Trademarks owned by Merlin International, Inc. | Applied Marks - Trademark, Domain Name and Social Media Protection for Brands - /\\\ Applied Marks
owned Merlin International, Inc. owned Merlin International, Inc.

Trademarks owned by 'Merlin International, Inc.'

Summary of page content
2020-12-28
US
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    platform-as-a-service offering that provides tools, guidance and managed services relating to the hosting of enterprise software platforms in government and regulated industry compliant environments, and serves as a marketplace for sales of those third party certified products to customers in government and regulated industries
630
NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER
2020-12-31
2021-03-23
energy services electric source power trust maritime conflict club group classic nuclear solutions newenergy resources spa local third activia celebrity
2020-12-28
US
  • 35
    Advertising; business management; business administration; office functions
    business services, namely, providing, and coordinating the provision of services by others, in the fields of business information management and business analytics, business process improvement and systems development, business services, namely, providing cyber security, and coordinating the provision of cyber security by others, in the fields of cyber threats, network vulnerabilities, data privacy and regulatory compliance; records management, namely, document indexing for others; computer consulting services, namely, providing, and coordinating the provision of services by others, in the fields of enterprise resource planning (erp) and data and database management and storage
  • 36
    Insurance; financial affairs; monetary affairs; real estate affairs
    financial and investment services, namely, providing capital to companies and businesses in the enterprise it sector; investment management services for investments in companies and businesses in the enterprise it industries; advice and consultancy relating to investments; financial services, namely, investment advice, investment management, investment consultation and investment of funds and capital for others in the field enterprise it industries
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security consultancy; technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; consulting in the field of information technology; data security consultancy; internet security consultancy; technological consultation in the technology field of cyber threats, network vulnerabilities, data privacy and regulatory compliance; technological planning and consulting services in the field of cyber threats, network vulnerabilities, data privacy and regulatory compliance; consulting services in the design and implementation of computer-based information systems for business; computer security, namely, security assessment, computer systems security architecture design and implementation, defense-in-depth design and implementation, and user access authentication; information technology consultation, namely, enterprise computer system architecture, software engineering, service oriented architecture (soa), enterprise systems management, and data warehousing, design, analysis, development and management of networks, namely, wan (wide area networks), man (metropolitan area networks), lan (local area networks); technology migration, namely, migrating existing computer systems to replacement computer systems; selection, implementation and use of computer hardware and software for others; computer disaster recovery planning
630
NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER
2020-12-31
2021-03-19
group technologies marketing technology hotel solutions bank professional water associates express software law magic lures frankies spuntino merchants 3d factor
2020-12-28
US
  • 35
    Advertising; business management; business administration; office functions
    business services, namely, providing, and coordinating the provision of services by others, in the fields of business information management and business analytics, business process improvement and systems development, business services, namely, providing cyber security, and coordinating the provision of cyber security by others, in the fields of cyber threats, network vulnerabilities, data privacy and regulatory compliance; records management, namely, document indexing for others; computer consulting services, namely, providing, and coordinating the provision of services by others, in the fields of enterprise resource planning (erp) and data and database management and storage
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security consultancy; technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; consulting in the field of information technology; data security consultancy; internet security consultancy; technological consultation in the technology field of cyber threats, network vulnerabilities, data privacy and regulatory compliance; technological planning and consulting services in the field of cyber threats, network vulnerabilities, data privacy and regulatory compliance; consulting services in the design and implementation of computer-based information systems for business; computer security, namely, security assessment, computer systems security architecture design and implementation, defense-in-depth design and implementation, and user access authentication; information technology consultation, namely, enterprise computer system architecture, software engineering, service oriented architecture (soa), enterprise systems management, and data warehousing, design, analysis, development and management of networks, namely, wan (wide area networks), man (metropolitan area networks), lan (local area networks); technology migration, namely, migrating existing computer systems to replacement computer systems; selection, implementation and use of computer hardware and software for others; computer disaster recovery planning
630
NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER
2020-12-31
2021-03-19
group technology solutions law magic lures technologies frankies spuntino merchants 3d factor marketing navigator chamberlain citi commercial 457 court street
2020-12-28
US
  • 35
    Advertising; business management; business administration; office functions
    business services, namely, providing, and coordinating the provision of services by others, in the fields of business information management and business analytics, business process improvement and systems development, business services, namely, providing cyber security, and coordinating the provision of cyber security by others, in the fields of cyber threats, network vulnerabilities, data privacy and regulatory compliance; records management, namely, document indexing for others; computer consulting services, namely, providing, and coordinating the provision of services by others, in the fields of enterprise resource planning (erp) and data and database management and storage
  • 36
    Insurance; financial affairs; monetary affairs; real estate affairs
    financial and investment services, namely, providing capital to companies and businesses in the enterprise it sector; investment management services for investments in companies and businesses in the enterprise it industries; advice and consultancy relating to investments; financial services, namely, investment advice, investment management, investment consultation and investment of funds and capital for others in the field enterprise it industries
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security consultancy; technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; consulting in the field of information technology; data security consultancy; internet security consultancy; technological consultation in the technology field of cyber threats, network vulnerabilities, data privacy and regulatory compliance; technological planning and consulting services in the field of cyber threats, network vulnerabilities, data privacy and regulatory compliance; consulting services in the design and implementation of computer-based information systems for business; computer security, namely, security assessment, computer systems security architecture design and implementation, defense-in-depth design and implementation, and user access authentication; information technology consultation, namely, enterprise computer system architecture, software engineering, service oriented architecture (soa), enterprise systems management, and data warehousing, design, analysis, development and management of networks, namely, wan (wide area networks), man (metropolitan area networks), lan (local area networks); technology migration, namely, migrating existing computer systems to replacement computer systems; selection, implementation and use of computer hardware and software for others; computer disaster recovery planning
630
NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER
2020-12-31
2021-03-19
technology group marketing magic lures technologies frankies spuntino merchants 3d factor navigator chamberlain citi commercial 457 court street brooklyn gaylord
2018-11-21
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software to implement a standard architecture as a platform for integration of security operations and network access control; computer software for network access control; computer software for network security, system security, file security, user security, and data security; computer software for management and monitoring of computer networks, systems, files, users, and data; computer software for detection, analysis, reporting, and restoration of changes to computer networks, systems, applications, files, users, and data; computer software for managing and optimizing hardware and software in an information technology environment; computer software for monitoring and improving the security of, and detecting and protecting against cyber-attacks and threats directed at, computers, computer systems, networks, hardware, software applications, digital devices, digital data, users, and mobile devices; computer software for policy monitoring, management, orchestration, action, response, and adherence for protecting against cyber-attacks and threats; computer software for identity management information security; computer software for maintaining access control and identity management for protecting against cyber-attacks and threats; computer software for maintaining appropriate risk, audit and compliance posture for protecting against cyber-attacks and threats; computer software for implementing zero-trust networks and managing boundaries for network users, systems, and processes for protecting against cyber-attacks and threats
605
ABANDONED - AFTER PUBLICATION
2019-06-03
2020-05-31
group technologies marketing technology hotel solutions bank professional water associates express software law magic lures frankies spuntino merchants 3d factor
2018-11-21
US
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    software as service (saas) services featuring software to implement a standard architecture as a platform for integration of security operations and network access control; computer software for network access control; software as service (saas) services featuring software for network security, system security, file security, user security, and data security; software as service (saas) services featuring software for management and monitoring of computer networks, systems, files, users, and data; software as service (saas) services featuring software for detection, analysis, reporting, and restoration of changes to computer networks, systems, applications, files, users, and data; software as service (saas) services featuring software for managing and optimizing hardware and software in an information technology environment; software as service (saas) services featuring software for monitoring and improving the security of, and detecting and protecting against cyber-attacks and threats directed at, computers, computer systems, networks, hardware, software applications, digital devices, digital data, users, and mobile devices; software as service (saas) services featuring software for policy monitoring, management, orchestration, action, response, and adherence for protecting against cyber-attacks and threats; software as service (saas) services featuring software for identity management information security; software as service (saas) services featuring software for maintaining access control and identity management for protecting against cyber-attacks and threats; software as service (saas) services featuring software for maintaining appropriate risk, audit and compliance posture for protecting against cyber-attacks and threats; software as service (saas) services featuring software for implementing zero-trust networks and managing boundaries for network users, systems, and processes for protecting against cyber-attacks and threats; technical support services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; computer software development in the field of cyber security
601
ABANDONED - EXPRESS
2019-05-30
2020-05-31
group technologies marketing technology hotel solutions bank professional water associates express software law magic lures frankies spuntino merchants 3d factor
2018-11-21
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software to implement a standard architecture as a platform for integration of security operations and network access control; computer software for network access control; computer software for network security, system security, file security, user security, and data security; computer software for management and monitoring of computer networks, systems, files, users, and data; computer software for detection, analysis, reporting, and restoration of changes to computer networks, systems, applications, files, users, and data; computer software for managing and optimizing hardware and software in an information technology environment; computer software for monitoring and improving the security of, and detecting and protecting against cyber-attacks and threats directed at, computers, computer systems, networks, hardware, software applications, digital devices, digital data, users, and mobile devices; computer software for policy monitoring, management, orchestration, action, response, and adherence for protecting against cyber-attacks and threats; computer software for identity management information security; computer software for maintaining access control and identity management for protecting against cyber-attacks and threats; computer software for maintaining appropriate risk, audit and compliance posture for protecting against cyber-attacks and threats; computer software for implementing zero-trust networks and managing boundaries for network users, systems, and processes for protecting against cyber-attacks and threats
605
ABANDONED - AFTER PUBLICATION
2019-06-06
2020-05-31
group technologies marketing technology hotel solutions bank professional water associates express software law magic lures frankies spuntino merchants 3d factor
2018-11-21
US
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    software as service (saas) services featuring software to implement a standard architecture as a platform for integration of security operations and network access control; computer software for network access control; software as service (saas) services featuring software for network security, system security, file security, user security, and data security; software as service (saas) services featuring software for management and monitoring of computer networks, systems, files, users, and data; software as service (saas) services featuring software for detection, analysis, reporting, and restoration of changes to computer networks, systems, applications, files, users, and data; software as service (saas) services featuring software for managing and optimizing hardware and software in an information technology environment; software as service (saas) services featuring software for monitoring and improving the security of, and detecting and protecting against cyber-attacks and threats directed at, computers, computer systems, networks, hardware, software applications, digital devices, digital data, users, and mobile devices; software as service (saas) services featuring software for policy monitoring, management, orchestration, action, response, and adherence for protecting against cyber-attacks and threats; software as service (saas) services featuring software for identity management information security; software as service (saas) services featuring software for maintaining access control and identity management for protecting against cyber-attacks and threats; software as service (saas) services featuring software for maintaining appropriate risk, audit and compliance posture for protecting against cyber-attacks and threats; software as service (saas) services featuring software for implementing zero-trust networks and managing boundaries for network users, systems, and processes for protecting against cyber-attacks and threats; technical support services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; computer software development in the field of cyber security
601
ABANDONED - EXPRESS
2019-05-30
2020-05-31
group technologies marketing technology hotel solutions bank professional water associates express software law magic lures frankies spuntino merchants 3d factor
2012-04-18
4257072
2012-12-11
US
Trademark Image
The mark consists of MERLIN SECURE.PERFORMANCE stylized with MERLIN in black and the dot above the letter I in MERLIN in orange, above SECURE.PERFORMANCE in orange.
  • 35
    Advertising; business management; business administration; office functions
    business services, namely business advisory services, consultancy and information for others in the fields of business information management, business analytics, business process improvement and business production systems development; records management, namely, document indexing for others
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer consulting services in the fields of enterprise resource planning (erp) software, data processing software, database management software and data storage software; computer security, namely, security assessment, computer systems security architecture design and implementation, defense-in-depth design and implementation, and user access authentication; information technology consultation, namely, enterprise computer system architecture, software engineering, service oriented architecture (soa), enterprise systems management, and data warehousing, design, analysis, development and management of networks, namely, wan (wide area networks), man (metropolitan area networks), lan (local area networks); technology migration, namely, migrating existing computer systems to replacement computer systems; selection, implementation and use of computer hardware and software for others; computer disaster recovery planning
702
SECTION 8 & 15-ACCEPTED AND ACKNOWLEDGED
2019-01-11
2020-08-19
group technologies marketing technology hotel solutions bank professional water associates express software law magic lures frankies spuntino merchants 3d factor
2011-03-03
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software for security assessment; computer software for design and implementation of computer systems security architecture; computer software for user access authentication, identification and verification; computer software for analysis of information embedded in network internet protocol (ip) traffic; computer software for authentication of personal identification information; computer hardware, namely packet analyzers and computer network servers for multiple virtual machines; computer hardware for high-speed processing and storage of data using multiple cpus
602
ABANDONED-FAILURE TO RESPOND OR LATE RESPONSE
2012-01-06
2020-05-31
group technologies marketing technology hotel solutions bank professional water associates express software law magic lures frankies spuntino merchants 3d factor
2011-03-15
US
Trademark Image
The mark consists of the stylized word "MERLIN" in black lettering with the dot above the "I" in orange, located to the left of a black vertical line with the words "THE" in orange lettering, "SOLUTIONS" in black lettering, "YOU NEED" in orange lettering, "THE" in orange lettering, "INTEGRITY" in black lettering and "YOU DEMAND" in orange lettering located to the right of the vertical line. The punctuation marks also appear in orange. The wording and vertical line in the mark appear inside a rectangle design which is white at the top and fades to gray at the bottom of the rectangle.
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software for security assessment; computer software for design and implementation of computer systems security architecture; computer software for user access authentication, identification and verification; computer software for analysis of information embedded in network internet protocol (ip) traffic; computer software for authentication of personal identification information; computer hardware, namely, packet analyzers and computer network servers for multiple virtual machines; computer hardware for high-speed processing and storage of data using multiple cpus
  • 35
    Advertising; business management; business administration; office functions
    business services, namely, business advisory services, consultancy and information for others in the fields of business information management, business analytics, business process improvement and business production systems development; records management, namely, document indexing for others
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer consulting services in the fields of enterprise resource planning (erp) software, data processing software, database management software and data storage software; computer security, namely, security assessment, computer systems security architecture design and implementation, defense-in-depth design and implementation, and user access authentication; information technology consultation, namely, enterprise computer system architecture, software engineering, service oriented architecture (soa), enterprise systems management, and data warehousing, design, analysis, development and management of networks, namely, wan (wide area networks), man (metropolitan area networks), lan (local area networks); technology migration, namely, migrating existing computer systems to replacement computer systems; selection, implementation and use of computer hardware and software for others; computer disaster recovery planning
606
ABANDONED - NO STATEMENT OF USE FILED
2012-08-13
2020-05-31
technology magic lures technologies frankies spuntino merchants 3d factor group marketing navigator chamberlain citi commercial 457 court street brooklyn gaylord
2010-03-16
3872717
2010-11-09
US
Trademark Image
The mark consists of the stylized word "MERLIN" in black with the letter "i" also forming a part of the letter "n", with a small orange square representing the dot above the letter "i".
  • 35
    Advertising; business management; business administration; office functions
    business services, namely, providing, and coordinating the provision of services by others, in the fields of business information management and business analytics, business process improvement and systems development; records management, namely, document indexing for others; computer consulting services, namely, providing, and coordinating the provision of services by others, in the fields of enterprise resource planning (erp) and data and database management and storage
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security, namely, security assessment, computer systems security architecture design and implementation, defense-in-depth design and implementation, and user access authentication; information technology consultation, namely, enterprise computer system architecture, software engineering, service oriented architecture (soa), enterprise systems management, and data warehousing, design, analysis, development and management of networks, namely, wan (wide area networks), man (metropolitan area networks), lan (local area networks); technology migration, namely, migrating existing computer systems to replacement computer systems; selection, implementation and use of computer hardware and software for others; computer disaster recovery planning
800
REGISTERED AND RENEWED
2020-10-16
2020-11-24
group technologies marketing technology hotel solutions bank professional water associates express software law magic lures frankies spuntino merchants 3d factor
First 1 Last  1 of 1
NEED HELP? Chat with us online

Copyright 2008 - 2024 Applied Marks Pty Ltd (ACN 134 698 249). All rights reserved. Terms of Service, Privacy Policy and Acceptable Use Policy.