GleanMark

Trademark 98275449 Trademark

Trademark 98275449 is a USPTO trademark filed by GENERAL DYNAMICS MISSION SYSTEMS, INC.. Status: Pending.

Trademark Facts

MarkTrademark 98275449
Serial Number98275449
StatusPending
Filing Date2023-11-17
Mark TypeDesign
Nice Classes009 (Electronics & Software), 042 (Software & IT)
OwnerGENERAL DYNAMICS MISSION SYSTEMS, INC.
Attorney of RecordMichael R. Justus
Prosecution Events32
Latest EventCHAN on 2026-04-06

Goods & Services

computer processors being central processing units (CPU); computer processors being central processing units (CPU), namely, encrypted computer processors for use in computer security applications; computer hardware; computer hardware, namely, computer readable storage media and computer readable memory for use in computer security; secure computer readable media, namely, encrypted computer readable storage devices, encrypted computer readable memory media, and encrypted field programmable gate arrays (FPGA); encrypted computer hardware for use in military, critical infrastructure and other industrial applications; downloadable computer software, namely, locally installed encryption and decryption software for use on computer readable storage, computer readable memory, computer processors, and field programmable gate arrays (FPGA) for use in computer security applications; cryptography and other encryption and digital key management solutions for military applications in the nature of downloadable software for use in computer security applications; secure computer architectures being connected computer processing units (CPU), field programmable gate arrays (FPGA), application-specific integrated circuits (ASICs), and recorded computer firmware and software for use in computer security applications; the design of the shape of the state of Idaho; Computer security consultancy services; data security consultancy; software development for others, namely, development of software for use in computer-anti-tampering, namely, for mitigating software infiltration and exfiltration with computer hardware; development of secure hardware and secure software for use in military applications; Providing temporary use of online, non-downloadable software for use in computer security applications

Related