The trademark application WE GO BEYOND was filed by DigiCert, Inc., a U.S. corporation (the "Applicant"). Application refused.
The application was filed in English (Italian was selected as the second language).
Appointment and Replacement of representative of the trademark registration was recorded on January 8, 2018. A transfer of the trademark registration was recorded on January 18, 2018. Change of name and address of the trademark registration was recorded on February 11, 2018.
Goods And Services
The mark was filed in class 9 with following description of goods:
Computer software
Computer hardware
Computer software for providing network, internet, and computer security
Computer antivirus software
Internet and data security software
Enterprise security software
Firewall software
Computer utility software
Privacy control software
Content filtering software
Cloning software, namely, software for cloning computer hard drives, software for cloning computer operating systems, software for cloning data files, software reconfiguring personal computers
Computer hardware appliances that provide firewall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions
Computer software for providing online identity protection, privacy control, and parental control
Computer software for providing intrusion detection and prevention
Computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware
Computer software for use in the monitoring and control of computer and online activity
Computer software for providing online transaction security
Computer software for detection and prevention of identity theft and fraud
Computer optimization software
Computer software to prevent, diagnose and repair computer problems
Computer maintenance software
Computer software for the creation of virtual private network
Computer software for the back-up, storage, restoration and recovery of data, folders, and files
Computer software for file management and transfer
Computer software for use in updating other computer software
Computer application software for use in electronic storage of data, documents and receipts
Computer application software to assist in tracking, managing, and reporting expenses, credit scores, account information, and commercial transactions
Computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer software and network security measures for remote computer users
Computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices
Computer programs for the encryption and authentication of electronic information
Computer software and firmware for the management, transmission, and storage of data and information
Computer software for use in networking computers and applications
Computer software for use in monitoring computers for security purposes
Computer software in the field of cryptographic network security and data security functions
Downloadable user manuals and instructional guides for use in connection with all of the foregoing
Downloadable electronic publications in the nature of newsletters in the fields of computer software and network security.
The mark was filed in class 42 with following description of goods:
Monitoring of computer systems for security purposes
Computer services
Providing information in the fields of global computer network and local area network security, preventing computer viruses
Computer network security and Internet security services
Computer virus protection services
Identity theft protection services, namely, fraud prevention in the form of personal and financial information monitoring
Software as a service (SaaS) service featuring software for personal information management, software to help consumers identify and opt out from public websites and databases to increase privacy and reduce unwanted solicitations, and software for fraud protection and identity theft prevention
Web content categorization and filtering services
Technical support services, namely, troubleshooting of problems with computer software and computer networks
Maintenance, installation and updating of computer software for others
Consulting services for others in the field of computer software, computer network security and internet security
Computer programming
Computer software design for others
Leasing, hire and rental of computers, computer hardware, computer systems, computer programs and computer software
Providing security threat management systems, namely, monitoring and tracking of malware, security vulnerabilities and problems in computer software, the internet, and computer networks
Computer services relating to computer, network and internet security, including content screening and filtering services, virus scanning and protection services, access control services, authorization management services, web usage monitoring services, and bandwidth management and protection services
Notification and delivery of software updates
Development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks
On-line technical support services, namely, troubleshooting of computer software problems
Computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks
Computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security
Security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability
Provision of security services for virtual private computer networks (VPNs)
Providing on-line, non-downloadable software for computer and Internet security testing
Providing consultants to help deploy, supervise and manage information technology projects
Providing information in the field of information technology relating to communications devices, computers, computer hardware, computer software, computer peripherals, and computer networks
Managed public key infrastructure (PKI) services, namely, application and network infrastructure security services
Providing identity verification services in e-commerce transactions
Computer services relating to fraud and identity theft protection
Monitoring the Internet, public records, credit reports, private and public electronic databases, and unregulated global computer networks to facilitate the detection of and protection against identity theft and fraud
Computer services, namely, data recovery services
Technical support services, namely, providing back-up computer programs and facilities
Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others
Updating, providing and maintenance of software for networks and standalone computers in the fields of security, database management, and anti-virus protection
Providing online database regarding computers, computer hardware, computer software, computer networks, computer-related services, data storage management, enterprise information management, and online analytical processing (OLAP).