Use GleanMark for a free trademark search powered by millions of USPTO records. See similar trademarks, filter results, and sign up for active monitoring.

140 resultsfor "OPDIVO"

Refine results
Filed
Registered
Last Activity
Clickto monitor
OPDIVO
OPDIVO
Trademark
Word
TTAB
REGISTERED
Owner:
Serial:85764349
Filed:Oct 26, 2012
Classes:5
Registration:4548457
Registered:Jun 10, 2014
Goods & Services
Pharmaceutical preparations for human use for the treatment and prevention of [ obesity, diabetes, incontinence, cardiovascular diseases, central nervous system diseases and disorders, metabolic disorders, stroke, ] cancer [ inflammation and inflammatory diseases, respiratory and infectious diseases, auto-immune diseases, solid organ transplant rejection; pharmaceutical preparations for human use, namely, antibiotics, anti-fungals, anti-virals, immunosuppressants and pharmaceutical antibodies ]
OPDIVO
OPDIVO
Trademark
Combined
TTAB
REGISTERED
Owner:
Serial:86174642
Filed:Jan 24, 2014
Classes:5
Registration:4914296
Registered:Mar 8, 2016
Goods & Services
Pharmaceutical preparations for human use for the treatment and prevention of [ obesity, diabetes, incontinence, cardiovascular diseases, central nervous system diseases and disorders, metabolic disorders, stroke, ] cancer [, inflammation and inflammatory diseases, respiratory and infectious diseases, auto-immune diseases, solid organ transplant rejection; pharmaceutical preparations for human use, namely, antibiotics, anti-fungals, anti-virals, immunosuppressants and pharmaceutical antibodies ]
OPTAFI
OPTAFI
Service Mark
Word
REGISTERED
Owner:
Serial:97428064
Filed:May 25, 2022
Classes:42
Registration:7166097
Registered:Sep 12, 2023
Goods & Services
Software as a service (SAAS) services featuring software for securely deploying, migrating, hosting and updating software applications in the cloud; Software as a service (SAAS) services featuring software for software application and computing systems integration; Software as a service (SAAS) services featuring software for IT and cloud security; Providing temporary use of non-downloadable cloud-based software for securely deploying, migrating, hosting and updating software applications in the cloud; Providing temporary use of non-downloadable cloud-based software for software application and computing systems integration; Providing temporary use of non-downloadable cloud-based software for IT and cloud security; Cloud migration services in the nature of data migration services and migration of computer software to the cloud for others; IT integration services and consulting services in the field of cloud computing and integration; Design and development of computer software; Technical support services, namely, troubleshooting of computer software problems
OPTAVE
OPTAVE
Trademark
Word
REGISTERED
Owner:
Serial:79406479
Filed:Aug 25, 2024
Classes:9, 35, 41, +1
Registration:8081594
Registered:Dec 30, 2025
Goods & Services
Computer-based simulation training services in the field of business management; conducting seminars, webinars and training in the field of business management; education and training in the fields of employment and professional development; educational services, namely, development and provision of educational courses in the fields of computer software training; training support services for others, namely, assisting customers with the production and delivery of online training courses.; Computer chatbot software for simulating conversations; computer programming software for the integration of artificial intelligence and machine learning in the field of big data for business data analytics and user behavior analytics; computer programs for language translations and training; computer software for use in customer relationship management (CRM).; Business management of outsourcing; customer relationship management; customer service in the field of airline reservations; customer service in the field of computer servicing; customer service management; outsourcing services in the field of business operations; outsourcing services in the field of customer relationship management; providing an online marketplace for buyers and sellers of goods and services.; Providing non-downloadable computer software development tools in the field of artificial intelligence; providing temporary use of on-line non-downloadable software for the development of machine learning in the field of computer technology; providing temporary use of online non-downloadable chatbot software for replying to questions from online customers related to consumer goods; providing temporary use of online non-downloadable computer chatbot software for simulating conversations; software as a service (SAAS) featuring non-downloadable computer software for the integration of artificial intelligence and machine learning in the field of Big Data for business data analytics and user behavior analytics; software as a service (SAAS) featuring non-downloadable computer software to train computers to predict user behaviour in the field of machine learning models and artificial intelligence; software as a service (SaaS) provider in the field of customer relationship management; software as a service (SaaS) provider in the field of providing customer relations management; software as a service (saas) services featuring software for applications for the management and provision of customer relationship management; software as a Service (SAAS) services featuring software for customer relationship management; software as a service (saas) services featuring software for enabling users to communicate, collaborate, and share computer screens among each other via the internet; software as a service (SAAS) services featuring software for use in connection with buying, selling, downloading, customizing, integrating and reviewing computer applications and computer software; technical support in the nature of troubleshooting to diagnose computer software problems.
OPTAVIA
OPTAVIA
Trademark
Combined
REGISTERED
Owner:
Serial:86912494
Filed:Feb 18, 2016
Classes:21
Registration:5282044
Registered:Sep 5, 2017
Goods & Services
Reusable plastic water bottles sold empty | Frozen, prepared or packaged meals consisting primarily of meat, fish, poultry or vegetables; dietary foods, namely, fruit-based and nut-based meal replacement bars; soy-based food bars; soy-based food bars also containing dried fruits, chocolate or nuts; shakes; milk shakes; soy based shakes; dairy-based powdered mixes for making dairy-based shakes; food and beverages, namely, stews, soups, soup mixes, chili, soy based snack foods | Frozen, prepared or packaged entrees consisting primarily of pasta or rice; macaroni and cheese; dietary foods, namely, chocolate-based and cereal-based meal replacement bars; puddings; oatmeal; breakfast cereals; pancakes; pancake mixes; pancake syrup; ready to eat, cereal derived food bars; muffins and muffin mixes; breads and bread mixes; brownies and brownie mixes; cookies and cookie mixes; cakes and cake mixes; crackers; beverages made of tea; beverages with a coffee, tea or cocoa base; iced teas; cocoa drinks, cappuccino drinks, chai latte drinks | Whey beverages; smoothies; low calorie, non-dairy powdered mixes for making shakes and smoothies; low calorie powdered mix used in the preparation of soft drinks and fruit-flavored, tea-flavored, and coffee-flavored beverages; fruit-flavored beverages | Weight reduction diet planning services, weight management services; supervision services in the fields of weight reduction, diet planning, and weight management; consultation services in the fields of weight reduction, diet planning, and weight management; counseling services in the fields of weight reduction, diet planning, and weight management; health care services, namely, wellness programs comprising diet regimes; providing information via a web site, namely, information and electronic publications on weight management
OPTAVIA
OPTAVIA
Trademark
Word
REGISTERED
Owner:
Serial:86982463
Filed:Oct 22, 2015
Classes:21
Registration:5238008
Registered:Jul 4, 2017
Goods & Services
Reusable plastic water bottles sold empty | Frozen, prepared or packaged meals consisting primarily of meat, fish, poultry or vegetables; dietary foods, namely, fruit-based and nut-based meal replacement bars; soy-based food bars; soy-based food bars also containing dried fruits, chocolate or nuts; shakes; milk shakes; soy based shakes; dairy-based powdered mixes for making dairy-based shakes; food and beverages, namely, stews, soups, soup mixes, chili, soy based snack foods | Frozen, prepared or packaged entrees consisting primarily of pasta or rice; macaroni and cheese; dietary foods, namely, chocolate-based and cereal-based meal replacement bars; puddings; oatmeal; breakfast cereals; pancakes; pancake mixes; pancake syrup; ready to eat, cereal derived food bars; muffins and muffin mixes; breads and bread mixes; brownies and brownie mixes; cookies and cookie mixes; cakes and cake mixes; crackers; beverages made of tea; beverages with a coffee, tea or cocoa base; iced teas; cocoa drinks, cappuccino drinks, chai latte drinks | Whey beverages; smoothies; low calorie, non-dairy powdered mixes for making shakes and smoothies; low calorie powdered mix used in the preparation of soft drinks and fruit-flavored, tea-flavored, and coffee-flavored beverages; fruit-flavored beverages | Weight reduction diet planning services, weight management services, namely, providing weight loss and/or weight maintenance programs; supervision services in the fields of weight reduction, diet planning, and weight management; consultation services in the fields of weight reduction, diet planning, and weight management; counseling services in the fields of weight reduction, diet planning, and weight management; health care services, namely, wellness programs comprising diet regimes; providing a website featuring information about weight management
OPTAVIA
OPTAVIA
Trademark
Word
REGISTERED
Owner:
Serial:87715536
Filed:Dec 11, 2017
Classes:5
Registration:5639461
Registered:Dec 25, 2018
Goods & Services
Dietary and nutritional supplements
OPTAVIA
OPTAVIA
Trademark
Word
REGISTERED
Owner:
Serial:97398601
Filed:May 6, 2022
Classes:9
Registration:6991664
Registered:Feb 28, 2023
Goods & Services
Downloadable mobile applications for weight reduction diet planning services, weight management services, namely, providing weight loss and/or weight maintenance programs
OPTEAVA
OPTEAVA
Trademark
Word
REGISTERED
Owner:
Serial:86107901
Filed:Nov 1, 2013
Classes:5
Registration:4547674
Registered:Jun 10, 2014
Goods & Services
Dietary and nutritional supplements
OPTEVA
OPTEVA
Trademark
Word
REGISTERED
Owner:
Serial:87653349
Filed:Oct 20, 2017
Classes:1
Registration:5962024
Registered:Jan 14, 2020
Goods & Services
Chemicals for use in the industry; Additives or admixtures for cement and cementitious compositions or their manufacture; chemical additives or admixtures used in the production of cement or mineral compositions, including for improving the quality of the cement or mineral compositions; chemical additives or admixtures for grinding of cement, cementitious materials, limestone, or other inorganic materials; chemical additives for modifying one or more properties of cement, cementitious materials, limestone, or other inorganic materials; liquid chemical compositions which function as a grinding aid, quality improver, or pack set inhibitor for cement, or combination thereof, such as for Portland cement or Portland cement precursor materials; chemical agents used for facilitating ball mill, vertical mill, or roller-based grinding operations
OPTEVE
OPTEVE
Trademark
Word
REGISTERED
Owner:
Serial:85901245
Filed:Apr 11, 2013
Classes:12
Registration:4439787
Registered:Nov 26, 2013
Goods & Services
parts for motor vehicles, namely, brake rotors, brake drums, disc brake pads and hardware therefor, brake shoes [, wheel bearings, wiper blades, master cylinders, power brake boosters, axles and remanufactured calipers, repair kits and clutch repair kits comprised of caliper dust boot, caliper seal, brake pad clips and bushings ]
OPTEVIEW
OPTEVIEW
Service Mark
Word
REGISTERED
Owner:
Serial:78864427
Filed:Apr 19, 2006
Classes:42
Registration:3295594
Registered:Sep 18, 2007
Goods & Services
Class 042: Remote monitoring service which tracks hardware performance and processes and sends out historical reports and alerts related to automated teller machines
OPTEVO
OPTEVO
Service Mark
Word
TTAB
REGISTERED
Owner:
Serial:97024163
Filed:Sep 13, 2021
Classes:42
Registration:7117795
Registered:Jul 25, 2023
Goods & Services
Providing temporary use of online non-downloadable software and applications for task and project management, task and project tracking, resource management, human resources management, document management, customer relationship management, business management, time, costs and financial tracking, employee performance tracking and rating, for transmission and receipt of data, images, and messages used in sharing information, collaboration and interactive discussions, namely, sharing information, collaboration and interactive discussions for social networking purposes, for customizing computer application user interfaces, for sending and receiving electronic messages, and uploading and transferring files
OPTI OVA
OPTI OVA
Trademark
Word
REGISTERED
Owner:
Serial:88827242
Filed:Mar 9, 2020
Classes:5
Registration:6157840
Registered:Sep 22, 2020
Goods & Services
OVA
OPTI-FI
OPTI-FI
Service Mark
Word
REGISTERED
Owner:
Serial:86913850
Filed:Feb 19, 2016
Classes:37
Registration:5277275
Registered:Aug 29, 2017
Goods & Services
[ Burglar alarm installation and repair; Maintenance and repair of telecommunications and computer networking hardware, apparatuses, and instruments ] | [ Telecommunication services, namely, wireless telephone services consisting of transmission of voice, data, graphics, images, audio and video by means of telecommunications networks, wireless communication networks, and the internet; ] Providing access to telecommunication networks [ and infrastructure ] ; Data transmission and reception services on optical telecommunication networks; Internet service provider services; Providing voice communication services via the internet; Telecommunication services, namely, providing internet access via broadband optical or wireless networks; [ Television broadcasting consisting of cable and satellite transmission services; ] Digital network telecommunications services; Wireless broadband communication services; Telecommunications services, namely, [ wireless telephony and ] wireless broadband communications services for the transmission of voice and data; wireless broadcasting
OPTI-V
OPTI-V
Trademark
Word
REGISTERED
Owner:
Serial:85861045
Filed:Feb 26, 2013
Classes:11
Registration:4535756
Registered:May 27, 2014
Goods & Services
Apparatus for recording, transmission or reproduction of sound and images; [ blank magnetic data carriers; televisions; television screens; ] display screens, namely, flat panel display screens and [ fluorescent screens, ] LCD large screen displays [, touch screens, video screens; projectors, namely, LCD projectors, media projectors, multimedia projectors, photographic projectors, movie feature projectors, slide projectors, sound projectors, video projectors, and projector screens ] | [ Apparatus for heating, namely, electric radiators for heating buildings, electric space heaters, electric radiant heaters for household purposes, portable electric heaters, electric storage heaters for commercial use, electric space heaters; electric heating fans; ventilation, namely, air-conditioning, air cooling and ventilation apparatus and instruments ]
OPTI-VIEW
OPTI-VIEW
Trademark
Word
REGISTERED
Owner:
Serial:78177305
Filed:Oct 23, 2002
Classes:7
Registration:2903861
Registered:Nov 16, 2004
Goods & Services
operator seat for digger derricks, in the fields of electric utilities, telecommunications, construction and tree care
OPTI-VU
OPTI-VU
Trademark
Word
REGISTERED
Owner:
Serial:88104735
Filed:Sep 5, 2018
Classes:9, 42
Registration:5956765
Registered:Jan 7, 2020
Goods & Services
Software for connecting, operating, collecting data and managing data for networked loading dock management systems comprised of air duct systems, fans, loading dock warning systems and safety equipment, loading dock levelers and lifts, loading dock seals, barriers, locks, vehicle restraints, loading dock shelters, industrial doors and controls in the internet of things (IoT); microcontrollers for internet of things (IoT) enabled devices; Providing temporary use of non-downloadable cloud-based software for connecting, operating, collecting data and managing data for networked loading dock management systems comprised of air duct systems, fans, loading dock warning systems and safety equipment, high speed doors, loading dock levelers and lifts, loading dock seals, barriers, locks, vehicle restraints and loading dock shelters; providing on-line non-downloadable software for connecting, operating, collecting data and managing data for networked loading dock management systems comprised of air duct systems, fans, loading dock warning systems and safety equipment, loading dock levelers and lifts, loading dock seals, barriers, locks, vehicle restraints, loading dock shelters, industrial doors and controls in the internet of things (IoT)
OPTI-VU
OPTI-VU
Trademark
Word
REGISTERED
Owner:
Serial:75075373
Filed:Mar 20, 1996
Classes:10
Registration:2201745
Registered:Nov 3, 1998
Goods & Services
medical devices for use in the field of gastroenterology, namely, barrels for holding ligating bands at the operational end of an endoscopic device for use in ligating lesions within the gastrointestinal tract
OPTIFI
OPTIFI
Trademark
Word
ITU
PENDING
Owner:
Serial:99526151
Filed:Dec 2, 2025
Classes:9
Goods & Services
Class 009: Fiber optic connectors; Fiber optic patch cables; Optical fiber distribution frames; Optical fiber splice enclosures; Optical connectors; Cable management systems for use in telecommunications and data center equipment, namely, fiber optic cable organizers, frames, and trays; Computer hardware for telecommunications, data center, and networking applications, namely, high-density fiber optic cross-connect devices; Signal identification devices for use with fiber optic networks, namely, visual fault locator-compatible tracer fiber systems; Closures specially adapted for splicing and terminating fiber optic cables; fiber optic splice closure kits comprised of trays specially adapted for splicing fiber optics, and also including enclosure domes and bases, clamps, o-rings, gel sealing blocks, cable port plugs, tray towers, and cable retention hardware; fiber optic splicing accessories, namely, splice trays, multi-cable sealers, mounting hardware, slack storage baskets, splitters and multiplexers; Components for fiber optic connector assemblies, namely, plug connectors, plug inserts in the nature of a device to retain and secure fiber optic termini in plug connectors, receptacle connectors, receptacle insert in the nature of a device to retain and secure fiber optic termini in receptacle connectors, alignment inserts in the nature of a device to align mating fiber optic connectors, fiber optic termini in the nature of a device used to terminate, position and hold an optical fiber within a connector, alignment sleeves in the nature of a device used to secure, align and position fiber optic termini, cable strength member captivation components in the nature of a device to retain and secure fiber optic cables; fiber optic cable; fiber optic cable assemblies, namely, fiber optic connectors and fiber optic cable; Telecommunications equipment, namely, fiber-optic transceivers, fiber optic repeaters, converters and optimizers, wave division multiplexers, free-space opt; Telecommunications multiplexers; Multiplexers
OPTIFY
OPTIFY
Service Mark
Word
REGISTERED
Owner:
Serial:88048173
Filed:Jul 23, 2018
Classes:35
Registration:5886570
Registered:Oct 15, 2019
Goods & Services
Business consulting services in the fields of leadership development and building organizational leadership capacity and culture
OPTIFY
OPTIFY
Service Mark
Word
REGISTERED
Owner:
Serial:88048183
Filed:Jul 23, 2018
Classes:41
Registration:5886571
Registered:Oct 15, 2019
Goods & Services
Business and education training services, namely, providing leadership development and personal, professional, group, and executive coaching services in the field of business; developing printed educational materials for others in the field of leadership development and coaching; business education and training services, namely, developing customized leadership development programs
OPTIFY
OPTIFY
Service Mark
Word
REGISTERED
Owner:
Serial:88048186
Filed:Jul 23, 2018
Classes:42
Registration:5886572
Registered:Oct 15, 2019
Goods & Services
Software as a service (SAAS) services featuring software for users to access leadership development and coaching services; software as a service (SAAS) services featuring software for users to access educational materials in the field of leadership development; software as a service (SAAS) services featuring software for users to set, track, and manage goals and progress in the field of leadership development
OPTIFY
OPTIFY
Service Mark
Word
REGISTERED
Owner:
Serial:88207712
Filed:Nov 27, 2018
Classes:36
Registration:5968725
Registered:Jan 21, 2020
Goods & Services
Financial planning and investment advisory services; Financial planning consultation; Financial planning for retirement; Financial planning, namely, creating personalized investment strategies for achieving specific financial goals; Financial portfolio management; Financial services, namely, assisting others with the completion of financial transactions for stocks, bonds, securities and equities; Financial services, namely, wealth management services; Insurance brokerage; Insurance information and consultancy; Investment management of and distribution of annuities; Investment of funds; Management of securities portfolios
OPTIFY
OPTIFY
Trademark
Word
REGISTERED
Owner:
Serial:88533497
Filed:Jul 24, 2019
Classes:10
Registration:6137705
Registered:Aug 25, 2020
Goods & Services
GLOVES FOR MEDICAL USE
OPTIFY
OPTIFY
Trademark
Word
REGISTERED
Owner:
Serial:90066582
Filed:Jul 22, 2020
Classes:1
Registration:6350157
Registered:May 11, 2021
Goods & Services
Adjuvant for use with agricultural chemicals
OPTIFY
OPTIFY
Trademark
Word
REGISTERED
Owner:
Serial:88673521
Filed:Oct 30, 2019
Classes:3
Registration:6449522
Registered:Aug 10, 2021
Goods & Services
Food and beverage flavorings prepared from essential oils; food and beverage flavorings, being essential oils; food and beverage flavorings, being encapsulated essential oils | Glass encapsulated flavor enhancers for use in food and beverage products; flavorings for use in foods and beverages, other than essential oils; food and beverage flavorings, being non-essential oils
OPTIFY
OPTIFY
Trademark
Word
PENDING
Owner:
Serial:99741645
Filed:Apr 2, 2026
Classes:9, 42
Goods & Services
Class 009: Downloadable software for monitoring and managing industrial machinery; downloadable software for industrial machinery maintenance monitoring; Class 042: Platform as a service (PAAS) featuring computer software platforms for monitoring and managing industrial machinery; Platform as a service (PAAS) featuring computer software platforms for industrial machinery maintenance monitoring
OPTIFY
OPTIFY
Trademark
Word
REGISTERED
Owner:
Serial:98117324
Filed:Aug 4, 2023
Classes:5
Registration:7604739
Registered:Dec 17, 2024
Goods & Services
Dietary supplements; Nutritional supplements
OPTIFY
OPTIFY
Service Mark
Word
REGISTERED
Owner:
Serial:98005086
Filed:May 19, 2023
Classes:42
Registration:8206345
Registered:Apr 7, 2026
Goods & Services
N Managed digital, online, computer and electronic device service provider services, namely remote monitoring and management of servers, computers, electronic devices, workstation devices and electronic infrastructure for asset discovery, endpoint management, patching, monitoring, automation and ensuring optimal performance and security; Anti-virus and cloud anti-virus services, namely, firewall services in the nature of computer virus, malware and hacker protection services, content filtering, mobile web browsing and providing real-time anti-virus and malware updates and monitoring of servers, computers, electronic devices, workstation devices and electronic infrastructure for virus, malware and hacker threats and confirming of the integrity of websites and social networking websites with respect to computer viruses, malwares, hacker and other digital threats; identity protection services, namely, computer security services for protecting data, images and information from unauthorized access; sharing of digital files and folders solution services, namely, providing temporary use of on-line, non-downloadable software that enables users to upload, share and download electronic files; Providing temporary use of on-line, non-downloadable software that allows users to create, edit, transmit, exchange, share, upload, download, post, store, organize, display, tag, manage, collaborate on, print and set permissions for or otherwise provide folders, files, images, graphics, sound, text, documents, messages, videos, audio and other digital information; Remote system monitoring, management and support services for computer systems and devices; troubleshooting of software problems; remote monitoring of computer systems by remote access to ensure proper functioning; monitoring of computer system operation by remote access; Consulting services in the design and implementation of computer systems; maintenance and updating of computing software for others; Cloud architecture and design, namely, design and management services, namely, developing and managing cloud architecture; computer system design; computer software version upgrade; remote online data backup; cloud off-site data backup; electronic daily remote data backup; computer data recovery; computer software maintenance; computer program installation; advice on designing network infrastructure and systems and computer systems; computer security guidance and advice; computer system monitoring to detect failures; data security advice; Monitoring of unauthorized access to computer systems by remote access; remote monitoring of computer systems to detect data leaks; electronic monitoring of personal identification information to detect theft of personal information via the Internet; Design/creation/maintenance of computer virus intrusion prevention program; Software as a service (SAAS) services featuring software for supervision, monitoring and filtering services of corporate emails; filtering of unwanted e-mails; Software as a service (SAAS) application providing content monitoring of electronic mail and content filtering of electronic mail services; Mobile web browsing, namely, web filtering to prevent access to undesirable content; Design, development, and maintenance of database systems and cloud architecture; Computer technology support services, namely, help desk services; Computer technical support services, namely, service or help desk services for IT infrastructure, operating systems, database systems, and web applications; Technical support services, namely, remote and on-site infrastructure management services for monitoring, maintaining, installing, administration and management of computer systems, servers, public and private cloud computing IT and application systems, electronic messaging apparatuses and software applications; Computer services, namely, remote management of information technology (IT) systems and infrastructure of others comprised of computer systems, servers, electronic messaging apparatuses, and software applications; Consulting in the field of IT project management; IT consulting services relating to installations, management, monitoring, maintenance and repair of computer software; Consulting in the field of IT project management; IT consulting services relating to installations, management, monitoring, maintenance and repair of computer hardware; Computer disaster recovery planning; Disaster recovery services, namely, business planning and business continuity consulting; Remote computer backup services; remote online backup of computer data; Electronic storage of digital data and images; Electronic storage of electronic media, namely, images, video, text and audio data; Installation, maintenance, management, monitoring and repair of computer software, Internet access software, cloud computing software, server software, network system software and mobile phone software; Repair of software; Repair of damaged computer programs; Technology consulting services and design in the fields of computer architecture, cloud architecture, public and private cloud computer solutions, and evaluation and implementation of internet technology and services; Outsource service provider in the field of information technology relating to installation, maintenance, repair, selection and purchasing of computer software; Outsource service provider in the field of information technology relating to installation, maintenance, repair, selection and purchasing of computer hardware; Outsource service provider in the field of information technology consulting computer network design, software threats, data backup and remote monitoring and management of servers, computer workstations, computers and other electronic devices; Outsource service provider in the field of information technology relating to off-site management of computers and servers of others, support in the nature of monitoring and consultations, design, engineering, security in the nature of cybersecurity, virus, malware, hacks and other software threat protection and maintenance of network infrastructures and systems including routers, network segmentation, switches, servers and wireless technology implementation; Outsource service provider in the field of information technology relating to off-site management of computers and servers of others, support in the nature of monitoring and consultations, design, engineering, security in the nature of virus, malware, hack and other software threat protection and maintenance of office and cloud based network infrastructures and systems including routers, network segmentation, switches, servers and wireless technology implementation; Outsourced chief information offer services, namely, outsourced management services in the field of information technology, computer hardware and software operations and maintenance, data backup, software threats and cybersecurity to others; Outsourced Information Technology Director services, namely, outsourced management services in the field of information technology, computer hardware and software operations and maintenance, data backup, software threats and cybersecurity to others; Information technology services, namely, outsourced Chief Information Officer services in the nature of IT consulting services relating to installation, maintenance, monitoring, and repair of computer software, data backup and software and computer threat protection; IT assessments in the nature of computer system analysis, managed services in the nature of remote management of the IT systems of others; electronic data backup services; disaster recovery services in the nature of computer disaster recovery planning and recovery of computer data; cloud hosting provider services; cybersecurity services in the nature of computer security consultancy; data analytics services in the nature of data mining; hardware and software support in the nature of diagnosing computer hardware and software problems; Information technology and cybersecurity management, namely, On-site and remote management of information technology (IT) systems and infrastructure of others, On-site and remote cybersecurity management of other's information technology (IT) systems and infrastructure, Monitoring technological functions of computer network systems, Computer consultation in the field of computer security, Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others, none of the aforementioned services related to music, podcasts or entertainment.
OPTIFY
OPTIFY
Service Mark
Combined
REGISTERED
Owner:
Serial:98000195
Filed:May 17, 2023
Classes:42
Registration:7407011
Registered:Jun 4, 2024
Goods & Services
Software as a service (SAAS) services featuring software for users to access leadership development, team building, and coaching services; Software as a service (SAAS) services featuring software for users to access educational materials in the fields of leadership development, team building and coaching services; Software as a service (SAAS) services featuring software for users to set, track, and manage goals and progress in the fields of leadership development, team building and coaching services
OPTIFY
OPTIFY
Service Mark
Combined
REGISTERED
Owner:
Serial:98000177
Filed:May 17, 2023
Classes:41
Registration:7407007
Registered:Jun 4, 2024
Goods & Services
Business and education training services, namely, providing leadership development, team building, and personal, professional, group, and executive coaching services in the field of business; Developing printed educational materials for others in the fields of leadership development, team building and coaching; Business education and training services, namely, developing customized leadership development programs
OPTIFY
OPTIFY
Service Mark
Combined
REGISTERED
Owner:
Serial:98000165
Filed:May 17, 2023
Classes:35
Registration:7407006
Registered:Jun 4, 2024
Goods & Services
Business consulting services in the field of leadership development and building organizational leadership capacity and culture
OPTIFY
OPTIFY
Service Mark
Word
REGISTERED
Owner:
Serial:90397088
Filed:Dec 20, 2020
Classes:42
Registration:6509549
Registered:Oct 5, 2021
Goods & Services
Software as a service (SAAS) services featuring software for enabling office management and distribution of optical devices
OPTIPHI
OPTIPHI
Trademark
Word
REGISTERED
Owner:
Serial:88812586
Filed:Feb 27, 2020
Classes:3
Registration:6147278
Registered:Sep 8, 2020
Goods & Services
Exfoliants for skin; Facial masks; Gels for skin, namely, age retardant gel and beauty gels; Non-medicated serums for use on skin; Non-medicated skin care preparations; Non-medicated skin creams; Non-medicated sun care preparations; Skin cleansers; Skin lotions
OPTIV
OPTIV
Trademark
Combined
TTAB
REGISTERED
Owner:
Serial:86633787
Filed:May 18, 2015
Classes:9, 35, 37, +4
Registration:5161762
Registered:Mar 14, 2017
Goods & Services
computer software, namely, cyber security software; computer software for computer security, computer network security, information security, data security and firewall security purposes [ ; computer hardware ] | value-added re-seller services, namely, distributorship services in the field of cyber security, computer security, network security, application security, data security and information technology software, hardware, and peripherals; employment staffing, namely, providing on-site and remote staffing to manage security processes and procedures, all in the fields of cyber security, computer security, network security, application security, data security, and information security; conducting business audits in the field of computer security, computer network security, information security, data security and firewall security; business risk assessment services, business risk management services, and consultation related thereto; business consulting services in the field of cyber security program strategy, namely, helping businesses define metrics, prioritize and schedule initiatives, and align activities with business departments | installation and maintenance of computers, computer hardware and related peripheral devices in the fields of cyber security, computer security, data security, information security, application security, and network security | Providing an on-line forum for transmission of messages among information security personnel and experts concerning best practices for secure information technology infrastructures | security awareness training, namely, training in the fields of cyber security planning and awareness; product training, namely, training in the use and operation of cyber security software and hardware, computer security software and hardware, network security software and hardware, and information technology software and hardware; software security training, namely, training others in maintaining software security in the field of cyber threats and warfare; training services in the field of information security compliance, information risk management, and computer network security; educational services, namely, conducting courses, workshops, and seminars in the fields of cyber security, computer security, data security, information security, application security, and network security; providing a website featuring blogs and non-downloadable publications in the nature of articles in the field of cyber security | technology research in the field of cyber security, data and information security, and network security; product research and development in the field of cyber security; computer services, namely, binary analysis services for computer security purposes and cyber security purposes; computer consulting services, namely, planning and design of network architectures; technical consulting services in the field of cyber security, namely, consulting regarding security architecture, information architecture, enterprise architecture, public and private cloud computing software solutions; technology consultation services in the field of cyber security, namely, identification and selection of appropriate technologies that meet business and technical requirements; computer consulting services, namely, implementation and integration of information technology solutions in the field of cyber security; integration of computer systems and networks; optimization of computer systems, computer networks, and related equipment, namely, computer consultation services regarding desired performance levels and reasons for optimization, evaluating the health of computer systems, providing upgrades to computer systems, updating software, applying patches, and changing configurations; computer technical support services in the nature of 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; computer technology support services, namely, help desk services; managed computer security services, namely, providing computer security analysis, computer security consulting, computer security assessment, computer security program assessment, and computer testing for vulnerability assessment; managed computer security services, namely, malware mitigation in the nature of detection, blocking, and remediation of malware; managed security services in the nature of security information event management (SIEM), namely, electronic collection and analysis of real-time network information to manage and respond to security vulnerabilities and external threats; computer network security services and communications network security services in the nature of network intrusion protection, computer testing for vulnerability management and assessment, managing endpoint security on networks, data breach threat analysis, network threat analysis, computer incident response, network incident response, and forensics and penetration testing; computer security consulting services in the field of critical incident response to information, computer, and internet security breaches; computer cloud security advisory services, namely, software consultation regarding cloud storage, cloud collaboration software platforms, and cloud hosted enterprise software applications; information technology vulnerability assessment services, namely, computer testing for assessing network information security vulnerability and risk; computer security consultancy in the field of scanning and penetration tests of computers and networks to assess information security vulnerability; computer consultation, namely, information technology system security breach investigation and remediation services in the nature of providing assistance to isolate and remediate security threats and security breaches in computer systems and networks, in information technology applications, and in computer software and hardware; computer services, namely, providing forensic services to recover lost and deleted data; software as a service (SAAS) services featuring cyber security software; providing online, non-downloadable network infrastructure and application software allowing users to perform technology testing for compatibility, scalability and flexibility of vendor solutions; installation and maintenance of computer software relating to computer security, cyber security, software security, and prevention of computer risks; technology consultation and research in the fields of cyber security, computer software security, network security, digital devices, networked devices, and mobile device security; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; providing technology consultation in connection with computer software, computer network design, electronic storage design, network security, and cloud computing security; testing of computer software and computer networks relating to computer security and prevention of computer risks; design and development of security systems and contingency planning for information systems and computer network security; computer services, namely, monitoring of computer security systems of others to assess information security vulnerability; computer services, namely, remote and on-site management of computer networks, firewalls, virtual private networks and networked devices of others for the purpose of assessing and preventing information security vulnerability; managed computer security services, namely, design, development and implementation of firewalls, virtual private networks, and intrusion detection systems; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, digital devices, networked devices, mobile devices, and electronic devices; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; security audits of physical locations, information systems, working environments and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases and applications; providing an online, interactive website for information security personnel and experts to establish best practices for secure information technology infrastructures featuring technology that allows users to upload and share updates, news, white papers, and information regarding events in the field of secure information technology | compliance services, namely, regulatory compliance consulting in the field of cyber security, information security, and data security; reviewing standards and practices and developing and implementing corporate and security policies, procedures and standards, to assure compliance with information security laws and regulations; security services, namely, providing security assessments and security risk assessments of physical locations, information systems, and working environments and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases, and applications; security services, namely, providing information security risk assessments; security services, namely, providing security assessments for businesses and governmental agencies; security consultancy services; cyber security consultancy services; computer security threat analysis for mitigating and resolving cyber incidents and security breach incidents; computer security threat analysis services in the nature of analyzing and resolving cyber incidents and security breach incidents; intrusion detection management, namely, providing onsite and remote monitoring of network infrastructure and network activity for security purposes; identity access management in the nature of consulting and advisory services relating to identity, access, and authentication in the field of cyber security; security threat analysis for protection of internet security
OPTIV
OPTIV
Trademark
Word
REGISTERED
Owner:
Serial:77296498
Filed:Oct 4, 2007
Classes:9
Registration:3588186
Registered:Mar 10, 2009
Goods & Services
Vision inspection system comprised primarily of optical inspection apparatus for industrial use for dimensional inspection of manufactured components
OPTIV
OPTIV
Trademark
Word
TTAB
REGISTERED
Owner:
Serial:86579559
Filed:Mar 27, 2015
Classes:9, 35, 37, +4
Registration:5161694
Registered:Mar 14, 2017
Goods & Services
Computer software, namely, cyber security software; computer software for computer security, computer network security, information security, data security and firewall security purposes [ ; computer hardware ] | Value-added re-seller services, namely, distributorship services in the field of cyber security, computer security, network security, application security, data security and information technology software, hardware, and peripherals; employment staffing, namely, providing on-site and remote staffing to manage security processes and procedures, all in the fields of cyber security, computer security, network security, application security, data security, and information security; conducting business audits in the field of computer security, computer network security, information security, data security and firewall security; business risk assessment services, business risk management services, and consultation related thereto; business consulting services in the field of cyber security program strategy, namely, helping businesses define metrics, prioritize and schedule initiatives, and align activities with business departments | Installation and maintenance of computers, computer hardware and related peripheral devices in the fields of cyber security, computer security, data security, information security, application security, and network security | Providing an on-line forum for transmission of messages among information security personnel and experts concerning best practices for secure information technology infrastructures | Security awareness training, namely, training in the fields of cyber security planning and awareness; product training, namely, training in the use and operation of cyber security software and hardware, computer security software and hardware, network security software and hardware, and information technology software and hardware; software security training, namely, training others in maintaining software security in the field of cyber threats and warfare; training services in the field of information security compliance, information risk management, and computer network security; educational services, namely, conducting courses, workshops, and seminars in the fields of cyber security, computer security, data security, information security, application security, and network security; providing a website featuring blogs and non-downloadable publications in the nature of articles in the field of cyber security | Technology research in the field of cyber security, data and information security, and network security; product research and development in the field of cyber security; computer services, namely, binary analysis services for computer security purposes and cyber security purposes; computer consulting services, namely, planning and design of network architectures; technical consulting services in the field of cyber security, namely, consulting regarding security architecture, information architecture, enterprise architecture, public and private cloud computing software solutions; technology consultation services in the field of cyber security, namely, identification and selection of appropriate technologies that meet business and technical requirements; computer consulting services, namely, implementation and integration of information technology solutions in the field of cyber security; integration of computer systems and networks; optimization of computer systems, computer networks, and related equipment, namely, computer consultation services regarding desired performance levels and reasons for optimization, evaluating the health of computer systems, providing upgrades to computer systems, updating software, applying patches, and changing configurations; computer technical support services in the nature of 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; computer technology support services, namely, help desk services; managed computer security services, namely, providing computer security analysis, computer security consulting, computer security assessment, computer security program assessment, and computer testing for vulnerability assessment; managed computer security services, namely, malware mitigation in the nature of detection, blocking, and remediation of malware; managed security services in the nature of security information event management (SIEM), namely, electronic collection and analysis of real-time network information to manage and respond to security vulnerabilities and external threats; computer network security services and communications network security services in the nature of network intrusion protection, computer testing for vulnerability management and assessment, managing endpoint security on networks, data breach threat analysis, network threat analysis, computer incident response, network incident response, and forensics and penetration testing; computer security consulting services in the field of critical incident response to information, computer, and Internet security breaches; computer cloud security advisory services, namely, software consultation regarding cloud storage, cloud collaboration software platforms, and cloud hosted enterprise software applications; information technology vulnerability assessment services, namely, computer testing for assessing network information security vulnerability and risk; computer security consultancy in the field of scanning and penetration tests of computers and networks to assess information security vulnerability; computer consultation, namely, information technology system security breach investigation and remediation services in the nature of providing assistance to isolate and remediate security threats and security breaches in computer systems and networks, in information technology applications, and in computer software and hardware; computer services, namely, providing forensic services to recover lost and deleted data; software as a service (SAAS) services featuring cyber security software; providing online, non-downloadable network infrastructure and application software allowing users to perform technology testing for compatibility, scalability and flexibility of vendor solutions; installation and maintenance of computer software relating to computer security, cyber security, software security, and prevention of computer risks; technology consultation and research in the fields of cyber security, computer software security, network security, digital devices, networked devices, and mobile device security; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; providing technology consultation in connection with computer software, computer network design, electronic storage design, network security, and cloud computing security; testing of computer software and computer networks relating to computer security and prevention of computer risks; design and development of security systems and contingency planning for information systems and computer network security; computer services, namely, monitoring of computer security systems of others to assess information security vulnerability; computer services, namely, remote and on-site management of computer networks, firewalls, virtual private networks and networked devices of others for the purpose of assessing and preventing information security vulnerability; managed computer security services, namely, design, development and implementation of firewalls, virtual private networks, and intrusion detection systems; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, digital devices, networked devices, mobile devices, and electronic devices; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; security audits of physical locations, information systems, working environments and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases and applications; providing an online, interactive website for information security personnel and experts to establish best practices for secure information technology infrastructures featuring technology that allows users to upload and share updates, news, white papers, and information regarding events in the field of secure information technology | Compliance services, namely, regulatory compliance consulting in the field of cyber security, information security, and data security; reviewing standards and practices and developing and implementing corporate and security policies, procedures and standards, to assure compliance with information security laws and regulations; security services, namely, providing security assessments and security risk assessments of physical locations, information systems, and working environments and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases, and applications; security services, namely, providing information security risk assessments; security services, namely, providing security assessments for businesses and governmental agencies; security consultancy services; cyber security consultancy services; computer security threat analysis for mitigating and resolving cyber incidents and security breach incidents; computer security threat analysis services in the nature of analyzing and resolving cyber incidents and security breach incidents; intrusion detection management, namely, providing onsite and remote monitoring of network infrastructure and network activity for security purposes; identity access management in the nature of consulting and advisory services relating to identity, access, and authentication in the field of cyber security; security threat analysis for protection of Internet security
OPTIV
OPTIV
Trademark
Combined
TTAB
REGISTERED
Owner:
Serial:90203912
Filed:Sep 23, 2020
Classes:9, 35, 37, +4
Registration:6586181
Registered:Dec 14, 2021
Goods & Services
Downloadable and recorded computer software, namely, cyber security software; Downloadable and recorded computer software for computer security, computer network security, information security, data security and firewall security purposes; computer hardware | value-added re-seller services, namely, distributorship services in the field of cyber security, computer security, network security, application security, data security and information technology software, hardware, and peripherals; employment staffing, namely, providing on-site and remote staffing to manage security processes and procedures, all in the fields of cyber security, computer security, network security, application security, data security, and information security; conducting business audits in the field of computer security, computer network security, information security, data security and firewall security; business risk assessment services, business risk management services, and consultation related thereto; business consulting services in the field of cyber security program strategy, namely, helping businesses define metrics, prioritize and schedule initiatives, and align activities with business departments | installation and maintenance of computers, computer hardware and related peripheral devices in the fields of cyber security, computer security, data security, information security, application security, and network security | Providing an on-line forum for transmission of messages among information security personnel and experts concerning best practices for secure information technology infrastructures | security awareness training, namely, training in the fields of cyber security planning and awareness; product training, namely, training in the use and operation of cyber security software and hardware, computer security software and hardware, network security software and hardware, and information technology software and hardware; software security training, namely, training others in maintaining software security in the field of cyber threats and warfare; training services in the field of information security compliance, information risk management, and computer network security; educational services, namely, conducting courses, workshops, and seminars in the fields of cyber security, computer security, data security, information security, application security, and network security; providing a website featuring blogs and non-downloadable publications in the nature of articles in the field of cyber security | Technology research in the field of cyber security, data and information security, and network security; product research and development in the field of cyber security; computer services, namely, binary analysis services for computer security purposes and cyber security purposes; computer consulting services, namely, planning and design of network architectures; technical consulting services in the field of cyber security, namely, consulting regarding security architecture, information architecture, enterprise architecture, public and private cloud computing software solutions; technology consultation services in the field of cyber security, namely, identification and selection of appropriate technologies that meet business and technical requirements; computer consulting services, namely, implementation and integration of information technology solutions in the field of cyber security; integration of computer systems and networks; optimization of computer systems, computer networks, and related equipment, namely, computer consultation services regarding desired performance levels and reasons for optimization, evaluating the health of computer systems, providing upgrades to computer systems, updating software, applying patches, and changing configurations; computer technical support services in the nature of 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; managed computer security services, namely, providing computer security analysis, computer security consulting, computer security assessment, computer security program assessment, and computer testing for vulnerability assessment; managed computer security services, namely, malware mitigation in the nature of detection, blocking, and remediation of malware; managed security services in the nature of security information event management (SIEM), namely, electronic collection and analysis of real-time network information to manage and respond to security vulnerabilities and external threats; computer network security services and communications network security services in the nature of network intrusion protection, computer testing for vulnerability management and assessment, managing endpoint security on networks, data breach threat analysis, network threat analysis, computer incident response, network incident response, and forensics and penetration testing; computer security consulting services in the field of critical incident response to information, computer, and Internet security breaches; computer cloud security advisory services, namely, software consultation regarding cloud storage, cloud collaboration software platforms, and cloud hosted enterprise software applications; information technology vulnerability assessment services, namely, computer testing for assessing network information security vulnerability and risk; computer security consultancy in the field of scanning and penetration tests of computers and networks to assess information security vulnerability; computer consultation, namely, information technology system security breach investigation and remediation services in the nature of providing assistance to isolate and remediate security threats and security breaches in computer systems and networks, in information technology applications, and in computer software and hardware; computer services, namely, providing forensic services to recover lost and deleted data; software as a service (SAAS) services featuring cyber security software; providing online, non-downloadable network infrastructure and application software allowing users to perform technology testing for compatibility, scalability and flexibility of vendor solutions; installation and maintenance of computer software relating to computer security, cyber security, software security, and prevention of computer risks; technology consultation and research in the fields of cyber security, computer software security, network security, digital devices, networked devices, and mobile device security; providing technology consultation in connection with computer software, computer network design, electronic storage design, network security, and cloud computing security; testing of computer software and computer networks relating to computer security and prevention of computer risks; design and development of electronic data security systems and contingency planning for information systems and computer network security; computer services, namely, monitoring of computer security systems of others to assess information security vulnerability; computer security consultancy services, namely, remote and onsite management of computer networks, firewalls, virtual private networks and networked devices of others for the purpose of assessing and preventing information security vulnerability; managed computer security services, namely, design, development and implementation of firewalls, virtual private networks, and intrusion detection systems; computer security consultancy services, namely, online scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, digital devices, networked devices, mobile devices, and electronic devices; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer security consultancy, namely, security audits of information systems, working environments and infrastructure, namely, desktops, servers, routers, networked devices, digital devices, mobile devices, databases and applications; providing an online, interactive website for information security personnel and experts to establish best practices for secure information technology infrastructures featuring technology that allows users to upload and share updates, news, white papers, and information regarding events in the field of secure information technology; computer security consultancy, namely, cyber security consultancy services; computer security consultancy, namely, computer security threat analysis for mitigating and resolving cyber incidents and security breach incidents; computer security consultancy, namely, computer security threat analysis services in the nature of analyzing and resolving cyber incidents and security breach incidents; computer security consultancy, namely, intrusion detection management, namely, providing onsite and remote monitoring of network infrastructure and network activity for security purposes; computer security consultancy, namely, user identity access management in the nature of consulting and advisory services relating to identity, access, and authentication in the field of cyber security; computer security consultancy, namely, security threat analysis for protection of Internet security | compliance services, namely, regulatory compliance consulting in the field of cyber security, information security, and data security; reviewing standards and practices and developing and implementing corporate and security policies, procedures and standards, to assure compliance with information security laws and regulations; physical security consultancy services, namely, providing security assessments and security risk assessments of physical locations; physical security consultancy services, namely, providing information security risk assessments for physical locations; physical security consultancy services, namely, providing security assessments for businesses and governmental agencies; physical security consultancy services; Physical security consultancy, namely, security audits of physical locations
OPTIVA
OPTIVA
Trademark
Word
REGISTERED
Owner:
Serial:87732074
Filed:Dec 22, 2017
Classes:9
Registration:6696281
Registered:Apr 12, 2022
Goods & Services
Computer software and hardware for processing billing information, customer service management, order fulfillment management, real-time rating and balance management of telecommunications, internet and cable and satellite transactions; computer software for operating billing payment systems in the field of telecommunications; computer software for making financial payment transaction via mobile devices; computer software for use in making online electronic financial payment transactions; computer hardware and software for making financial payment transaction via mobile devices; computer hardware and software for use in making online electronic financial payment transactions; downloadable cloud based or premises based software applications for operating billing systems of telecommunications companies; downloadable cloud based or premises based software applications for use by telecommunications and digital service providers for demonetization of digital services, namely, managing billing and settlement transactions, real time balance management, customer care management, order fulfillment orchestration, network policy management, analytics and real time revenue management | Provision of business management and administration assistance to telecommunications and digital service providers in the form of cloud based and/or premises based systems comprising computer software and hardware used for management of accounts receivable billing services, customer service management, customer care management, order fulfillment management, wholesale transactions between telecommunications carriers, namely the wholesale provision of mobile telecommunications airtime, real-time rating and balance management of telecommunications, internet and cable and satellite transactions | Providing electronic processing of bill payment data for telecommunications and digital service providers using cloud based and/or premises based systems comprising computer software and hardware; telecommunications reseller services, namely, wholesale telecommunication airtime brokerage services | Maintenance of computer hardware for others; consulting services provided to telecommunications services providers for computer hardware deployment and maintenance; consultation regarding the installation of computer hardware for application service providers, telecommunication product suppliers and telecommunication network operators | Provision of telecommunications information about billing, customer service management, order fulfillment management, real time rating and balance management. Telecommunications consultation on billing, customer service management, order fulfillment management, real time rating and balance management; on-line and on-site provision of information relating to telecommunications, namely, billing, customer service management, order fulfillment management, real time rating and balance management; information, consultation and advisory services in the field of telecommunications, namely, for billing, customer service management, order fulfillment management, real time rating and balance management; Electronic message collection and transmission for voice, video and data communications applications; Providing collection services for electronic voice, video and data communications applications; data communications services, namely, data mediation | Computer software design for others; computer software and hardware design for others; maintenance of computer software for others; computer software consulting and technical support in the nature of design, development, software installation, analysis or monitoring of technological functioning of computer network systems for application service providers, telecommunication product suppliers and telecommunication network operators; design and implementation for others of computer software for use in operating payment transaction systems for mobile or electronic payments; support, namely, monitoring technological functioning of software systems, and consultancy services provided to telecommunications service providers for software deployment and maintenance; consultation in the field of computer software and computer hardware design, development, software installation, analysis, configuration and providing technical support in the nature of troubleshooting and diagnosing computer software and hardware problems for application service providers, telecommunication product suppliers and telecommunication network operators; computer software diagnostic consulting services; computer software and computer hardware problem diagnostic consulting services; cloud based support and monitoring of computer systems to ensure proper technological functioning for data communication, satellite communication and telecommunications service providers; premises based support and monitoring of computer systems to ensure proper technological functioning for data communication, satellite communication and telecommunications service providers; technological services, namely, the provision of expert, professional and scientific consultancy, research, development, design and inspection services, all relating to telecommunications networks, infrastructure and systems, computer software and data mediation, computer hardware and software, data automation and collection services using proprietary software to evaluate, analyze and collect service data; application service provider (ASP) featuring software in the field of telecommunications for use in enabling the aggregation and distribution of customer usage data in the telecommunications, financial services and utilities fields; development of software applications for application service providers and mobile network operators to facilitate the delivery of services to end-users; consulting and maintenance of computer software for application service providers and mobile network operators to facilitate the delivery of services to end-users | Licensing of computer software