GleanMark

CYBER 2.0 Trademark

CYBER 2.0 is a USPTO trademark filed by Cyber 2.0 (2015) LTD.. Status: Cancelled.

Trademark Facts

MarkCYBER 2.0
Serial Number87414605
Registration Number5836439
StatusCancelled
Filing Date2017-04-17
Registration Date2019-08-13
Mark TypeWord
Nice Classes009 (Electronics & Software), 042 (Software & IT)
OwnerCyber 2.0 (2015) LTD.
Attorney of RecordMichael T. Smith
Prosecution Events50
Latest EventC8.. on 2026-02-27

Goods & Services

Class 009: Downloadable computer security software, namely, computer security software implementing scrambling of ports to facilitate secure communications over a network; software for creating, facilitating, and managing remote access to and communication with local area networks and global networks, namely, software implementing scrambling of ports to facilitate secure communications over a network; computer software for controlling and managing access server applications, namely, software for managing credentials of device in a computer network implementing port scrambling; virtual private network (VPN) operating software, namely, operating software implementing scrambling of ports to facilitate the virtual private network; local area network (LAN) operating software, namely, operating software implementing scrambling of ports within the local area network; computer software for encryption, namely, computer software for encryption used to encrypt communications within a network implementing port scrambling; computer firewall software, namely, computer software for implementing a firewall using scrambling of ports; Class 042: Computer security consultancy; diagnosis of computer software security problems, namely, diagnosis of security problems using port scrambling; encryption of data, namely, data encryption of data communicated over a network implementing port scrambling; consultancy services relating to the design, development and secure use of computer hardware and software; providing temporary use of on-line applications and software tools, namely, providing temporary use of tools and applications for monitoring and managing a network implementing port scrambling; server administration, namely, administration of a server distributing certificates used by software agents for selectively implementing port scrambling; computer security services for protection against illegal network access, namely, provisioning of software agents in computer networks for implementing selective port scrambling

Related