LEDGER RECOVER Trademark
LEDGER RECOVER is a USPTO trademark filed by LEDGER. Status: Registered.
Trademark Facts
| Mark | LEDGER RECOVER |
|---|---|
| Serial Number | 79379235 |
| Registration Number | 8016652 |
| Status | Registered |
| Filing Date | 2023-07-12 |
| Registration Date | 2025-11-11 |
| Mark Type | Combined |
| Nice Classes | 009 (Electronics & Software), 042 (Software & IT) |
| Owner | LEDGER |
| Attorney of Record | KRISTEN RUISI |
| Prosecution Events | 38 |
| Latest Event | FICR on 2026-02-11 |
Goods & Services
Recorded software programs for generating and securing cryptographic private keys, which are used for authenticating transactions on blockchain networks, against potentially insecure computers on those networks; downloadable computer software applications for generating and securing cryptographic private keys, which are used for authenticating transactions on blockchain networks, against potentially insecure computers on those networks; security tokens, namely hardware in the form of encryption devices; downloadable computer programs for generating and securing cryptographic private keys, which are used for authenticating transactions on blockchain networks, against potentially insecure computers on those networks; microprogramming and encoding systems for operating system programs to enable secure transactions in cryptocurrency on the blockchain network for generating and securing cryptographic private keys, which are used for authenticating transactions on blockchain networks, against potentially insecure computers on those networks; devices for access and access control to data processing apparatus and equipment namely computers; identification and authentication devices for apparatus and equipment for data processing , namely, iris recognition security devices; encryption and decryption programs and circuits namely, downloadable computer software for decrypting and encrypting digital files, and decryption and encryption logic circuits; recorded computer programs for generating and securing cryptographic private keys, which are used for authenticating transactions on blockchain networks, against potentially insecure computers on those networks; downloadable computer programs for generating and securing cryptographic private keys, which are used for authenticating transactions on blockchain networks, against potentially insecure computers on those networks; Assistance and consulting services in connection with the development of computer systems in the field of computer systems design, design of computer applications and design of database; Development of applications and databases for generating and securing cryptographic private keys, which are used for authenticating transactions on blockchain networks against potentially insecure computers on those networks; providing access to online non-downloadable applications and databases for generating and securing cryptographic private keys, which are used for authenticating transactions on blockchain networks against potentially insecure computers on those networks; Software as a Service (SaaS), with software for generating and securing cryptographic private keys, which are used for authenticating transactions on blockchain networks, against potentially insecure computers on those networks; Rental of computer software for securing cryptographic private keys to authenticate transactions on the blockchain or in the cloud; Providing temporary use of online non-downloadable software enabling users to program audio, video, text and other multimedia content, including music, concerts, videos, radio content, television content, current affairs, sports, games, cultural events, and entertainment related programs to generate and secure cryptographic private keys for authenticating transactions on blockchain networks against potentially insecure computers on those networks; rental of computer application software for the updating of computer software that generates and secures cryptographic private keys to authenticate transactions on blockchain networks against potentially insecure computers on those networks