Castle Shield Holdings, LLC
6 Marks
LLC
First Filed:Nov 12, 2019Latest Filed:Aug 26, 2024Address:537 Valley Street, Scottsville, VA 24590, US
Portfolio Overview
Registered
2(33%)Pending
3(50%)Dead
1(17%)Top Classes
Class 9
Electronics, Software & Scientific EquipmentClass 42
Software, IT Services & Scientific ResearchTTAB Proceedings
Total Proceedings
1As Plaintiff
1(100%)As Defendant
0(0%)Top Firms
SGIP(Aug 2024)
6
Trademark Portfolio
6 results
(current & previous marks)
Refine by Mark/Description🔽
Filed
Registered
Last Activity
Filters
Ownership
6
0
Status
2
3
0
1
0
Mark Type
6
0
0
0
0
5
4
Goods & Services
Downloadable software to encrypt and authenticate digital files in a distributed network and zero trust environment; downloadable computer software for encryption and authentication of user identification; downloadable computer software for protecting data in the nature of data encryption, key generation, and identity management; downloadable software for ensuring the security of data in the nature of data encryption; downloadable computer software for use in the encryption and decryption of digital files, ephemeral key generation, and data encapsulation; downloadable computer software for authentication of data provenance; downloadable computer software for encryption ephemeral key management and entropy; downloadable computer software for use in protecting centralized data and multi point access control via data encryption, ephemeral key generation, and identity management; downloadable computer software for use in the safeguarding of digital files and identities while providing key recovery systems via data encryption, ephemeral key generation, and identity management; downloadable computer software for use in tracking and managing ephemeral key exchange to protect digital files; downloadable computer software for managing the non-alterability of digital files; downloadable computer software that uses partially homomorphic protocols to view abstract and underlining data files while remaining encrypted in the cloud; downloadable user authentication computer software that uses a template-less biometric for multifactor authentication; downloadable computer software for use in the safeguarding of digital files via data encryption, ephemeral key generation, and identity management; security token hardware; USB computer security key; circuit boards; electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication and a key recovery system; encoded electronic chip cards for authentication and a key recovery system; computer circuit boards for authentication and a key recovery system; downloadable computer software that uses a True Random Number Generator (TRNG) to enhance entropy and generate ephemeral encryption keys; electronic security token in the nature of a fob-like device used by an authorized user of a computer system that uses a True Random Number Generator (TRNG) to enhance entropy and generate ephemeral encryption keys to facilitate authentication and a key recovery system; Providing temporary use of online non-downloadable software and applications to encrypt and authenticate digital files in a distributed network and zero trust environment; providing temporary use of online non-downloadable software and applications for encryption and authentication of user identification; providing temporary use of online non-downloadable software and applications for protecting data in the nature of data encryption, ephemeral key generation, and identity management; providing temporary use of online non-downloadable software and applications for ensuring the security of data in the nature of data encryption; providing temporary use of online non-downloadable computer software for use in the encryption and decryption of digital files, ephemeral key generation, and data encapsulation; providing temporary use of online non-downloadable computer software for authentication of data provenance; providing temporary use of online non-downloadable software and applications for encryption key management and entropy; providing temporary use of online non-downloadable software and applications for use in protecting centralized data and multi point access control via data encryption, ephemeral key generation, and identity management; providing temporary use of online non-downloadable software and applications for use in the safeguarding of digital files and identities while providing key recovery systems via data encryption, ephemeral key generation, and identity management; providing temporary use of online non-downloadable software and applications for use in tracking and managing key exchange to protect digital files; providing temporary use of online non-downloadable software and applications for managing the non-alterability of digital files; providing temporary use of online non-downloadable computer software that uses partially homomorphic protocols to view abstract and underlining data files while remaining encrypted in the cloud; providing temporary use of online non-downloadable user authentication computer software that uses a template-less biometric for multifactor authentication; providing temporary use of online non-downloadable computer software for use in the safeguarding of digital files via data encryption, ephemeral key generation, and identity management; providing temporary use of online non-downloadable computer software that uses a True Random Number Generator (TRNG) to enhance entropy and generate ephemeral encryption keys
Goods & Services
Downloadable facial recognition software and downloadable biometric technology software for tracking and managing biometric data and authenticating users; downloadable computer software for encryption; downloadable computer software for protecting data in the nature of data encryption, key generation, and identity management; downloadable software for ensuring the security of data in the nature of data encryption; downloadable computer software for use in the encryption and decryption of digital files, key generation, and identity management; downloadable computer software for authorizing access to data and devices; downloadable computer software for encryption key management and entropy; downloadable computer software for use in data and device access control; downloadable computer software for use in the safeguarding of digital files, identities and devices; security token hardware; USB computer security key; circuit boards; electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication and a key recovery system; encoded electronic chip cards for authentication and a key recovery system; computer circuit boards for authentication and a key recovery system; Providing temporary use of online, non-downloadable facial recognition software and providing temporary use of online, non-downloadable biometric technology software for tracking and managing biometric data and authenticating users; Providing temporary use of online, non-downloadable computer software for encryption; Providing temporary use of online, non-downloadable computer software for protecting data in the nature of data encryption, key generation, and identity management; Providing temporary use of online, non-downloadable software for ensuring the security of data in the nature of data encryption; Providing temporary use of online, non-downloadable computer software for use in the encryption and decryption of digital files, key generation, and identity management; Providing temporary use of online, non-downloadable computer software for authorizing access to data and devices; Providing temporary use of online, non-downloadable computer software for encryption key management and entropy; Providing temporary use of online, non-downloadable computer software for use in data and device access control; Providing temporary use of online, non-downloadable computer software for use in the safeguarding of digital files, identities and devices
Goods & Services
Downloadable computer software for encryption; downloadable computer software for protecting data in the nature of data encryption; downloadable software for ensuring the security of data in the nature of data encryption; downloadable computer software for use in the encryption and decryption of digital files; downloadable computer software for authorizing access to data; downloadable computer software for encryption key management; downloadable computer software for use in data access control; downloadable computer software for use in the safeguarding of digital files; security token hardware; USB computer security key; circuit boards; electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication and a key recovery system; encoded electronic chip cards for authentication and a key recovery system; computer circuit boards for authentication and a key recovery system; Providing temporary use of online, non-downloadable computer software for encryption; Providing temporary use of online, non-downloadable computer software for protecting data in the nature of data encryption; Providing temporary use of online, non-downloadable software for ensuring the security of data in the nature of data encryption; Providing temporary use of online, non-downloadable computer software for use in the encryption and decryption of digital files; Providing temporary use of online, non-downloadable computer software for authorizing access to data; Providing temporary use of online, non-downloadable computer software for encryption key management; Providing temporary use of online, non-downloadable computer software for use in data access control; Providing temporary use of online, non-downloadable computer software for use in the safeguarding of digital files
Goods & Services
Downloadable software, namely, instant messaging software, file sharing software, communications software for electronically exchanging data, audio, video images and graphics via computer, mobile, wireless, and communication networks; Downloadable computer software for processing images, graphics, audio, video, and text; Downloadable software in the nature of a messaging application; Downloadable computer software for use in facilitating voice over internet protocol (VOIP) calls, phone calls, video calls, text messages, and instant message services; Downloadable software for sending and receiving encrypted electronic messages, graphics, images, audio and audio visual content via global communication networks; Downloadable computer software for the collection, managing, editing, organizing, modifying, transmission, sharing, and storage of data and information; Downloadable computer software for personal information management, and data synchronization software; Downloadable computer software for end to end encryption
Goods & Services
Computer software consultancy; Design and development of computer software; Installation and maintenance of computer software