Find Laws Find Lawyers Free Legal Forms USA State Laws
Laws-info.com » Trademark » Trademarks Search » (APPLICANT) Secure Systems Limited CORPORATION AUSTRALIA Level One 16 Ord Street Western Perth AUSTRALIA 6005 | TOMORROW'S TECHNOLOGIES TODAY - 76342456 - Trademark Search | Registered by David Hochman
TOMORROW'S TECHNOLOGIES TODAY
Serial Number: 76342456
Word Mark: TOMORROW'S TECHNOLOGIES TODAY
Goods and Services: (ABANDONED) IC 009. US 021 023 026 036 038. G & S: Hardware based computer technology programmed to design and permit the safe storage of data and software within a computer (without the need to use firewalls and data encryption software) and prevents unauthorized reads and writes to the hard disk drive; hard ware based computer technology to permit the safe transmission of data and data processing procedures (eg files, messages and e-commerce transactions) via electronic media and unique recognizable keys for computer security, hardware technology to deny access to computer systems by hackers, prevent viruses to affect computer systems; computer device which attaches to external port of computer and programs as a self contained intelligent device with its own memory operating system, onboard modifiable software store and secure access for computer systems management. FIRST USE: 20000927. FIRST USE IN COMMERCE: 20000927

(ABANDONED) IC 035. US 100 101 102. G & S: Hardware based computer technology for business management and administration; programmed to design and permit the safe storage of data and software within a computer (without the need to use firewalls and data encryption software) and prevents unauthorized reads and writes to the hard disk drive; hard ware based computer technology to permit the safe transmission of data and data processing procedures (e.g. files, messages and e-commerce business to business transactions) via electronic media and unique recognizable keys for computer security; hardware technology to deny access to computer systems by hackers, prevent viruses to affect computer systems; computer device which attaches to external port of computer and programs as a self contained intelligent device with its own memory, operating system, onboard modifiable software store and secure access for computer systems management. FIRST USE: 20000927. FIRST USE IN COMMERCE: 20010927

(ABANDONED) IC 038. US 100 101 104. G & S: Hardware based computer technology programmed design and permit the secured transmittal of messages from user to user and the safe storage of data and software within a computer (without the need to use firewalls and data encryption software) and prevents unauthorized reads and writes to the hard disk drive; hard ware based computer technology to permit the safe transmission of data and data processing procedures (e.g. files, messages and e-commerce transactions) via electronic media and unique recognizable keys for computer security; hardware technology to deny access to computer systems by hackers, prevent viruses to affect computer systems; computer device which attaches to external port of computer and programs as a software store and secure access for computer systems management. FIRST USE: 20000927. FIRST USE IN COMMERCE: 20000927

(ABANDONED) IC 041. US 100 101 107. G & S: Hardware based computer technology which provides education and training for users of computer and electronic systems to permit the safe storage of data and software within a computer (without the need to use firewalls and data encryption software) and prevents unauthorized reads and writes to the hard disk drive; hard ware based computer technology to permit the safe transmission of data and data processing procedures (eg files, messages and e-commerce transactions) via electronic media and unique recognizable keys for computer security; hardware technology to deny access to computer systems by hackers, prevent viruses to affect computer systems; computer device which attaches to eternal port of computer and programs as a self contained intelligent device with its own memory, operating system, onboard modifiable software store and secure access for computer systems management. FIRST USE: 20000927. FIRST USE IN COMMERCE: 20000927

(ABANDONED) IC 042. US 100 101. G & S: Hardware based computer technology programmed to design and permit the safe storage of data and software within a computer (without the need to use firewalls and data encryption software) and prevents unauthorized reads and writes to the hard disk drive; hard ware based, computer technology to permit the safe transmission of data and data processing procedures (eg files, messages and e- commerce transactions) via electronic media and unique recognizable keys for computer security; hardware technology to deny access to computer systems by hackers, prevent viruses to affect computer systems; computer device which attaches to external port of computer and programs as a self contained intelligent device with its own memory, operating system, onboard modifiable software store and secure access for computer systems management. FIRST USE: 20000927. FIRST USE IN COMMERCE: 20000927

Mark Drawing Code: (1) TYPED DRAWING
Filing Date: 11/28/2001
Current Basis: 1A
Original Filing Basis: 1A
Owner: (APPLICANT) Secure Systems Limited CORPORATION AUSTRALIA Level One 16 Ord Street Western Perth AUSTRALIA 6005
Attorney of Record: David Hochman
Type of Mark: TRADEMARK. SERVICE MARK
Register: PRINCIPAL
Live/Dead Indicator: DEAD
SiteNo: 106930

Comments

Related Articles

Copyright Infringements In Depth Copyright Infringements In Depth
Copyright is a form of intellectual property law designed to protect authors of creative work from unauthorized reproduction, copying, and selling.
10 Copyright Laws You Have To Know 10 Copyright Laws You Have To Know
  Copyrighting creative works is a legal process that is subject to specific laws and regulations.
5 Facts To Know About Copyright 5 Facts To Know About Copyright
Copyright infringement is considered to be punishable by law in the United States.
A Brief Overview of Trademark Registration A Brief Overview of Trademark Registration
Trademark registration is required if someone or a company wants to be protected by the exclusive bundle of rights granted to a registered trademark owner.
What are the Legal Consequences Of Plagiarism What are the Legal Consequences Of Plagiarism
Individuals caught plagiarizing can face serious consequences.
3 Steps to Find & Use Copyright Free Images 3 Steps to Find & Use Copyright Free Images
Using images as part of a business venture, such as a website, can certainly increase the viability for success of the project.
Tips