About 2,070 Trademarks found for “*ICA”
Filters
Also try searching for:
ICA*
Mark | Details | Status | Class/Description | |
---|---|---|---|---|
BRITANNICA KINGSLEY VENTURES CORPORATION 1608464 3 Jan 2013 | REGISTERED on 8 Sept 2014 | Education, namely, classes, courses, seminars, executive education pro... Class 025 Class 025 Clothing Products Class 035 Class 035 Advertising, Business & Retail Services Casual Clothing. ... Class 036 Insurance & Financial Services Financial services, namely, operation and management of hedge funds, commodity pools, private equity funds, private investments funds, and real estate investment funds, and trading of securities, options, futures, derivatives, debt instruments and commodities ; corporate finance services; investments services, namely, asset and investment acquisition, consultation, advisory and development; capital markets services, namely, researching and providing information on global financial and capital markets; asset management services; capital providing services, namely, for investment in business and financial ventures; financial analysis; wealth management services; risk management services; portfolio management services; financial research services; providing private equity services, namely, researching and investing in privately owned businesses; providing financial and business due-diligence services, namely, investigations into financial statements, operational structure, and managerial capability of publicly traded and privately held companies; mortgage finance services; real estate finance services, namely, providing information, research, technology, and investable products related to real estate properties; providing mergers and acquisitions services, namely, searching, valuing, structuring and processing mergers and acquisitions transactions; financial forecasting; providing financial information; global investment research services; alternative assets services, namely, providing information and advice on alternative assets investments; capital investment consultation; providing fixed income investment services; securities investment services; investment in real estate; investment services in the field of treasury and other government bonds; performance monitoring; venture capital and project capital investment services; investment analysis and publishing of investment reports; currency trading; on-line real-time currency trading; commodities investment advisory services; trading in bonds; trading in stocks; financial services, namely, trading in bonds; derivatives trading services; trading in options. Class 041 Education and Entertainment Services Providing temporary accommodation, namely, hotels, boarding houses, conference rooms, dorm rooms, meeting rooms, event reception rooms, serviced offices, serviced apartments, and seminar rooms, for business and educational seminars; restaurant; catering services. Class 042 Computer & Software Services & Scientific Services Business management; business administration; data processing; computer programming. Class 043 Restaurant and Hotel Services Education, namely, classes, courses, seminars, executive education programs and training in the field of business and finance. | ||
CHINESE INDUSTRY AND COMMERCIAL ALLIED SOCIETY OF NORTH AMERICA YANG XUANWEN 1608364 2 Jan 2013 | ABANDONED SECTION 36 on 1 Apr 2014 | To bridge the relationship between China and North America including C... Class 035 Class 035 Advertising, Business & Retail Services Class 039 Class 039 Transportation & Storage Services ... Class 041 Education and Entertainment Services International Education, Immigration, Tourism, Import/Export Business Class 045 Personal & Legal & Social Services To bridge the relationship between China and North America including Canada, USA and Mexico in order to improve communication and exchange in education, immigration and import/export business | ||
UNITED SLOTS OF AMERICA KONAMI DIGITAL ENTERTAINMENT CO. LTD. A LEGAL ENTITY 1608302 28 Dec 2012 | ABANDONED SECTION 36 on 8 Apr 2014 | Entertainment services, namely providing online computer games accessi... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Computer game programs; computer game software; video game software; video game programs; electronic game programs Class 041 Class 041 Education and Entertainment Services Entertainment services, namely providing online computer games accessible via video game machine, mobile phones and computers; providing information, images, music and sound regarding games; arranging, organizing and conducting game tournaments | ||
MUSICA AGFA NV 1606571 13 Dec 2012 | REGISTERED on 21 May 2014 | Image processing software for use in medical computed radiography,Soft... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Image processing software for use in medical computed radiography | ||
PERRY ELLIS AMERICA PEI LICENSING INC. 1606491 13 Dec 2012 | ABANDONED SECTION 40(3) on 4 Jan 2017 | On-line retail store services featuring apparel, hats, leather goods, ... Class 035 Class 035 Advertising, Business & Retail Services On-line retail store services featuring apparel, hats, leather goods, fashion accessories, jewelry, footwear, cosmetics, personal care products, eyewear and luggage; Retail store services featuring apparel, hats, leather goods, fashion accessories, jewelry, footwear, cosmetics, personal care products, eyewear and luggage; | ||
DETICA BAE SYSTEMS PLC 1606146 11 Dec 2012 | ABANDONED SECTION 36 on 11 Aug 2015 | Compilation and systematization of information into computer databases... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Class 016 Class 016 Paper Goods and Printed Material ... Class 035 Advertising, Business & Retail Services Computer software, firmware and hardware for searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for searching for, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling transactions in the fields of crime, financial crime, fraud, anti-smuggling operations and counter-terrorism; computer software, firmware and hardware for searching, exploring, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling patterns and networks in data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for use in detecting and reporting on suspicious and abnormal behaviour in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, anti-smuggling operations, homeland security and counter-terrorism; computer software, firmware and hardware for analysing and predicting customer behaviour; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the field of information technology and communications technology security; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analysing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the fields of defence, law enforcement, and business process optimisation; data processing equipment, namely, computers; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for identifying and reporting intrusions into computer networks and communications networks; computer software, namely, firewalls; computer hardware, namely, firewalls; computer software, firmware and hardware for identifying, collecting, viewing, recording, analysing, sharing, processing, managing, filtering, storing, monitoring and transmitting data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; computer software for real-time situational awareness and workflow management; computer software, firmware and hardware for receiving, collecting, storing, viewing, sharing, monitoring, managing, processing, configuring, analysing, sanitising, cleansing, anonymising, de-anonymising, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation, transmitting, sharing and validating of data and of information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and of electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware which provide a gateway for anonymising, de-anonymising, transmitting, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation and validating data and information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for receiving, processing, converting, translating, validating, encrypting, decrypting, recording, sending and distributing data, namely financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for checking the integrity of data; computer software for transferring data between networks; computer software for message brokering; computer software for protecting the quality, integrity and security of data and information, in particular when transmitted between networks; computer software, firmware and hardware for minimising the risk of data leaks, data breach, data loss and other risks associated with the transmission of data between networks; computer software for the creation and operation of a data firewall which intercepts and transforms data sent between different networks, interfaces or security domains; computer software for checking data for viruses, malware and spyware; computer software for monitoring data levels; computer software, firmware and hardware for use in gathering intelligence and evidence; sensors, namely, motion sensors, proximity sensors and voice sensors; apparatus, namely, computers, for gathering information and evidence; computer software, firmware and hardware for use in detection, analysing, neutralisation, excavation and disposal in the field of explosive ordnance disposal; computer software, firmware, hardware, sensors, namely, motion sensors, weight sensors and proximity sensors for the purposes of countering improvised explosive devices (IEDs), including minefield clearance; parts and fittings for computer firmware and computer hardware; publications, brochures, reports, certificates, user manuals, user guides, technical manuals, instruction manuals, training manuals, educational, training and instructional materials in electronic form, namely, user guides, technical manuals, instruction sheets, instruction manuals, training manuals, online seminars, online training courses and DVDs, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed matter, namely, printed magazines, printed periodical publications, printed newsletters, printed brochures and printed product information sheets, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed reports; technical manuals; instruction manuals; user manuals; user guides; educational, training and instructional materials in printed form, namely, printed user guides, printed technical manuals, printed instruction sheets, printed instruction manuals and printed training manuals in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; certificates; newsletters; pamphlets; brochures; catalogues; printed advertising materials, namely, printed commercials (advertisements), printed posters, printed brochures, printed leaflets, printed magazines and printed product information sheets. Class 036 Insurance & Financial Services Computer software, firmware and hardware for searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for searching for, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling transactions in the fields of crime, financial crime, fraud, anti-smuggling operations and counter-terrorism; computer software, firmware and hardware for searching, exploring, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling patterns and networks in data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for use in detecting and reporting on suspicious and abnormal behaviour in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, anti-smuggling operations, homeland security and counter-terrorism; computer software, firmware and hardware for analysing and predicting customer behaviour; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the field of information technology and communications technology security; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analysing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the fields of defence, law enforcement, and business process optimisation; data processing equipment, namely, computers; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for identifying and reporting intrusions into computer networks and communications networks; computer software, namely, firewalls; computer hardware, namely, firewalls; computer software, firmware and hardware for identifying, collecting, viewing, recording, analysing, sharing, processing, managing, filtering, storing, monitoring and transmitting data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; computer software for real-time situational awareness and workflow management; computer software, firmware and hardware for receiving, collecting, storing, viewing, sharing, monitoring, managing, processing, configuring, analysing, sanitising, cleansing, anonymising, de-anonymising, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation, transmitting, sharing and validating of data and of information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and of electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware which provide a gateway for anonymising, de-anonymising, transmitting, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation and validating data and information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for receiving, processing, converting, translating, validating, encrypting, decrypting, recording, sending and distributing data, namely financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for checking the integrity of data; computer software for transferring data between networks; computer software for message brokering; computer software for protecting the quality, integrity and security of data and information, in particular when transmitted between networks; computer software, firmware and hardware for minimising the risk of data leaks, data breach, data loss and other risks associated with the transmission of data between networks; computer software for the creation and operation of a data firewall which intercepts and transforms data sent between different networks, interfaces or security domains; computer software for checking data for viruses, malware and spyware; computer software for monitoring data levels; computer software, firmware and hardware for use in gathering intelligence and evidence; sensors, namely, motion sensors, proximity sensors and voice sensors; apparatus, namely, computers, for gathering information and evidence; computer software, firmware and hardware for use in detection, analysing, neutralisation, excavation and disposal in the field of explosive ordnance disposal; computer software, firmware, hardware, sensors, namely, motion sensors, weight sensors and proximity sensors for the purposes of countering improvised explosive devices (IEDs), including minefield clearance; parts and fittings for computer firmware and computer hardware; publications, brochures, reports, certificates, user manuals, user guides, technical manuals, instruction manuals, training manuals, educational, training and instructional materials in electronic form, namely, user guides, technical manuals, instruction sheets, instruction manuals, training manuals, online seminars, online training courses and DVDs, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed matter, namely, printed magazines, printed periodical publications, printed newsletters, printed brochures and printed product information sheets, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed reports; technical manuals; instruction manuals; user manuals; user guides; educational, training and instructional materials in printed form, namely, printed user guides, printed technical manuals, printed instruction sheets, printed instruction manuals and printed training manuals in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; certificates; newsletters; pamphlets; brochures; catalogues; printed advertising materials, namely, printed commercials (advertisements), printed posters, printed brochures, printed leaflets, printed magazines and printed product information sheets. Class 037 Construction and Repair Services Computer software, firmware and hardware for searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for searching for, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling transactions in the fields of crime, financial crime, fraud, anti-smuggling operations and counter-terrorism; computer software, firmware and hardware for searching, exploring, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling patterns and networks in data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for use in detecting and reporting on suspicious and abnormal behaviour in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, anti-smuggling operations, homeland security and counter-terrorism; computer software, firmware and hardware for analysing and predicting customer behaviour; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the field of information technology and communications technology security; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analysing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the fields of defence, law enforcement, and business process optimisation; data processing equipment, namely, computers; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for identifying and reporting intrusions into computer networks and communications networks; computer software, namely, firewalls; computer hardware, namely, firewalls; computer software, firmware and hardware for identifying, collecting, viewing, recording, analysing, sharing, processing, managing, filtering, storing, monitoring and transmitting data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; computer software for real-time situational awareness and workflow management; computer software, firmware and hardware for receiving, collecting, storing, viewing, sharing, monitoring, managing, processing, configuring, analysing, sanitising, cleansing, anonymising, de-anonymising, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation, transmitting, sharing and validating of data and of information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and of electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware which provide a gateway for anonymising, de-anonymising, transmitting, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation and validating data and information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for receiving, processing, converting, translating, validating, encrypting, decrypting, recording, sending and distributing data, namely financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for checking the integrity of data; computer software for transferring data between networks; computer software for message brokering; computer software for protecting the quality, integrity and security of data and information, in particular when transmitted between networks; computer software, firmware and hardware for minimising the risk of data leaks, data breach, data loss and other risks associated with the transmission of data between networks; computer software for the creation and operation of a data firewall which intercepts and transforms data sent between different networks, interfaces or security domains; computer software for checking data for viruses, malware and spyware; computer software for monitoring data levels; computer software, firmware and hardware for use in gathering intelligence and evidence; sensors, namely, motion sensors, proximity sensors and voice sensors; apparatus, namely, computers, for gathering information and evidence; computer software, firmware and hardware for use in detection, analysing, neutralisation, excavation and disposal in the field of explosive ordnance disposal; computer software, firmware, hardware, sensors, namely, motion sensors, weight sensors and proximity sensors for the purposes of countering improvised explosive devices (IEDs), including minefield clearance; parts and fittings for computer firmware and computer hardware; publications, brochures, reports, certificates, user manuals, user guides, technical manuals, instruction manuals, training manuals, educational, training and instructional materials in electronic form, namely, user guides, technical manuals, instruction sheets, instruction manuals, training manuals, online seminars, online training courses and DVDs, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed matter, namely, printed magazines, printed periodical publications, printed newsletters, printed brochures and printed product information sheets, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed reports; technical manuals; instruction manuals; user manuals; user guides; educational, training and instructional materials in printed form, namely, printed user guides, printed technical manuals, printed instruction sheets, printed instruction manuals and printed training manuals in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; certificates; newsletters; pamphlets; brochures; catalogues; printed advertising materials, namely, printed commercials (advertisements), printed posters, printed brochures, printed leaflets, printed magazines and printed product information sheets. Class 041 Education and Entertainment Services Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modelling of data and transactions, and of patterns and networks in data and transactions; business consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; management consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; technical management consulting in the fields of information technology, communications technology and computer network security; strategy consulting in the fields of information technology, communications technology, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; provision of business information; provision of business management information; business analysis services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; analytics, namely, business intelligence and business lifecycle analysis; business operational analysis services; business research services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; carrying out studies in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure to provide evidence to support informed decision making; business consulting relating to operational availability, operational capability, capability planning, capability audits, cost analysis and effectiveness analysis; supply chain modelling, namely, mathematical modelling of supply chain networks; business modelling to support operational risk analysis and capability audits; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; business simulation to understand and explain business performance; enterprise mapping, namely, developing a breakdown of the key activities required to support a complex multi-organisational enterprise in the achievement of its goals; business facilitation services, namely, designing, running, guiding or chairing meetings to facilitate the reaching of a common goal or to facilitate a productive or successful exchange of information or ideas; identification of business or organisational performance indicators; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; information, advice and consultancy relating to detecting, combating and defending against financial crime, namely, money laundering, financial fraud, debit and credit card fraud and on-line fraud; information, advice and consultancy relating to the monitoring of financial transactions, detecting and preventing suspicious financial behaviour and reducing monetary losses; information, advice and consultancy relating to due diligence, background checks and vetting of customers and potential customers; information, advice and consultancy relating to the identification, investigation, review and management of cases of financial crime of all types; information, advice and consultancy relating to regulatory compliance, operational efficiency, risk management and corporate governance; information technology consultancy services; communications technology consultancy services; research, design, development and customisation of computer software, computer firmware, computer hardware, computer systems and computer architectures; preparation of technical reports; preparation of reports relating to computer data, computer software, computer firmware, computer hardware, computer operating systems, computer networks, communications networks, the security of computer networks and the security of communications networks; installation, integration, implementation, configuration, servicing, maintenance, updating, upgrading, repair and operational support services for computer software; computer software services relating to the searching, mining, collection, gathering, storage, exploration, analysis, processing, management, aggregation, modelling, viewing, sharing and monitoring of data and transactions, namely, patterns and networks in data and transactions; computer software services relating to the detection and prevention of fraud, on-line fraud, financial fraud, financial crime, suspicious behaviour, terrorism operations, smuggling operations, money laundering operations and monetary losses; computer software services relating to identifying, investigating, reviewing and managing cases of financial crime of all types; computer software services, namely, SaaS ("software as a service"), relating to predictive modelling, regulatory compliance, operational efficiency, risk management, risk prevention, corporate governance and customer relationship management; computer software services in the field of due diligence investigations on customers and potential customers; computer software services relating to the analysis and prediction of customer behaviour; computer system monitoring services; analytical services in the fields of computers, computer networks and communications networks; forensic analysis of computer operating systems; forensic analysis, reverse engineering, storage, recovery, conversion, compression and migration of computer data; computer software services in the fields of matching, transforming, sampling, partitioning and analysis of data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; analytical services in the field of computers, computer software, computer networks and communications networks; computer software, computer programs and manuals in electronic form, dealing with artificial intelligence; technical support services, namely, developing technologies for others in the field of artificial intelligence; neural network modelling, namely, mathematical and technical consulting services in the field of neural network technologies; project management services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; industrial analysis and research services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; providing analytical tools for raising threat alerts; computer virus, malware and spyware protection services; recovery of computer data and computer operating systems; incident management and investigations relating to threats and malicious behaviour in connection with computer operating systems, computer networks and communications networks; geographic mapping and spatial modelling; information, advice and consultancy relating to computer security, computer network security and communications network security; advising and consulting on how to reduce vulnerability to cyber-attacks, how to minimise the damage caused by cyber-attacks, and how to recover from cyber-attacks; computer software services, consultancy and advice in the field of gathering of intelligence and evidence; computer software services, consultancy and advice in the field of explosive ordnance disposal; computer software services, consultancy and advice relating to the countering of improvised explosive devices (IEDs), including minefield clearance; military and defence analysis and consulting; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; data security services, namely, provision of services for the secure gathering, storage, retrieval, analysis, monitoring, transmission and exchange of data, namely, personal data, business data, financial data, transactions data, Internet traffic data, computer data, communications network data, behavioural data, audio data, visual data and geographical data; analysis, consulting and advice in relation to national security; homeland security advisory and consultancy services, namely, advising and consulting on how to reduce vulnerability to terrorism, how to minimise the damage caused by terrorist attacks, and how to recover from terrorist attacks. Class 042 Computer & Software Services & Scientific Services Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modelling of data and transactions, and of patterns and networks in data and transactions; business consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; management consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; technical management consulting in the fields of information technology, communications technology and computer network security; strategy consulting in the fields of information technology, communications technology, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; provision of business information; provision of business management information; business analysis services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; analytics, namely, business intelligence and business lifecycle analysis; business operational analysis services; business research services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; carrying out studies in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure to provide evidence to support informed decision making; business consulting relating to operational availability, operational capability, capability planning, capability audits, cost analysis and effectiveness analysis; supply chain modelling, namely, mathematical modelling of supply chain networks; business modelling to support operational risk analysis and capability audits; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; business simulation to understand and explain business performance; enterprise mapping, namely, developing a breakdown of the key activities required to support a complex multi-organisational enterprise in the achievement of its goals; business facilitation services, namely, designing, running, guiding or chairing meetings to facilitate the reaching of a common goal or to facilitate a productive or successful exchange of information or ideas; identification of business or organisational performance indicators; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; information, advice and consultancy relating to detecting, combating and defending against financial crime, namely, money laundering, financial fraud, debit and credit card fraud and on-line fraud; information, advice and consultancy relating to the monitoring of financial transactions, detecting and preventing suspicious financial behaviour and reducing monetary losses; information, advice and consultancy relating to due diligence, background checks and vetting of customers and potential customers; information, advice and consultancy relating to the identification, investigation, review and management of cases of financial crime of all types; information, advice and consultancy relating to regulatory compliance, operational efficiency, risk management and corporate governance; information technology consultancy services; communications technology consultancy services; research, design, development and customisation of computer software, computer firmware, computer hardware, computer systems and computer architectures; preparation of technical reports; preparation of reports relating to computer data, computer software, computer firmware, computer hardware, computer operating systems, computer networks, communications networks, the security of computer networks and the security of communications networks; installation, integration, implementation, configuration, servicing, maintenance, updating, upgrading, repair and operational support services for computer software; computer software services relating to the searching, mining, collection, gathering, storage, exploration, analysis, processing, management, aggregation, modelling, viewing, sharing and monitoring of data and transactions, namely, patterns and networks in data and transactions; computer software services relating to the detection and prevention of fraud, on-line fraud, financial fraud, financial crime, suspicious behaviour, terrorism operations, smuggling operations, money laundering operations and monetary losses; computer software services relating to identifying, investigating, reviewing and managing cases of financial crime of all types; computer software services, namely, SaaS ("software as a service"), relating to predictive modelling, regulatory compliance, operational efficiency, risk management, risk prevention, corporate governance and customer relationship management; computer software services in the field of due diligence investigations on customers and potential customers; computer software services relating to the analysis and prediction of customer behaviour; computer system monitoring services; analytical services in the fields of computers, computer networks and communications networks; forensic analysis of computer operating systems; forensic analysis, reverse engineering, storage, recovery, conversion, compression and migration of computer data; computer software services in the fields of matching, transforming, sampling, partitioning and analysis of data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; analytical services in the field of computers, computer software, computer networks and communications networks; computer software, computer programs and manuals in electronic form, dealing with artificial intelligence; technical support services, namely, developing technologies for others in the field of artificial intelligence; neural network modelling, namely, mathematical and technical consulting services in the field of neural network technologies; project management services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; industrial analysis and research services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; providing analytical tools for raising threat alerts; computer virus, malware and spyware protection services; recovery of computer data and computer operating systems; incident management and investigations relating to threats and malicious behaviour in connection with computer operating systems, computer networks and communications networks; geographic mapping and spatial modelling; information, advice and consultancy relating to computer security, computer network security and communications network security; advising and consulting on how to reduce vulnerability to cyber-attacks, how to minimise the damage caused by cyber-attacks, and how to recover from cyber-attacks; computer software services, consultancy and advice in the field of gathering of intelligence and evidence; computer software services, consultancy and advice in the field of explosive ordnance disposal; computer software services, consultancy and advice relating to the countering of improvised explosive devices (IEDs), including minefield clearance; military and defence analysis and consulting; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; data security services, namely, provision of services for the secure gathering, storage, retrieval, analysis, monitoring, transmission and exchange of data, namely, personal data, business data, financial data, transactions data, Internet traffic data, computer data, communications network data, behavioural data, audio data, visual data and geographical data; analysis, consulting and advice in relation to national security; homeland security advisory and consultancy services, namely, advising and consulting on how to reduce vulnerability to terrorism, how to minimise the damage caused by terrorist attacks, and how to recover from terrorist attacks. Class 045 Personal & Legal & Social Services Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modelling of data and transactions, and of patterns and networks in data and transactions; business consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; management consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; technical management consulting in the fields of information technology, communications technology and computer network security; strategy consulting in the fields of information technology, communications technology, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; provision of business information; provision of business management information; business analysis services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; analytics, namely, business intelligence and business lifecycle analysis; business operational analysis services; business research services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; carrying out studies in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure to provide evidence to support informed decision making; business consulting relating to operational availability, operational capability, capability planning, capability audits, cost analysis and effectiveness analysis; supply chain modelling, namely, mathematical modelling of supply chain networks; business modelling to support operational risk analysis and capability audits; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; business simulation to understand and explain business performance; enterprise mapping, namely, developing a breakdown of the key activities required to support a complex multi-organisational enterprise in the achievement of its goals; business facilitation services, namely, designing, running, guiding or chairing meetings to facilitate the reaching of a common goal or to facilitate a productive or successful exchange of information or ideas; identification of business or organisational performance indicators; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; information, advice and consultancy relating to detecting, combating and defending against financial crime, namely, money laundering, financial fraud, debit and credit card fraud and on-line fraud; information, advice and consultancy relating to the monitoring of financial transactions, detecting and preventing suspicious financial behaviour and reducing monetary losses; information, advice and consultancy relating to due diligence, background checks and vetting of customers and potential customers; information, advice and consultancy relating to the identification, investigation, review and management of cases of financial crime of all types; information, advice and consultancy relating to regulatory compliance, operational efficiency, risk management and corporate governance; information technology consultancy services; communications technology consultancy services; research, design, development and customisation of computer software, computer firmware, computer hardware, computer systems and computer architectures; preparation of technical reports; preparation of reports relating to computer data, computer software, computer firmware, computer hardware, computer operating systems, computer networks, communications networks, the security of computer networks and the security of communications networks; installation, integration, implementation, configuration, servicing, maintenance, updating, upgrading, repair and operational support services for computer software; computer software services relating to the searching, mining, collection, gathering, storage, exploration, analysis, processing, management, aggregation, modelling, viewing, sharing and monitoring of data and transactions, namely, patterns and networks in data and transactions; computer software services relating to the detection and prevention of fraud, on-line fraud, financial fraud, financial crime, suspicious behaviour, terrorism operations, smuggling operations, money laundering operations and monetary losses; computer software services relating to identifying, investigating, reviewing and managing cases of financial crime of all types; computer software services, namely, SaaS ("software as a service"), relating to predictive modelling, regulatory compliance, operational efficiency, risk management, risk prevention, corporate governance and customer relationship management; computer software services in the field of due diligence investigations on customers and potential customers; computer software services relating to the analysis and prediction of customer behaviour; computer system monitoring services; analytical services in the fields of computers, computer networks and communications networks; forensic analysis of computer operating systems; forensic analysis, reverse engineering, storage, recovery, conversion, compression and migration of computer data; computer software services in the fields of matching, transforming, sampling, partitioning and analysis of data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; analytical services in the field of computers, computer software, computer networks and communications networks; computer software, computer programs and manuals in electronic form, dealing with artificial intelligence; technical support services, namely, developing technologies for others in the field of artificial intelligence; neural network modelling, namely, mathematical and technical consulting services in the field of neural network technologies; project management services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; industrial analysis and research services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; providing analytical tools for raising threat alerts; computer virus, malware and spyware protection services; recovery of computer data and computer operating systems; incident management and investigations relating to threats and malicious behaviour in connection with computer operating systems, computer networks and communications networks; geographic mapping and spatial modelling; information, advice and consultancy relating to computer security, computer network security and communications network security; advising and consulting on how to reduce vulnerability to cyber-attacks, how to minimise the damage caused by cyber-attacks, and how to recover from cyber-attacks; computer software services, consultancy and advice in the field of gathering of intelligence and evidence; computer software services, consultancy and advice in the field of explosive ordnance disposal; computer software services, consultancy and advice relating to the countering of improvised explosive devices (IEDs), including minefield clearance; military and defence analysis and consulting; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; data security services, namely, provision of services for the secure gathering, storage, retrieval, analysis, monitoring, transmission and exchange of data, namely, personal data, business data, financial data, transactions data, Internet traffic data, computer data, communications network data, behavioural data, audio data, visual data and geographical data; analysis, consulting and advice in relation to national security; homeland security advisory and consultancy services, namely, advising and consulting on how to reduce vulnerability to terrorism, how to minimise the damage caused by terrorist attacks, and how to recover from terrorist attacks. | ||
SUREMERICA ALLIANT INSURANCE SERVICES INC. 1605438 6 Dec 2012 | REGISTERED on 15 Apr 2015 | Surety services; surety underwriting and surety underwriting services. Class 036 Class 036 Insurance & Financial Services Surety services; surety underwriting and surety underwriting services. | ||
RETURN TO RAVNICA WIZARDS OF THE COAST LLC 1604507 29 Nov 2012 | REGISTERED on 3 Jun 2014 | Card games, trading card games, playing cards Class 028 Class 028 Toys and Sporting Goods Products Card games, trading card games, playing cards | ||
MAGELICA MAGELICA INC. 1603663 23 Nov 2012 | REGISTERED on 8 Jan 2015 | Books, electronic books, video recordings, namely DVDs featuring episo... Class 003 Class 003 Cosmetics and Cleaning Products Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products ... Class 014 Jewelry Products Class 016 Paper Goods and Printed Material Class 018 Leather Products not including clothing Class 024 Fabrics Class 025 Clothing Products Class 026 Lace, Ribbons & Embroidery and Fancy Goods Class 028 Toys and Sporting Goods Products Books, electronic books, video recordings, namely DVDs featuring episodes from a television series, animated feature films and movies, animated feature films and movies; travel gear, namely luggage; cosmetics, namely, lip gloss, cleansing gel, shampoo, cream, cologne, bath mousse and sunscreen; accessories, namely bath robes, bath towels, bath mitts, bath hair bands, slippers and pyjamas; jewellery with feather/wing pendant, namely necklace and bracelet; t- shirts; toys namely, video games, stuffed animals and figurines. | ||
METRICA MICHAEL LAWRENCE 1602043 13 Nov 2012 | REGISTERED on 12 May 2014 | A web-based service for: (1) on-line publishing of academic research p... Class 041 Class 041 Education and Entertainment Services Class 042 Class 042 Computer & Software Services & Scientific Services A web-based service for: (1) on-line publishing of academic research papers, (2) collecting peer reviews of academic research papers, and (3) quantifying research contributions by peer evaluation of contributed academic research papers and reviews. |
on 8 Sept 2014
KINGSLEY VENTURES CORPORATION
1608464 · 3 Jan 2013
025
Class 025
Clothing Products
035
Class 035
Advertising, Business & Retail Services
Casual Clothing.
...
Class 036
Insurance & Financial Services
Financial services, namely, operation and management of hedge funds, commodity pools, private equity funds, private investments funds, and real estate investment funds, and trading of securities, options, futures, derivatives, debt instruments and commodities ; corporate finance services; investments services, namely, asset and investment acquisition, consultation, advisory and development; capital markets services, namely, researching and providing information on global financial and capital markets; asset management services; capital providing services, namely, for investment in business and financial ventures; financial analysis; wealth management services; risk management services; portfolio management services; financial research services; providing private equity services, namely, researching and investing in privately owned businesses; providing financial and business due-diligence services, namely, investigations into financial statements, operational structure, and managerial capability of publicly traded and privately held companies; mortgage finance services; real estate finance services, namely, providing information, research, technology, and investable products related to real estate properties; providing mergers and acquisitions services, namely, searching, valuing, structuring and processing mergers and acquisitions transactions; financial forecasting; providing financial information; global investment research services; alternative assets services, namely, providing information and advice on alternative assets investments; capital investment consultation; providing fixed income investment services; securities investment services; investment in real estate; investment services in the field of treasury and other government bonds; performance monitoring; venture capital and project capital investment services; investment analysis and publishing of investment reports; currency trading; on-line real-time currency trading; commodities investment advisory services; trading in bonds; trading in stocks; financial services, namely, trading in bonds; derivatives trading services; trading in options.
Class 041
Education and Entertainment Services
Providing temporary accommodation, namely, hotels, boarding houses, conference rooms, dorm rooms, meeting rooms, event reception rooms, serviced offices, serviced apartments, and seminar rooms, for business and educational seminars; restaurant; catering services.
Class 042
Computer & Software Services & Scientific Services
Business management; business administration; data processing; computer programming.
Class 043
Restaurant and Hotel Services
Education, namely, classes, courses, seminars, executive education programs and training in the field of business and finance.
Education, namely, classes, courses, seminars, executive education pro...
on 1 Apr 2014
YANG XUANWEN
1608364 · 2 Jan 2013
035
Class 035
Advertising, Business & Retail Services
039
Class 039
Transportation & Storage Services
...
Class 041
Education and Entertainment Services
International Education, Immigration, Tourism, Import/Export Business
Class 045
Personal & Legal & Social Services
To bridge the relationship between China and North America including Canada, USA and Mexico in order to improve communication and exchange in education, immigration and import/export business
To bridge the relationship between China and North America including C...
on 8 Apr 2014
KONAMI DIGITAL ENTERTAINMENT CO. LTD. A LEGAL ENTITY
1608302 · 28 Dec 2012
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Computer game programs; computer game software; video game software; video game programs; electronic game programs
041
Class 041
Education and Entertainment Services
Entertainment services, namely providing online computer games accessible via video game machine, mobile phones and computers; providing information, images, music and sound regarding games; arranging, organizing and conducting game tournaments
Entertainment services, namely providing online computer games accessi...
on 21 May 2014
AGFA NV
1606571 · 13 Dec 2012
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Image processing software for use in medical computed radiography
Image processing software for use in medical computed radiography,Soft...
on 4 Jan 2017
PEI LICENSING INC.
1606491 · 13 Dec 2012
035
Class 035
Advertising, Business & Retail Services
On-line retail store services featuring apparel, hats, leather goods, fashion accessories, jewelry, footwear, cosmetics, personal care products, eyewear and luggage; Retail store services featuring apparel, hats, leather goods, fashion accessories, jewelry, footwear, cosmetics, personal care products, eyewear and luggage;
On-line retail store services featuring apparel, hats, leather goods, ...
on 11 Aug 2015
BAE SYSTEMS PLC
1606146 · 11 Dec 2012
009
Class 009
Computer & Software Products & Electrical & Scientific Products
016
Class 016
Paper Goods and Printed Material
...
Class 035
Advertising, Business & Retail Services
Computer software, firmware and hardware for searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for searching for, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling transactions in the fields of crime, financial crime, fraud, anti-smuggling operations and counter-terrorism; computer software, firmware and hardware for searching, exploring, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling patterns and networks in data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for use in detecting and reporting on suspicious and abnormal behaviour in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, anti-smuggling operations, homeland security and counter-terrorism; computer software, firmware and hardware for analysing and predicting customer behaviour; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the field of information technology and communications technology security; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analysing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the fields of defence, law enforcement, and business process optimisation; data processing equipment, namely, computers; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for identifying and reporting intrusions into computer networks and communications networks; computer software, namely, firewalls; computer hardware, namely, firewalls; computer software, firmware and hardware for identifying, collecting, viewing, recording, analysing, sharing, processing, managing, filtering, storing, monitoring and transmitting data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; computer software for real-time situational awareness and workflow management; computer software, firmware and hardware for receiving, collecting, storing, viewing, sharing, monitoring, managing, processing, configuring, analysing, sanitising, cleansing, anonymising, de-anonymising, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation, transmitting, sharing and validating of data and of information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and of electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware which provide a gateway for anonymising, de-anonymising, transmitting, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation and validating data and information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for receiving, processing, converting, translating, validating, encrypting, decrypting, recording, sending and distributing data, namely financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for checking the integrity of data; computer software for transferring data between networks; computer software for message brokering; computer software for protecting the quality, integrity and security of data and information, in particular when transmitted between networks; computer software, firmware and hardware for minimising the risk of data leaks, data breach, data loss and other risks associated with the transmission of data between networks; computer software for the creation and operation of a data firewall which intercepts and transforms data sent between different networks, interfaces or security domains; computer software for checking data for viruses, malware and spyware; computer software for monitoring data levels; computer software, firmware and hardware for use in gathering intelligence and evidence; sensors, namely, motion sensors, proximity sensors and voice sensors; apparatus, namely, computers, for gathering information and evidence; computer software, firmware and hardware for use in detection, analysing, neutralisation, excavation and disposal in the field of explosive ordnance disposal; computer software, firmware, hardware, sensors, namely, motion sensors, weight sensors and proximity sensors for the purposes of countering improvised explosive devices (IEDs), including minefield clearance; parts and fittings for computer firmware and computer hardware; publications, brochures, reports, certificates, user manuals, user guides, technical manuals, instruction manuals, training manuals, educational, training and instructional materials in electronic form, namely, user guides, technical manuals, instruction sheets, instruction manuals, training manuals, online seminars, online training courses and DVDs, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed matter, namely, printed magazines, printed periodical publications, printed newsletters, printed brochures and printed product information sheets, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed reports; technical manuals; instruction manuals; user manuals; user guides; educational, training and instructional materials in printed form, namely, printed user guides, printed technical manuals, printed instruction sheets, printed instruction manuals and printed training manuals in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; certificates; newsletters; pamphlets; brochures; catalogues; printed advertising materials, namely, printed commercials (advertisements), printed posters, printed brochures, printed leaflets, printed magazines and printed product information sheets.
Class 036
Insurance & Financial Services
Computer software, firmware and hardware for searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for searching for, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling transactions in the fields of crime, financial crime, fraud, anti-smuggling operations and counter-terrorism; computer software, firmware and hardware for searching, exploring, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling patterns and networks in data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for use in detecting and reporting on suspicious and abnormal behaviour in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, anti-smuggling operations, homeland security and counter-terrorism; computer software, firmware and hardware for analysing and predicting customer behaviour; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the field of information technology and communications technology security; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analysing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the fields of defence, law enforcement, and business process optimisation; data processing equipment, namely, computers; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for identifying and reporting intrusions into computer networks and communications networks; computer software, namely, firewalls; computer hardware, namely, firewalls; computer software, firmware and hardware for identifying, collecting, viewing, recording, analysing, sharing, processing, managing, filtering, storing, monitoring and transmitting data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; computer software for real-time situational awareness and workflow management; computer software, firmware and hardware for receiving, collecting, storing, viewing, sharing, monitoring, managing, processing, configuring, analysing, sanitising, cleansing, anonymising, de-anonymising, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation, transmitting, sharing and validating of data and of information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and of electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware which provide a gateway for anonymising, de-anonymising, transmitting, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation and validating data and information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for receiving, processing, converting, translating, validating, encrypting, decrypting, recording, sending and distributing data, namely financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for checking the integrity of data; computer software for transferring data between networks; computer software for message brokering; computer software for protecting the quality, integrity and security of data and information, in particular when transmitted between networks; computer software, firmware and hardware for minimising the risk of data leaks, data breach, data loss and other risks associated with the transmission of data between networks; computer software for the creation and operation of a data firewall which intercepts and transforms data sent between different networks, interfaces or security domains; computer software for checking data for viruses, malware and spyware; computer software for monitoring data levels; computer software, firmware and hardware for use in gathering intelligence and evidence; sensors, namely, motion sensors, proximity sensors and voice sensors; apparatus, namely, computers, for gathering information and evidence; computer software, firmware and hardware for use in detection, analysing, neutralisation, excavation and disposal in the field of explosive ordnance disposal; computer software, firmware, hardware, sensors, namely, motion sensors, weight sensors and proximity sensors for the purposes of countering improvised explosive devices (IEDs), including minefield clearance; parts and fittings for computer firmware and computer hardware; publications, brochures, reports, certificates, user manuals, user guides, technical manuals, instruction manuals, training manuals, educational, training and instructional materials in electronic form, namely, user guides, technical manuals, instruction sheets, instruction manuals, training manuals, online seminars, online training courses and DVDs, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed matter, namely, printed magazines, printed periodical publications, printed newsletters, printed brochures and printed product information sheets, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed reports; technical manuals; instruction manuals; user manuals; user guides; educational, training and instructional materials in printed form, namely, printed user guides, printed technical manuals, printed instruction sheets, printed instruction manuals and printed training manuals in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; certificates; newsletters; pamphlets; brochures; catalogues; printed advertising materials, namely, printed commercials (advertisements), printed posters, printed brochures, printed leaflets, printed magazines and printed product information sheets.
Class 037
Construction and Repair Services
Computer software, firmware and hardware for searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for searching for, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling transactions in the fields of crime, financial crime, fraud, anti-smuggling operations and counter-terrorism; computer software, firmware and hardware for searching, exploring, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling patterns and networks in data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for use in detecting and reporting on suspicious and abnormal behaviour in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, anti-smuggling operations, homeland security and counter-terrorism; computer software, firmware and hardware for analysing and predicting customer behaviour; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the field of information technology and communications technology security; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analysing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the fields of defence, law enforcement, and business process optimisation; data processing equipment, namely, computers; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for identifying and reporting intrusions into computer networks and communications networks; computer software, namely, firewalls; computer hardware, namely, firewalls; computer software, firmware and hardware for identifying, collecting, viewing, recording, analysing, sharing, processing, managing, filtering, storing, monitoring and transmitting data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; computer software for real-time situational awareness and workflow management; computer software, firmware and hardware for receiving, collecting, storing, viewing, sharing, monitoring, managing, processing, configuring, analysing, sanitising, cleansing, anonymising, de-anonymising, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation, transmitting, sharing and validating of data and of information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and of electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware which provide a gateway for anonymising, de-anonymising, transmitting, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation and validating data and information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for receiving, processing, converting, translating, validating, encrypting, decrypting, recording, sending and distributing data, namely financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for checking the integrity of data; computer software for transferring data between networks; computer software for message brokering; computer software for protecting the quality, integrity and security of data and information, in particular when transmitted between networks; computer software, firmware and hardware for minimising the risk of data leaks, data breach, data loss and other risks associated with the transmission of data between networks; computer software for the creation and operation of a data firewall which intercepts and transforms data sent between different networks, interfaces or security domains; computer software for checking data for viruses, malware and spyware; computer software for monitoring data levels; computer software, firmware and hardware for use in gathering intelligence and evidence; sensors, namely, motion sensors, proximity sensors and voice sensors; apparatus, namely, computers, for gathering information and evidence; computer software, firmware and hardware for use in detection, analysing, neutralisation, excavation and disposal in the field of explosive ordnance disposal; computer software, firmware, hardware, sensors, namely, motion sensors, weight sensors and proximity sensors for the purposes of countering improvised explosive devices (IEDs), including minefield clearance; parts and fittings for computer firmware and computer hardware; publications, brochures, reports, certificates, user manuals, user guides, technical manuals, instruction manuals, training manuals, educational, training and instructional materials in electronic form, namely, user guides, technical manuals, instruction sheets, instruction manuals, training manuals, online seminars, online training courses and DVDs, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed matter, namely, printed magazines, printed periodical publications, printed newsletters, printed brochures and printed product information sheets, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed reports; technical manuals; instruction manuals; user manuals; user guides; educational, training and instructional materials in printed form, namely, printed user guides, printed technical manuals, printed instruction sheets, printed instruction manuals and printed training manuals in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; certificates; newsletters; pamphlets; brochures; catalogues; printed advertising materials, namely, printed commercials (advertisements), printed posters, printed brochures, printed leaflets, printed magazines and printed product information sheets.
Class 041
Education and Entertainment Services
Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modelling of data and transactions, and of patterns and networks in data and transactions; business consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; management consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; technical management consulting in the fields of information technology, communications technology and computer network security; strategy consulting in the fields of information technology, communications technology, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; provision of business information; provision of business management information; business analysis services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; analytics, namely, business intelligence and business lifecycle analysis; business operational analysis services; business research services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; carrying out studies in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure to provide evidence to support informed decision making; business consulting relating to operational availability, operational capability, capability planning, capability audits, cost analysis and effectiveness analysis; supply chain modelling, namely, mathematical modelling of supply chain networks; business modelling to support operational risk analysis and capability audits; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; business simulation to understand and explain business performance; enterprise mapping, namely, developing a breakdown of the key activities required to support a complex multi-organisational enterprise in the achievement of its goals; business facilitation services, namely, designing, running, guiding or chairing meetings to facilitate the reaching of a common goal or to facilitate a productive or successful exchange of information or ideas; identification of business or organisational performance indicators; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; information, advice and consultancy relating to detecting, combating and defending against financial crime, namely, money laundering, financial fraud, debit and credit card fraud and on-line fraud; information, advice and consultancy relating to the monitoring of financial transactions, detecting and preventing suspicious financial behaviour and reducing monetary losses; information, advice and consultancy relating to due diligence, background checks and vetting of customers and potential customers; information, advice and consultancy relating to the identification, investigation, review and management of cases of financial crime of all types; information, advice and consultancy relating to regulatory compliance, operational efficiency, risk management and corporate governance; information technology consultancy services; communications technology consultancy services; research, design, development and customisation of computer software, computer firmware, computer hardware, computer systems and computer architectures; preparation of technical reports; preparation of reports relating to computer data, computer software, computer firmware, computer hardware, computer operating systems, computer networks, communications networks, the security of computer networks and the security of communications networks; installation, integration, implementation, configuration, servicing, maintenance, updating, upgrading, repair and operational support services for computer software; computer software services relating to the searching, mining, collection, gathering, storage, exploration, analysis, processing, management, aggregation, modelling, viewing, sharing and monitoring of data and transactions, namely, patterns and networks in data and transactions; computer software services relating to the detection and prevention of fraud, on-line fraud, financial fraud, financial crime, suspicious behaviour, terrorism operations, smuggling operations, money laundering operations and monetary losses; computer software services relating to identifying, investigating, reviewing and managing cases of financial crime of all types; computer software services, namely, SaaS ("software as a service"), relating to predictive modelling, regulatory compliance, operational efficiency, risk management, risk prevention, corporate governance and customer relationship management; computer software services in the field of due diligence investigations on customers and potential customers; computer software services relating to the analysis and prediction of customer behaviour; computer system monitoring services; analytical services in the fields of computers, computer networks and communications networks; forensic analysis of computer operating systems; forensic analysis, reverse engineering, storage, recovery, conversion, compression and migration of computer data; computer software services in the fields of matching, transforming, sampling, partitioning and analysis of data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; analytical services in the field of computers, computer software, computer networks and communications networks; computer software, computer programs and manuals in electronic form, dealing with artificial intelligence; technical support services, namely, developing technologies for others in the field of artificial intelligence; neural network modelling, namely, mathematical and technical consulting services in the field of neural network technologies; project management services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; industrial analysis and research services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; providing analytical tools for raising threat alerts; computer virus, malware and spyware protection services; recovery of computer data and computer operating systems; incident management and investigations relating to threats and malicious behaviour in connection with computer operating systems, computer networks and communications networks; geographic mapping and spatial modelling; information, advice and consultancy relating to computer security, computer network security and communications network security; advising and consulting on how to reduce vulnerability to cyber-attacks, how to minimise the damage caused by cyber-attacks, and how to recover from cyber-attacks; computer software services, consultancy and advice in the field of gathering of intelligence and evidence; computer software services, consultancy and advice in the field of explosive ordnance disposal; computer software services, consultancy and advice relating to the countering of improvised explosive devices (IEDs), including minefield clearance; military and defence analysis and consulting; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; data security services, namely, provision of services for the secure gathering, storage, retrieval, analysis, monitoring, transmission and exchange of data, namely, personal data, business data, financial data, transactions data, Internet traffic data, computer data, communications network data, behavioural data, audio data, visual data and geographical data; analysis, consulting and advice in relation to national security; homeland security advisory and consultancy services, namely, advising and consulting on how to reduce vulnerability to terrorism, how to minimise the damage caused by terrorist attacks, and how to recover from terrorist attacks.
Class 042
Computer & Software Services & Scientific Services
Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modelling of data and transactions, and of patterns and networks in data and transactions; business consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; management consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; technical management consulting in the fields of information technology, communications technology and computer network security; strategy consulting in the fields of information technology, communications technology, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; provision of business information; provision of business management information; business analysis services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; analytics, namely, business intelligence and business lifecycle analysis; business operational analysis services; business research services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; carrying out studies in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure to provide evidence to support informed decision making; business consulting relating to operational availability, operational capability, capability planning, capability audits, cost analysis and effectiveness analysis; supply chain modelling, namely, mathematical modelling of supply chain networks; business modelling to support operational risk analysis and capability audits; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; business simulation to understand and explain business performance; enterprise mapping, namely, developing a breakdown of the key activities required to support a complex multi-organisational enterprise in the achievement of its goals; business facilitation services, namely, designing, running, guiding or chairing meetings to facilitate the reaching of a common goal or to facilitate a productive or successful exchange of information or ideas; identification of business or organisational performance indicators; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; information, advice and consultancy relating to detecting, combating and defending against financial crime, namely, money laundering, financial fraud, debit and credit card fraud and on-line fraud; information, advice and consultancy relating to the monitoring of financial transactions, detecting and preventing suspicious financial behaviour and reducing monetary losses; information, advice and consultancy relating to due diligence, background checks and vetting of customers and potential customers; information, advice and consultancy relating to the identification, investigation, review and management of cases of financial crime of all types; information, advice and consultancy relating to regulatory compliance, operational efficiency, risk management and corporate governance; information technology consultancy services; communications technology consultancy services; research, design, development and customisation of computer software, computer firmware, computer hardware, computer systems and computer architectures; preparation of technical reports; preparation of reports relating to computer data, computer software, computer firmware, computer hardware, computer operating systems, computer networks, communications networks, the security of computer networks and the security of communications networks; installation, integration, implementation, configuration, servicing, maintenance, updating, upgrading, repair and operational support services for computer software; computer software services relating to the searching, mining, collection, gathering, storage, exploration, analysis, processing, management, aggregation, modelling, viewing, sharing and monitoring of data and transactions, namely, patterns and networks in data and transactions; computer software services relating to the detection and prevention of fraud, on-line fraud, financial fraud, financial crime, suspicious behaviour, terrorism operations, smuggling operations, money laundering operations and monetary losses; computer software services relating to identifying, investigating, reviewing and managing cases of financial crime of all types; computer software services, namely, SaaS ("software as a service"), relating to predictive modelling, regulatory compliance, operational efficiency, risk management, risk prevention, corporate governance and customer relationship management; computer software services in the field of due diligence investigations on customers and potential customers; computer software services relating to the analysis and prediction of customer behaviour; computer system monitoring services; analytical services in the fields of computers, computer networks and communications networks; forensic analysis of computer operating systems; forensic analysis, reverse engineering, storage, recovery, conversion, compression and migration of computer data; computer software services in the fields of matching, transforming, sampling, partitioning and analysis of data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; analytical services in the field of computers, computer software, computer networks and communications networks; computer software, computer programs and manuals in electronic form, dealing with artificial intelligence; technical support services, namely, developing technologies for others in the field of artificial intelligence; neural network modelling, namely, mathematical and technical consulting services in the field of neural network technologies; project management services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; industrial analysis and research services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; providing analytical tools for raising threat alerts; computer virus, malware and spyware protection services; recovery of computer data and computer operating systems; incident management and investigations relating to threats and malicious behaviour in connection with computer operating systems, computer networks and communications networks; geographic mapping and spatial modelling; information, advice and consultancy relating to computer security, computer network security and communications network security; advising and consulting on how to reduce vulnerability to cyber-attacks, how to minimise the damage caused by cyber-attacks, and how to recover from cyber-attacks; computer software services, consultancy and advice in the field of gathering of intelligence and evidence; computer software services, consultancy and advice in the field of explosive ordnance disposal; computer software services, consultancy and advice relating to the countering of improvised explosive devices (IEDs), including minefield clearance; military and defence analysis and consulting; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; data security services, namely, provision of services for the secure gathering, storage, retrieval, analysis, monitoring, transmission and exchange of data, namely, personal data, business data, financial data, transactions data, Internet traffic data, computer data, communications network data, behavioural data, audio data, visual data and geographical data; analysis, consulting and advice in relation to national security; homeland security advisory and consultancy services, namely, advising and consulting on how to reduce vulnerability to terrorism, how to minimise the damage caused by terrorist attacks, and how to recover from terrorist attacks.
Class 045
Personal & Legal & Social Services
Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modelling of data and transactions, and of patterns and networks in data and transactions; business consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; management consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; technical management consulting in the fields of information technology, communications technology and computer network security; strategy consulting in the fields of information technology, communications technology, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; provision of business information; provision of business management information; business analysis services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; analytics, namely, business intelligence and business lifecycle analysis; business operational analysis services; business research services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; carrying out studies in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure to provide evidence to support informed decision making; business consulting relating to operational availability, operational capability, capability planning, capability audits, cost analysis and effectiveness analysis; supply chain modelling, namely, mathematical modelling of supply chain networks; business modelling to support operational risk analysis and capability audits; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; business simulation to understand and explain business performance; enterprise mapping, namely, developing a breakdown of the key activities required to support a complex multi-organisational enterprise in the achievement of its goals; business facilitation services, namely, designing, running, guiding or chairing meetings to facilitate the reaching of a common goal or to facilitate a productive or successful exchange of information or ideas; identification of business or organisational performance indicators; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; information, advice and consultancy relating to detecting, combating and defending against financial crime, namely, money laundering, financial fraud, debit and credit card fraud and on-line fraud; information, advice and consultancy relating to the monitoring of financial transactions, detecting and preventing suspicious financial behaviour and reducing monetary losses; information, advice and consultancy relating to due diligence, background checks and vetting of customers and potential customers; information, advice and consultancy relating to the identification, investigation, review and management of cases of financial crime of all types; information, advice and consultancy relating to regulatory compliance, operational efficiency, risk management and corporate governance; information technology consultancy services; communications technology consultancy services; research, design, development and customisation of computer software, computer firmware, computer hardware, computer systems and computer architectures; preparation of technical reports; preparation of reports relating to computer data, computer software, computer firmware, computer hardware, computer operating systems, computer networks, communications networks, the security of computer networks and the security of communications networks; installation, integration, implementation, configuration, servicing, maintenance, updating, upgrading, repair and operational support services for computer software; computer software services relating to the searching, mining, collection, gathering, storage, exploration, analysis, processing, management, aggregation, modelling, viewing, sharing and monitoring of data and transactions, namely, patterns and networks in data and transactions; computer software services relating to the detection and prevention of fraud, on-line fraud, financial fraud, financial crime, suspicious behaviour, terrorism operations, smuggling operations, money laundering operations and monetary losses; computer software services relating to identifying, investigating, reviewing and managing cases of financial crime of all types; computer software services, namely, SaaS ("software as a service"), relating to predictive modelling, regulatory compliance, operational efficiency, risk management, risk prevention, corporate governance and customer relationship management; computer software services in the field of due diligence investigations on customers and potential customers; computer software services relating to the analysis and prediction of customer behaviour; computer system monitoring services; analytical services in the fields of computers, computer networks and communications networks; forensic analysis of computer operating systems; forensic analysis, reverse engineering, storage, recovery, conversion, compression and migration of computer data; computer software services in the fields of matching, transforming, sampling, partitioning and analysis of data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; analytical services in the field of computers, computer software, computer networks and communications networks; computer software, computer programs and manuals in electronic form, dealing with artificial intelligence; technical support services, namely, developing technologies for others in the field of artificial intelligence; neural network modelling, namely, mathematical and technical consulting services in the field of neural network technologies; project management services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; industrial analysis and research services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; providing analytical tools for raising threat alerts; computer virus, malware and spyware protection services; recovery of computer data and computer operating systems; incident management and investigations relating to threats and malicious behaviour in connection with computer operating systems, computer networks and communications networks; geographic mapping and spatial modelling; information, advice and consultancy relating to computer security, computer network security and communications network security; advising and consulting on how to reduce vulnerability to cyber-attacks, how to minimise the damage caused by cyber-attacks, and how to recover from cyber-attacks; computer software services, consultancy and advice in the field of gathering of intelligence and evidence; computer software services, consultancy and advice in the field of explosive ordnance disposal; computer software services, consultancy and advice relating to the countering of improvised explosive devices (IEDs), including minefield clearance; military and defence analysis and consulting; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; data security services, namely, provision of services for the secure gathering, storage, retrieval, analysis, monitoring, transmission and exchange of data, namely, personal data, business data, financial data, transactions data, Internet traffic data, computer data, communications network data, behavioural data, audio data, visual data and geographical data; analysis, consulting and advice in relation to national security; homeland security advisory and consultancy services, namely, advising and consulting on how to reduce vulnerability to terrorism, how to minimise the damage caused by terrorist attacks, and how to recover from terrorist attacks.
Compilation and systematization of information into computer databases...
on 15 Apr 2015
ALLIANT INSURANCE SERVICES INC.
1605438 · 6 Dec 2012
036
Class 036
Insurance & Financial Services
Surety services; surety underwriting and surety underwriting services.
Surety services; surety underwriting and surety underwriting services.
on 3 Jun 2014
WIZARDS OF THE COAST LLC
1604507 · 29 Nov 2012
028
Class 028
Toys and Sporting Goods Products
Card games, trading card games, playing cards
Card games, trading card games, playing cards
on 8 Jan 2015
MAGELICA INC.
1603663 · 23 Nov 2012
003
Class 003
Cosmetics and Cleaning Products
009
Class 009
Computer & Software Products & Electrical & Scientific Products
...
Class 014
Jewelry Products
Class 016
Paper Goods and Printed Material
Class 018
Leather Products not including clothing
Class 024
Fabrics
Class 025
Clothing Products
Class 026
Lace, Ribbons & Embroidery and Fancy Goods
Class 028
Toys and Sporting Goods Products
Books, electronic books, video recordings, namely DVDs featuring episodes from a television series, animated feature films and movies, animated feature films and movies; travel gear, namely luggage; cosmetics, namely, lip gloss, cleansing gel, shampoo, cream, cologne, bath mousse and sunscreen; accessories, namely bath robes, bath towels, bath mitts, bath hair bands, slippers and pyjamas; jewellery with feather/wing pendant, namely necklace and bracelet; t- shirts; toys namely, video games, stuffed animals and figurines.
Books, electronic books, video recordings, namely DVDs featuring episo...
on 12 May 2014
MICHAEL LAWRENCE
1602043 · 13 Nov 2012
041
Class 041
Education and Entertainment Services
042
Class 042
Computer & Software Services & Scientific Services
A web-based service for: (1) on-line publishing of academic research papers, (2) collecting peer reviews of academic research papers, and (3) quantifying research contributions by peer evaluation of contributed academic research papers and reviews.
A web-based service for: (1) on-line publishing of academic research p...
Owners
Orica australia pty ltd. (13)
Nautica apparel inc. (10)
The diller corporation (8)
Kitanica llc (5)
Nautica apparel, inc. (5)
Tweed inc. (5)
Basilea pharmaceutica ag (4)
Boston pizza international inc. (4)
Centre d'excellence en traitement de l'information - 2000 inc. (4)
Lidl stiftung & co. kg (4)
Categories
Class 9 (482)
Class 35 (455)
Class 41 (327)
Class 42 (316)
Class 16 (278)
Class 25 (269)
Class 5 (245)
Class 3 (219)
Class 21 (175)
Class 30 (163)
Class 28 (159)
Class 36 (158)
Class 18 (130)
Class 20 (122)
Class 29 (120)
Class 38 (120)
Class 10 (116)
Class 44 (116)
Class 14 (112)
Class 11 (111)
Class 24 (109)
Class 1 (105)
Class 37 (97)
Class 6 (95)
Class 39 (95)
Class 12 (90)
Class 7 (89)
Class 19 (87)
Class 43 (85)
Class 40 (81)
Class 8 (77)
Class 33 (76)
Class 31 (74)
Class 32 (74)
Class 17 (73)
Class 26 (61)
Class 45 (61)
Class 34 (55)
Class 27 (42)
Class 4 (40)
Class 2 (38)
Class 22 (38)
Class 13 (23)
Class 15 (23)
Class 23 (21)
Correspondents
Smart & biggar lp (251)
Gowling wlg (canada) llp (181)
Robic agence pi s.E.C./ robic ip agency lp (84)
Marks & clerk (61)
Borden ladner gervais llp (59)
Moffat & co. (39)
Osler, hoskin & harcourt llp (37)
Aventum ip law llp (36)
Lavery, de billy, llp (30)
Apply for Trademark
Select countries to protect your logo Trademark
Trademark Name
Country Selected
Canada
C$474/ 1 class + gov fee
United States
C$136/ 1 class + gov fee
Canada
C$474/ 1 class + gov fee
Mexico
C$683/ 1 class + gov fee
European Union
C$957/ 1 class + gov fee
China
C$683/ 1 class + gov fee
South Korea
C$956/ 1 class + gov fee
Japan
C$1,093/ 1 class + gov fee
India
C$341/ 1 class + gov fee
United Kingdom
C$683/ 1 class + gov fee
Australia
C$409/ 1 class + gov fee
Israel
C$956/ 1 class + gov fee
United Arab Emirates
C$956/ 1 class + gov fee
New Zealand
C$546/ 1 class + gov fee
Brazil
C$683/ 1 class + gov fee
Taiwan
C$1,093/ 1 class + gov fee
Ukraine
C$1,093/ 1 class + gov fee
Indonesia
C$956/ 1 class + gov fee
South Africa
C$683/ 1 class + gov fee
Singapore
C$1,093/ 1 class + gov fee
Saudi Arabia
C$1,093/ 1 class + gov fee
Afghanistan
C$1,093/ 1 class + gov fee
Algeria
C$1,093/ 1 class + gov fee
Argentina
C$546/ 1 class + gov fee
Austria
C$1,229/ 1 class + gov fee
Bahrain
C$956/ 1 class + gov fee
Bangladesh
C$819/ 1 class + gov fee
Benelux
C$1,366/ 1 class + gov fee
Bhutan
C$1,229/ 1 class + gov fee
Bolivia
C$1,093/ 1 class + gov fee
Botswana
C$1,776/ 1 class + gov fee
British Virgin Islands
C$1,640/ 1 class + gov fee
Bulgaria
C$1,093/ 1 class + gov fee
Cambodia
C$1,093/ 1 class + gov fee
Chile
C$683/ 1 class + gov fee
Colombia
C$956/ 1 class + gov fee
Congo
C$1,640/ 1 class + gov fee
Costa Rica
C$1,229/ 1 class + gov fee
Croatia
C$1,229/ 1 class + gov fee
Cyprus
C$1,366/ 1 class + gov fee
Czech Republic
C$1,229/ 1 class + gov fee
Denmark
C$1,093/ 1 class + gov fee
Macau
C$956/ 1 class + gov fee
Greenland
C$1,093/ 1 class + gov fee
Dominican Republic
C$1,229/ 1 class + gov fee
Curacao
C$1,640/ 1 class + gov fee
Aruba
C$1,640/ 1 class + gov fee
Ecuador
C$1,093/ 1 class + gov fee
Egypt
C$956/ 1 class + gov fee
El Salvador
C$1,093/ 1 class + gov fee
Ethiopia
C$1,503/ 1 class + gov fee
France
C$1,229/ 1 class + gov fee
Gaza
C$1,093/ 1 class + gov fee
Germany
C$1,229/ 1 class + gov fee
Greece
C$1,093/ 1 class + gov fee
Guatemala
C$1,229/ 1 class + gov fee
Haiti
C$1,229/ 1 class + gov fee
Honduras
C$1,229/ 1 class + gov fee
Hong Kong (SAR)
C$1,229/ 1 class + gov fee
Hungary
C$1,503/ 1 class + gov fee
Iraq
C$2,050/ 1 class + gov fee
Italy
C$1,229/ 1 class + gov fee
Jordan
C$1,093/ 1 class + gov fee
Kazakhstan
C$1,093/ 1 class + gov fee
Kenya
C$1,229/ 1 class + gov fee
Kuwait
C$1,093/ 1 class + gov fee
Laos
C$956/ 1 class + gov fee
Lebanon
C$1,366/ 1 class + gov fee
Lesotho
C$1,640/ 1 class + gov fee
Libya
C$1,229/ 1 class + gov fee
Madrid Protocol (WIPO)
C$2,733/ 1 class + gov fee
Malawi
C$1,503/ 1 class + gov fee
Malaysia
C$956/ 1 class + gov fee
Maldives
C$1,366/ 1 class + gov fee
Morocco
C$1,366/ 1 class + gov fee
Mozambique
C$1,229/ 1 class + gov fee
Myanmar
C$1,093/ 1 class + gov fee
Namibia
C$1,093/ 1 class + gov fee
Nepal
C$956/ 1 class + gov fee
Nicaragua
C$1,229/ 1 class + gov fee
Norway
C$1,229/ 1 class + gov fee
Oman
C$1,503/ 1 class + gov fee
Pakistan
C$1,093/ 1 class + gov fee
Panama
C$1,229/ 1 class + gov fee
Paraguay
C$1,229/ 1 class + gov fee
Peru
C$1,093/ 1 class + gov fee
Philippines
C$1,229/ 1 class + gov fee
Poland
C$683/ 1 class + gov fee
Portugal
C$1,229/ 1 class + gov fee
Puerto Rico
C$1,229/ 1 class + gov fee
Qatar
C$1,093/ 1 class + gov fee
Romania
C$1,229/ 1 class + gov fee
Serbia
C$1,229/ 1 class + gov fee
Slovakia
C$1,229/ 1 class + gov fee
Spain
C$1,229/ 1 class + gov fee
Sri Lanka
C$956/ 1 class + gov fee
Swaziland
C$1,776/ 1 class + gov fee
Sweden
C$1,093/ 1 class + gov fee
Switzerland
C$1,229/ 1 class + gov fee
Thailand
C$1,093/ 1 class + gov fee
Tunisia
C$1,229/ 1 class + gov fee
Turkey
C$1,093/ 1 class + gov fee
Uganda
C$956/ 1 class + gov fee
United Republic of Tanzania
C$956/ 1 class + gov fee
Uruguay
C$1,093/ 1 class + gov fee
Venezuela
C$1,229/ 1 class + gov fee
Vietnam
C$1,093/ 1 class + gov fee
West Bank, Palestine
C$1,093/ 1 class + gov fee
Yemen
C$2,323/ 1 class + gov fee
Albania
C$1,229/ 1 class + gov fee
Andorra
C$1,229/ 1 class + gov fee
Angola
C$1,776/ 1 class + gov fee
Antigua and Barbuda
C$1,640/ 1 class + gov fee
Armenia
C$1,093/ 1 class + gov fee
Azerbaijan
C$1,093/ 1 class + gov fee
Bahamas
C$1,913/ 1 class + gov fee
Barbados
C$1,776/ 1 class + gov fee
Belgium
C$1,366/ 1 class + gov fee
Belize
C$1,776/ 1 class + gov fee
Benin
C$1,093/ 1 class + gov fee
Bosnia and Herzegovina
C$1,366/ 1 class + gov fee
Brunei
C$1,776/ 1 class + gov fee
Burkina Faso
C$1,093/ 1 class + gov fee
Burundi
C$1,640/ 1 class + gov fee
Cabo Verde
C$1,229/ 1 class + gov fee
Cameroon
C$1,093/ 1 class + gov fee
Central African Republic (CAR)
C$1,093/ 1 class + gov fee
Chad
C$1,093/ 1 class + gov fee
Comoros
C$1,093/ 1 class + gov fee
Cote d'Ivoire
C$1,093/ 1 class + gov fee
Czechia
C$1,366/ 1 class + gov fee
Djibouti
C$1,640/ 1 class + gov fee
Dominica
C$1,776/ 1 class + gov fee
Equatorial Guinea
C$1,093/ 1 class + gov fee
Eritrea
C$1,366/ 1 class + gov fee
Estonia
C$1,776/ 1 class + gov fee
Eswatini
C$1,776/ 1 class + gov fee
Fiji
C$1,229/ 1 class + gov fee
Finland
C$956/ 1 class + gov fee
Gabon
C$1,093/ 1 class + gov fee
Gambia
C$1,229/ 1 class + gov fee
Georgia
C$1,093/ 1 class + gov fee
Ghana
C$1,366/ 1 class + gov fee
Grenada
C$1,776/ 1 class + gov fee
Guinea
C$1,093/ 1 class + gov fee
Guinea-Bissau
C$1,093/ 1 class + gov fee
Guyana
C$1,776/ 1 class + gov fee
Iceland
C$1,776/ 1 class + gov fee
Ireland
C$1,093/ 1 class + gov fee
Jamaica
C$1,640/ 1 class + gov fee
Kiribati
C$1,366/ 1 class + gov fee
Kosovo
C$1,229/ 1 class + gov fee
Kyrgyzstan
C$1,229/ 1 class + gov fee
Latvia
C$956/ 1 class + gov fee
Liberia
C$1,366/ 1 class + gov fee
Liechtenstein
C$1,366/ 1 class + gov fee
Lithuania
C$956/ 1 class + gov fee
Luxembourg
C$1,366/ 1 class + gov fee
Madagascar
C$1,366/ 1 class + gov fee
Mali
C$1,093/ 1 class + gov fee
Malta
C$819/ 1 class + gov fee
Marshall Islands
C$1,366/ 1 class + gov fee
Mauritania
C$1,093/ 1 class + gov fee
Mauritius
C$1,366/ 1 class + gov fee
Micronesia
C$1,366/ 1 class + gov fee
Moldova
C$1,366/ 1 class + gov fee
Monaco
C$1,913/ 1 class + gov fee
Mongolia
C$819/ 1 class + gov fee
Montenegro
C$1,229/ 1 class + gov fee
Nauru
C$1,366/ 1 class + gov fee
Netherlands
C$1,366/ 1 class + gov fee
Niger
C$1,093/ 1 class + gov fee
Nigeria
C$546/ 1 class + gov fee
North Macedonia
C$1,229/ 1 class + gov fee
Palau
C$1,366/ 1 class + gov fee
Palestine
C$1,366/ 1 class + gov fee
Papua New Guinea
C$1,093/ 1 class + gov fee
Rwanda
C$1,366/ 1 class + gov fee
Saint Kitts and Nevis
C$1,776/ 1 class + gov fee
Saint Lucia
C$1,776/ 1 class + gov fee
Saint Vincent and the Grenadines
C$1,776/ 1 class + gov fee
Samoa
C$1,640/ 1 class + gov fee
San Marino
C$1,366/ 1 class + gov fee
Sao Tome and Principe
C$1,366/ 1 class + gov fee
Senegal
C$1,093/ 1 class + gov fee
Seychelles
C$1,366/ 1 class + gov fee
Sierra Leone
C$1,366/ 1 class + gov fee
Slovenia
C$1,229/ 1 class + gov fee
Solomon Islands
C$1,366/ 1 class + gov fee
Somalia
C$1,366/ 1 class + gov fee
South Sudan
C$1,366/ 1 class + gov fee
Suriname
C$2,186/ 1 class + gov fee
Tajikistan
C$1,093/ 1 class + gov fee
Tanzania
C$956/ 1 class + gov fee
Timor-Leste
C$1,366/ 1 class + gov fee
Togo
C$1,093/ 1 class + gov fee
Tonga
C$1,776/ 1 class + gov fee
Trinidad and Tobago
C$1,640/ 1 class + gov fee
Turkmenistan
C$1,093/ 1 class + gov fee
Tuvalu
C$1,366/ 1 class + gov fee
Uzbekistan
C$956/ 1 class + gov fee
Vanuatu
C$1,640/ 1 class + gov fee
Zambia
C$1,229/ 1 class + gov fee
Zimbabwe
C$1,229/ 1 class + gov fee
OAPI
C$1,229/ 1 class + gov fee
ARIPO
C$1,366/ 1 class + gov fee