Trademarks owned by NortonLifeLock Inc. | Applied Marks - Trademark, Domain Name and Social Media Protection for Brands - /\\\ Applied Marks
owned NortonLifeLock Inc. owned NortonLifeLock Inc.

Trademarks owned by 'NortonLifeLock Inc.'

Summary of page content
2006-06-20
3878212
2010-11-16
US
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer virus protection services; computer support services, namely, technical support services, namely, troubleshooting of computer software problems
  • 45
    Legal services; security services for the protection of property and individuals; personal and social services rendered by others to meet the needs of individuals
    monitoring of computer systems for security purposes; providing enterprise security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computer software products and computer networks
800
REGISTERED AND RENEWED
2021-02-13
2021-03-23
system performance security healthcare digital emperor mcnaughton 1853 original bodega burgess backup guides sound francisco sourdough snacks crispy baker records
2019-03-22
US
Trademark Image
The mark consists of a box with rounded edges with a lock shape and keyhole in the center appearing to the left of the words "LIFELOCK WITH NORTON", with a circle with a checkmark in the center of the circle design appearing between the words "WITH" and "NORTON".
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    downloadable computer antivirus software; computer hardware; computers; downloadable computer application software for use in electronic storage of data, documents and receipts; downloadable computer application software to assist in tracking, managing, and reporting expenses, credit scores, account information, and commercial transactions; downloadable computer application software for providing alerts and notifications regarding potential identity theft, and for providing tips and information concerning identity theft
  • 36
    Insurance; financial affairs; monetary affairs; real estate affairs
    credit reporting services; providing credit reporting data maintained by others; credit risk management and consultation services, namely, assistance with restoring and analyzing credit damaged by identity theft; tracking and reporting regarding consumer credit reports and changes thereto; providing advice and consultation in the field of credit reports and credit scores; fraud resolution assistance, namely, assistance with restoring credit damaged by identity theft; providing reimbursement of costs associated with identity theft; financial services, namely, credit repair and restoration; credit risk management, credit risk consultation, and analyzing credit damaged by identity theft; prevention of unsolicited commercial communications, namely, credit counseling services in the nature of removing customers from preapproved credit offer lists; card payment processing services and fraud reimbursement services, namely, fraud and identity theft protection services consisting of credit card and debit card cancellation services in the event of loss or theft, namely, registering credit and debit cards for cancellation; fraud and identity theft protection services consisting of assisting others with reissuance of credit cards, traveler's checks, personal checks in the event of loss or theft
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    software as a service (saas) featuring software for use in electronic storage of data, documents and receipts; software as a service (saas) featuring software to assist in tracking, managing, and reporting expenses, credit scores, account information, and commercial transactions; software as a service (saas) featuring software for providing alerts and notifications regarding potential identity theft, and for providing tips and information concerning identity theft; electronic monitoring of personally identifying information to detect identity theft via the internet; electronic monitoring of credit card activity to detect fraud via the internet; data security consultancy; computer and online identity theft detection and protection services in the nature of arranging secure electronic authentication of personal data in requests to open banking, credit, credit card, loan, financial, telecommunications and utility accounts; fraud and identity theft protection services, namely, electronic monitoring of personally identifying information to detect identity theft via the internet; computer security services, namely, monitoring the internet, public records, credit reports, private and public electronic databases, and unregulated global computer networks to facilitate the detection of and protection against identity theft and fraud; providing a secure interactive website featuring technology that allows users to be notified of potential fraud and potential identity theft; computer security services, namely, providing information on potential fraud and potential identity theft via e-mail alerts and notifications; resolution assistance, namely, providing advice and consultation in the field of computer security services for protecting against data theft and identity theft; consultation in the field of computer security services for protecting against data theft and identity theft; electronic monitoring personal financial account activities for fraud protection purposes; providing electronic alerts and notification information concerning possible fraud and identity theft for fraud protection purposes; computerized and electronic monitoring of public reports concerning larger scale consumer data security breaches for fraud protection purposes; providing electronic alerts and notification information concerning possible fraud and identity theft related to such events for fraud protection purposes; computerized and electronic monitoring personal financial account activities for atypical activities for fraud protection services; computer technology consultancy; computer programming; rental of computer software; computer system design; providing consultation to third parties in the field of prevention of computer and online data theft, identity theft, and prevention of unsolicited commercial electronic mail, namely, removal from junk mail lists and offers for pre-approved credit in the nature of filtering of unwanted e-mails
606
ABANDONED - NO STATEMENT OF USE FILED
2021-03-22
2021-03-22
center identity alert personal command credit score manager sds breach detection control emperor mcnaughton 1853 original bodega burgess backup system
2019-02-05
US
Trademark Image
The mark consists of a circle with a checkmark in the center of the circle appearing next to the word "NORTON".
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    downloadable computer antivirus software; downloadable computer software for providing network, internet, and computer security; downloadable computer software for providing online identity protection and parental control; downloadable computer software for providing intrusion detection and prevention; downloadable computer software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spyware, and other malware; downloadable internet security software, including computer software for use in the monitoring and control of computer and online activity; downloadable computer software for providing online transaction security; downloadable fraud protection software; downloadable computer optimization software; downloadable computer software to prevent, diagnose, and repair computer problems; downloadable computer maintenance software; downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable enterprise security software; downloadable firewall software; downloadable privacy control software; downloadable content filtering software; downloadable computer software for providing cryptographic network security and data security functions; downloadable computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the internet, as well as over other modes of communication between computing devices; downloadable computer software for use in analysis and reporting of firewall log data; downloadable computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable computer software for encrypting and authenticating data; downloadable computer software for encryption; downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable computer software for the creation of virtual private network; downloadable computer software, namely, utility software; downloadable computer utility software for removal of computer applications and software; downloadable computer software for file management; downloadable computer software and databases for use in diagnosis, repair and configuration of computers downloadable computer programs for data communications applications, and for the encryption and authentication of electronic information; downloadable computer software for identity security; downloadable computer software for digital information and data access; downloadable computer software for detecting identity fraud; downloadable computer software for use in monitoring computers for security purposes; downloadable computer software for use in vulnerability scanning of networks and websites; downloadable electronic publications in the nature of manuals, blogs, instructional materials, teaching materials, and newsletters, in the field of computer software and computer and on-line security
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    electronic storage of data; computer software consultation; internet security consultancy, namely, computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks; on-line technical support services, namely, troubleshooting in the nature of diagnosing of computer hardware and software problems; technical and customer support services, namely, troubleshooting of computer software problems; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; technical support services, namely, providing back-up computer programs; updating of computer software for others; computer virus protection services; computer consultation in the field of computer security; computer diagnostic services; computer services, namely, data recovery services; computer software installation services; electronic notification and delivery of software updates; technical consultation in the field of computer software installation and maintenance; providing information in the field of network and internet security; providing technical information in the field of computer software applications; encryption and decryption of data and communications; computer support services, namely, technical support and software update services; computer software and consulting services related to computer products and services; software as a service featuring software for use in scanning networks and websites to detect and identify vulnerabilities and malware; providing information in the field of information technology relating to communications devices, computers, computer hardware, computer software, computer peripherals, and computer networks; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; electronic monitoring of computer systems for security purposes; electronic monitoring of computer networks for security purposes; providing security threat management systems, namely, electronic monitoring and tracking of security vulnerabilities and problems in computer software products, the internet, and computer networks; providing information in the fields of global computer network and local area network internet security, preventing computer viruses, preventing computer threats, computer hardware and software applications in security; identity theft protection services, namely, fraud prevention in the form of computerized and electronic monitoring of personal and financial information
819
SU - REGISTRATION REVIEW COMPLETE
2021-03-18
2021-03-19
emperor mcnaughton 1853 original bodega burgess backup system guides sound francisco sourdough snacks crispy baker records mary guitars jen studio
2013-02-28
4645798
2014-11-25
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer, mobile and cloud based data encryption, management, monitoring and security software used in the protection of data transmissions over public networks, managing data and connections on networks and mobile devices
702
SECTION 8 & 15-ACCEPTED AND ACKNOWLEDGED
2021-02-27
2021-02-28
SURFEASY NortonLifeLock Inc.
2020-04-28
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    downloadable computer antivirus software; downloadable computer maintenance software, namely, software that identifies and removes unwanted programs; downloadable computer optimization software, namely, software that enhances computer processing power; downloadable computer software for providing computer intrusion detection and prevention; downloadable computer software for providing network, internet, and computer security; downloadable computer software for providing online identity protection and parental control; downloadable computer software for providing online transaction security; downloadable computer software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spyware, and other malware; downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable computer software to prevent, diagnose, and repair computer problems; downloadable content filtering software; downloadable computer programs for data communications applications, namely, software for enabling virtual private network (vpn) and for the encryption and authentication of electronic information; downloadable computer software for diagnosing, repairing, and configuring computers, computer software, and computer peripherals; downloadable computer application software for mobile phones, tablets, portable media players, and handheld computers, namely, software for use in anonymous browsing that provides secure and private access for users to the internet, software that encrypts electronic data for transmission through a secure and private connection over the internet, software that provides blocking from targeted advertising, and software for compressing data; downloadable computer software for connecting and managing remote computers, for implementing computer, software and network security measures for remote computer users; downloadable computer software for detecting identity fraud; downloadable computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable computer software for encrypting and authenticating data; downloadable computer software for encryption; downloadable computer software for providing identity security; downloadable computer software for providing cryptographic network security and data security functions; downloadable computer software for the creation of virtual private networks; downloadable computer software for use in analysis and reporting of firewall log data; downloadable computer software for use in detecting malware; downloadable computer software for use with computer servers for controlling and managing server applications; downloadable computer software for use in monitoring computers for security purposes; downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable computer software for updating other computer software; downloadable computer software for use in vulnerability scanning of networks and websites; downloadable computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the internet, as well as over other modes of communication between computing devices; downloadable computer utility software for removal of computer applications and software; downloadable electronic publications in the nature of manuals, instruction manuals, teaching manuals, and newsletters in the field of computer software and computer and on-line security; downloadable software for the creation of firewalls; downloadable fraud protection software, namely, software that provides alerts and notifications to users regarding potential identity theft, fictitious identity monitoring, and credit fraud; internet security software, namely, downloadable computer software for monitoring and controlling computer and online activity; downloadable privacy control software, namely, software for use in protecting and safeguarding online identity, privacy, data and information; downloadable utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable computer application software for mobile devices, namely, software for researching suspicious applications; downloadable software for analyzing privacy threats and detecting malware and other system vulnerabilities for computers and mobile devices; downloadable computer software for detecting, blocking, and intercepting targeted advertising; downloadable computer software for storing and retrieving login credentials securely and generating strong passwords; downloadable computer software for tracking and managing personal and private identity data entered on websites; downloadable computer software for tracking, locating, locking and wiping lost or stolen computers, tablets, mobile devices and other digital devices; downloadable computer application software for providing alerts and notifications regarding potential identity theft, and for providing tips and information concerning identity theft; downloadable computer application software for use in electronic storage of data and documents; downloadable computer application software that tracks, manages, and reports expenses, credit scores, financial account information, and commercial transactions; downloadable mobile application software that enables users to monitor for identity theft and track their credit scores; downloadable mobile application software that enables users to respond to identity theft and credit fraud alerts and to contact support service representatives by instant message or telephone for assistance in reporting and remediating the theft or fraud; downloadable mobile application software that provides alerts and notifications to users regarding potential identity theft, fictitious identity monitoring, credit fraud, dark web activity, investment account activity, home title records scanning, and court records scanning; downloadable electronic publications in the nature of user manuals and instructional guides supplied with all of the foregoing
  • 35
    Advertising; business management; business administration; office functions
    providing consumer information concerning fraud and identity theft protection services for assisting others with replacing personal identification cards, driver's licenses, social security cards, insurance cards, checkbooks and travelers checks in the event of loss or theft; arranging and conducting incentive reward programs to promote the sale of cybersecurity services and software; arranging and conducting incentive reward programs to promote the sale of fraud and identity theft protection services
  • 36
    Insurance; financial affairs; monetary affairs; real estate affairs
    credit reporting services; credit risk management and consultation services, namely, assistance with restoring and analyzing credit damaged by identity theft; credit risk management, credit risk consultation, and analyzing credit damaged by identity theft; financial services, namely, credit repair and restoration; fraud and identity theft protection services consisting of credit card and debit card cancellation services in the event of loss or theft, namely, registering credit and debit cards for cancellation; fraud resolution assistance, namely, assistance with restoring credit damaged by identity theft; providing financial advice and consultation in the field of credit reports and credit scores; providing credit reporting data maintained by others; providing financial information via a web site; providing reimbursement of costs associated with identity theft; financial services, namely, tracking and reporting regarding consumer credit reports and changes thereto for financial purposes; insurance services, namely, claims processing, consultation, and administration of insurance for mobile devices
  • 38
    Telecommunications
    providing virtual private network (vpn) services, namely, private and secure electronic communications over a private or public computer network; telecommunication services, namely, providing electronic email and push notifications and delivery of software updates via a global computer network; providing an on-line forum for developers to showcase, display, demonstrate, promote, and offer new and innovative ideas, products and services in the field of cybersecurity software applications, mobile applications, software design, and computer security software solutions and services; providing an on-line forum for users to provide comments and reviews of software applications, mobile applications, software design and computer security software solutions and services and cybersecurity
  • 41
    Education; providing of training; entertainment; sporting and cultural activities
    educational services, namely, conducting classes, seminars, conferences, workshops, online and onsite training in the fields of computer and internet security and consumer credit, fraud and identity theft; interactive on-line training services in the field of computer and internet security and consumer credit, fraud and identity theft; providing a website featuring blogs and non-downloadable publications in the nature of articles in the fields of network, internet, and computer security, consumer credit, fraud and identity theft, and privacy protection
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer services, namely, detection of computer viruses and computer security threats; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and internet security; computer software installation services; computer services, namely, data recovery services; computer support services, namely, technical support in the nature of troubleshooting by diagnosing problems with computer software and software update services; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; computer virus protection services; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; development of software for network and internet security and data encryption; development, updating, and maintenance of software for networks and standalone computers in the fields of security, database management, and anti-virus protection and monitoring security systems; electronic monitoring of computer networks for security purposes for protecting data and information from unauthorized access; electronic storage of data; computer software consultation; encryption and decryption of data and communications; identity theft protection services, namely, fraud prevention in the form of computerized and electronic monitoring of personal and financial information; on-line technical support services, namely, troubleshooting in the nature of diagnosing of computer hardware and software problems; providing authentication of website operator identity; providing information about assessing computer security relating to protecting data, preventing computer threats and design and development of computer security hardware and software applications; providing information in the field of computer network and internet information security; providing information in the field of information technology relating to communications devices, computers, computer hardware, computer software, computer peripherals, and computer networks; computer services, namely, providing search engines for obtaining data on a global computer network; providing information in the field of network and internet information security relating to protecting data and information from unauthorized access; providing security threat management systems relating to protecting information and data from unauthorized access, namely, electronic monitoring and tracking of security vulnerabilities and problems in computer software products, the internet, and computer networks; providing security threat management systems for protecting data, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the internet, and computer networks; providing technical information in the field of computer software applications; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; software as a service featuring software for use in scanning networks and websites to detect and identify vulnerabilities and malware; technical and customer support services, namely, troubleshooting of computer software problems; technical consultation in the field of computer software installation and maintenance; electronic data back-up services; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; updating of computer software for others; software as a service (saas) featuring software for storing and retrieving login credentials securely and generating strong passwords; providing information on protecting data and information from unauthorized use, namely, information on protection related to consumer credit, fraud and identity theft; software as a service (saas) services featuring software for securely backing up and archiving electronic data; providing consultation and information in the field of identity theft protection featuring methods, tools, and techniques to safeguard personal identifying information from unauthorized access; cybersecurity services in the nature of restricting unauthorized access to computer systems; providing consultation and information in the field of identity theft protection featuring methods, tools, and techniques to safeguard personal identifying information from unauthorized access
  • 45
    Legal services; security services for the protection of property and individuals; personal and social services rendered by others to meet the needs of individuals
    tracking and reporting regarding consumer credit reports and changes thereto for purposes of fraud detection; monitoring computer networks for protecting personal property; remote protection services for wireless phones and mobile computing and communication devices, namely, remotely providing device locking, device alarm activation, and provision of location information; verification of personal identity as part of personal background investigations in order to provide assistance in fraud resolution; fraud and identity theft protection services for assisting others with replacing personal identification cards, driver's licenses, social security cards, insurance cards, checkbooks and travelers checks in the event of loss or theft
653
SUSPENSION LETTER - MAILED
2021-02-22
2021-02-22
NLOK NortonLifeLock Inc.
2004-08-20
3861132
2010-10-12
US
Trademark Image
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software in the field of cryptographic network security and data security functions; [ computer software for integration of information logic and data between computer networks; ] computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the internet and other computer networks; computer software to integrate managed security services, namely, public key infrastructure ("pki") services, digital certificate issuance, verification, and management, and enterprise software integration, with existing communications networks, software, and services; [ downloadable electronic publications in the nature of a newsletter in the field of information technology ]
  • 16
    Paper, cardboard and goods made from these materials, not included in other classes; printed matter; bookbinding material; photographs; stationery; adhesives for stationery or household purposes; artists' materials; paint brushes; typewriters and office requisites (except furniture); instructional and teaching material (except apparatus); plastic materials for packaging (not included in other classes); printers' type; printing blocks.
    [ printed matter, namely, newsletters, instructional materials and teaching materials in the field of information technology ]
  • 35
    Advertising; business management; business administration; office functions
    [ commercial information and directory services; providing commercial information and on-line directory information services for locating internet and other computer network addresses and demographic information for entities, and providing a directory of organizations, individuals, addresses, and resources accessible through the use of the internet and other computer networks; ] [ business management services, namely, providing outsource management services to others in the field of digital certificate authentication; advanced computerized database management services ]
  • 36
    Insurance; financial affairs; monetary affairs; real estate affairs
    [ providing extended warranties for authentication, encryption and certification services used to provide security in electronic transactions and communications that take place over the internet and other computer networks; administration and processing of claims under extended warranties of authentication, encryption and certification services used to provide security in electronic transactions and communications that take place over the internet and other computer networks ]
  • 41
    Education; providing of training; entertainment; sporting and cultural activities
    educational services, namely, providing instruction in the fields of the internet, computer network addresses, and internet domain name issues [; providing news in the nature of current event reporting in the field of domain name disputes; providing a nondownloadable on-line newsletter in the field of information technology ]
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    providing authentication of identity; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; [ development, integration and operation of computer systems to support issuance and management of digital certificates; creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and internet security services, namely, public key infrastructure ('pm') verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration ] [; computer services, namely, enabling users of the internet to deliver information about themselves and, if applicable, their businesses, products or services to, and to register their universal resource locators with on-line catalogues, directories, search engines and web sites, via the internet and other computer networks; registration and tracking of domain names for identification of users on a global computer network and other computer networks; providing information in the field of services relating to the ownership rights of domain names; domain name management services, namely, domain name system ("dns") management and maintenance, domain name directory management and maintenance, domain name system ('dns') infrastructure services, domain name and domain name system ("dns") information propagation, and resolution of domain name system ("dns") requests; data conversion of computer programs data or information, namely, network, computer, database and directory services that convert an assigned number sequence into an internet protocol ("if') address or uniform resource locator ('url") for the purpose of enabling access, selection and display of online content via a wireless network; directory, discovery, and information services associated with radio frequency id (rfid) and the electronic product code (epc) network ]
  • 45
    Legal services; security services for the protection of property and individuals; personal and social services rendered by others to meet the needs of individuals
    [ business services in the nature of managed public key infrastructure services, namely, application and network infrastructure security services; business management, namely, digital certificate issuance services ]
800
REGISTERED AND RENEWED
2021-01-04
2021-02-19
NortonLifeLock Inc.
2009-07-28
3780480
2010-04-27
US
  • 45
    Legal services; security services for the protection of property and individuals; personal and social services rendered by others to meet the needs of individuals
    fraud detection and prevention services in the nature of arranging secure authentication of personal data in requests to open banking, credit, credit card, insurance, loan, and other financial accounts; consultation in the field of data theft and identity theft
800
REGISTERED AND RENEWED
2020-06-29
2021-02-19
personal center manager command credit score sds breach detection control theft protection solutions management protect id services preserved secure brand
2017-11-30
6019368
2020-03-24
US
Trademark Image
The mark consists of a box with rounded edges with a lock shape and a keyhole in the center where the lock shape has legs at the bottom of the lock, and the term "LifeLock" appears to the right.
  • 35
    Advertising; business management; business administration; office functions
    fraud and identity theft protection services consisting of credit card and debit card cancellation services in the event of loss or theft, namely, registering credit and debit cards for cancellation; fraud and identity theft protection services consisting of providing consumer information for assisting others with replacing personal identification cards, driver's licenses, social security cards, insurance cards, checkbooks and travelers checks in the event of loss or theft
  • 36
    Insurance; financial affairs; monetary affairs; real estate affairs
    resolution assistance, namely, providing financial credit repair and restoration advice and consultation in the field of data theft and identity theft; credit and financial consultation in the field of data theft and identity theft
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    software as a service (saas) featuring software for use in electronic storage of data, documents and receipts; software as a service (saas) featuring software to assist in tracking, managing, and reporting expenses, credit scores, account information, and commercial transactions; software as a service (saas) featuring software for providing alerts and notifications regarding potential identity theft, and for providing tips and information concerning identity theft; electronic monitoring of personally identifying information to detect identity theft via the internet; electronic monitoring of credit card activity to detect fraud via the internet; data security consultancy; identity theft detection and protection services in the nature of computer security services for protecting personal data in requests to open banking, credit, credit card, loan, financial, telecommunications and utility accounts; fraud and identity theft protection services, namely, computer security services for protecting personal data and information from unauthorized access; monitoring the internet, public records, credit reports, private and public electronic databases, and unregulated global computer networks in the nature of computer security services for electronically monitoring personal identifying information to facilitate the detection of and protection against identity theft and fraud; providing a secure interactive website that features technology that enables the sending of notifications of potential fraud and potential identity theft; electronic monitoring of financial credit, debit and bank card activity, banking activity, financial transactions activity and financial accounts activity to detect potential fraud and identify theft and providing reporting information regarding the results of such monitoring via email notifications and alerts; computer security services involving the tracking, monitoring, and reporting regarding consumer credit reports and changes thereto for purposes of protecting data and information from unauthorized access to prevent data theft, identity theft and fraud; electronic monitoring personal financial account activities for fraud protection purposes via the internet; electronic monitoring of credit card activity and providing alerts and notification information concerning possible fraud and identity theft for fraud protection purposes related thereto; consumer data security threat analysis, namely, monitoring public reports concerning larger scale consumer data security breaches for fraud protection purposes via the internet; electronic monitoring of personal financial account activities for atypical activities for fraud protection services via the internet
700
REGISTERED
2020-03-24
2021-02-19
identity alert personal command center credit score manager sds breach detection control
2017-11-30
6211492
2020-12-01
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    mobile application software that enables users to monitor for identity theft and track their credit scores; mobile application software that provides alerts and notifications to users regarding potential identity theft, fictitious identity monitoring, credit fraud, dark web activity detection, investment account activity, court records scanning; mobile application software that enables users to respond to identity theft and credit fraud alerts and to contact support service representatives by instant message or telephone for assistance in reporting and remediating the theft or fraud; computer application software for use in electronic storage of data, documents and receipts; computer application software to assist in tracking, managing, and reporting expenses, credit scores, account information, and commercial transactions; computer application software for providing alerts and notifications regarding potential identity theft, and for providing tips and information concerning identity theft
  • 35
    Advertising; business management; business administration; office functions
    tracking and reporting regarding consumer credit reports and changes thereto for business purposes; fraud and identity theft protection services consisting of credit card and debit card cancellation services in the event of loss or theft, namely, registering credit and debit cards for cancellation; fraud and identity theft protection services consisting of providing consumer information for assisting others with replacing personal identification cards, driver's licenses, social security cards, insurance cards, checkbooks and travelers checks in the event of loss or theft
  • 36
    Insurance; financial affairs; monetary affairs; real estate affairs
    credit reporting services; providing credit reporting data maintained by others, namely, providing business credit reporting services; credit risk management and consultation services, namely, assistance with restoring and analyzing credit damaged by identity theft; providing financial advice and consultation in the field of credit reports and credit scores; fraud resolution assistance, namely, assistance with restoring credit damaged by identity theft; and providing reimbursement of costs associated with identity theft; providing financial information via a web site; financial advisory and consultancy services, namely, credit restoration; credit risk management, credit risk management and consultation services, namely, assistance with restoring and analyzing credit damaged by identity theft; resolution assistance, namely, providing financial credit repair and restoration advice and consultation in the field of data theft and identity theft; credit and financial consultation in the field of data theft and identity theft
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    software as a service (saas) featuring software for use in electronic storage of data, documents and receipts; software as a service (saas) featuring software to assist in tracking, managing, and reporting expenses, credit scores, account information, and commercial transactions; software as a service (saas) featuring software for providing alerts and notifications regarding potential identity theft, and for providing tips and information concerning identity theft; electronic monitoring of personally identifying information to detect identity theft via the internet; electronic monitoring of credit card activity to detect fraud via the internet; data security consultancy; identity theft detection and protection services in the nature of computer security services for protecting personal data in requests to open banking, credit, credit card, loan, financial, telecommunications and utility accounts; fraud and identity theft protection services, namely, computer security services for protecting personal data and information from unauthorized access; monitoring the internet, public records, credit reports, private and public electronic databases, and unregulated global computer networks in the nature of computer security services for electronically monitoring personal identifying information to facilitate the detection of and protection against identity theft and fraud; providing a secure interactive website that features technology that enables the sending of notifications of potential fraud and potential identity theft; electronic monitoring of financial credit, debit and bank card activity, banking activity, financial transactions activity and financial accounts activity to detect potential fraud and identify theft and providing reporting information regarding the results of such monitoring via email notifications and alerts; computer security services involving the tracking, monitoring, and reporting regarding consumer credit reports and changes thereto for purposes of protecting data and information from unauthorized access to prevent data theft, identity theft and fraud; electronic monitoring personal financial account activities for fraud protection purposes via the internet; electronic monitoring of credit card activity and providing alerts and notification information concerning possible fraud and identity theft for fraud protection purposes related thereto; consumer data security threat analysis, namely, monitoring public reports concerning larger scale consumer data security breaches for fraud protection purposes via the internet; electronic monitoring of personal financial account activities for atypical activities for fraud protection services via the internet
700
REGISTERED
2020-12-01
2021-02-19
identity alert personal command center credit score manager sds breach detection control
2018-09-20
5973802
2020-01-28
US
Trademark Image
The mark consists of a circle with a checkmark in the center of the circle next to a design consisting of the word "NORTON" appearing on top of a box with rounded edges with a lock shape and a keyhole in the center next to the word "LIFELOCK".
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    mobile application software that enables users to monitor for identity theft and track their credit scores; mobile application software that provides alerts and notifications to users regarding potential identity theft, fictitious identity monitoring, credit fraud, dark web activity detection, investment account activity, court records scanning; mobile application software that enables users to respond to identity theft and credit fraud alerts and to contact support service representatives by instant message or telephone for assistance in reporting and remediating the theft or fraud; computer application software for use in electronic storage of data, documents and receipts; computer application software to assist in tracking, managing, and reporting expenses, credit scores, financial account information, and commercial transactions; computer application software for providing alerts and notifications regarding potential identity theft, and for providing tips and information concerning identity theft
  • 35
    Advertising; business management; business administration; office functions
    fraud and identity theft protection services consisting of providing consumer information for assisting others with replacing personal identification cards, driver's licenses, social security cards, insurance cards, checkbooks and travelers checks in the event of loss or theft
  • 36
    Insurance; financial affairs; monetary affairs; real estate affairs
    credit reporting services; providing credit reporting data maintained by others; credit risk management and consultation services, namely, assistance with restoring and analyzing credit damaged by identity theft; tracking and reporting regarding consumer credit reports and changes thereto; providing advice and consultation in the field of credit reports and credit scores; fraud resolution assistance, namely, assistance with restoring credit damaged by identity theft; providing reimbursement of costs associated with identity theft; providing financial information via a web site; financing services; financial services, namely, credit repair and restoration; credit risk management, credit risk consultation, and analyzing credit damaged by identity theft; fraud and identity theft protection services consisting of credit card and debit card cancellation services in the event of loss or theft, namely, registering credit and debit cards for cancellation
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    software as a service (saas) featuring software for use in electronic storage of data, documents and receipts; software as a service (saas) featuring software to assist in tracking, managing, and reporting expenses, credit scores, financial account information, and commercial transactions; software as a service (saas) featuring software for providing alerts and notifications regarding potential identity theft, and for providing tips and information concerning identity theft; electronic monitoring of personally identifying information to detect identity theft via the internet; electronic monitoring of credit card activity to detect fraud via the internet; data security consultancy; computer and online identity theft detection and protection services in the nature of arranging secure electronic authentication of personal data in requests to open banking, credit, credit card, loan, financial, telecommunications and utility accounts in the nature of computer security services; fraud and identity theft protection services, namely, computer security services for protecting personal data and information from unauthorized access; monitoring the internet, and electronic public records, electronic credit reports, private and public electronic databases, and unregulated global computer networks to facilitate the detection of and protection against identity theft and fraud in the nature of computer security services; providing a secure interactive website that features technology that enables the sending of notifications of potential fraud and potential identity theft; providing information about potential computer fraud and potential online identity theft via e-mail alerts and electronic notifications in the nature of computer security services; resolution assistance, namely, providing advice and consultation in the field of computer security services for protecting data against theft and online identity theft; consultation in the field of computer security services for protecting data against theft and online identity theft; computer security services involving the tracking, monitoring, and reporting regarding consumer credit reports and changes thereto for purposes of protecting data and information from unauthorized access to prevent data theft, identity theft and fraud; prevention of unsolicited commercial communications, namely, computer filtering services in the nature of removal from pre-approved credit offer lists; electronic monitoring personal financial account activities for fraud protection purposes via the internet; providing electronic alerts and notification information concerning possible computer fraud and online identity theft for fraud protection purposes in the nature of computer security services; monitoring of computer systems for public reports concerning larger scale consumer computer and online data security breaches for fraud protection purposes in the nature of computer security; electronic monitoring of personal financial account activities for atypical activities for fraud protection services via the internet; computer technology consultancy; computer programming
700
REGISTERED
2020-01-28
2021-02-19
center emperor mcnaughton 1853 original bodega burgess backup system guides sound francisco sourdough snacks crispy baker records mary guitars jen
2021-02-12
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    downloadable security software for computers and smart devices and mobile devices for protection against viruses, malware, spyware, and unauthorized access; downloadable mobile applications for security including protection against viruses, malware, spyware, and unauthorized access; downloadable software in the field of computer and network protection and security; downloadable computer software for the creation of firewalls; downloadable computer application software for protection against viruses, malware, spyware, and unauthorized access; downloadable computer utility programs; downloadable mobile application software that provides alerts and notifications to users regarding potential identity theft, fictitious identity monitoring, credit fraud, dark web activity, investment account activity, home title records scanning, and court records scanning; downloadable computer programs for data communications applications, namely, software for enabling virtual private network (vpn) and for the encryption and authentication of electronic information; downloadable computer application software for mobile devices, namely, software for researching suspicious applications; downloadable software for analyzing privacy threats and detecting malware and other system vulnerabilities for computers and mobile devices; downloadable computer software for detecting, blocking, and intercepting targeted advertising; downloadable computer software for storing and retrieving login credentials securely and generating strong passwords
  • 36
    Insurance; financial affairs; monetary affairs; real estate affairs
    fraud and identity theft protection services consisting of credit card and debit card cancellation services in the event of loss or theft, namely, registering credit and debit cards for cancellation; fraud resolution assistance, namely, assistance with restoring credit damaged by identity theft; providing credit reporting data maintained by others; providing reimbursement of costs associated with identity theft; financial services, namely, tracking and reporting regarding consumer credit reports and changes thereto for financial purposes
  • 38
    Telecommunications
    providing virtual private network (vpn) services, namely, private and secure electronic communications over a private or public computer network
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    application service provider, namely, providing on-line, non-downloadable software for computer and mobile device security; computer services, namely, scanning, detecting, quarantining and eliminating of viruses, threats, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; development of software for network and internet security and data encryption; electronic storage of data; computer virus protection services; software as a service featuring software for use in scanning networks and websites to detect and identify vulnerabilities and malware; identity theft protection services, namely, fraud prevention in the form of computerized and electronic monitoring of personal and financial information; technical and customer support services, namely, troubleshooting of computer software problems; providing information on protecting data and information from unauthorized use, namely, information on protection related to consumer credit, fraud and identity theft; providing information about potential computer fraud and potential online identity theft via e-mail alerts and electronic notifications in the nature of computer security services; resolution assistance, namely, providing advice and consultation in the field of computer security services for protecting data against theft and online identity theft
  • 45
    Legal services; security services for the protection of property and individuals; personal and social services rendered by others to meet the needs of individuals
    tracking and reporting regarding consumer credit reports and changes thereto for purposes of fraud detection; fraud and identity theft protection services for assisting others with replacing personal identification cards, driver's licenses, social security cards, insurance cards, checkbooks and travelers checks in the event of loss or theft
630
NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER
2021-02-16
2021-02-19
health network system security center systems international solutions care association training services home business technology gear education smart design time
2019-11-04
US
Trademark Image
The mark consists of a circle with a checkmark in the center of the circle in front of the words "NORTONLIFELOCK".
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    downloadable computer antivirus software; downloadable computer maintenance software, namely, software that identifies and removes unwanted programs; downloadable computer optimization software, namely, software that enhances computer processing power; downloadable computer software for providing computer intrusion detection and prevention; downloadable computer software for providing network, internet, and computer security; downloadable computer software for providing online identity protection and parental control; downloadable computer software for providing online transaction security; downloadable computer software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spyware, and other malware; downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable computer software to prevent, diagnose, and repair computer problems; downloadable content filtering software; downloadable computer programs for data communications applications, namely, software for enabling virtual private network (vpn), and for the encryption and authentication of electronic information; downloadable computer software for diagnosing, repairing and configuring computers, computer software and computer peripherals; downloadable computer application software for mobile phones, tablets, portable media players, and handheld computers, namely, software for use in anonymous browsing that provides secure and private access for users to the internet, software that encrypts electronic data for transmission through a secure and private connection over the internet, software that provides blocking from targeted advertising, and software for compressing data; downloadable computer software for connecting and managing remote computers, for implementing computer, software and network security measures for remote computer users; downloadable computer software for detecting identity fraud; downloadable computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable computer software for encrypting and authenticating data; downloadable computer software for encryption; downloadable computer software for providing identity security; downloadable computer software for providing cryptographic network security and data security functions; downloadable computer software for the creation of virtual private networks; downloadable computer software for use in analysis and reporting of firewall log data; downloadable computer software for use in detecting malware; downloadable computer software for use with computer servers for controlling and managing server applications; downloadable computer software for use in monitoring computers for security purposes; downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable computer software for updating other computer software; downloadable computer software for use in vulnerability scanning of networks and websites; downloadable computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the internet, as well as over other modes of communication between computing devices; downloadable computer utility software for removal of computer applications and software; downloadable electronic publications in the nature of manuals, instruction manuals, teaching manuals, and newsletters in the field of computer software and computer and on-line security; downloadable software for the creation of firewalls; downloadable fraud protection software, namely, software that provides alerts and notifications to users regarding potential identity theft, fictitious identity monitoring, and credit fraud; internet security software, namely, downloadable computer software for monitoring and controlling computer and online activity; downloadable privacy control software, namely, software for use in protecting and safeguarding online identity, privacy, data and information; downloadable utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable computer application software for mobile devices, namely, software for researching suspicious applications; downloadable software for analyzing privacy threats and detecting malware and other system vulnerabilities for computers and mobile devices; downloadable computer software for detecting, blocking, and intercepting targeted advertising; downloadable computer software for storing and retrieving login credentials securely and generating strong passwords; downloadable computer software for tracking and managing personal and private identity data entered on websites; downloadable computer software for tracking, locating, locking and wiping lost or stolen computers, tablets, mobile devices and other digital devices; downloadable computer application software for providing alerts and notifications regarding potential identity theft, and for providing tips and information concerning identity theft; downloadable computer application software for use in electronic storage of data, documents and receipts; downloadable computer application software that tracks, manages, and reports expenses, credit scores, financial account information, and commercial transactions; downloadable mobile application software that enables users to monitor for identity theft and track their credit scores; downloadable mobile application software that enables users to respond to identity theft and credit fraud alerts and to contact support service representatives by instant message or telephone for assistance in reporting and remediating the theft or fraud; downloadable mobile application software that provides alerts and notifications to users regarding potential identity theft, fictitious identity monitoring, credit fraud, dark web activity, investment account activity, home title records scanning, and court records scanning; downloadable electronic publications in the nature of user manuals and instructional guides supplied with all of the foregoing
  • 35
    Advertising; business management; business administration; office functions
    providing consumer information concerning fraud and identity theft protection services for assisting others with replacing personal identification cards, driver's licenses, social security cards, insurance cards, checkbooks and travelers checks in the event of loss or theft; business services, namely, arranging and conducting incentive reward programs to promote the sale of cybersecurity services and software; business services, namely, arranging and conducting incentive reward programs to promote the sale of fraud and identity theft protection services
  • 36
    Insurance; financial affairs; monetary affairs; real estate affairs
    credit reporting services; credit risk management and consultation services, namely, assistance with restoring and analyzing credit damaged by identity theft; credit risk management, credit risk consultation, and analyzing credit damaged by identity theft; financial services, namely, credit repair and restoration; fraud and identity theft protection services consisting of credit card and debit card cancellation services in the event of loss or theft, namely, registering credit and debit cards for cancellation; fraud resolution assistance, namely, assistance with restoring credit damaged by identity theft; providing financial advice and consultation in the field of credit reports and credit scores; providing credit reporting data maintained by others; providing financial information via a web site; providing reimbursement of costs associated with identity theft; financial services, namely, tracking and reporting regarding consumer credit reports and changes thereto for financial purposes; insurance services, namely, claims processing, consultation, and administration of insurance for mobile devices
  • 38
    Telecommunications
    providing virtual private network (vpn) services, namely, private and secure electronic communications over a private or public computer network; telecommunication services, namely, providing electronic email and push notifications and delivery of software updates via a global computer network; telecommunication services, namely, providing an online forum for developers to showcase, display, demonstrate, promote, and offer new and innovative ideas, products and services in the field of cybersecurity software applications, mobile applications, software design, and computer security software solutions and services; telecommunication services, namely, providing an on-line forum for users to provide comments and reviews of software applications, mobile applications, software design and computer security software solutions and services and cybersecurity
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer services, namely, data recovery services; computer services, namely, detection of computer viruses and computer security threats; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and internet security; computer software installation services; computer support services, namely, technical support in the nature of troubleshooting by diagnosing problems with computer software and software update services; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; computer virus protection services; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; development of software for network and internet security and data encryption; development, updating, and maintenance of software for networks and standalone computers in the fields of security, database management, and anti-virus protection and monitoring security systems; electronic monitoring of computer networks for security purposes for protecting data and information from unauthorized access; updating of computer software; electronic storage of data; computer software consultation; encryption and decryption of data and communications; identity theft protection services, namely, fraud prevention in the form of computerized and electronic monitoring of personal and financial information; on-line technical support services, namely, troubleshooting in the nature of diagnosing of computer hardware and software problems; providing authentication of website operator identity; providing information about assessing computer security relating to protecting data, preventing computer threats and design and development of computer security hardware and software applications; providing information in the field of computer network and internet information security; providing information in the field of information technology relating to communications devices, computers, computer hardware, computer software, computer peripherals, and computer networks; computer services, namely, providing search engines for obtaining data on a global computer network; providing information in the field of network and internet information security relating to protecting data and information from unauthorized access; providing security threat management systems relating to protecting information and data from unauthorized access, namely, electronic monitoring and tracking of security vulnerabilities and problems in computer software products, the internet, and computer networks; providing security threat management systems for protecting data, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the internet, and computer networks; providing technical information in the field of computer software applications; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; software as a service featuring software for use in scanning networks and websites to detect and identify vulnerabilities and malware; technical and customer support services, namely, troubleshooting of computer software problems; technical consultation in the field of computer software installation and maintenance; electronic data back-up services; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; updating of computer software for others; software as a service (saas) featuring software for storing and retrieving login credentials securely and generating strong passwords; providing information on protecting data and information from unauthorized use, namely, information on protection related to consumer credit, fraud and identity theft; software as a service (saas) services featuring software for securely backing up and archiving electronic data; cybersecurity services in the nature of restricting unauthorized access to computer systems; providing consultation and information in the field of identity theft protection featuring methods and techniques to safeguard computerized and online personal identifying information from unauthorized access
  • 45
    Legal services; security services for the protection of property and individuals; personal and social services rendered by others to meet the needs of individuals
    tracking and reporting regarding consumer credit reports and changes thereto for purposes of fraud detection; monitoring computer networks for protecting personal property; remote protection services for wireless phones and mobile computing and communication devices, namely, remotely providing device locking, device alarm activation, and provision of location information; verification of personal identity as part of personal background investigations in order to provide assistance in fraud resolution; fraud and identity theft protection services for assisting others with replacing personal identification cards, driver's licenses, social security cards, insurance cards, checkbooks and travelers checks in the event of loss or theft
688
NOTICE OF ALLOWANCE - ISSUED
2020-11-24
2021-02-18
NORTONLIFELOCK NortonLifeLock Inc.
2019-11-04
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    downloadable computer antivirus software; downloadable computer maintenance software, namely, software that identifies and removes unwanted programs; downloadable computer optimization software, namely, software that enhances computer processing power; downloadable computer software for providing computer intrusion detection and prevention; downloadable computer software for providing network, internet, and computer security; downloadable computer software for providing online identity protection and parental control; downloadable computer software for providing online transaction security; downloadable computer software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spyware, and other malware; downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable computer software to prevent, diagnose, and repair computer problems; downloadable content filtering software; downloadable computer programs for data communications applications, and for the encryption and authentication of electronic information; downloadable computer software for diagnosing, repairing and configuring computers, computer software and computer peripherals; downloadable computer application software for mobile phones, tablets, portable media players, and handheld computers, namely, software for use in anonymous browsing that provides secure and private access for users to the internet, software that encrypts electronic data for transmission through a secure and private connection over the internet, software that provides blocking from targeted advertising, and software for compressing data; downloadable computer software for connecting and managing remote computers, for implementing computer, software and network security measures for remote computer users; downloadable computer software for detecting identity fraud; downloadable computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable computer software for encrypting and authenticating data; downloadable computer software for encryption; downloadable computer software for providing identity security; downloadable computer software for providing cryptographic network security and data security functions; downloadable computer software for the creation of virtual private networks; downloadable computer software for use in analysis and reporting of firewall log data; downloadable computer software for use in detecting malware; downloadable computer software for use with computer servers for controlling and managing server applications; downloadable computer software for use in monitoring computers for security purposes; downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable computer software for updating other computer software; downloadable computer software for use in vulnerability scanning of networks and websites; downloadable computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the internet, as well as over other modes of communication between computing devices; downloadable computer utility software for removal of computer applications and software; downloadable electronic publications in the nature of manuals, instruction manuals, teaching manuals, and newsletters in the field of computer software and computer and on-line security; downloadable software for the creation of firewalls; downloadable fraud protection software, namely, software that provides alerts and notifications to users regarding potential identity theft, fictitious identity monitoring, and credit fraud; internet security software, namely, downloadable computer software for monitoring and controlling computer and online activity; downloadable privacy control software, namely, software for use in protecting and safeguarding online identity, privacy, data and information; downloadable utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable computer application software for mobile devices, namely, software for researching suspicious applications; downloadable software for analyzing privacy threats and detecting malware and other system vulnerabilities for computers and mobile devices; downloadable computer software for detecting, blocking, and intercepting targeted advertising; downloadable computer software for storing and retrieving login credentials securely and generating strong passwords; downloadable computer software for tracking and managing personal and private identity data entered on websites; downloadable computer software for tracking, locating, locking and wiping lost or stolen computers, tablets, mobile devices and other digital devices; downloadable computer application software for providing alerts and notifications regarding potential identity theft, and for providing tips and information concerning identity theft; downloadable computer application software for use in electronic storage of data, documents and receipts; downloadable computer application software that tracks, manages, and reports expenses, credit scores, financial account information, and commercial transactions; downloadable mobile application software that enables users to monitor for identity theft and track their credit scores; downloadable mobile application software that enables users to respond to identity theft and credit fraud alerts and to contact support service representatives by instant message or telephone for assistance in reporting and remediating the theft or fraud; downloadable mobile application software that provides alerts and notifications to users regarding potential identity theft, fictitious identity monitoring, credit fraud, dark web activity, investment account activity, home title records scanning, and court records scanning; downloadable electronic publications in the nature of user manuals and instructional guides supplied with all of the foregoing
  • 35
    Advertising; business management; business administration; office functions
    providing consumer information concerning fraud and identity theft protection services for assisting others with replacing personal identification cards, driver's licenses, social security cards, insurance cards, checkbooks and travelers checks in the event of loss or theft; business services, namely, arranging and conducting incentive reward programs to promote the sale of cybersecurity services and software; business services, namely, arranging and conducting incentive reward programs to promote the sale of fraud and identity theft protection services
  • 36
    Insurance; financial affairs; monetary affairs; real estate affairs
    credit reporting services; credit risk management and consultation services, namely, assistance with restoring and analyzing credit damaged by identity theft; credit risk management, credit risk consultation, and analyzing credit damaged by identity theft; financial services, namely, credit repair and restoration; fraud and identity theft protection services consisting of credit card and debit card cancellation services in the event of loss or theft, namely, registering credit and debit cards for cancellation; fraud resolution assistance, namely, assistance with restoring credit damaged by identity theft; providing financial advice and consultation in the field of credit reports and credit scores; providing credit reporting data maintained by others; providing financial information via a web site; providing reimbursement of costs associated with identity theft; financial services, namely, tracking and reporting regarding consumer credit reports and changes thereto for financial purposes; insurance services, namely, claims processing, consultation, and administration of insurance for mobile devices
  • 38
    Telecommunications
    providing virtual private network (vpn) services, namely, private and secure electronic communications over a private or public computer network; telecommunication services, namely, providing electronic email and push notifications and delivery of software updates via a global computer network; telecommunication services, namely, providing an on-line forum for developers to showcase, display, demonstrate, promote, and offer new innovative ideas, products and services in the field of cybersecurity software applications, mobile applications, software design, and computer security software solutions and services; telecommunication services, namely, providing an on-line forum for users to provide comments and reviews of software applications, mobile applications, software design and computer security software solutions and services and cybersecurity
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer services, namely, data recovery services; computer services, namely, detection of computer viruses and computer security threats; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and internet security; computer software installation services; computer support services, namely, technical support in the nature of troubleshooting by diagnosing problems with computer software and software update services; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; computer virus protection services; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; development of software for network and internet security and data encryption; development, updating, and maintenance of software for networks and standalone computers in the fields of security, database management, and anti-virus protection and monitoring security systems; electronic monitoring of computer networks for security purposes for protecting data and information from unauthorized access; updating of computer software; electronic storage of data; computer software consultation; encryption and decryption of data and communications; identity theft protection services, namely, fraud prevention in the form of computerized and electronic monitoring of personal and financial information; on-line technical support services, namely, troubleshooting in the nature of diagnosing of computer hardware and software problems; providing authentication of website operator identity; providing information about assessing computer security relating to protecting data, preventing computer threats relating to protecting data, and design and development of computer security hardware and software applications; providing information in the field of computer network and internet information security; providing information in the field of information technology relating to communications devices, computers, computer hardware, computer software, computer peripherals, and computer networks; computer services, namely, providing search engines for obtaining data on a global computer network; providing information in the field of network and internet information security relating to protecting data and information from unauthorized access; providing security threat management systems relating to protecting information and data from unauthorized access, namely, electronic monitoring and tracking of security vulnerabilities and problems in computer software products, the internet, and computer networks; providing security threat management systems for protecting data, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the internet, and computer networks; providing technical information in the field of computer software applications; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; software as a service featuring software for use in scanning networks and websites to detect and identify vulnerabilities and malware; technical and customer support services, namely, troubleshooting of computer software problems; technical consultation in the field of computer software installation and maintenance; electronic data back-up services; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; updating of computer software for others; software as a service (saas) featuring software for storing and retrieving login credentials securely and generating strong passwords; providing information on protecting data and information from unauthorized use, namely, information on protection related to consumer credit, fraud and identity theft; software as a service (saas) services featuring software for securely backing up and archiving electronic data; cybersecurity services in the nature of restricting unauthorized access to computer systems; providing consultation and information in the field of identity theft protection featuring methods and techniques to safeguard computerized and online personal identifying information from unauthorized access
  • 45
    Legal services; security services for the protection of property and individuals; personal and social services rendered by others to meet the needs of individuals
    tracking and reporting regarding consumer credit reports and changes thereto for purposes of fraud detection; monitoring computer networks for protecting personal property; remote protection services for wireless phones and mobile computing and communication devices, namely, remotely providing device locking, device alarm activation, and provision of location information; verification of personal identity as part of personal background investigations in order to provide assistance in fraud resolution; fraud and identity theft protection services for assisting others with replacing personal identification cards, driver's licenses, social security cards, insurance cards, checkbooks and travelers checks in the event of loss or theft
688
NOTICE OF ALLOWANCE - ISSUED
2020-11-24
2021-02-18
NORTONLIFELOCK NortonLifeLock Inc.
2019-11-04
US
Trademark Image
The mark consists of a circle with a checkmark in the center of the circle in front of the words "NORTONLIFELOCK".
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    downloadable computer antivirus software; downloadable computer maintenance software, namely, software that identifies and removes unwanted programs; downloadable computer optimization software, namely, software that enhances computer processing power; downloadable computer software for providing computer intrusion detection and prevention; downloadable computer software for providing network, internet, and computer security; downloadable computer software for providing online identity protection and parental control; downloadable computer software for providing online transaction security; downloadable computer software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spyware, and other malware; downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable computer software to prevent, diagnose, and repair computer problems; downloadable content filtering software; downloadable computer programs for data communications applications, namely, software for enabling virtual private network (vpn), and for the encryption and authentication of electronic information; downloadable computer software for diagnosing, repairing and configuring computers, computer software and computer peripherals; downloadable computer application software for mobile phones, tablets, portable media players, and handheld computers, namely, software for use in anonymous browsing that provides secure and private access for users to the internet, software that encrypts electronic data for transmission through a secure and private connection over the internet, software that provides blocking from targeted advertising, and software for compressing data; downloadable computer software for connecting and managing remote computers, for implementing computer, software and network security measures for remote computer users; downloadable computer software for detecting identity fraud; downloadable computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable computer software for encrypting and authenticating data; downloadable computer software for encryption; downloadable computer software for providing identity security; downloadable computer software for providing cryptographic network security and data security functions; downloadable computer software for the creation of virtual private networks; downloadable computer software for use in analysis and reporting of firewall log data; downloadable computer software for use in detecting malware; downloadable computer software for use with computer servers for controlling and managing server applications; downloadable computer software for use in monitoring computers for security purposes; downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable computer software for updating other computer software; downloadable computer software for use in vulnerability scanning of networks and websites; downloadable computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the internet, as well as over other modes of communication between computing devices; downloadable computer utility software for removal of computer applications and software; downloadable electronic publications in the nature of manuals, instruction manuals, teaching manuals, and newsletters in the field of computer software and computer and on-line security; downloadable software for the creation of firewalls; downloadable fraud protection software, namely, software that provides alerts and notifications to users regarding potential identity theft, fictitious identity monitoring, and credit fraud; internet security software, namely, downloadable computer software for monitoring and controlling computer and online activity; downloadable privacy control software, namely, software for use in protecting and safeguarding online identity, privacy, data and information; downloadable utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable computer application software for mobile devices, namely, software for researching suspicious applications; downloadable software for analyzing privacy threats and detecting malware and other system vulnerabilities for computers and mobile devices; downloadable computer software for detecting, blocking, and intercepting targeted advertising; downloadable computer software for storing and retrieving login credentials securely and generating strong passwords; downloadable computer software for tracking and managing personal and private identity data entered on websites; downloadable computer software for tracking, locating, locking and wiping lost or stolen computers, tablets, mobile devices and other digital devices; downloadable computer application software for providing alerts and notifications regarding potential identity theft, and for providing tips and information concerning identity theft; downloadable computer application software for use in electronic storage of data, documents and receipts; downloadable computer application software that tracks, manages, and reports expenses, credit scores, financial account information, and commercial transactions; downloadable mobile application software that enables users to monitor for identity theft and track their credit scores; downloadable mobile application software that enables users to respond to identity theft and credit fraud alerts and to contact support service representatives by instant message or telephone for assistance in reporting and remediating the theft or fraud; downloadable mobile application software that provides alerts and notifications to users regarding potential identity theft, fictitious identity monitoring, credit fraud, dark web activity, investment account activity, home title records scanning, and court records scanning; downloadable electronic publications in the nature of user manuals and instructional guides supplied with all of the foregoing
  • 35
    Advertising; business management; business administration; office functions
    providing consumer information concerning fraud and identity theft protection services for assisting others with replacing personal identification cards, driver's licenses, social security cards, insurance cards, checkbooks and travelers checks in the event of loss or theft; business services, namely, arranging and conducting incentive reward programs to promote the sale of cybersecurity services and software; business services, namely, arranging and conducting incentive reward programs to promote the sale of fraud and identity theft protection services
  • 36
    Insurance; financial affairs; monetary affairs; real estate affairs
    credit reporting services; credit risk management and consultation services, namely, assistance with restoring and analyzing credit damaged by identity theft; credit risk management, credit risk consultation, and analyzing credit damaged by identity theft; financial services, namely, credit repair and restoration; fraud and identity theft protection services consisting of credit card and debit card cancellation services in the event of loss or theft, namely, registering credit and debit cards for cancellation; fraud resolution assistance, namely, assistance with restoring credit damaged by identity theft; providing financial advice and consultation in the field of credit reports and credit scores; providing credit reporting data maintained by others; providing financial information via a web site; providing reimbursement of costs associated with identity theft; financial services, namely, tracking and reporting regarding consumer credit reports and changes thereto for financial purposes; insurance services, namely, claims processing, consultation, and administration of insurance for mobile devices
  • 38
    Telecommunications
    providing virtual private network (vpn) services, namely, private and secure electronic communications over a private or public computer network; telecommunication services, namely, providing electronic email and push notifications and delivery of software updates via a global computer network; telecommunication services, namely, providing an online forum for developers to showcase, display, demonstrate, promote, and offer new and innovative ideas, products and services in the field of cybersecurity software applications, mobile applications, software design, and computer security software solutions and services; telecommunication services, namely, providing an on-line forum for users to provide comments and reviews of software applications, mobile applications, software design and computer security software solutions and services and cybersecurity
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer services, namely, data recovery services; computer services, namely, detection of computer viruses and computer security threats; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and internet security; computer software installation services; computer support services, namely, technical support in the nature of troubleshooting by diagnosing problems with computer software and software update services; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; computer virus protection services; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; development of software for network and internet security and data encryption; development, updating, and maintenance of software for networks and standalone computers in the fields of security, database management, and anti-virus protection and monitoring security systems; electronic monitoring of computer networks for security purposes for protecting data and information from unauthorized access; updating of computer software; electronic storage of data; computer software consultation; encryption and decryption of data and communications; identity theft protection services, namely, fraud prevention in the form of computerized and electronic monitoring of personal and financial information; on-line technical support services, namely, troubleshooting in the nature of diagnosing of computer hardware and software problems; providing authentication of website operator identity; providing information about assessing computer security relating to protecting data, preventing computer threats and design and development of computer security hardware and software applications; providing information in the field of computer network and internet information security; providing information in the field of information technology relating to communications devices, computers, computer hardware, computer software, computer peripherals, and computer networks; computer services, namely, providing search engines for obtaining data on a global computer network; providing information in the field of network and internet information security relating to protecting data and information from unauthorized access; providing security threat management systems relating to protecting information and data from unauthorized access, namely, electronic monitoring and tracking of security vulnerabilities and problems in computer software products, the internet, and computer networks; providing security threat management systems for protecting data, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the internet, and computer networks; providing technical information in the field of computer software applications; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; software as a service featuring software for use in scanning networks and websites to detect and identify vulnerabilities and malware; technical and customer support services, namely, troubleshooting of computer software problems; technical consultation in the field of computer software installation and maintenance; electronic data back-up services; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; updating of computer software for others; software as a service (saas) featuring software for storing and retrieving login credentials securely and generating strong passwords; providing information on protecting data and information from unauthorized use, namely, information on protection related to consumer credit, fraud and identity theft; software as a service (saas) services featuring software for securely backing up and archiving electronic data; cybersecurity services in the nature of restricting unauthorized access to computer systems; providing consultation and information in the field of identity theft protection featuring methods and techniques to safeguard computerized and online personal identifying information from unauthorized access
  • 45
    Legal services; security services for the protection of property and individuals; personal and social services rendered by others to meet the needs of individuals
    tracking and reporting regarding consumer credit reports and changes thereto for purposes of fraud detection; monitoring computer networks for protecting personal property; remote protection services for wireless phones and mobile computing and communication devices, namely, remotely providing device locking, device alarm activation, and provision of location information; verification of personal identity as part of personal background investigations in order to provide assistance in fraud resolution; fraud and identity theft protection services for assisting others with replacing personal identification cards, driver's licenses, social security cards, insurance cards, checkbooks and travelers checks in the event of loss or theft
688
NOTICE OF ALLOWANCE - ISSUED
2020-11-24
2021-02-18
NORTONLIFELOCK NortonLifeLock Inc.
2019-11-04
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    downloadable computer antivirus software; downloadable computer maintenance software, namely, software that identifies and removes unwanted programs; downloadable computer optimization software, namely, software that enhances computer processing power; downloadable computer software for providing computer intrusion detection and prevention; downloadable computer software for providing network, internet, and computer security; downloadable computer software for providing online identity protection and parental control; downloadable computer software for providing online transaction security; downloadable computer software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spyware, and other malware; downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable computer software to prevent, diagnose, and repair computer problems; downloadable content filtering software; downloadable computer programs for data communications applications, and for the encryption and authentication of electronic information; downloadable computer software for diagnosing, repairing and configuring computers, computer software and computer peripherals; downloadable computer application software for mobile phones, tablets, portable media players, and handheld computers, namely, software for use in anonymous browsing that provides secure and private access for users to the internet, software that encrypts electronic data for transmission through a secure and private connection over the internet, software that provides blocking from targeted advertising, and software for compressing data; downloadable computer software for connecting and managing remote computers, for implementing computer, software and network security measures for remote computer users; downloadable computer software for detecting identity fraud; downloadable computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable computer software for encrypting and authenticating data; downloadable computer software for encryption; downloadable computer software for providing identity security; downloadable computer software for providing cryptographic network security and data security functions; downloadable computer software for the creation of virtual private networks; downloadable computer software for use in analysis and reporting of firewall log data; downloadable computer software for use in detecting malware; downloadable computer software for use with computer servers for controlling and managing server applications; downloadable computer software for use in monitoring computers for security purposes; downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable computer software for updating other computer software; downloadable computer software for use in vulnerability scanning of networks and websites; downloadable computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the internet, as well as over other modes of communication between computing devices; downloadable computer utility software for removal of computer applications and software; downloadable electronic publications in the nature of manuals, instruction manuals, teaching manuals, and newsletters in the field of computer software and computer and on-line security; downloadable software for the creation of firewalls; downloadable fraud protection software, namely, software that provides alerts and notifications to users regarding potential identity theft, fictitious identity monitoring, and credit fraud; internet security software, namely, downloadable computer software for monitoring and controlling computer and online activity; downloadable privacy control software, namely, software for use in protecting and safeguarding online identity, privacy, data and information; downloadable utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable computer application software for mobile devices, namely, software for researching suspicious applications; downloadable software for analyzing privacy threats and detecting malware and other system vulnerabilities for computers and mobile devices; downloadable computer software for detecting, blocking, and intercepting targeted advertising; downloadable computer software for storing and retrieving login credentials securely and generating strong passwords; downloadable computer software for tracking and managing personal and private identity data entered on websites; downloadable computer software for tracking, locating, locking and wiping lost or stolen computers, tablets, mobile devices and other digital devices; downloadable computer application software for providing alerts and notifications regarding potential identity theft, and for providing tips and information concerning identity theft; downloadable computer application software for use in electronic storage of data, documents and receipts; downloadable computer application software that tracks, manages, and reports expenses, credit scores, financial account information, and commercial transactions; downloadable mobile application software that enables users to monitor for identity theft and track their credit scores; downloadable mobile application software that enables users to respond to identity theft and credit fraud alerts and to contact support service representatives by instant message or telephone for assistance in reporting and remediating the theft or fraud; downloadable mobile application software that provides alerts and notifications to users regarding potential identity theft, fictitious identity monitoring, credit fraud, dark web activity, investment account activity, home title records scanning, and court records scanning; downloadable electronic publications in the nature of user manuals and instructional guides supplied with all of the foregoing
  • 35
    Advertising; business management; business administration; office functions
    providing consumer information concerning fraud and identity theft protection services for assisting others with replacing personal identification cards, driver's licenses, social security cards, insurance cards, checkbooks and travelers checks in the event of loss or theft; business services, namely, arranging and conducting incentive reward programs to promote the sale of cybersecurity services and software; business services, namely, arranging and conducting incentive reward programs to promote the sale of fraud and identity theft protection services
  • 36
    Insurance; financial affairs; monetary affairs; real estate affairs
    credit reporting services; credit risk management and consultation services, namely, assistance with restoring and analyzing credit damaged by identity theft; credit risk management, credit risk consultation, and analyzing credit damaged by identity theft; financial services, namely, credit repair and restoration; fraud and identity theft protection services consisting of credit card and debit card cancellation services in the event of loss or theft, namely, registering credit and debit cards for cancellation; fraud resolution assistance, namely, assistance with restoring credit damaged by identity theft; providing financial advice and consultation in the field of credit reports and credit scores; providing credit reporting data maintained by others; providing financial information via a web site; providing reimbursement of costs associated with identity theft; financial services, namely, tracking and reporting regarding consumer credit reports and changes thereto for financial purposes; insurance services, namely, claims processing, consultation, and administration of insurance for mobile devices
  • 38
    Telecommunications
    providing virtual private network (vpn) services, namely, private and secure electronic communications over a private or public computer network; telecommunication services, namely, providing electronic email and push notifications and delivery of software updates via a global computer network; telecommunication services, namely, providing an on-line forum for developers to showcase, display, demonstrate, promote, and offer new innovative ideas, products and services in the field of cybersecurity software applications, mobile applications, software design, and computer security software solutions and services; telecommunication services, namely, providing an on-line forum for users to provide comments and reviews of software applications, mobile applications, software design and computer security software solutions and services and cybersecurity
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer services, namely, data recovery services; computer services, namely, detection of computer viruses and computer security threats; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and internet security; computer software installation services; computer support services, namely, technical support in the nature of troubleshooting by diagnosing problems with computer software and software update services; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; computer virus protection services; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; development of software for network and internet security and data encryption; development, updating, and maintenance of software for networks and standalone computers in the fields of security, database management, and anti-virus protection and monitoring security systems; electronic monitoring of computer networks for security purposes for protecting data and information from unauthorized access; updating of computer software; electronic storage of data; computer software consultation; encryption and decryption of data and communications; identity theft protection services, namely, fraud prevention in the form of computerized and electronic monitoring of personal and financial information; on-line technical support services, namely, troubleshooting in the nature of diagnosing of computer hardware and software problems; providing authentication of website operator identity; providing information about assessing computer security relating to protecting data, preventing computer threats relating to protecting data, and design and development of computer security hardware and software applications; providing information in the field of computer network and internet information security; providing information in the field of information technology relating to communications devices, computers, computer hardware, computer software, computer peripherals, and computer networks; computer services, namely, providing search engines for obtaining data on a global computer network; providing information in the field of network and internet information security relating to protecting data and information from unauthorized access; providing security threat management systems relating to protecting information and data from unauthorized access, namely, electronic monitoring and tracking of security vulnerabilities and problems in computer software products, the internet, and computer networks; providing security threat management systems for protecting data, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the internet, and computer networks; providing technical information in the field of computer software applications; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; software as a service featuring software for use in scanning networks and websites to detect and identify vulnerabilities and malware; technical and customer support services, namely, troubleshooting of computer software problems; technical consultation in the field of computer software installation and maintenance; electronic data back-up services; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; updating of computer software for others; software as a service (saas) featuring software for storing and retrieving login credentials securely and generating strong passwords; providing information on protecting data and information from unauthorized use, namely, information on protection related to consumer credit, fraud and identity theft; software as a service (saas) services featuring software for securely backing up and archiving electronic data; cybersecurity services in the nature of restricting unauthorized access to computer systems; providing consultation and information in the field of identity theft protection featuring methods and techniques to safeguard computerized and online personal identifying information from unauthorized access
  • 45
    Legal services; security services for the protection of property and individuals; personal and social services rendered by others to meet the needs of individuals
    tracking and reporting regarding consumer credit reports and changes thereto for purposes of fraud detection; monitoring computer networks for protecting personal property; remote protection services for wireless phones and mobile computing and communication devices, namely, remotely providing device locking, device alarm activation, and provision of location information; verification of personal identity as part of personal background investigations in order to provide assistance in fraud resolution; fraud and identity theft protection services for assisting others with replacing personal identification cards, driver's licenses, social security cards, insurance cards, checkbooks and travelers checks in the event of loss or theft
688
NOTICE OF ALLOWANCE - ISSUED
2020-11-24
2021-02-18
NORTONLIFELOCK NortonLifeLock Inc.
First 1 Last  1 of 1
NEED HELP? Chat with us online

Copyright 2008 - 2024 Applied Marks Pty Ltd (ACN 134 698 249). All rights reserved. Terms of Service, Privacy Policy and Acceptable Use Policy.