Wintego Systems Ltd. logo

Wintego Systems Ltd.

2 Marks
Corp.
First Filed:Jun 12, 2018Latest Filed:Jun 12, 2018Address:2 HaTaasiya Street, IL

Portfolio Overview

Registered
2(100%)

Top Classes

Class 9
Electronics, Software & Scientific Equipment
2(100%)

TTAB Proceedings

No litigation activity

Top Firms

Advitam IP, LLC(Jun 2018)
2

Trademark Portfolio

2 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
WINT
WINT
Trademark
Word
REGISTERED
Owner:
Serial:79237157
Filed:Jun 12, 2018
Classes:9
Registration:5974386
Registered:Feb 4, 2020
Goods & Services
Computer hardware for the collection of data, databases, files, activity information, locations, communications, messages, emails, chats, videos or photos from mobile phones, cellular phones, tablets, laptops or computers; computer hardware for the collection of data, databases, files, activity information, locations, communications, messages, emails, chats, videos or photos from Internet services, Internet web accounts, email accounts or Internet cloud services; computer hardware for the collection of data, databases, files, activity, communication, protocols, or transmissions from cellular networks; computer hardware for the collection of data, databases, files, activity, communication, protocols, or transmissions from wireless communication networks; computer hardware for inserting and installing software code into mobile phones, cellular phones, tablets, laptops or computers; computer hardware for the collection and storage of data, databases, files, activity information, locations, communications, messages, emails, chats, videos, photos, protocols or communication transmissions; computer hardware for the analysis of data, databases, files, activity information, locations, communications, messages, emails, chats, videos, photos, protocols or communication transmissions; computer hardware for the decoding and processing of data, databases, files, activity information, locations, communications, messages, emails, chats, videos, photos, protocols or communication transmissions; computer hardware for use in the fields of intelligence gathering, communications interception, cyber, cyber intelligence, cyber security or telecommunications; computer hardware used for the purpose of lawful interception of communications; computer hardware for intelligence gathering used for the purpose of homeland security; computer hardware for performing man-in-the-middle methods; computer hardware for performing interception using man-in-the-middle methods; encryption computer hardware; decryption computer hardware; encryption cellular phone hardware; decryption cellular phone hardware; tactical computer hardware units for intelligence gathering; cellular phone units for intelligence gathering; computer software for the collection of data, databases, files, activity information, locations, communications, messages, emails, chats, videos or photos from mobile phones, cellular phones, tablets, laptops or computers; computer software for the collection of data, databases, files, activity information, locations, communications, messages, emails, chats, videos or photos from Internet services, Internet web accounts, email accounts or Internet cloud services; computer software for the collection of data, databases, files, activity, communication, protocols, or transmissions from cellular networks; computer software for the collection of data, databases, files, activity, communication, protocols, or transmissions from wireless communication networks; computer software for inserting and installing software code into mobile phones, cellular phones, tablets, laptops or computers; computer software for the collection and storage of data, databases, files, activity information, locations, communications, messages, emails, chats, videos, photos, protocols or communication transmissions; computer software for the analysis of data, databases, files, activity information, locations, communications, messages, emails, chats, videos, photos, protocols or communication transmissions; computer software for the decoding and processing of data, databases, files, activity information, locations, communications, messages, emails, chats, videos, photos, protocols or communication transmissions; computer software for use in the fields of intelligence gathering, communications interception, cyber, cyber intelligence, cyber security or telecommunications, namely, for extraction of data from mobile phones; computer software for extraction of data from computers; computer software for extraction of data from the Internet; computer software for collection of intelligence from mobile phones; computer software for collection of intelligence from computers; computer software for collection of intelligence from the Internet; computer software for interception of communications; computer software used for the purpose of lawful interception of communications; computer software for intelligence gathering used for the purpose of homeland security; computer software for performing man-in-the-middle methods; computer software for performing interception using man-in-the-middle methods; encryption software, namely, software for encryption; decryption software, namely, software for decryption; all aforementioned goods not for use in the field of finance, banking, insurance and real estate
WINTEGO
WINTEGO
Trademark
Word
REGISTERED
Owner:
Serial:79237158
Filed:Jun 12, 2018
Classes:9
Registration:5974387
Registered:Feb 4, 2020
Goods & Services
Computer hardware for the collection of data, databases, files, activity information, locations, communications, messages, emails, chats, videos or photos from mobile phones, cellular phones, tablets, laptops or computers; computer hardware for the collection of data, databases, files, activity information, locations, communications, messages, emails, chats, videos or photos from Internet services, Internet web accounts, email accounts or Internet cloud services; computer hardware for the collection of data, databases, files, activity, communication, protocols, or transmissions from cellular networks; computer hardware for the collection of data, databases, files, activity, communication, protocols, or transmissions from wireless communication networks; computer hardware for inserting and installing software code into mobile phones, cellular phones, tablets, laptops or computers; computer hardware for the collection and storage of data, databases, files, activity information, locations, communications, messages, emails, chats, videos, photos, protocols or communication transmissions; computer hardware for the analysis of data, databases, files, activity information, locations, communications, messages, emails, chats, videos, photos, protocols or communication transmissions; computer hardware for the decoding and processing of data, databases, files, activity information, locations, communications, messages, emails, chats, videos, photos, protocols or communication transmissions; computer hardware for use in the fields of intelligence gathering, communications interception, cyber, cyber intelligence, cyber security or telecommunications; computer hardware used for the purpose of lawful interception of communications; computer hardware for intelligence gathering used for the purpose of homeland security; computer hardware for performing man-in-the-middle methods; computer hardware for performing interception using man-in-the-middle methods; encryption computer hardware; decryption computer hardware; encryption cellular phone hardware; decryption cellular phone hardware; tactical computer hardware units for intelligence gathering; cellular phone units for intelligence gathering; computer software for the collection of data, databases, files, activity information, locations, communications, messages, emails, chats, videos or photos from mobile phones, cellular phones, tablets, laptops or computers; computer software for the collection of data, databases, files, activity information, locations, communications, messages, emails, chats, videos or photos from Internet services, Internet web accounts, email accounts or Internet cloud services; computer software for the collection of data, databases, files, activity, communication, protocols, or transmissions from cellular networks; computer software for the collection of data, databases, files, activity, communication, protocols, or transmissions from wireless communication networks; computer software for inserting and installing software code into mobile phones, cellular phones, tablets, laptops or computers; computer software for the collection and storage of data, databases, files, activity information, locations, communications, messages, emails, chats, videos, photos, protocols or communication transmissions; computer software for the analysis of data, databases, files, activity information, locations, communications, messages, emails, chats, videos, photos, protocols or communication transmissions; computer software for the decoding and processing of data, databases, files, activity information, locations, communications, messages, emails, chats, videos, photos, protocols or communication transmissions; computer software for use in the fields of intelligence gathering, communications interception, cyber, cyber intelligence, cyber security or telecommunications, namely, for extraction of data from mobile phones; computer software for extraction of data from computers; computer software for extraction of data from the Internet; computer software for collection of intelligence from mobile phones; computer software for collection of intelligence from computers; computer software for collection of intelligence from the Internet; computer software for interception of communications; computer software used for the purpose of lawful interception of communications; computer software for intelligence gathering used for the purpose of homeland security; computer software for performing man-in-the-middle methods; computer software for performing interception using man-in-the-middle methods; encryption software, namely, software for encryption; decryption software, namely, software for decryption

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.