GleanMark

USHER Trademark

USHER is a USPTO trademark filed by STRATEGY INC. Status: Registered.

Trademark Facts

MarkUSHER
Serial Number86328395
Registration Number5241819
StatusRegistered
Filing Date2014-07-03
Registration Date2017-07-11
Mark TypeWord
Nice Classes009 (Electronics & Software), 042 (Software & IT)
OwnerSTRATEGY INC
Attorney of RecordB. Brett Heavner
Prosecution Events43
Latest EventASGN on 2026-03-25

Goods & Services

computer programs, downloadable computer programs and mobile device software for validating identity through multi-factor authentication, for communicating with physical and logical access gateways and control systems, for managing physical and logical access, for analyzing, managing, refining and enriching data related to physical and logical access, user transactions and other user activity, for issuing, monitoring, creating and modifying credentials, for validating admission or access to events, physical spaces, websites, software applications, computer systems, for validating financial or other transactions, for social, personal and professional networking and interacting, for sharing and managing contact information, for discovering other users, for communicating with and sending invitations and credentials to other users, for conducting personal and commercial transactions, for issuing and using digital identification badges, for creating and using time-limited access codes, for capturing unauthorized activity, for monitoring behavior analytics, for providing detailed analytics, for allowing for single sign on across applications and platforms, for creating and managing an identity network, and for providing dynamic biometric identification and authentication across multiple methods | Application Service Provider services featuring computer software for validating identity through multi-factor authentication, for communicating with physical and logical access gateways and control systems, for managing physical and logical access, for analyzing, managing, refining and enriching data related to physical and logical access, user transactions and other user activity, for issuing, monitoring, creating and modifying credentials, for validating admission or access to events, physical spaces, websites, software applications, computer systems, for validating financial or other transactions, for social, personal and professional networking and interacting, for sharing and managing contact information, for discovering other users, for communicating with and sending invitations and credentials to other users, for conducting personal and commercial transactions, for issuing and using digital identification badges, for creating and using time-limited access codes, for capturing unauthorized activity, for monitoring behavior analytics, for providing detailed analytics, for allowing for single sign on across applications and platforms, for creating and managing an identity network, and for providing dynamic biometric identification and authentication across multiple methods

Related