(ABANDONED) IC 035. US 100 101 102. G & S: Hardware based computer technology for business management and administration; programmed to design and permit the safe storage of data and software within a computer (without the need to use firewalls and data encryption software) and prevents unauthorized reads and writes to the hard disk drive; hard ware based computer technology to permit the safe transmission of data and data processing procedures (e.g. files, messages and e-commerce business to business transactions) via electronic media and unique recognizable keys for computer security; hardware technology to deny access to computer systems by hackers, prevent viruses to affect computer systems; computer device which attaches to external port of computer and programs as a self contained intelligent device with its own memory, operating system, onboard modifiable software store and secure access for computer systems management. FIRST USE: 20000927. FIRST USE IN COMMERCE: 20010927
(ABANDONED) IC 038. US 100 101 104. G & S: Hardware based computer technology programmed design and permit the secured transmittal of messages from user to user and the safe storage of data and software within a computer (without the need to use firewalls and data encryption software) and prevents unauthorized reads and writes to the hard disk drive; hard ware based computer technology to permit the safe transmission of data and data processing procedures (e.g. files, messages and e-commerce transactions) via electronic media and unique recognizable keys for computer security; hardware technology to deny access to computer systems by hackers, prevent viruses to affect computer systems; computer device which attaches to external port of computer and programs as a software store and secure access for computer systems management. FIRST USE: 20000927. FIRST USE IN COMMERCE: 20000927
(ABANDONED) IC 041. US 100 101 107. G & S: Hardware based computer technology which provides education and training for users of computer and electronic systems to permit the safe storage of data and software within a computer (without the need to use firewalls and data encryption software) and prevents unauthorized reads and writes to the hard disk drive; hard ware based computer technology to permit the safe transmission of data and data processing procedures (eg files, messages and e-commerce transactions) via electronic media and unique recognizable keys for computer security; hardware technology to deny access to computer systems by hackers, prevent viruses to affect computer systems; computer device which attaches to eternal port of computer and programs as a self contained intelligent device with its own memory, operating system, onboard modifiable software store and secure access for computer systems management. FIRST USE: 20000927. FIRST USE IN COMMERCE: 20000927
(ABANDONED) IC 042. US 100 101. G & S: Hardware based computer technology programmed to design and permit the safe storage of data and software within a computer (without the need to use firewalls and data encryption software) and prevents unauthorized reads and writes to the hard disk drive; hard ware based, computer technology to permit the safe transmission of data and data processing procedures (eg files, messages and e- commerce transactions) via electronic media and unique recognizable keys for computer security; hardware technology to deny access to computer systems by hackers, prevent viruses to affect computer systems; computer device which attaches to external port of computer and programs as a self contained intelligent device with its own memory, operating system, onboard modifiable software store and secure access for computer systems management. FIRST USE: 20000927. FIRST USE IN COMMERCE: 20000927
Trademark Registration Overview How To Trademark A Name Trademark Symbols Remedies To Trademark Infringement Defenses Against Trademark Infringement Paris Convention How To Report Trademark Infringement Tm Symbol Trademarks Common Law And Trademarks Types Of Passing Off How To Register A Trademark The Madrid Agreement Overview
10 Copyright Laws You Have To Know
Copyright Infringements In Depth
A Brief Overview of Trademark Registration
An Overview of Trademark Names
5 Facts To Know About Copyright
What are the Legal Consequences Of Plagiarism