TAGLIO LLC
6 Marks
LLC
First Filed:Oct 22, 2002Latest Filed:Jul 10, 2023Address:508 E 53rd St, Austin, TX 78751
Portfolio Overview
Registered
4(67%)Dead
2(33%)Top Classes
Class 9
Electronics, Software & Scientific EquipmentClass 42
Software, IT Services & Scientific ResearchTTAB Proceedings
Total Proceedings
1As Plaintiff
0(0%)As Defendant
1(100%)Top Firms
PIERSON IP, PLLC(Jul 2023)
5
Trademark Portfolio
6 results
(current & previous marks)
Refine by Mark/Description🔽
Filed
Registered
Last Activity
Filters
Ownership
6
0
Status
4
0
2
0
0
Mark Type
4
0
1
1
0
5
2
Goods & Services
Chip card readers; Pre-recorded USB cards containing programming used for digital certificate issuance, verification, and management, for the verification and management of digital keys and credentials; Blank smart cards; Blank electronic chip cards; Downloadable computer software and firmware for managing user identities and access privileges for electronic commerce and security, and for user and device authentication, specifically for enterprise environments; Downloadable software for generating cryptographic keys for receiving and spending crypto assets; Electronic key cards; Electronic security and surveillance devices, namely, electronic security tags and labels, acoustic tags, magnetic tags; Electronic devices for reading, encoding and programming transponder keys; Electronic key fobs being remote control apparatus; Electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication; Encoded key cards; Encoded smart cards containing programming used for managing user identities and access privileges for electronic commerce and security, and for user and device authentication, specifically for enterprise environments; Encoded electronic chip cards for digital certificate issuance, verification, and management, for the verification and management of digital keys and credentials, specifically in enterprise based environments; Magnetically encoded key cards; Pre-recorded USB flash drives containing programming used for digital certificate issuance, verification, and management, for the verification and management of digital keys and credentials; USB computer access control key; USB computer security key
Goods & Services
Design and development of computer software; Design and development of computer software for card management systems for access control, namely, design and development of computer software for managing the issuance, personalization, initialization, deployment and software licenses for access cards; Technological consultation in the technology field of computer-controlled physical and computer access systems for member organizations; Computer programming services in connection with computerized systems for restricting unauthorized network access by smart cards and electronic security tokens; Computer security services, namely, authentication, issuance and validation of digital certificates for personalized authentication cards used to restrict unauthorized access to physical locations; Developing customized software in the field of physical and computer access for smart cards for others; Installation and maintenance of authentication card management software; Installation of authentication card and security card software; Scientific and technological services, namely, authentication, issuance and validation of digital certificates for smart cards and electronic security tokens used to restrict unauthorized physical locations and computer networks; Software as a service (SAAS) services featuring software for operational management of physical access control systems, logical access control systems, and computer access control systems; Software as a service (SAAS) services featuring software for the programming of physical and computer access cards and physical tokens, and managing the issuance of digital identities, smart cards and electronic security tokens, such services provided via a secure computer environment
Goods & Services
Computer software and firmware for managing user identities and access privileges for electronic commerce and security, and for user and device authentication; Computer hardware and software systems for managing user identities and access privileges for electronic commerce and security, and for user and device authentication; smart card readers and terminals; Identity cards, magnetic; Smart card readers; Blank smart cards; Blank smart cards embedded with transponders; Blank electronic chip cards; Blank integrated circuit cards; Computer application software for the encryption and decryption of data, namely, software for digital certificate issuance, verification, and management, for the verification and management of digital keys and credentials, for application management; [ Computer network interface devices; Computer operating software; ] Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Electronic card readers; Electronic encryption units; Electronic key cards; Electronic key fobs being remote control apparatus; Electronic security and surveillance devices, namely, electronic security tags and labels, acoustic tags, magnetic tags; Electronic circuit cards; Electronic memory card readers; Electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication; Encoded smart cards containing programming used for authentication, encryption and decryption of data; Encoded identity cards; Encoded key cards; Magnetic coded card readers; Magnetic encoded card readers; Magnetic identifying cards; Magnetically encoded gift cards; Magnetically encoded identity cards; Magnetically encoded key cards; Point-of-sale terminals for making contactless payments; Sensor cards for authentication, encryption and decryption of data; USB card readers; USB computer security key
Goods & Services
Computer software and firmware for managing user identities and access privileges for electronic commerce and security, and for user and device authentication; Computer hardware and software systems for managing user identities and access privileges for electronic commerce and security, and for user and device authentication; smart card readers and terminals; Identity cards, magnetic; Smart card readers; Blank smart cards; Blank smart cards embedded with transponders; Blank electronic chip cards; Blank integrated circuit cards; Computer application software for the encryption and decryption of data, namely, software for digital certificate issuance, verification, and management, for the verification and management of digital keys and credentials, for application management; [ Computer network interface devices; Computer operating software; ] Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Electronic card readers; Electronic encryption units; Electronic key cards; Electronic key fobs being remote control apparatus; Electronic security and surveillance devices, namely, electronic security tags and labels, acoustic tags, magnetic tags; Electronic circuit cards; Electronic memory card readers; Electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication; Encoded smart cards containing programming used for authentication, encryption and decryption of data; Encoded identity cards; Encoded key cards; Magnetic coded card readers; Magnetic encoded card readers; Magnetic identifying cards; Magnetically encoded gift cards; Magnetically encoded identity cards; Magnetically encoded key cards; Point-of-sale terminals for making contactless payments; Sensor cards for authentication, encryption and decryption of data; USB card readers; USB computer security key | Application service provider (ASP) featuring software for use for hosting computer software applications to manage user identities and access privileges for electronic commerce and security, and for user and device authentication; Application service provider (ASP), namely, hosting computer software applications of others; Consulting in the field of cryptographic engineering; Technical support services, namely, troubleshooting of computer software problems; Authentication, issuance and validation of digital certificates; Computer consultation in the field of computer network security; Computer security consultancy; Computer security services in the nature of administering digital keys; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computer software consulting; Data encryption and decoding services; Data encryption services; Data encryption services for providing security and anonymity for electronically transmitted credit card transactions; Data security consultancy; Providing a secure, web-based service featuring technology that enables individuals to remotely create and manage their own accounts so that whatever private content they upload now can be encrypted, then delivered to their intended recipients, at the time and in the manner requested; [ Rental of smart card readers; ] Testing of security systems
Goods & Services
Blank smart cards; encoded smart cards containing programming for the authentication, encryption and decryption of data; operating software for smart cards; computer hardware; computer network interface cards; computer software for the encryption and decryption of data, for digital certificate issuance, verification, and management, for the verification and management of digital keys and credentials, for application management; computer software to manage user identities and access privileges for electronic commerce and security, and for user and device authentication; smart card readers and terminals | Data encryption services; application service provider (asp), namely hosting computer software applications for computer software for the encryption and decryption of data, for digital certificate issuance, verification, and management, for the verification and management of digital keys and credentials, for application management; application service provider (asp), namely hosting computer software applications to manage user identities and access privileges for electronic commerce and security, and for user and device authentication; application service provider (asp), namely, hosting computer software applications of others; technical support services, namely troubleshooting of computer hardware and software problems; consulting in the field of computer network security