BS
BETA SYSTEMS SOFTWARE AG
12 Marks
Corp.
First Filed:Apr 8, 1994Latest Filed:Jul 29, 2024Address:Alt-Moabit 90d, Berlin, 10559, DE
Portfolio Overview
Registered
5(42%)Dead
7(58%)Previous
3Top Classes
Class 9
Electronics, Software & Scientific EquipmentClass 42
Software, IT Services & Scientific ResearchClass 41
Education and EntertainmentTTAB Proceedings
Total Proceedings
1As Plaintiff
1(100%)As Defendant
0(0%)Top Firms
The Dobrusin Law Firm, P.C.(Jul 2024)
5
Oppedahl Patent Law Firm LLC(Aug 2002)
2
Fish & Richardson P.C.(Jun 1992)
1
Trademark Portfolio
15 results
(current & previous marks)
Refine by Mark/Description🔽
Filed
Registered
Last Activity
Filters
Ownership
12
3
Status
5
0
5
5
0
Mark Type
7
3
0
5
0
14
5
2
4
9
Goods & Services
Provision of courses of instruction in the management of information technology; training courses relating to computer software and IT security; arranging and conducting of conferences, congresses, seminars, symposiums, training courses, classes and lectures; provision of instruction relating to computer programming; technical training relating to cyber safety; technical training relating to internet security; provision of instruction relating to data processing.; Software; downloadable software; computer software packages; computer programs for data processing; embedded software; networking software; computer network scanning applications for detecting, monitoring and eliminating network vulnerabilities.; IT services; IT security, protection and restoration; IT consultancy, advisory and information services; IT project management; IT service management; data security consultancy; Internet security consultancy; consultancy in the field of computer system analysis; technical project management for IT projects including their planning and coordination; advice on the selection of hardware and software to be used; creation, development and design, design, installation, updating, maintenance and configuration of software [programs and system configurations]; software engineering; server administration; electronic storage of programs and IT- supported information; computer software technical support services; data recovery services; development of technologies for the protection of electronic networks; software as a service [SaaS]; platform as a Service [PaaS]; consulting services in the field of software as a service [SaaS]; consulting services in the field of platform as a service [PaaS]; cloud hosting provider services; cloud-based data protection services; consulting in the field of cloud computing networks and applications; programming of operating software for accessing and using a cloud computing network; design and development of operating software for accessing and using a cloud computing network; artificial intelligence consultancy; providing artificial intelligence computer programs on data networks; platforms for artificial intelligence as software as a service [SaaS]; provision of computer security risk management programs; providing security services for computer networks.
Goods & Services
Provision of courses of instruction in the management of information technology; training courses relating to computer software and IT security; arranging and conducting of conferences, congresses, seminars, symposiums, training courses, classes and lectures; provision of instruction relating to computer programming; technical training relating to cyber safety; technical training relating to internet security; provision of instruction relating to data processing.; Software; downloadable software; computer software packages; computer programs for data processing; embedded software; networking software; computer network scanning applications for detecting, monitoring and eliminating network vulnerabilities.; IT services; IT security, protection and restoration; IT consultancy, advisory and information services; IT project management; IT service management; data security consultancy; Internet security consultancy; consultancy in the field of computer system analysis; technical project management for IT projects including their planning and coordination; advice on the selection of hardware and software to be used; creation, development and design, design, installation, updating, maintenance and configuration of software [programs and system configurations]; software engineering; server administration; electronic storage of programs and IT- supported information; computer software technical support services; data recovery services; development of technologies for the protection of electronic networks; software as a service [SaaS]; platform as a Service [PaaS]; consulting services in the field of software as a service [SaaS]; consulting services in the field of platform as a service [PaaS]; cloud hosting provider services; cloud-based data protection services; consulting in the field of cloud computing networks and applications; programming of operating software for accessing and using a cloud computing network; design and development of operating software for accessing and using a cloud computing network; artificial intelligence consultancy; providing artificial intelligence computer programs on data networks; platforms for artificial intelligence as software as a service [SaaS]; provision of computer security risk management programs; providing security services for computer networks.
Goods & Services
Provision of courses of instruction in the management of information technology; training courses relating to computer software and IT security; arranging and conducting of conferences, congresses, seminars, symposiums, training courses, classes and lectures; provision of instruction relating to computer programming; technical training relating to cyber safety; technical training relating to internet security; provision of instruction relating to data processing.; Software; downloadable software; computer software packages; computer programs for data processing; embedded software; networking software; computer network scanning applications for detecting, monitoring and eliminating network vulnerabilities.; IT services; IT security, protection and restoration; IT consultancy, advisory and information services; IT project management; IT service management; data security consultancy; Internet security consultancy; consultancy in the field of computer system analysis; technical project management for IT projects including their planning and coordination; advice on the selection of hardware and software to be used; creation, development and design, design, installation, updating, maintenance and configuration of software [programs and system configurations]; software engineering; server administration; electronic storage of programs and IT- supported information; computer software technical support services; data recovery services; development of technologies for the protection of electronic networks; software as a service [SaaS]; platform as a Service [PaaS]; consulting services in the field of software as a service [SaaS]; consulting services, in the field of platform as a service [PaaS]; cloud hosting provider services; cloud-based data protection services; consulting in the field of cloud computing networks and applications; programming of operating software for accessing and using a cloud computing network; design and development of operating software for accessing and using a cloud computing network; artificial intelligence consultancy; providing artificial intelligence computer programs on data networks; platforms for artificial intelligence as software as a service [SaaS]; provision of computer security risk management programs; providing security services for computer networks.
Goods & Services
Provision of courses of instruction in the management of information technology; training courses relating to computer software and IT security; arranging and conducting of conferences, congresses, seminars, symposiums, training courses, classes and lectures; provision of instruction relating to computer programming; technical training relating to cyber safety; technical training relating to internet security; provision of instruction relating to data processing.; Software; downloadable software; computer software packages; computer programs for data processing; embedded software; networking software; computer network scanning applications for detecting, monitoring and eliminating network vulnerabilities.; IT services; IT security, protection and restoration; IT consultancy, advisory and information services; IT project management; IT service management; data security consultancy; Internet security consultancy; consultancy in the field of computer system analysis; technical project management for IT projects including their planning and coordination; advice on the selection of hardware and software to be used; creation, development and design, design, installation, updating, maintenance and configuration of software [programs and system configurations]; software engineering; server administration; electronic storage of programs and IT- supported information; computer software technical support services; data recovery services; development of technologies for the protection of electronic networks; software as a service [SaaS]; platform as a Service [PaaS]; consulting services in the field of software as a service [SaaS]; consulting services in the field of platform as a service [PaaS]; cloud hosting provider services; cloud-based data protection services; consulting in the field of cloud computing networks and applications; programming of operating software for accessing and using a cloud computing network; design and development of operating software for accessing and using a cloud computing network; artificial intelligence consultancy; providing artificial intelligence computer programs on data networks; platforms for artificial intelligence as software as a service [SaaS]; provision of computer security risk management programs; providing security services for computer network.
Goods & Services
Computer software for electronic data security and compliance, in particular, computer software designed to generate, issue and manage digital user identities, access management and access control and privilege information for computers, computer networks and cloud computing environments; computer software for identification and authentication of users; computer software for encryption and decryption of data; computer software to integrate cryptographic security features into software applications; computer software for computer network administration and software for cloud computing; computer software for identifying risk to computer network and cloud computing application and database security configurations; computer security products, namely, blank smart cards, digital tokens, electronic tokens, servers, clients, computer hardware and software, all for protection of data from unauthorized access; electronic data carriers containing software for electronic data security and compliance, in particular, computer software designed to generate, issue and manage digital user identities, access management and access control and privilege information for computers, computer networks and cloud computing environments, identification and authentication of users, encryption and decryption of data, integrate cryptographic security features into software applications, computer network administration and software for cloud computing, identifying risk to computer network and cloud computing products and user manuals sold in connection therewith | Business organizational consultancy and business consultancy, in particular in the field of electronic data security and information technology data security | Providing access time to computer networks; leasing of access time to computer networks | Consultancy in the field of information technology; consultancy in the field of computer software, in particular, in the field of computer software for electronic data security; computer software programming; design, development, installation and maintenance of computer software; creating complete software concepts for others; design, development and preparation of software for electronic data security; design, development, preparation of computer software to integrate cryptographic security features into software applications; design, development and preparation of computer software designed to generate, issue and manage digital user identities, access management and access control and privilege information for computers, computer networks and cloud computing environments; design and development of computer software for identification and authentication of users; design, development of computer software for encryption and decryption of data; design, development of computer network administration software and cloud computing software, in particular, design, development of software for identifying risk to computer network and cloud computing application and database security configurations; design, development of computer security products, namely, blank smart cards, tokens, servers, clients, computer hardware and software for protection of data from unauthorized access; design, development, and administration of systems for controlling and managing heterogeneous computing networks, consisting of computer networks, computers and mainframe computer systems, and for controlling and managing mainframe computer systems, and for controlling and managing client/server systems; rental of computer software; providing computer technology support services, namely, help desk services, relating to computer software and information and advice concerning the design and development of hardware; cloud computing services, in particular, public and private cloud computing services featuring software for data security and compliance and integration of private and public cloud computing environments; encrypted data recovery services; data encryption and decoding services; design, development of electronic data security systems; internet protocol (ip) address verification services; providing electronic verification of on-line orders of digital content and generating electronic permission codes which then allow users to access said digital content; providing online, non-downloadable software for installation and maintenance of computer software, electronic data security, identification and authentication of users, encryption and decryption of data, identifying risk to computer network and cloud computing application and database security configurations, computer security products, namely, smart cards, tokens, servers, clients, electronic data security systems; providing online, non-downloadable software to integrate cryptographic security features into software applications, and to generate, issue and manage digital user identities, rights and privileges to information, and privilege information for computers, computer networks and cloud computing environments; providing online non-downloadable computer software for protection of data from unauthorized access, for controlling and managing heterogeneous computing networks, consisting of computer networks, computers and mainframe computer systems, and for controlling and managing mainframe computer systems, and for controlling and managing client/server systems | Consulting services in the field of maintaining the security and integrity of databases; authentication, issuance and validation of digital certificates
Owner:
Serial:78158360
Filed:Aug 27, 2002
Classes:9, 37, 42, +1
Registration:2786400
Registered:Nov 25, 2003
Goods & Services
Class 009: Computer programs, namely, access control programs for security systems;[ internet and intranet network access server operating programs; ] access-control-based information technology security systems consisting of data processors, machine readable data media, and access-based security system computer programs; Class 037: Installation of information technology security systems; Class 042: Design and development of computer programs for data processing, analysis, evaluation and input of information into computer databases for information technology security systems; Class 045: Consultation in the field of access-control-based information technology security systems
ROLE MINER
Goods & Services
Class 009: Computer software for creating and maintaining firewalls and preventing unauthorized access, data theft, data or computer system damage or misuse by unauthorized computer users for security systems for linked information technology resources; [computers; computer networks comprising computers and servers]; Class 042: Management and consultation in the nature of information technology and information technology security[; computer programming for others]
Goods & Services
computer programs for automatic management and control of large-scale data processing systems; business management consultation in the field of computer programs for automatic management and control of large-scale data processing systems; computer programming and software design of computer programs for others for automating management and control of large-scale data processing systems
Goods & Services
computer programs for the integration of computer applications; computer programs enabling the communication between computer applications even across various data processing platforms; business management consultation in the field of data processing; computer programming for others; computer software design for others