignment with Data Self-Governance standards; authentication services for computer security, utilizing device-based recognition systems where access is granted based on the authentication of a registered device, adding an extra layer of security by linking user access specifically to their hardware, compliant with Data Self-Governance requirements; authentication services for computer security, integrating traditional security methods such as security keys and PINs with modern biometric verification to provide a robust, hybrid security solution covering both physical and digital authentication mechanisms, designed for Data Self-Governance compliance; user authentication services using biometric hardware and software technology for access control, specifically designed for legacy planning and secure transfer of digital asset control to designated beneficiaries under predefined conditions, ensuring adherence to Data Self-Governance protocols; user authentication services using biometric hardware and software technology for access control, tailored for the seamless and secure inheritance of digital assets, ensuring that biometric data and other secure access methods are transferable according to the user's estate plans, fully compliant with Data Self-Governance; user authentication services using biometric hardware and software technology for access control, incorporating advanced encryption and secure protocols to facilitate the transition of access rights to digital assets from the original owner to heirs or designated entities, in line with Data Self-Governance principles; user authentication services using biometric hardware and software technology for access control, including features to manage digital assets posthumously, enabling executors or legal representatives to access or transfer assets securely, adhering to the wishes of the deceased, and aligned with Data Self-Governance standards; authentication, issuance, and validation of digital keys, designed with redundant key systems to prevent lockouts, ensuring users have multiple ways to authenticate and gain access to their digital vaults without compromising security, developed to meet Data Self-Governance guidelines; authentication, issuance, and validation of digital keys that include advanced recovery options, such as biometrically enabled recovery processes or multi-factor authentication steps, to restore access in case primary keys are lost or compromised, ensuring compliance with Data Self-Governance frameworks; authentication, issuance, and validation of digital keys, allowing trusted individuals or entities to access the vault under strict conditions defined by the original user, crafted to support the principles of Data Self-Governance; authentication and issuance of digital keys that include self-recovery options through rigorous identity verification processes, allowing users to regain access through steps that securely confirm their identity without external intervention, aligned with Data Self-Governance standards; authentication, issuance, and validation of digital keys with integrated time-lock features, allowing vault owners to set specific time windows for access, thereby restricting entry to the vault outside these predefined periods, tailored for use within a digital vault environment influenced by Data Self-Governance; software as a Service (SaaS) providing encrypted security and cryptographic protection for digital assets and sensitive data, with features including advanced access control through biometric, PIN, security key, and device-based authentication systems tailored for enhanced user security, fully compliant with Data Self-Governance requirements; software as a service (SaaS) featuring secure management and cryptographic protection of digital assets and sensitive information, specifically tailored for use within a digital vault environment, developed under Data Self-Governance guidelines; software as a service (SaaS) featuring database management software providing advanced encryption and access controls for digital asset protection, specifically tailored for use within a digital vault environment to meet Data Self-Governance protocols; software as a service (SaaS) featuring software for use in database management with robust security features tailored for digital assets and sensitive data management, specifically tailored for use within a digital vault environment, ensuring adherence to Data Self-Governance principles; software as a service (SaaS) featuring artificial intelligence software for facial and speech recognition technologies for secure identity verification and authentication in managing digital assets, specifically tailored for use within a digital vault environment to enhance Data Self-Governance compliance; software as a service (SaaS) featuring artificial intelligence software for face and speech recognition tools designed to enhance security protocols for digital asset access and management, specifically tailored for use within a digital vault environment, in alignment with Data Self-Governance frameworks; software as a service (SaaS) featuring word processing software with integrated security features for encrypted document creation and management, specifically tailored for use within a digital vault environment, compatible with Data Self-Governance standards; software as a service (SaaS) featuring artificial intelligence software for use in facial and speech recognition technologies for facial and speech recognition, ensuring secure user authentication and data protection, specifically tailored for use within a digital vault environment, crafted to meet the needs of Data Self-Governance; software as a service (SaaS) featuring software using artificial intelligence for facial and speech recognition capabilities, focusing on secure and encrypted access to digital resources, specifically tailored for use within a digital vault environment adhering to Data Self-Governance standards; software as a service (SaaS) featuring software using artificial intelligence for face and speech recognition services, aimed at strengthening security measures for digital asset handling, specifically designed for operation within Data Self-Governance compliant digital vault environments; software as a service (SaaS) featuring software using artificial intelligence for use in facial and speech recognition to bolster secure access controls for sensitive digital environments, specifically tailored for integration within digital vaults governed by Data Self-Governance protocols; software as a service (SaaS) featuring artificial intelligence software for use in face and speech recognition, designed to authenticate and secure access to digital assets, specifically developed for digital vaults adhering to Data Self-Governance; software as a service (SaaS) featuring software using artificial intelligence for use in face and speech recognition to support secure user authentication through face and speech recognition for digital asset management, specifically tailored for use within Data Self-Governance structured digital vaults; computer security services for managing digital certificates with enhanced security for authentication and data integrity in digital asset transactions, specifically tailored for use within digital vault environments focused on Data Self-Governance; software as a service (SaaS) featuring software for use as a word processor offering encryption and secure access features for safeguarding sensitive information, specifically designed for use within digital vaults that follow Data Self-Governance frameworks; software as a service (SaaS) featuring software for use in word processing tools that include data protection and security measures tailored for confidentiality, specifically designed for secure operations within digital vaults adhering to Data Self-Governance standards; software as a service (SaaS) featuring software for use as a spreadsheet with integrated security functions for managing and protecting sensitive financial and asset data, specifically developed for use within digital vaults that enforce Data Self-Governance principles; computer security services in the nature of providing digital certificates to authenticate and secure digital transactions and communications, specifically tailored for secure operations within digital vaults adhering to Data Self-Governance; computer security services providing comprehensive security services for the protection and management of digital assets and sensitive data, specifically designed for deployment within digital vault environments that are governed by Data Self-Governance protocols; digital signature verification services (electronic cryptology services) offering digital signature verification to ensure the security and integrity of electronic transactions involving digital assets, specifically tailored for operations within digital vaults that prioritize Data Self-Governance; data security services providing data security solutions focused on the encrypted storage and safe handling of digital assets and sensitive information, specifically designed for secure operations within a digital vault environment that adheres to Data Self-Governance standards; digital archiving services offering digital archiving solutions with advanced security features to protect and preserve digital assets over long periods, tailored for integration within digital vault environments that implement Data Self-Governance protocols; identity verification services (computer security) providing identity verification services using advanced biometric and cryptographic technologies to ensure secure access to digital systems, specifically developed for use within digital vaults focused on Data Self-Governance; electronic cryptology services in the nature of digital certificate and digital signature verification services offering cryptology solutions focused on the verification of digital certificates and signatures to secure digital transactions, specifically tailored for digital vault environments enforcing Data Self-Governance; quality control and authentication services providing quality control and authentication services to ensure the security and authenticity of digital transactions and asset management, tailored for secure operations within digital vaults that follow Data Self-Governance practices; digital music encryption services offering encryption services specifically for digital music to ensure secure storage and transmission, designed to integrate seamlessly into digital vault environments that prioritize Data Self-Governance; authentication services for computer security providing authentication services designed to secure access to computer systems and protect digital assets, specifically developed for deployment within digital vaults that adhere to Data Self-Governance frameworks; platform as a Service (PaaS) that includes tools and services for secure digital asset management and protection, specifically tailored for use within digital vault environments that implement Data Self-Governance protocols; user authentication services using biometric hardware and software technology for point-of-sale transactions providing user authentication services at point-of-sale using biometric technology to secure transactions involving digital assets, specifically tailored for integration within digital vault environments governed by Data Self-Governance; IT services for data protection specifically focused on the protection of digital assets and sensitive data through advanced security measures, tailored for secure operations within digital vault environments that enforce Data Self-Governance; information technology services for data protection providing IT services that emphasize the secure management and protection of digital assets and sensitive information, specifically designed for use within digital vault environments committed to Data Self-Governance; all the foregoing limited to digital security services on the secure management, storage, and encryption of digital assets and sensitive data, and which facilitate the encryption, backup, recovery, and secure storage of critical and sensitive digital information, and not in respect of general consumer software, entertainment, or unrelated technological fields. | ||
![]() | ZARIA COURT Zaria Group Limited 2364922 25 Apr 2024 | FORMALIZED on 27 Nov 2024 | Education; providing of training; entertainment; sporting and cultural... Class 041 Class 041 Education and Entertainment Services Education; providing of training; entertainment; sporting and cultural activities. Class 043 Class 043 Restaurant and Hotel Services Services for providing food and drink; temporary accommodation. | |
JOIST KOHLER CO. 2323358 24 Apr 2024 | FORMALIZED on 24 Apr 2024 | Toilets Class 011 Class 011 Environmental Control Instrument Products lighting heating cooling cooking Toilets | ||
![]() | LEGENDFIT XIAOXIN XU 2323661 24 Apr 2024 | FORMALIZED on 24 Apr 2024 | Arm guards for baseball; baseball gloves; baseball mitts; batting glov... Class 028 Class 028 Toys and Sporting Goods Products Arm guards for baseball; baseball gloves; baseball mitts; batting gloves; body protectors for American football; body protectors for sports use; chest pads for American football; chest protectors for sports use; elbow guards for athletic use; elbow guards for sports use; jockstraps; knee guards for athletic use; leg guards for athletic use; men's athletic supporters; protective cups for sports; protective padding for snowboarding; protective supports for shoulders and elbows; shin guards for soccer; shoulder pads for American football; wrist guards for athletic use | |
STAX CONNECT FATTMERCHANT INC. 2323349 24 Apr 2024 | FORMALIZED on 24 Apr 2024 | Charge card and credit card payment processing services; debit card tr... Class 036 Class 036 Insurance & Financial Services Charge card and credit card payment processing services; debit card transaction processing services; financial services in the nature of payment processing services; financial transaction services, namely, providing secure commercial transactions and payment options using a mobile device at a point of sale; merchant services, namely, payment transaction processing services; payment gateway services Class 042 Class 042 Computer & Software Services & Scientific Services Application service provider (ASP) featuring e-commerce software for use as a payment gateway that authorizes processing of credit cards or direct payments for merchants; software as a service (saas) provider in the field of payment processing services; software as a Service (SAAS) services featuring software for billing and invoicing; software as a Service (SAAS) services featuring software for financial management | ||
![]() | QiT QIT POUCHES INC 2370837 24 Apr 2024 | FORMALIZED on 25 Dec 2024 | Nicotine patches for use as aids to stop smoking. Class 005 Class 005 Pharmaceutical Products Nicotine patches for use as aids to stop smoking. | |
SOUL ORIGIN GOODNESS MADE GREAT SO Nominees Pty Limited as trustee for Soul OriginIP Unit Trust 2331310 24 Apr 2024 | FORMALIZED on 5 Jun 2024 | Chicken salads; poultry salads; meat salads; fruit and vegetable salad... Class 029 Class 029 Meats and Processed Food Products Chicken salads; poultry salads; meat salads; fruit and vegetable salads; vegetable salads; fruit salads; cheese; garden salads, prepared; prepared meals consisting principally of meat, fish, poultry or vegetables; potato salads; cooked fruits and vegetables; prepared meals consisting principally of vegetables; baked potatoes; soups; eggs; cheese in the form of dips; fish and seafood, not live; meat; chicken; poultry, not live; yoghurt; dairy-based desserts; dried fruit; fruit-based snack food; snack foods consisting primarily of nuts; falafel; beverages consisting principally of milk; flavored milk beverages; bacon; prepared meals consisting primarily of bacon; whipped cream; milk shakes; cooked pulses; prepared pulses. Class 030 Class 030 Staple Food Products Chocolate-based beverages with milk; edible rice paper; noodle-based prepared meals; noodles; spices; breakfast cereals; muesli; muesli-based snack bars; croissants; tortillas; wraps [sandwich]; wrap sandwiches; grain based snack food; fruit bread; toasted bread; bread rolls; quiche; quinoa, processed; pasta salad; baguettes; bagels; baguettes [French loaves]; sandwiches; toasted sandwiches; cookies; biscuits; brownies; beverages consisting principally of coffee; coffee preparations and beverages; iced coffee; cocoa-based beverages; sauces [condiments]; mustard; honey; caramel sauce; chocolate sauce; caramel syrup; chocolate syrups; tea-based iced beverages; chai tea; tea drinks; bubble tea [tea-based drink]; tea-based drinks with fruit flavoring; pearl milk tea [tea-based drink]; bubble tea; tea-based drinks; brewed coffee; coffee; coffee beverages; drinks made of coffee; ice cream; pastry; bread; confectionery; salad dressings; rice salads; pasta salads. ... Class 032 Light Beverage Products Coconut water [beverage]; non-alcoholic drinks; non-alcoholic beverages; smoothies; fruit juices and fruit drinks; coconut juice beverages; fruit juices; vegetable juices [beverages]; iced fruit drinks; aerated fruit juice. Class 035 Advertising, Business & Retail Services Business management of retail outlets; providing business information relating to franchising; business consulting relating to franchising; business advice relating to franchising; providing marketing assistance relating to franchising; business assistance relating to franchising; providing business advice relating to franchising; provision of business information relating to franchising; business management assistance in the field of franchising; business consultation relating to franchising; business advisory services relating to franchising; provision of marketing assistance relating to franchising; business consultancy relating to franchising; business management services in relation to franchising; business management services within the framework of franchising; business consultancy services relating to franchising; business consultation services relating to franchising; business franchising consultancy and administrative business support services; online retail store services featuring foodstuffs; business assistance within the framework of a franchise contract; administration of the business affairs of franchises; providing business assistance in the establishment of franchises; provision of business assistance in the operation of franchises; business assistance relating to the establishment of franchises; providing assistance in the management of franchised businesses; providing marketing assistance relating to the operation of franchises; administration of customer loyalty and incentive schemes; organization of customer loyalty schemes; organisation, operation and supervision of loyalty and incentive schemes; administration of loyalty rewards programmes; promoting the goods and services of others by means of a loyalty rewards card scheme; administration of customer loyalty programmes; organisation and management of customer loyalty programs; administration of consumer loyalty programs; business advertising services relating to franchising; commercial advertising services in the field of franchising; advertising, promotion and marketing; product marketing; distribution of advertising, marketing and promotional matter; promotional services; retail store services; retail store services featuring foodstuffs; advertising services for the promotion of goods; advertising services relating to the sale of goods; marketing; retail store services for clothing. Class 039 Transportation & Storage Services Food delivery; food delivery services; delivery of food and drink prepared for consumption. Class 043 Restaurant and Hotel Services Catering services; preparation of food and drink; preparation of food and beverages; preparation of food and drink for immediate consumption; cafés; café services; catering; mobile catering; catering services for the provision of food; take away food and drink services; serving food and drink in retail and takeaway establishments; take away food services; takeaway food services; takeaway food and drink services; take-out food and drink services; cafeteria services; take-away fast food services; provision of food and drink in bistros; serving food and drinks; catering for the provision of food and beverages; food and drink catering; cafe and snack-bar services. | ||
ACSA CONNECT ALBERTA CONSTRUCTION SAFETY ASSOCIATION 2323229 24 Apr 2024 | SEARCHED on 12 May 2025 | Providing access to internet platforms Class 038 Class 038 Communications Services Providing access to internet platforms |
on 7 Aug 2024
Emsland-Stärke Gesellschaft mit beschränkterHaftung
2342649 · 25 Apr 2024
001
Class 001
Chemical Products
Chemicals based on starch for the paper industry; chemicals for industrial use, namely auxiliary agents being sizing and glueing agents as well as binding agents for use in the manufacture of mineral fibreboard; starches for use in manufacturing and industry; potato and pea starch for industrial use; starch for use in the manufacture of paper; cationic starch for use in the production of paper.
Chemicals based on starch for the paper industry; chemicals for indust...
on 3 Jul 2024
ASENDIA MANAGEMENT
2336502 · 25 Apr 2024
039
Class 039
Transportation & Storage Services
Location d'unités de stockage; location de conteneurs; location de conteneurs d'expédition isothermes pour le transport de produits y compris de produits alimentaires et pharmaceutiques à température ambiante, réfrigérés et congelés; services de transport; transport de marchandises et de colis par voie aérienne, ferroviaire, fluviale, maritime et routière; services d'affrètement; services d'entreposage, de conditionnement, d'emballage, de collecte, de chargement, d'expédition, de transport, de déchargement, d'entreposage, et de livraison de produits, de colis, de fret et de marchandises, en ce compris les produits alimentaires et pharmaceutiques sous température dirigée ou contrôlée, ou à température ambiante; ramassage (collecte) de lettres, documents, colis et marchandises; distribution de courrier, de journaux, de colis, de marchandises; transport et mise en entrepôt de marchandises en tant que services logistiques; services de logistique en matière de ramassage, de transport, d'entreposage et de livraison; informations et conseils en matière de ramassage, de transport, d'entreposage et de livraison; expédition et livraison de marchandises commandées par correspondance; messagerie (courrier et marchandises); suivi de l'envoi par détermination électronique de la localisation de marchandises et de biens, en particulier de paquets, colis; services informatisés de suivi et de pistage de colis en cours d'acheminement [informations en matière de transport]; localisation et suivi de cargaison dans le cadre des transports; mise à disposition d'informations en matière de localisation d'articles en transit; affranchissement de produits, en particulier paquets et colis; services de coursiers; services de courtage de transport; services de courtage de fret; services de livraison de colis dans un réseau de commerçants; transport de colis; services d'expédition de marchandises; livraison de marchandises; fourniture d'informations en matière d'expédition et de livraison.
Location d'unités de stockage; location de conteneurs; location de con...
on 24 Jul 2024
TechSologic Incorporated
2340163 · 25 Apr 2024
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Downloadable computer security software for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer application software for mobile telephones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable application software for smartphones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; smartphone software applications, downloadable for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer software applications for smartphones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable software applications for cell phones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer software applications for mobile telephones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable applications for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer utility programs for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; computer software applications, downloadable for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer software applications for cellular phones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer application software for cellular phones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable software applications for smartphones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable software applications for mobile telephones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable cloud-based software for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable smartphone apps [software] for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer application software for cellular telephones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; computer application software for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer software for tablets for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable apps for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer security software for encrypted security and cryptographic protection of digital assets and sensitive data, tailored for integration within a Data Self-Governance compliant digital vault environment; downloadable computer application software for mobile telephones for encrypted security and cryptographic protection of digital assets and sensitive data, designed to support Data Self-Governance principles; downloadable application software for smartphones for encrypted security and cryptographic protection of digital assets and sensitive data, ensuring adherence to Data Self-Governance as a Service protocols; smartphone software applications, downloadable for encrypted security and cryptographic protection of digital assets and sensitive data, suitable for use within Data Self-Governance secured environments; downloadable computer software applications for smartphones for encrypted security and cryptographic protection of digital assets and sensitive data, customized for Data Self-Governance compliance; downloadable software applications for cell phones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring compliance with Data Self-Governance standards; downloadable computer software applications for mobile telephones for encrypted security and cryptographic protection of digital assets and sensitive data, developed under Data Self-Governance guidelines; downloadable applications for encrypted security and cryptographic protection of digital assets and sensitive data, aligned with the principles of Data Self-Governance and Data Self-Governance as a Service; downloadable computer utility programs for encrypted security and cryptographic protection of digital assets and sensitive data, integrated within a Data Self-Governance framework; computer software applications, downloadable for encrypted security and cryptographic protection of digital assets and sensitive data, tailored for operation within digital vaults that adhere to Data Self-Governance protocols; downloadable computer software applications for cellular phones for encrypted security and cryptographic protection of digital assets and sensitive data, optimized for Data Self-Governance compliant secure environments; downloadable computer application software for cellular phones for encrypted security and cryptographic protection of digital assets and sensitive data, developed to facilitate Data Self-Governance and Data Self-Governance as a Service implementations; downloadable software applications for smartphones for encrypted security and cryptographic protection of digital assets and sensitive data, designed to enhance security measures under Data Self-Governance standards; downloadable software applications for mobile telephones for encrypted security and cryptographic protection of digital assets and sensitive data, ensuring compliance with Data Self-Governance and Data Self-Governance as a Service requirements; downloadable cloudbased software for encrypted security and cryptographic protection of digital assets and sensitive data, supporting Data Self-Governance principles through cloud technologies; downloadable smartphone apps [software] for encrypted security and cryptographic protection of digital assets and sensitive data, structured to conform to Data Self-Governance operational protocols; downloadable computer application software for cellular telephones for encrypted security and cryptographic protection of digital assets and sensitive data, built to align with Data Self-Governance and Data Self-Governance as a Service frameworks; computer application software for encrypted security and cryptographic protection of digital assets and sensitive data, integrating Data Self-Governance compliant mechanisms; downloadable computer software for tablets for encrypted security and cryptographic protection of digital assets and sensitive data, customized to support Data Self-Governance compliance in digital asset management; downloadable apps for encrypted security and cryptographic protection of digital assets and sensitive data, designed to function within environments regulated by Data Self-Governance principles; all the foregoing limited to digital security software on the secure management, storage, and encryption of digital assets and sensitive data, and which facilitates the encryption, backup, recovery, and secure storage of critical and sensitive digital information, and not in respect of general consumer software, entertainment, or unrelated technological fields.
042
Class 042
Computer & Software Services & Scientific Services
Computer software programming for scanning or reading a QR code via mobile devices, tailored specifically for secure digital asset management environments, enhancing security protocols; computer programming of software for scanning or reading a bar code via mobile devices, tailored specifically for secure digital asset management environments, enhancing security protocols; computer programming of software for scanning or reading a QR code via mobile devices, tailored specifically for secure digital asset management environments, enhancing security protocols; programming of computer software for scanning or reading a QR code via mobile devices, tailored specifically for secure digital asset management environments, enhancing security protocols; computer programming of computer software for scanning or reading a bar code via mobile devices, tailored specifically for secure digital asset management environments, enhancing security protocols; computer programming of computer software for scanning or reading a QR code via mobile devices, tailored specifically for secure digital asset management environments, enhancing security protocols; computer software programming for scanning or reading a QR code via computer networks, tailored specifically for secure digital asset management environments, enhancing security protocols; user authentication services using single sign-on technology for online software applications, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; user authentication services using biometric hardware and software technology for access control, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; user authentication services using biometric hardware and software technology for managing human identification, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; user authentication services using biometric hardware and software technology for password management, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; providing user authentication services using biometric hardware and software technology for access control, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; providing user authentication services using biometric hardware and software technology for managing human identification, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; user authentication services using biometric hardware and software technology for managing identification of things, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; providing user authentication services using biometric hardware and software technology for password management, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; providing user authentication services using biometric hardware and software technology for managing identification of things, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; providing user authentication services using biometric hardware and software technology for e-commerce transactions, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; authentication services for computer security, offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; electronic signature verification services using technology to authenticate user identity, offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; electronic cryptology services in the nature of electronic data encryption services, providing advanced encryption services for digital images and data to secure sensitive information during transmission and storage; computer security services in the nature of providing authentication, issuance, validation, and revocation of digital keys, offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; computer security services for managing digital certificates, offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; digital signature verification services [electronic cryptology services], offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; identity verification services [computer security], offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; identity verification [computer security], offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; authentication, issuance and validation of digital keys, offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; providing authentication of personal identification information [computer security services], offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; encryption, decryption, and authentication of information, messages, and data, offering enhanced encryption technologies to secure digital communications and sensitive information against unauthorized access and data breaches; cryptographic engineering, providing specialized encryption services tailored to secure sensitive and critical information, including but not limited to digital assets and personal data; digital image encryption services, focused on providing high-security solutions for protecting digital images from unauthorized access and tampering; encryption of digital images, ensuring the security and integrity of digital visual content through advanced encryption standards; electronic storage of digital video files, providing secure digital storage solutions with advanced encryption and access controls to ensure data privacy and integrity; electronic storage of digital videos, focused on maintaining high security and data integrity in digital video storage through encrypted services; electronic storage of digital images, providing secure cloud-based solutions for storing sensitive visual content, ensuring data integrity and preventing unauthorized access; electronic storage of digital audio files, offering encrypted storage services that safeguard audio data against unauthorized access and corruption; electronic storage of digital photographs, ensuring the secure archiving of digital photo data with comprehensive encryption and secure access protocols; electronic storage of digital music, providing secure storage solutions that protect musical digital files from piracy and unauthorized distribution; electronic storage of images and videos, offering robust digital archiving services with advanced security measures to ensure the safety and confidentiality of multimedia files; electronic storage services for archiving electronic data, providing secure cloud-based solutions for businesses and individuals to safely store and manage their digital information with full encryption and access control; electronic storage of files and documents, focused on providing secure and encrypted storage solutions tailored for sensitive and critical business and personal documents; electronic storage services for archiving databases, offering secure database management solutions with strong encryption and real-time backup capabilities; electronic data storage and data backup services, providing comprehensive solutions for securely backing up and restoring digital assets and sensitive data in the event of data loss or system failure; electronic storage and retrieval services for archiving biological data, offering specialized storage solutions tailored for sensitive biological and medical data with enhanced security measures; electronic data log storage, providing secure and encrypted logging services to ensure the integrity and confidentiality of transaction logs and other sensitive data entries; computerised data storage services, offering advanced digital storage solutions that include encrypted data management and secure access systems to ensure data safety and privacy; online data storage and on-line data storage services, providing cloud-based solutions for secure and accessible online storage of digital assets, allowing for secure management and retrieval of data from anywhere; authentication services for computer security featuring advanced biometric capabilities, utilizing fingerprint, facial recognition, iris scanning, and other biometric technologies to ensure secure user verification and access control; authentication services for computer security incorporating multi-factor authentication, combining biometrics, hardware tokens, security keys, and PINs to enhance the security layers protecting user data and access points; authentication services for computer security utilizing device-based recognition systems, where access is granted based on the authentication of a registered device, adding an extra layer of security by linking user access specifically to their hardware; authentication services for computer security that integrate traditional security methods such as security keys and PINs with modern biometric verification, providing a robust, hybrid security solution that covers both physical and digital authentication mechanisms; user authentication services using biometric hardware and software technology for access control, specifically designed for legacy planning and secure transfer of digital asset control to designated beneficiaries under predefined conditions; user authentication services using biometric hardware and software technology for access control, tailored for the seamless and secure inheritance of digital assets, ensuring that biometric data and other secure access methods are transferable according to the user's estate plans; user authentication services using biometric hardware and software technology for access control, incorporating advanced encryption and secure protocols to facilitate the transition of access rights to digital assets from the original owner to heirs or designated entities; user authentication services using biometric hardware and software technology for access control that includes features to manage digital assets posthumously, enabling executors or legal representatives to access or transfer assets securely, adhering to the wishes of the deceased; authentication, issuance, and validation of digital keys, designed with redundant key systems to prevent lockouts, ensuring users have multiple ways to authenticate and gain access to their digital vaults without compromising security; authentication, issuance, and validation of digital keys that include advanced recovery options, such as biometrically enabled recovery processes or multi-factor authentication steps, to restore access in case primary keys are lost or compromised; authentication, issuance, and validation of digital keys, allowing trusted individuals or entities to access the vault under strict conditions defined by the original user; authentication and issuance of digital keys that include self-recovery options through rigorous identity verification processes, allowing users to regain access through steps that securely confirm their identity without external intervention; authentication, issuance, and validation of digital keys with integrated time-lock features, allowing vault owners to set specific time windows for access, thereby restricting entry to the vault outside these predefined periods; software as a Service (SaaS) providing encrypted security and cryptographic protection for digital assets and sensitive data, with features including advanced access control through biometric, PIN, security key, and device-based authentication systems tailored for enhanced user security; software as a service (SaaS) featuring secure management and cryptographic protection of digital assets and sensitive information, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring database management software providing advanced encryption and access controls for digital asset protection, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software for use in database management with robust security features tailored for digital assets and sensitive data management, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring artificial intelligence software for facial and speech recognition technologies for secure identity verification and authentication in managing digital assets, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring artificial intelligence software for face and speech recognition tools designed to enhance security protocols for digital asset access and management, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring word processing software with integrated security features for encrypted document creation and management, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring artificial intelligence software for use in facial and speech recognition technologies for facial and speech recognition, ensuring secure user authentication and data protection, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software using artificial intelligence for facial and speech recognition capabilities, focusing on secure and encrypted access to digital resources, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software using artificial intelligence for face and speech recognition services, aimed at strengthening security measures for digital asset handling, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software using artificial intelligence for use in facial and speech recognition to bolster secure access controls for sensitive digital environments, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring artificial intelligence software for use in face and speech recognition, designed to authenticate and secure access to digital assets, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software using artificial intelligence for use in face and speech recognition to support secure user authentication through face and speech recognition for digital asset management, specifically tailored for use within a digital vault environment; computer security services for managing digital certificates with enhanced security for authentication and data integrity in digital asset transactions, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software for use as a word processor offering encryption and secure access features for safeguarding sensitive information, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software for use in word processing tools that include data protection and security measures tailored for confidentiality, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software for use as a spreadsheet with integrated security functions for managing and protecting sensitive financial and asset data, specifically tailored for use within a digital vault environment; computer security services in the nature of providing digital certificates to authenticate and secure digital transactions and communications, specifically tailored for use within a digital vault environment; computer security services providing comprehensive security services for the protection and management of digital assets and sensitive data, specifically tailored for use within a digital vault environment; digital signature verification services (electronic cryptology services) offering digital signature verification to ensure the security and integrity of electronic transactions involving digital assets, specifically tailored for use within a digital vault environment; data security services providing data security solutions focused on the encrypted storage and safe handling of digital assets and sensitive information, specifically tailored for use within a digital vault environment; digital archiving services offering digital archiving solutions with advanced security features to protect and preserve digital assets over long periods, specifically tailored for use within a digital vault environment; identity verification services (computer security) providing identity verification services using advanced biometric and cryptographic technologies to ensure secure access to digital systems, specifically tailored for use within a digital vault environment; electronic cryptology services in the nature of digital certificate and digital signature verification services offering cryptology services focused on the verification of digital certificates and signatures to secure digital transactions, specifically tailored for use within a digital vault environment; quality control and authentication services providing quality control and authentication services to ensure the security and authenticity of digital transactions and asset management, specifically tailored for use within a digital vault environment; digital music encryption services offering encryption services specifically for digital music to ensure secure storage and transmission, specifically tailored for use within a digital vault environment; authentication services for computer security providing authentication services designed to secure access to computer systems and protect digital assets, specifically tailored for use within a digital vault environment; platform as a service (PaaS) that includes tools and services for secure digital asset management and protection, specifically tailored for use within a digital vault environment; user authentication services using biometric hardware and software technology for point-of-sale transactions providing user authentication services at point-of-sale using biometric technology to secure transactions involving digital assets, specifically tailored for use within a digital vault environment; IT services for data protection specifically focused on the protection of digital assets and sensitive data through advanced security measures, specifically tailored for use within a digital vault environment; information technology services for data protection providing information technology services that emphasize the secure management and protection of digital assets and sensitive information, specifically tailored for use within a digital vault environment; computer software programming for scanning or reading a QR code via mobile devices, tailored specifically for secure digital asset management environments adhering to Data Self-Governance and Data Self-Governance as a Service protocols, enhancing security protocols; computer programming of software for scanning or reading a bar code via mobile devices, developed to facilitate Data Self-Governance and Data Self-Governance as a Service implementations, enhancing security protocols within secure digital asset management environments; computer programming of software for scanning or reading a QR code via mobile devices, optimized for environments that comply with Data Self-Governance and Data Self-Governance as a Service standards, enhancing security protocols; programming of computer software for scanning or reading a QR code via mobile devices, integrated within a Data Self-Governance framework to enhance security protocols in secure digital asset management environments; computer programming of computer software for scanning or reading a QR code via mobile devices, developed specifically for secure digital asset management environments that adhere to Data Self-Governance and Data Self-Governance as a Service standards, thereby enhancing security protocols; computer software programming for scanning or reading a QR code via computer networks, optimized for integration within digital vault environments regulated by Data Self-Governance principles, aiming to enhance security protocols; user authentication services using single sign-on technology for online software applications, tailored to secure user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems, compliant with Data Self-Governance requirements; user authentication services using biometric hardware and software technology for access control, designed to secure user access to digital assets and sensitive information in environments adhering to Data Self-Governance and Data Self-Governance as a Service frameworks; user authentication services using biometric hardware and software technology for managing human identification, structured to enhance the security protocols within digital asset management systems that operate under strict Data Self-Governance standards; user authentication services using biometric hardware and software technology for password management, focused on providing robust security solutions for the management of digital assets and sensitive information within Data Self-Governance compliant environments; providing user authentication services using biometric hardware and software technology for access control, designed specifically to secure user access to digital assets and sensitive information, leveraging advanced multi-factor and biometric authentication systems compliant with Data Self-Governance principles; providing user authentication services using biometric hardware and software technology for managing human identification, optimized to enhance security measures in managing digital assets and sensitive information through the use of advanced multi-factor and biometric authentication systems, aligned with Data Self-Governance and Data Self-Governance as a Service protocols; user authentication services using biometric hardware and software technology for managing identification of things, tailored to ensure robust security for digital assets and sensitive information by incorporating advanced multi-factor and biometric authentication systems, within a Data Self-Governance regulated environment; providing user authentication services using biometric hardware and software technology for password management, focused on securing user access and enhancing protection of digital assets and sensitive data through comprehensive multi-factor and biometric authentication strategies, compliant with Data Self-Governance standards; providing user authentication services using biometric hardware and software technology for managing identification of things, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems, aligned with Data Self-Governance protocols for enhanced asset management security; providing user authentication services using biometric hardware and software technology for e-commerce transactions, tailored to ensure secure transactions by utilizing advanced multi-factor and biometric authentication systems, supporting Data Self-Governance standards in safeguarding digital assets and sensitive e-commerce interactions; authentication services for computer security, offering enhanced security measures for the protection and management of digital assets, incorporating cryptographic solutions and digital signature validation specifically tailored for financial and personal data protection under Data Self-Governance frameworks; electronic signature verification services using technology to authenticate user identity, designed to offer robust security measures for digital asset management, featuring cryptographic solutions and digital signature validation in compliance with Data Self-Governance standards for financial and personal data security; electronic cryptology services in the nature of electronic data encryption services, providing state-of-the-art encryption for digital images and data to secure sensitive information during transmission and storage, fully integrated with Data Self-Governance measures for comprehensive information security; computer security services in the nature of providing authentication, issuance, validation, and revocation of digital keys, offering enhanced security measures for digital asset management, including cryptographic solutions and digital signature validation, developed to meet Data Self-Governance requirements for protecting financial and personal data; computer security services for managing digital certificates, providing rigorous security protocols for digital asset protection, including cryptographic solutions and digital signature validation, tailored to support the stringent requirements of Data Self-Governance and safeguard sensitive financial and personal information; digital signature verification services [electronic cryptology services], providing enhanced security measures for digital assets management, including cryptographic solutions and digital signature validation specifically tailored for financial and personal data protection under Data Self-Governance standards; identity verification services [computer security], delivering advanced security protocols for digital asset management, incorporating cryptographic solutions and digital signature validation designed to meet Data Self-Governance guidelines; identity verification [computer security], offering stringent security measures to protect and manage digital assets, enhanced by cryptographic solutions and digital signature validation in compliance with Data Self-Governance practices; Authentication, issuance, and validation of digital keys, providing robust security measures for digital asset management, featuring cryptographic solutions and digital signature validation to support the principles of Data Self-Governance; providing authentication of personal identification information [computer security services], ensuring enhanced protection of digital assets with cryptographic solutions and digital signature validation developed to adhere to Data Self-Governance standards; encryption, decryption, and authentication of information, messages, and data, deploying advanced encryption technologies to secure digital communications and sensitive information against unauthorized access and breaches, aligned with Data Self-Governance protocols; cryptographic engineering, offering specialized encryption services tailored to secure sensitive and critical information, including digital assets and personal data, ensuring compliance with Data Self-Governance requirements; digital image encryption services, focused on providing high-security encryption solutions to protect digital images from unauthorized access and tampering, within a Data Self-Governance compliant environment; encryption of digital images, ensuring the security and integrity of digital visual content through advanced encryption standards, tailored for secure digital asset management under Data Self-Governance frameworks; electronic storage of digital video files, providing secure digital storage solutions with advanced encryption and access controls to ensure data privacy and integrity, fully compliant with Data Self-Governance protocols; electronic storage of digital videos, ensuring high-security and data integrity through encrypted storage services, tailored for DSG-compliant digital asset management; electronic storage of digital images, providing secure cloud-based solutions for storing sensitive visual content, aligned with DSG standards to ensure data integrity and prevent unauthorized access; electronic storage of digital audio files, offering encrypted storage services designed to safeguard audio data against unauthorized access and corruption, compliant with Data Self-Governance protocols; electronic storage of digital photographs, ensuring the secure archiving of digital photo data with comprehensive encryption and secure access protocols, adhering to DSG requirements; electronic storage of digital music, providing secure storage solutions that protect musical digital files from piracy and unauthorized distribution, consistent with Data Self-Governance principles; electronic storage of images and videos, offering robust digital archiving services with advanced security measures to ensure the safety and confidentiality of multimedia files, tailored for Data Self-Governance; electronic storage services for archiving electronic data, delivering secure cloud-based solutions for businesses and individuals to safely store and manage their digital information with full encryption and access control, designed under DSG protocols; electronic storage of files and documents, focused on providing secure and encrypted storage solutions tailored for sensitive and critical business and personal documents, ensuring compliance with Data Self-Governance standards; electronic storage services for archiving databases, offering secure database management solutions with strong encryption and real-time backup capabilities, optimized for Data Self-Governance compliant environments; electronic data storage and data backup services, providing comprehensive solutions for securely backing up and restoring digital assets and sensitive data in event of data loss or system failure, aligned with DSG; electronic storage and retrieval services for archiving biological data, delivering specialized storage solutions tailored for sensitive biological and medical data with enhanced security measures, compliant with Data Self-Governance frameworks; electronic data log storage, offering secure and encrypted logging services to ensure the integrity and confidentiality of transaction logs and other sensitive data entries, aligned with DSG standards; computerized data storage services, providing advanced digital storage solutions that include encrypted data management and secure access systems, designed to ensure data safety and compliance with Data Self-Governance; online data storage and on-line data storage services, offering cloud-based solutions for secure and accessible online storage of digital assets, allowing for secure management and retrieval of data from anywhere, under DSG frameworks; authentication services for computer security featuring advanced biometric capabilities, utilizing fingerprint, facial recognition, iris scanning, and other biometric technologies to ensure secure user verification and access control, fully integrated within a Data Self-Governance compliant system; authentication services for computer security, incorporating multi-factor authentication that combines biometrics, hardware tokens, security keys, and PINs, enhancing security layers to protect user data and access points, in alignment with Data Self-Governance standards; authentication services for computer security, utilizing device-based recognition systems where access is granted based on the authentication of a registered device, adding an extra layer of security by linking user access specifically to their hardware, compliant with Data Self-Governance requirements; authentication services for computer security, integrating traditional security methods such as security keys and PINs with modern biometric verification to provide a robust, hybrid security solution covering both physical and digital authentication mechanisms, designed for Data Self-Governance compliance; user authentication services using biometric hardware and software technology for access control, specifically designed for legacy planning and secure transfer of digital asset control to designated beneficiaries under predefined conditions, ensuring adherence to Data Self-Governance protocols; user authentication services using biometric hardware and software technology for access control, tailored for the seamless and secure inheritance of digital assets, ensuring that biometric data and other secure access methods are transferable according to the user's estate plans, fully compliant with Data Self-Governance; user authentication services using biometric hardware and software technology for access control, incorporating advanced encryption and secure protocols to facilitate the transition of access rights to digital assets from the original owner to heirs or designated entities, in line with Data Self-Governance principles; user authentication services using biometric hardware and software technology for access control, including features to manage digital assets posthumously, enabling executors or legal representatives to access or transfer assets securely, adhering to the wishes of the deceased, and aligned with Data Self-Governance standards; authentication, issuance, and validation of digital keys, designed with redundant key systems to prevent lockouts, ensuring users have multiple ways to authenticate and gain access to their digital vaults without compromising security, developed to meet Data Self-Governance guidelines; authentication, issuance, and validation of digital keys that include advanced recovery options, such as biometrically enabled recovery processes or multi-factor authentication steps, to restore access in case primary keys are lost or compromised, ensuring compliance with Data Self-Governance frameworks; authentication, issuance, and validation of digital keys, allowing trusted individuals or entities to access the vault under strict conditions defined by the original user, crafted to support the principles of Data Self-Governance; authentication and issuance of digital keys that include self-recovery options through rigorous identity verification processes, allowing users to regain access through steps that securely confirm their identity without external intervention, aligned with Data Self-Governance standards; authentication, issuance, and validation of digital keys with integrated time-lock features, allowing vault owners to set specific time windows for access, thereby restricting entry to the vault outside these predefined periods, tailored for use within a digital vault environment influenced by Data Self-Governance; software as a Service (SaaS) providing encrypted security and cryptographic protection for digital assets and sensitive data, with features including advanced access control through biometric, PIN, security key, and device-based authentication systems tailored for enhanced user security, fully compliant with Data Self-Governance requirements; software as a service (SaaS) featuring secure management and cryptographic protection of digital assets and sensitive information, specifically tailored for use within a digital vault environment, developed under Data Self-Governance guidelines; software as a service (SaaS) featuring database management software providing advanced encryption and access controls for digital asset protection, specifically tailored for use within a digital vault environment to meet Data Self-Governance protocols; software as a service (SaaS) featuring software for use in database management with robust security features tailored for digital assets and sensitive data management, specifically tailored for use within a digital vault environment, ensuring adherence to Data Self-Governance principles; software as a service (SaaS) featuring artificial intelligence software for facial and speech recognition technologies for secure identity verification and authentication in managing digital assets, specifically tailored for use within a digital vault environment to enhance Data Self-Governance compliance; software as a service (SaaS) featuring artificial intelligence software for face and speech recognition tools designed to enhance security protocols for digital asset access and management, specifically tailored for use within a digital vault environment, in alignment with Data Self-Governance frameworks; software as a service (SaaS) featuring word processing software with integrated security features for encrypted document creation and management, specifically tailored for use within a digital vault environment, compatible with Data Self-Governance standards; software as a service (SaaS) featuring artificial intelligence software for use in facial and speech recognition technologies for facial and speech recognition, ensuring secure user authentication and data protection, specifically tailored for use within a digital vault environment, crafted to meet the needs of Data Self-Governance; software as a service (SaaS) featuring software using artificial intelligence for facial and speech recognition capabilities, focusing on secure and encrypted access to digital resources, specifically tailored for use within a digital vault environment adhering to Data Self-Governance standards; software as a service (SaaS) featuring software using artificial intelligence for face and speech recognition services, aimed at strengthening security measures for digital asset handling, specifically designed for operation within Data Self-Governance compliant digital vault environments; software as a service (SaaS) featuring software using artificial intelligence for use in facial and speech recognition to bolster secure access controls for sensitive digital environments, specifically tailored for integration within digital vaults governed by Data Self-Governance protocols; software as a service (SaaS) featuring artificial intelligence software for use in face and speech recognition, designed to authenticate and secure access to digital assets, specifically developed for digital vaults adhering to Data Self-Governance; software as a service (SaaS) featuring software using artificial intelligence for use in face and speech recognition to support secure user authentication through face and speech recognition for digital asset management, specifically tailored for use within Data Self-Governance structured digital vaults; computer security services for managing digital certificates with enhanced security for authentication and data integrity in digital asset transactions, specifically tailored for use within digital vault environments focused on Data Self-Governance; software as a service (SaaS) featuring software for use as a word processor offering encryption and secure access features for safeguarding sensitive information, specifically designed for use within digital vaults that follow Data Self-Governance frameworks; software as a service (SaaS) featuring software for use in word processing tools that include data protection and security measures tailored for confidentiality, specifically designed for secure operations within digital vaults adhering to Data Self-Governance standards; software as a service (SaaS) featuring software for use as a spreadsheet with integrated security functions for managing and protecting sensitive financial and asset data, specifically developed for use within digital vaults that enforce Data Self-Governance principles; computer security services in the nature of providing digital certificates to authenticate and secure digital transactions and communications, specifically tailored for secure operations within digital vaults adhering to Data Self-Governance; computer security services providing comprehensive security services for the protection and management of digital assets and sensitive data, specifically designed for deployment within digital vault environments that are governed by Data Self-Governance protocols; digital signature verification services (electronic cryptology services) offering digital signature verification to ensure the security and integrity of electronic transactions involving digital assets, specifically tailored for operations within digital vaults that prioritize Data Self-Governance; data security services providing data security solutions focused on the encrypted storage and safe handling of digital assets and sensitive information, specifically designed for secure operations within a digital vault environment that adheres to Data Self-Governance standards; digital archiving services offering digital archiving solutions with advanced security features to protect and preserve digital assets over long periods, tailored for integration within digital vault environments that implement Data Self-Governance protocols; identity verification services (computer security) providing identity verification services using advanced biometric and cryptographic technologies to ensure secure access to digital systems, specifically developed for use within digital vaults focused on Data Self-Governance; electronic cryptology services in the nature of digital certificate and digital signature verification services offering cryptology solutions focused on the verification of digital certificates and signatures to secure digital transactions, specifically tailored for digital vault environments enforcing Data Self-Governance; quality control and authentication services providing quality control and authentication services to ensure the security and authenticity of digital transactions and asset management, tailored for secure operations within digital vaults that follow Data Self-Governance practices; digital music encryption services offering encryption services specifically for digital music to ensure secure storage and transmission, designed to integrate seamlessly into digital vault environments that prioritize Data Self-Governance; authentication services for computer security providing authentication services designed to secure access to computer systems and protect digital assets, specifically developed for deployment within digital vaults that adhere to Data Self-Governance frameworks; platform as a Service (PaaS) that includes tools and services for secure digital asset management and protection, specifically tailored for use within digital vault environments that implement Data Self-Governance protocols; user authentication services using biometric hardware and software technology for point-of-sale transactions providing user authentication services at point-of-sale using biometric technology to secure transactions involving digital assets, specifically tailored for integration within digital vault environments governed by Data Self-Governance; IT services for data protection specifically focused on the protection of digital assets and sensitive data through advanced security measures, tailored for secure operations within digital vault environments that enforce Data Self-Governance; information technology services for data protection providing IT services that emphasize the secure management and protection of digital assets and sensitive information, specifically designed for use within digital vault environments committed to Data Self-Governance; all the foregoing limited to digital security services on the secure management, storage, and encryption of digital assets and sensitive data, and which facilitate the encryption, backup, recovery, and secure storage of critical and sensitive digital information, and not in respect of general consumer software, entertainment, or unrelated technological fields.
Downloadable computer security software for encrypted security and cry...
on 27 Nov 2024
Zaria Group Limited
2364922 · 25 Apr 2024
041
Class 041
Education and Entertainment Services
Education; providing of training; entertainment; sporting and cultural activities.
043
Class 043
Restaurant and Hotel Services
Services for providing food and drink; temporary accommodation.
Education; providing of training; entertainment; sporting and cultural...
on 24 Apr 2024
KOHLER CO.
2323358 · 24 Apr 2024
011
Class 011
Environmental Control Instrument Products lighting heating cooling cooking
Toilets
Toilets
on 24 Apr 2024
XIAOXIN XU
2323661 · 24 Apr 2024
028
Class 028
Toys and Sporting Goods Products
Arm guards for baseball; baseball gloves; baseball mitts; batting gloves; body protectors for American football; body protectors for sports use; chest pads for American football; chest protectors for sports use; elbow guards for athletic use; elbow guards for sports use; jockstraps; knee guards for athletic use; leg guards for athletic use; men's athletic supporters; protective cups for sports; protective padding for snowboarding; protective supports for shoulders and elbows; shin guards for soccer; shoulder pads for American football; wrist guards for athletic use
Arm guards for baseball; baseball gloves; baseball mitts; batting glov...
on 24 Apr 2024
FATTMERCHANT INC.
2323349 · 24 Apr 2024
036
Class 036
Insurance & Financial Services
Charge card and credit card payment processing services; debit card transaction processing services; financial services in the nature of payment processing services; financial transaction services, namely, providing secure commercial transactions and payment options using a mobile device at a point of sale; merchant services, namely, payment transaction processing services; payment gateway services
042
Class 042
Computer & Software Services & Scientific Services
Application service provider (ASP) featuring e-commerce software for use as a payment gateway that authorizes processing of credit cards or direct payments for merchants; software as a service (saas) provider in the field of payment processing services; software as a Service (SAAS) services featuring software for billing and invoicing; software as a Service (SAAS) services featuring software for financial management
Charge card and credit card payment processing services; debit card tr...
on 25 Dec 2024
QIT POUCHES INC
2370837 · 24 Apr 2024
005
Class 005
Pharmaceutical Products
Nicotine patches for use as aids to stop smoking.
Nicotine patches for use as aids to stop smoking.
on 5 Jun 2024
SO Nominees Pty Limited as trustee for Soul OriginIP Unit Trust
2331310 · 24 Apr 2024
029
Class 029
Meats and Processed Food Products
Chicken salads; poultry salads; meat salads; fruit and vegetable salads; vegetable salads; fruit salads; cheese; garden salads, prepared; prepared meals consisting principally of meat, fish, poultry or vegetables; potato salads; cooked fruits and vegetables; prepared meals consisting principally of vegetables; baked potatoes; soups; eggs; cheese in the form of dips; fish and seafood, not live; meat; chicken; poultry, not live; yoghurt; dairy-based desserts; dried fruit; fruit-based snack food; snack foods consisting primarily of nuts; falafel; beverages consisting principally of milk; flavored milk beverages; bacon; prepared meals consisting primarily of bacon; whipped cream; milk shakes; cooked pulses; prepared pulses.
030
Class 030
Staple Food Products
Chocolate-based beverages with milk; edible rice paper; noodle-based prepared meals; noodles; spices; breakfast cereals; muesli; muesli-based snack bars; croissants; tortillas; wraps [sandwich]; wrap sandwiches; grain based snack food; fruit bread; toasted bread; bread rolls; quiche; quinoa, processed; pasta salad; baguettes; bagels; baguettes [French loaves]; sandwiches; toasted sandwiches; cookies; biscuits; brownies; beverages consisting principally of coffee; coffee preparations and beverages; iced coffee; cocoa-based beverages; sauces [condiments]; mustard; honey; caramel sauce; chocolate sauce; caramel syrup; chocolate syrups; tea-based iced beverages; chai tea; tea drinks; bubble tea [tea-based drink]; tea-based drinks with fruit flavoring; pearl milk tea [tea-based drink]; bubble tea; tea-based drinks; brewed coffee; coffee; coffee beverages; drinks made of coffee; ice cream; pastry; bread; confectionery; salad dressings; rice salads; pasta salads.
...
Class 032
Light Beverage Products
Coconut water [beverage]; non-alcoholic drinks; non-alcoholic beverages; smoothies; fruit juices and fruit drinks; coconut juice beverages; fruit juices; vegetable juices [beverages]; iced fruit drinks; aerated fruit juice.
Class 035
Advertising, Business & Retail Services
Business management of retail outlets; providing business information relating to franchising; business consulting relating to franchising; business advice relating to franchising; providing marketing assistance relating to franchising; business assistance relating to franchising; providing business advice relating to franchising; provision of business information relating to franchising; business management assistance in the field of franchising; business consultation relating to franchising; business advisory services relating to franchising; provision of marketing assistance relating to franchising; business consultancy relating to franchising; business management services in relation to franchising; business management services within the framework of franchising; business consultancy services relating to franchising; business consultation services relating to franchising; business franchising consultancy and administrative business support services; online retail store services featuring foodstuffs; business assistance within the framework of a franchise contract; administration of the business affairs of franchises; providing business assistance in the establishment of franchises; provision of business assistance in the operation of franchises; business assistance relating to the establishment of franchises; providing assistance in the management of franchised businesses; providing marketing assistance relating to the operation of franchises; administration of customer loyalty and incentive schemes; organization of customer loyalty schemes; organisation, operation and supervision of loyalty and incentive schemes; administration of loyalty rewards programmes; promoting the goods and services of others by means of a loyalty rewards card scheme; administration of customer loyalty programmes; organisation and management of customer loyalty programs; administration of consumer loyalty programs; business advertising services relating to franchising; commercial advertising services in the field of franchising; advertising, promotion and marketing; product marketing; distribution of advertising, marketing and promotional matter; promotional services; retail store services; retail store services featuring foodstuffs; advertising services for the promotion of goods; advertising services relating to the sale of goods; marketing; retail store services for clothing.
Class 039
Transportation & Storage Services
Food delivery; food delivery services; delivery of food and drink prepared for consumption.
Class 043
Restaurant and Hotel Services
Catering services; preparation of food and drink; preparation of food and beverages; preparation of food and drink for immediate consumption; cafés; café services; catering; mobile catering; catering services for the provision of food; take away food and drink services; serving food and drink in retail and takeaway establishments; take away food services; takeaway food services; takeaway food and drink services; take-out food and drink services; cafeteria services; take-away fast food services; provision of food and drink in bistros; serving food and drinks; catering for the provision of food and beverages; food and drink catering; cafe and snack-bar services.
Chicken salads; poultry salads; meat salads; fruit and vegetable salad...
Owners
The procter & gamble company (428)
L'oreal société anonyme (204)
Johnson & johnson (180)
Unilever canada inc. (175)
Bell canada (144)
Canadian imperial bank of commerce (126)
Glaxo group limited (123)
Canadian tire corporation limited (122)
The bank of nova scotia (114)
Royal bank of canada (103)
Categories
Class 9 (26497)
Class 35 (19844)
Class 42 (13769)
Class 41 (12947)
Class 16 (12469)
Class 25 (11546)
Class 5 (11295)
Class 3 (9560)
Class 36 (9064)
Class 28 (7364)
Class 7 (6843)
Class 21 (6814)
Class 30 (6617)
Class 11 (6533)
Class 20 (5942)
Class 10 (5908)
Class 38 (5522)
Class 1 (5514)
Class 37 (5168)
Class 6 (5106)
Class 29 (5098)
Class 12 (5064)
Class 18 (4659)
Class 44 (4533)
Class 39 (4225)
Class 14 (4223)
Class 24 (4037)
Class 43 (3980)
Class 19 (3966)
Class 32 (3807)
Class 45 (3764)
Class 31 (3736)
Class 40 (3405)
Class 8 (3258)
Class 17 (3082)
Class 33 (2648)
Class 2 (2472)
Class 26 (2367)
Class 34 (2113)
Class 4 (2021)
Class 27 (1932)
Class 22 (1735)
Class 13 (1042)
Class 15 (961)
Class 23 (948)
Correspondents
Smart & biggar lp (15473)
Gowling wlg (canada) llp (10389)
Robic agence pi s.E.C./ robic ip agency lp (3742)
Borden ladner gervais llp (3650)
Marks & clerk (2696)
Osler, hoskin & harcourt llp (2305)
Norton rose fulbright canada llp/s.E.N.C.R.L.,s.R.L. (1749)
Riches, mckenzie & herbert llp (1643)
Fasken martineau dumoulin llp (1636)
Apply for Trademark
Select countries to protect your logo Trademark
Trademark Name
Country Selected
Canada
C$500/ 1 class + gov fee
United States
C$138/ 1 class + gov fee
Canada
C$500/ 1 class + gov fee
Mexico
C$695/ 1 class + gov fee
European Union
C$975/ 1 class + gov fee
China
C$695/ 1 class + gov fee
South Korea
C$974/ 1 class + gov fee
Japan
C$1,113/ 1 class + gov fee
India
C$347/ 1 class + gov fee
United Kingdom
C$695/ 1 class + gov fee
Australia
C$417/ 1 class + gov fee
Israel
C$974/ 1 class + gov fee
United Arab Emirates
C$974/ 1 class + gov fee
New Zealand
C$974/ 1 class + gov fee
Brazil
C$695/ 1 class + gov fee
Taiwan
C$1,113/ 1 class + gov fee
Ukraine
C$1,113/ 1 class + gov fee
Indonesia
C$974/ 1 class + gov fee
South Africa
C$695/ 1 class + gov fee
Singapore
C$1,113/ 1 class + gov fee
Saudi Arabia
C$1,113/ 1 class + gov fee
Afghanistan
C$1,113/ 1 class + gov fee
Algeria
C$1,113/ 1 class + gov fee
Argentina
C$556/ 1 class + gov fee
Austria
C$1,252/ 1 class + gov fee
Bahrain
C$974/ 1 class + gov fee
Bangladesh
C$834/ 1 class + gov fee
Benelux
C$1,391/ 1 class + gov fee
Bhutan
C$1,252/ 1 class + gov fee
Bolivia
C$1,113/ 1 class + gov fee
Botswana
C$1,809/ 1 class + gov fee
British Virgin Islands
C$1,670/ 1 class + gov fee
Bulgaria
C$1,113/ 1 class + gov fee
Cambodia
C$1,113/ 1 class + gov fee
Chile
C$695/ 1 class + gov fee
Colombia
C$974/ 1 class + gov fee
Congo
C$1,670/ 1 class + gov fee
Costa Rica
C$1,252/ 1 class + gov fee
Croatia
C$1,252/ 1 class + gov fee
Cyprus
C$1,391/ 1 class + gov fee
Czech Republic
C$1,252/ 1 class + gov fee
Denmark
C$1,113/ 1 class + gov fee
Macau
C$974/ 1 class + gov fee
Aruba
C$1,670/ 1 class + gov fee
Greenland
C$1,113/ 1 class + gov fee
Curacao
C$1,670/ 1 class + gov fee
Dominican Republic
C$1,252/ 1 class + gov fee
Ecuador
C$1,113/ 1 class + gov fee
Egypt
C$974/ 1 class + gov fee
El Salvador
C$1,113/ 1 class + gov fee
Ethiopia
C$1,531/ 1 class + gov fee
France
C$1,252/ 1 class + gov fee
Gaza
C$1,113/ 1 class + gov fee
Germany
C$1,252/ 1 class + gov fee
Greece
C$1,113/ 1 class + gov fee
Guatemala
C$1,252/ 1 class + gov fee
Haiti
C$1,252/ 1 class + gov fee
Honduras
C$1,252/ 1 class + gov fee
Hong Kong (SAR)
C$1,252/ 1 class + gov fee
Hungary
C$1,531/ 1 class + gov fee
Iraq
C$2,088/ 1 class + gov fee
Italy
C$1,252/ 1 class + gov fee
Jordan
C$1,113/ 1 class + gov fee
Kazakhstan
C$1,113/ 1 class + gov fee
Kenya
C$1,252/ 1 class + gov fee
Kuwait
C$1,113/ 1 class + gov fee
Laos
C$974/ 1 class + gov fee
Lebanon
C$1,391/ 1 class + gov fee
Lesotho
C$1,670/ 1 class + gov fee
Libya
C$1,252/ 1 class + gov fee
Madrid Protocol (WIPO)
C$2,784/ 1 class + gov fee
Malawi
C$1,531/ 1 class + gov fee
Malaysia
C$974/ 1 class + gov fee
Maldives
C$1,391/ 1 class + gov fee
Morocco
C$1,391/ 1 class + gov fee
Mozambique
C$1,252/ 1 class + gov fee
Myanmar
C$1,113/ 1 class + gov fee
Namibia
C$1,113/ 1 class + gov fee
Nepal
C$974/ 1 class + gov fee
Nicaragua
C$1,252/ 1 class + gov fee
Norway
C$1,252/ 1 class + gov fee
Oman
C$1,531/ 1 class + gov fee
Pakistan
C$1,113/ 1 class + gov fee
Panama
C$1,252/ 1 class + gov fee
Paraguay
C$1,252/ 1 class + gov fee
Peru
C$1,113/ 1 class + gov fee
Philippines
C$1,252/ 1 class + gov fee
Poland
C$695/ 1 class + gov fee
Portugal
C$1,252/ 1 class + gov fee
Puerto Rico
C$1,252/ 1 class + gov fee
Qatar
C$1,113/ 1 class + gov fee
Romania
C$1,252/ 1 class + gov fee
Serbia
C$1,252/ 1 class + gov fee
Slovakia
C$1,252/ 1 class + gov fee
Spain
C$1,252/ 1 class + gov fee
Sri Lanka
C$974/ 1 class + gov fee
Swaziland
C$1,809/ 1 class + gov fee
Sweden
C$1,113/ 1 class + gov fee
Switzerland
C$1,252/ 1 class + gov fee
Thailand
C$1,113/ 1 class + gov fee
Tunisia
C$1,252/ 1 class + gov fee
Turkey
C$1,113/ 1 class + gov fee
Uganda
C$974/ 1 class + gov fee
United Republic of Tanzania
C$974/ 1 class + gov fee
Uruguay
C$1,113/ 1 class + gov fee
Venezuela
C$1,252/ 1 class + gov fee
Vietnam
C$1,113/ 1 class + gov fee
West Bank, Palestine
C$1,113/ 1 class + gov fee
Yemen
C$2,366/ 1 class + gov fee
Albania
C$1,252/ 1 class + gov fee
Andorra
C$1,252/ 1 class + gov fee
Angola
C$1,809/ 1 class + gov fee
Antigua and Barbuda
C$1,670/ 1 class + gov fee
Armenia
C$1,113/ 1 class + gov fee
Azerbaijan
C$1,113/ 1 class + gov fee
Bahamas
C$1,948/ 1 class + gov fee
Barbados
C$1,809/ 1 class + gov fee
Belgium
C$1,391/ 1 class + gov fee
Belize
C$1,809/ 1 class + gov fee
Benin
C$1,113/ 1 class + gov fee
Bosnia and Herzegovina
C$1,391/ 1 class + gov fee
Brunei
C$1,809/ 1 class + gov fee
Burkina Faso
C$1,113/ 1 class + gov fee
Burundi
C$1,670/ 1 class + gov fee
Cabo Verde
C$1,252/ 1 class + gov fee
Cameroon
C$1,113/ 1 class + gov fee
Central African Republic (CAR)
C$1,113/ 1 class + gov fee
Chad
C$1,113/ 1 class + gov fee
Comoros
C$1,113/ 1 class + gov fee
Cote d'Ivoire
C$1,113/ 1 class + gov fee
Czechia
C$1,391/ 1 class + gov fee
Djibouti
C$1,670/ 1 class + gov fee
Dominica
C$1,809/ 1 class + gov fee
Equatorial Guinea
C$1,113/ 1 class + gov fee
Eritrea
C$1,391/ 1 class + gov fee
Estonia
C$1,809/ 1 class + gov fee
Eswatini
C$1,809/ 1 class + gov fee
Fiji
C$1,252/ 1 class + gov fee
Finland
C$974/ 1 class + gov fee
Gabon
C$1,113/ 1 class + gov fee
Gambia
C$1,252/ 1 class + gov fee
Georgia
C$1,113/ 1 class + gov fee
Ghana
C$1,391/ 1 class + gov fee
Grenada
C$1,809/ 1 class + gov fee
Guinea
C$1,113/ 1 class + gov fee
Guinea-Bissau
C$1,113/ 1 class + gov fee
Guyana
C$1,809/ 1 class + gov fee
Iceland
C$1,809/ 1 class + gov fee
Ireland
C$1,113/ 1 class + gov fee
Jamaica
C$1,670/ 1 class + gov fee
Kiribati
C$1,391/ 1 class + gov fee
Kosovo
C$1,252/ 1 class + gov fee
Kyrgyzstan
C$1,252/ 1 class + gov fee
Latvia
C$974/ 1 class + gov fee
Liberia
C$1,391/ 1 class + gov fee
Liechtenstein
C$1,391/ 1 class + gov fee
Lithuania
C$974/ 1 class + gov fee
Luxembourg
C$1,391/ 1 class + gov fee
Madagascar
C$1,391/ 1 class + gov fee
Mali
C$1,113/ 1 class + gov fee
Malta
C$834/ 1 class + gov fee
Marshall Islands
C$1,391/ 1 class + gov fee
Mauritania
C$1,113/ 1 class + gov fee
Mauritius
C$1,391/ 1 class + gov fee
Micronesia
C$1,391/ 1 class + gov fee
Moldova
C$1,391/ 1 class + gov fee
Monaco
C$1,948/ 1 class + gov fee
Mongolia
C$834/ 1 class + gov fee
Montenegro
C$1,252/ 1 class + gov fee
Nauru
C$1,391/ 1 class + gov fee
Netherlands
C$1,391/ 1 class + gov fee
Niger
C$1,113/ 1 class + gov fee
Nigeria
C$556/ 1 class + gov fee
North Macedonia
C$1,252/ 1 class + gov fee
Palau
C$1,391/ 1 class + gov fee
Palestine
C$1,391/ 1 class + gov fee
Papua New Guinea
C$1,113/ 1 class + gov fee
Rwanda
C$1,391/ 1 class + gov fee
Saint Kitts and Nevis
C$1,809/ 1 class + gov fee
Saint Lucia
C$1,809/ 1 class + gov fee
Saint Vincent and the Grenadines
C$1,809/ 1 class + gov fee
Samoa
C$1,670/ 1 class + gov fee
San Marino
C$1,391/ 1 class + gov fee
Sao Tome and Principe
C$1,391/ 1 class + gov fee
Senegal
C$1,113/ 1 class + gov fee
Seychelles
C$1,391/ 1 class + gov fee
Sierra Leone
C$1,391/ 1 class + gov fee
Slovenia
C$1,252/ 1 class + gov fee
Solomon Islands
C$1,391/ 1 class + gov fee
Somalia
C$1,391/ 1 class + gov fee
South Sudan
C$1,391/ 1 class + gov fee
Suriname
C$2,227/ 1 class + gov fee
Tajikistan
C$1,113/ 1 class + gov fee
Tanzania
C$974/ 1 class + gov fee
Timor-Leste
C$1,391/ 1 class + gov fee
Togo
C$1,113/ 1 class + gov fee
Tonga
C$1,809/ 1 class + gov fee
Trinidad and Tobago
C$1,670/ 1 class + gov fee
Turkmenistan
C$1,113/ 1 class + gov fee
Tuvalu
C$1,391/ 1 class + gov fee
Uzbekistan
C$974/ 1 class + gov fee
Vanuatu
C$1,670/ 1 class + gov fee
Zambia
C$1,252/ 1 class + gov fee
Zimbabwe
C$1,252/ 1 class + gov fee
OAPI
C$1,252/ 1 class + gov fee
ARIPO
C$1,391/ 1 class + gov fee