Trademarkia Logo

Canada

C$
Trademark Search in Canada
NORTON (AND CHECKMARK IN A CIRCLE DESIGN)
NORTON (AND CHECKMARK IN A CIRCLE DESIGN)
REGISTERED

on 20 Sept 2023

Last Applicant/ Owned by

GEN DIGITAL INC.

60 E Rio Salado ParkwaySuite 1000Tempe, Arizona 85281

US

Serial Number

1944798 filed on 6th Feb 2019

Registration Number

TMA1199435 registered on 20th Sept 2023

Registration expiry Date

20th Sept 2033

Correspondent Address

FASKEN MARTINEAU DUMOULIN LLP

800 rue du Square Victoria, bureau 3500Montréal,

QUEBEC

CA

H4Z1E9

NORTON (AND CHECKMARK IN A CIRCLE DESIGN)

Trademark usage description

computer antivirus software; computer software for database management in the field of cryptographic network security and data security functions; com Read More

Vienna Information


24 . 17 . 20

Check signsCoches, signes de validation

26 . 1 . 1

CirclesCercles

26 . 1 . 3

One circle or ellipseUn cercle ou une ellipse

26 . 1 . 16

Circles or ellipses containing other figurative elementsCercles ou ellipses contenant d'autres éléments figuratifs

25 . 7 . 1

Surfaces or backgrounds covered with repeated geometrical figures or designsSurfaces ou fonds couverts de figures ou de motifs géométriques répétés

25 . 7 . 4

Surfaces or backgrounds in check patternSurfaces ou fonds en damier

Classification Information


Class [009]
Computer antivirus software; computer software for database management in the field of cryptographic network security and data security functions; computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for providing intrusion detection and prevention; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, including computer software for use in the monitoring and control of computer and online activity; computer software for providing online transaction security; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer maintenance software; computer software for the back-up, storage, restoration and recovery of data, folders, and files in electronic form in the field of data management; enterprise security software; firewall software; privacy control software; content filtering software; computer hardware; computer peripherals; computer hardware appliances that provide fire wall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions; computer software; computer software in the field of cryptographic network security and data security functions; computer software for processing logic and data validation between computer networks; computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; computer software for encrypting and authenticating data; computer software for encryption; computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; computer software platform for bridging Internet and telephony services and enabling users to communicate and transact business faster across multiple networks via wire line phones, mobile phones, personal computers, PDAs and other personal electronic devices; computer software platform for providing faster Internet connections, website resolution and e-mail deliveries; cloning software, namely, software for cloning computer hard drives, software for cloning computer operating systems, software for cloning data files, software reconfiguring personal computers; computer software for the creation of virtual private network; computer software and downloadable computer software, namely, utility software; computer utility software for removal of computer applications and software; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software, namely, middleware for interfacing client applications and networked or host based databases; computer software and downloadable computer software for use in updating other computer software; computer software for use in networking applications; computer software for sending and receiving facsimile transmissions from computers and notebook computers; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software for telecommuting, namely, for connecting to and use of a remote computer network, a remote computer and mobile devices; computer communications software for use with a home or remote office for connecting computer network users to global networks; computer software and databases for use in diagnosis, repair and configuration of computers, computer software and computer peripherals; computer programs for data communications applications, namely for the encryption and authentication of information in electronic form, in the field of data management; computer software for identity security; computer software for authentication and identity management information security; computer software for digital information and data access, in the field of data management; computer software for detecting identity fraud; computer software and firmware for the management, transmission, and storage of data and information in electronic form, in the field of data management; computer software for use in networking computers; computer software for use in operating electronic mail; computer software for use in monitoring computers for security purposes; computer software for use in vulnerability scanning of networks and websites; computer software for use in detecting malware computer software for use with computer servers for controlling and managing server applications; computer software for use in accessing databases; computers; computer application software for use in electronic storage of data, documents and receipts; computer application software to assist in tracking, managing, and reporting expenses, credit scores, account information, and commercial transactions; computer application software for providing alerts and notifications regarding potential identity theft, and for providing tips and information concerning identity theft; user manuals and instructional guides supplied with all of the foregoing; downloadable electronic publications.


Classification kind code

11

Class [016]
Paper and printed goods


Comment text

CIPO Classification Code

Classification kind code

Nice

Class [035]
Advertising, marketing, promotional and business


Comment text

CIPO Classification Code

Classification kind code

Nice

Class [036]
Credit reporting services; providing credit reporting data maintained by others; credit risk management and consultation services, namely, assistance with restoring and analyzing credit damaged by identity theft; tracking and reporting regarding consumer credit reports and changes thereto; providing advice and consultation in the field of credit reports and credit scores; providing reimbursement of costs associated with identity theft; providing financial information via a web site; financing services in the field of computer software; financial services, namely, financial security planning services; financial services, namely, credit repair and restoration; credit risk management, credit risk consultation, and analyzing credit damaged by identity theft.


Classification kind code

11

Class [038]
Telecommunications


Comment text

CIPO Classification Code

Classification kind code

Nice

Class [042]
Computer services in the fields of data management and computer security; Internet security services; electronic storage of data; computer consultation; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; on-line technical support services, namely, troubleshooting of computer hardware and software problems; technical and customer support services, namely, troubleshooting of computer software problems; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; technical support services, namely, providing back-up computer programs and facilities; updating of computer software for others; computer virus protection services; computer consultation in the field of computer security; computer diagnostic services; computer services, namely, data recovery services; computer software installation services; computer programming; notification and delivery of software updates; research services relating to computer hardware and computer software; technical consultation in the field of computer software installation and maintenance; development, updating, publishing and maintenance of software for networks and standalone computers in the fields of security, databases management, and anti-virus protection and monitoring security systems; providing information in the field of network and Internet security; providing technical information in the field of computer software applications; computer services, namely providing information concerning the encryption and authentication of electronic data; providing information concerning authentication of user identification data for e-commerce transaction security; consultancy services in the fields of digital media, data encryption, computer security, communication security and computer software; encryption and decryption of data and communications; computer support services, namely, technical support and software update services; computer consulting services related to computer products and services; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; providing consultants to help deploy, supervise and manage information technology projects; providing information in the field of information technology relating to communications devices, computers, computer hardware, computer software, computer peripherals, and computer networks; providing hosted electronic mail and instant messaging services; computer services, namely, providing search engines for obtaining data on a global computer network; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; application hosting; web hosting; and turnkey e-commerce services; providing authentication of identity; software as a service (SaaS) featuring software for use in electronic storage of data, documents and receipts; software as a service (SaaS) featuring software to assist in tracking, managing, and reporting expenses, credit scores, account information, and commercial transactions; software as a service (SaaS) featuring software for providing alerts and notifications regarding potential identity theft, and for providing tips and information concerning identity theft; electronic monitoring of personally identifying information to detect identity theft via the internet; electronic monitoring of credit card activity to detect fraud via the internet; data security consultancy; monitoring the internet, public records, credit reports, private and public electronic databases, and unregulated global computer networks to facilitate the detection of and protection against identity theft and fraud; providing a secure interactive website concerning notifications of potential fraud and potential identity theft; consultation in the field of data theft and identity theft; tracking, monitoring, and reporting regarding consumer credit reports and changes thereto for purposes of protecting against data theft, identity theft and fraud; prevention of unsolicited commercial communications, namely, removal from pre-approved credit offer lists; monitoring personal financial account activities for fraud protection purposes; providing alerts and notification information concerning possible fraud and identity theft for fraud protection purposes; monitoring public reports concerning larger scale consumer data security breaches for fraud protection purposes; monitoring personal financial account activities for atypical activities for fraud protection services; computer technology consultancy; rental of computer software; computer system design; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; development, integration and operation of computer systems to support issuance and management of digital certificates; creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; providing user authentication services in e-commerce transactions; monitoring of computer systems for security purposes; monitoring of computer networks for security purposes; providing security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the Internet, and computer networks; providing information in the fields of global computer network and local area network Internet security, preventing computer viruses, preventing computer threats, computer hardware and software applications in security; identity theft protection services, namely fraud prevention in the form of personal and financial information monitoring.


Classification kind code

11

Class [045]
Authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; providing authentication of identity; personal background investigation services in order to authenticate identity; providing consultation to third parties in the field of prevention of data theft, identity theft, and prevention of unsolicited commercial electronic mail, namely, removal from junk mail lists and offers for pre-approved credit; fraud resolution assistance, namely, assistance with restoring credit damaged by identity theft; identity theft detection and protection services in the nature of arranging secure authentication of personal data in requests to open banking, credit, credit card, loan, financial, telecommunications and utility accounts; fraud and identity theft protection services; providing information on potential fraud and potential identity theft via e-mail alerts and notifications; resolution assistance, namely, providing advice and consultation in the field of data theft and identity theft; fraud and identity theft protection services consisting of credit card and debit card cancellation services in the event of loss or theft, namely, registering credit and debit cards for cancellation; fraud and identity theft protection services consisting of assisting others with replacing personal identification cards, driver's licenses, Social Security cards, insurance cards, checkbooks and travelers checks in the event of loss or theft; providing alerts and notification information concerning possible fraud and identity theft related to such events for fraud protection purposes.


Classification kind code

11

Mark Details


Serial Number

1944798

Mark Type

Trademark

Legal History


Show more

Action TakenStatus
Submitted for opposition 190
on 9th Aug 2023
Registration Pending
Submitted for opposition 42
on 17th May 2023
Advertised
Submitted for opposition 27
on 19th Apr 2023
Approval Notice Sent
Submitted for opposition 26
on 19th Apr 2023
Approved
Submitted for opposition 22
on 2th Aug 2022
Search Recorded
Submitted for opposition 20
on 2th Aug 2022
Examiner's First Report
Submitted for opposition 135
on 10th Feb 2020
Amendment to Application
Submitted for opposition 31
on 11th Feb 2019
Formalized
Submitted for opposition 1
on 7th Feb 2019
Created
Submitted for opposition 30
on 6th Feb 2019
Filed