GleanMark is free for all of AprilGet free access
UNIKEN INC. logo

UNIKEN INC.

8 Marks
Corp.
First Filed:Nov 13, 2009Latest Filed:Jan 23, 2026Address:466 Southern Blvd., Chatham, NJ 07928

Portfolio Overview

Registered
3(38%)
Pending
1(13%)
Dead
4(50%)

Top Classes

Class 9
Electronics, Software & Scientific Equipment
5(63%)
Class 42
Software, IT Services & Scientific Research
4(50%)
Class 36
Insurance, Financial Services & Real Estate
1(13%)

TTAB Proceedings

No litigation activity

Top Firms

SMITH DUGGAN BUELL & RUFO LL...(Sep 2020)
2

Trademark Portfolio

8 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
DITTO.
DITTO.
Trademark
Combined
ITU
PENDING
Owner:
Serial:99610840
Filed:Jan 23, 2026
Classes:9, 36, 42
Goods & Services
Class 009: Downloadable computer software specifically for biometric identity verification using palm vein, facial recognition, and liveness detection technology; Downloadable software for cryptographic key pair generation and management for identity authentication; Downloadable mobile application software for passwordless authentication using device-specific fingerprinting and zero-knowledge proofs; Downloadable software development kits (SDKs) specifically for implementing multi-factor authentication with mobile threat detection capabilities in banking and financial services applications; Class 036: Identity verification services for financial transaction authorization; Fraud detection services specifically for banking and financial services; Electronic verification of identity for payment processing and financial compliance; Authentication services for preventing financial fraud in banking transactions; Issuance, acceptance and orchestration of digital identity credentials and attestations for use via electronic wallets; Generation and management of QR-based credentials and communications for customer engagement within electronic wallets; Class 042: Software as a service (SaaS) featuring software specifically for biometric identity verification and anti-money laundering (AML) compliance in regulated financial industries; Platform as a service (PaaS) featuring software for know-your-customer (KYC) verification using government document authentication and liveness detection; Providing temporary use of non-downloadable software for creating cryptographic private-private key pairs for deterministic authentication; Identity verification services using biometric technology for banking and financial services compliance; Identity intelligence platform that provides an aggregate view of identity events across an ecosystem, providing visibility into user behavior and risk; Orchestration of identity events and workflows across consumer lifecycles in an organization, incorporating verification and authentication; Provision of continuous identity assurance through ongoing identity authentication and risk signals monitoring; Providing a secure communication protocol that creates a secure, encrypted communication tunnel between electronic devices, facilitating trusted interactions
CERTAINTY IN YOUR HAND
ABANDONED
Owner:
Serial:98550899
Filed:May 14, 2024
Classes:9
Goods & Services
downloadable software, namely, cybersecurity software for use in retail POS (point of sale) systems or user authentication systems; computer software, namely, cybersecurity software for use in retail POS (point of sale) systems or user authentication systems; computer software for use in computer, data, network and mobile device security, namely, software for use in retail POS (point of sale) systems or user authentication systems
YOUR IDENTITY IS IN YOUR HAND
ABANDONED
Owner:
Serial:98550907
Filed:May 14, 2024
Classes:9
Goods & Services
downloadable software, namely, cybersecurity software for use in retail POS (point of sale) systems or user authentication systems; computer software, namely, cybersecurity software for use in retail POS (point of sale) systems or user authentication systems; computer software for use in computer, data, network and mobile device security, namely, software for use in retail POS (point of sale) systems or user authentication systems
YOUR IDENTITY IS YOU
ABANDONED
Owner:
Serial:98550911
Filed:May 14, 2024
Classes:9
Goods & Services
downloadable software, namely, cybersecurity software for use in retail POS (point of sale) systems or user authentication systems; computer software, namely, cybersecurity software for use in retail POS (point of sale) systems or user authentication systems; computer software for use in computer, data, network and mobile device security, namely, software for use in retail POS (point of sale) systems or user authentication systems
UNIKEN
UNIKEN
Trademark
Word
REGISTERED
Owner:
Serial:90196452
Filed:Sep 21, 2020
Classes:9
Registration:6423952
Registered:Jul 20, 2021
Goods & Services
Downloadable and recorded software for mobile devices and desktops securing the interaction between users, customers, and clients and their computer-based business applications; Downloadable computer software for securing the interaction between users and computer-based business applications; Downloadable identity verification software to allow end-customers to scan government-issued documents combined with facial recognition biometrics and data matching; Downloadable cyber security software; Downloadable authentication server software; Downloadable mobile software application for malware detection, transaction verification, device fingerprinting, and providing access to secure channel and authentication library software; Downloadable computer security software for restricting unauthorized access to computers, computer networks, websites, computer-based applications, and for ensuring the authenticity and integrity of electronic transactions; Downloadable communications security software for electronic devices and for restricting unauthorized access to computers, computer networks, websites, computer-based applications; Downloadable software for application, transaction, and identity security related to mobile device applications for authenticating, enforcing, restricting, and controlling access to users of mobile device applications, and for ensuring the authenticity and integrity of transactions submitted by users of mobile device applications; Downloadable software for mobile device virus and malware tracking and mobile device and virus and malware remediation; Downloadable Software development kits (SDK); Downloadable Computer security Software Development Kits (SDK); Downloadable Mobile application software security development kits (SDK); Downloadable Software development kits (SDK) for authentication of user identities; Downloadable Software development kits (SDK) for biometric security software; Downloadable real-time fraud prevention software for authenticating, enforcing, restricting, and controlling access to users of mobile device applications and computer-based applications, and for ensuring authenticity and integrity of transactions submitted by users of computer-based applications; Downloadable software for monitoring, detecting, and blocking electronic transactions submitted to computer-based applications, and determination if such transactions have been modified or originate from unauthorized sources; Downloadable software for logging, monitoring, and securing of computer-based services accessible via computer networks, namely, the internet and mobile networks; Downloadable software for analyzing and detecting unusual user and transaction patterns; Downloadable behavioral analytics software for authenticating, enforcing, restricting, and controlling access to users of mobile device and web applications and computer-based applications; Downloadable software for ensuring the authenticity and integrity of transactions submitted by users of mobile device, web applications, and computer-based applications; Downloadable mobile application security software for authenticating, enforcing, restricting, and controlling access to users of mobile device and web applications and computer-based applications and for ensuring the authenticity and integrity of transactions submitted by users of mobile device and web applications and computer-based applications; Downloadable software for protecting mobile applications against cyber threats, mobile viruses, and malware, phishing attacks, man-in-the-middle attacks; Downloadable software for detecting, preventing, and reporting mobile cyber-attacks against computer-based applications; Downloadable runtime application self-protection software, namely, computer mobile malware, software; Downloadable tamper detection software, namely, software for detecting illegitimate tampering by unauthorized entities with electronic devices or software; Downloadable software for generating cryptographic keys and encryption keys for use in the field of cyber security, internet security, computer security, computer network security, and cryptography; Downloadable software for capturing, analyzing, and verifying biometric traits; Electronic apparatus, namely, downloadable computer software used to identify and authenticate users of working-from-home remote access to secure online communications and transactions; Electronic apparatus, namely, downloadable software for limiting access control to physical and virtual spaces, to electronic systems, to computers, to electronic networks, to websites, to computer based applications, and to electronic databases
SECURE * AUTHENTICATE * TRANSACT
REGISTERED
Owner:
Serial:88667554
Filed:Oct 24, 2019
Classes:42
Registration:6143949
Registered:Sep 1, 2020
Goods & Services
Cybersecurity services in the nature of restricting unauthorized access to computer systems
SECURE · AUTHENTICATE · TRANSACT
REGISTERED
Owner:
Serial:88667732
Filed:Oct 24, 2019
Classes:42
Registration:6143951
Registered:Sep 1, 2020
Goods & Services
Software as a service (SAAS) services featuring software for computer security
UNIKEN
UNIKEN
Service Mark
Combined
CANCELLED
Owner:
Serial:77872530
Filed:Nov 13, 2009
Classes:42
Registration:4014355
Registered:Aug 23, 2011