GleanMark

O Trademark

O is a USPTO trademark filed by ONESPAN NORTH AMERICA INC.. Status: Pending.

Trademark Facts

MarkO
Serial Number97620156
StatusPending
Filing Date2022-10-05
Mark TypeStylized
Nice Classes009 (Electronics & Software), 042 (Software & IT)
OwnerONESPAN NORTH AMERICA INC.
Attorney of RecordJohn W. McGlynn
Prosecution Events44
Latest EventCNPR on 2026-05-08

Goods & Services

Class 009: Recorded or downloadable mobile application software for automating and securing the interaction between users and computer based business applications; recorded or downloadable software in the field of machine learning and artificial intelligence for automating and securing the interaction between users and computer based business applications; recorded or downloadable cyber security software; downloadable computer security software for restricting unauthorized access to computers, computer networks, websites, computer-based applications and for ensuring authenticity and integrity of electronic transactions; recorded or downloadable software for network and device security for restricting unauthorized access to computers, computer networks, websites, computer-based applications; recorded or downloadable software for application, transaction and identity security related to mobile device applications for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and for ensuring authenticity and integrity of transactions submitted by users of mobile device applications; recorded or downloadable software for data security for authenticating, enforcing, restricting and controlling access privileges to users and for ensuring authenticity and integrity of transactions submitted by users; recorded or downloadable software for ensuring the security of electronic mail by authenticating, enforcing, restricting and controlling access privileges to users; recorded or downloadable software for computer virus tracking and computer virus neutralization; electronic publications, namely, journals, books, manuals, magazines, brochures, downloadable, relating to the field of cyber security, internet security, computer security, computer network security, data security and cryptography; downloadable software development kits (SDK); downloadable computer security software development kits (SDK); downloadable mobile application software security development kits (SDK); downloadable software development kits (SDK) for authentication of user identities; downloadable software development kits (SDK) for biometric security software; recorded or downloadable real-time fraud prevention software for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and computer-based applications and for ensuring authenticity and integrity of transactions submitted by users of computer-based applications; recorded or downloadable software for monitoring, detecting and blocking of fraudulent electronic transactions submitted to computer-based applications; recorded or downloadable software for logging, monitoring and securing computer software applications hosted by server computers and accessible via computer networks, including the internet and mobile networks; recorded or downloadable software for analyzing, and detecting unusual patterns in user and transaction data including behavioral and contextual data; recorded or downloadable software for behavioral analytics for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and computer-based applications and for ensuring authenticity and integrity of transactions submitted by users of mobile device applications and computer-based applications; recorded or downloadable mobile application security software for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and computer-based applications and for ensuring authenticity and integrity of transactions submitted by users of mobile device applications and computer-based applications; recorded or downloadable software for protecting mobile applications against cyber threats, computer viruses, phishing attacks, computer malware, man-in-the-middle attacks; recorded or downloadable software for detecting, preventing and reporting mobile cyber attacks against computer-based applications; recorded or downloadable computer anti-malware software; recorded or downloadable runtime application self-protection software, namely, computer anti-malware software; recorded or downloadable tamper detection software, namely, software for detecting illegitimate tampering by unauthorized entities with electronic devices or software; recorded or downloadable device identification and device binding software, namely, software for identifying an individual electronic device, and software for binding a software application instance to an individual electronic device; recorded or downloadable device fingerprinting software, namely, software for collecting information about the hardware utilized by a website visitor and creating a profile to identify the visitor; recorded or downloadable secure storage software, namely, software for secure electronic storage of data; recorded or downloadable secure communications software, namely, software for monitor; Class 042: Computer hosted, online and cloud-based cyber security services, namely, software as a service featuring software for providing cyber security; electronic signature verification services using technology to authenticate user identity; data encryption services; data warehousing and electronic data back-up services; authentication, issuance, validation, revocation and blacklisting of digital certificates; providing cyber security services in the nature of electronic user authorization, authentication and identification of persons using single sign-on technology for online software applications; data encryption; development of electronic identification (ID) products, namely, computer hardware and software; providing online user authentication of electronic signatures, namely, electronic signature verification services using technology to authenticate user identity in connection with banking transaction services; provision of security services for limiting access to computer networks, computers and completing computerized transactions; computer security services, namely, restricting unauthorized access to computer networks for protection against illegal and illegitimate network access; online authentication of electronic signatures, namely, electronic signature verification services using technology to authenticate user identity; online security services, namely, providing security for electronic transactions, namely, data encryption and authentication services for providing security and anonymity for electronically transmitted transactions; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals; computer security services, namely, controlling access privileges of users of computing resources for computers, electronic networks, web sites and databases based on assigned credentials; computer network data transmission and transactions encryption, authentication and management services; computer security services, namely, controlling access privileges of users of computing resources to web sites, computers and databases; providing secure and authenticated access to computer networks, web sites, electronically accessible applications and computer applications, namely, controlling access privileges of users of computing resources based on assigned credentials; providing secured online transactions and secured data transfer by electronic means, namely, providing user authentication services using biometric hardware and software technology for e-commerce transactions; data encryption and authentication services for providing security against fraud for electronic transactions for electronic funds transfer, credit and debit card and electronic check transactions via a global computer network; providing user authentication services, namely, electronic signature and digital credential verification services using technology to authenticate user identity, user passwords, digital credentials and electronic signatures; providing user authentication services, namely, electronic signature and digital credential verification services using technology to authenticate user identity, user passwords, digital credentials and electronic signatures used to authorize transactions and access networks and online services; monitoring of computer systems for security purposes in the nature of monitoring data transmission and online transactions for access by unauthorized users; providing user authentication services using single sign-on technology, biometric hardware and software technology for e-commerce transactions; electronic Computer hosted, online and cloud-based cyber security services, namely, software as a service featuring software for providing cyber security; electronic signature verification services using technology to authenticate user identity; data encryption services; data warehousing and electronic data back-up services; authentication, issuance, validation, revocation and blacklisting of digital certificates; providing cyber security services in the nature of electronic user authorization, authentication and identification of persons using single sign-on technology for online software applications; data encryption; development of electronic identification (ID) products, namely, computer hardware and software; providing online user authentication of electronic signatures, namely, electronic signature verification services using technology to authenticate user identity in connection with banking transaction services; provision of security services for limiting access to computer networks, computers and completing computerized transactions; computer security services, namely, restricting unauthorized access to computer networks for protection against illegal and illegitimate network access; online authentication of electronic signatures, namely, electronic signature verification services using technology to authenticate user identity; online sec

Related