The trademark application secinso was filed by SecXtreme GmbH, a corporation established under the laws of the Federal Republic of Germany (the "Applicant"). The application was published for oppositions on August 20, 2015, and it was registered by office on November 29, 2015 without any oppositions.
The application was filed in German (English was selected as the second language).
The renewal of the trademark was recorded by the office on December 9, 2024.
Appointment and Replacement of representative of the trademark registration was recorded on March 29, 2017. Change of name and professional address of the trademark registration was recorded on December 8, 2020. Appointment and Replacement of representative of the trademark registration was recorded on January 4, 2021.
Goods And Services
The mark was filed in class 9 with following description of goods:
Apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity
Information technology and audiovisual equipment
Apparatus, instruments and cables for electricity
Electric and electronic apparatus for security solutions in the field of information technology, included in class 9
Electric and electronic components, in particular for security solutions in the field of information technology, included in class 9
Data processing equipment, in particular for security solutions in the field of information technology, included in class 9
Computer hardware for preventing hacking into computers, networks, data processing systems, computer hardware for detecting hacker attacks, for tracing hacker attacks, for detecting weak spots in data processing systems
Computer hardware for detecting and protecting against viruses, worms, trojans and similar malware
Computer hardware for security management in information technology
Computer modules and computer parts, in particular for computer, network and data processing security
Computer modules and computer parts for detecting hacker attacks, for tracing hacker attacks, for detecting weak spots in data processing systems
Computer servers, in particular for security solutions in the field of information technology, included in class 9
Computer software, in particular for security solutions in the field of information technology
Computer software for securing computers, networks, data processing systems
Computer software for preventing hacking into computers, networks, data processing systems
Computer software for detecting hacker attacks, for tracing hacker attacks, for detecting weak spots in data processing systems
Computer software for detecting and protecting against viruses, worms, trojans and similar malware
Computer software for security management in information technology
Interactive computer hardware and computer software for security solutions in the field of information technology
Compact discs, DVDs and other digital recording media with software recorded thereon, in particular for security solutions in the field of information technology.
The mark was filed in class 35 with following description of goods:
Advertising, marketing and promotional services
Commercial services and consumer information, namely brokerage, organising business contacts, collective buying, commercial evaluation, import and export, negotiation and brokerage, ordering, price comparison, procurement services, for others
Retailing and wholesaling in relation to information technology and audiovisual apparatus, electric and electronic apparatus for security solutions in the field of information technology, electric and electronic components, data processing equipment, computer software, compact discs, DVDs and other digital recording media with software recorded thereon
Business assistance, management and administrative services
Business administration
Office functions
Business analysis, research and information services.
The mark was filed in class 37 with following description of goods:
Installation, maintenance, repair of electric and electronic equipment, in particular in the field of computer, network and data processing security
Installation, assembly, maintenance and repair of computer hardware, in particular for security solutions in the field of information technology
Installation, assembly, maintenance and repair of computer hardware for preventing hacking into computers, networks, data processing systems
Installation, assembly, maintenance and repair of computer hardware for detecting hacker attacks, for tracing hacker attacks, for detecting weak spots in data processing systems
Installation, assembly, maintenance and repair of computer hardware for detecting and protecting against viruses, worms, trojans and similar malware
Installation, maintenance and repair of computers
Installation, maintenance and repair of computer systems, in particular for security solutions in the field of information technology
Installation, maintenance and repair of security systems for computer, network and data processing security
Installation, maintenance and repair of security systems for detecting hacker attacks, for tracing hacker attacks, for detecting weak spots in data processing systems
Installation, maintenance and repair of security systems for detecting and protecting against viruses, worms, trojans and similar malware
Installation services and maintenance in the field of computer, network and data processing security.
The mark was filed in class 38 with following description of goods:
Electronic communications, in particular via digital networks
Telecommunication services, In particular internet-based telecommunications
Computer communication and Internet access
Data transmission, in particular via digital networks
Information transmission services via digital networks
Interactive broadcasting and communications services
Transmission of digital files
Electronic transmission of computer programs via digital networks
Providing access to web sites on the internet
Providing access to electronic communications networks and electronic databases
Communications services for accessing a data-base
Data bank interconnection services.
The mark was filed in class 41 with following description of goods:
Providing of training, in particular in the field of computer, network and data processing security
Providing of training in relation to the detection of hacker attacks, the tracing of hacker attacks, the detection of weak spots in data processing systems
Providing of training in relation to security management in information technology
Arranging and conducting of training courses, courses, seminars, workshops, lectures, in particular in the field of computer, network and data processing security
Arranging and conducting of training courses, courses, seminars, workshops, lectures in relation to the detection of hacker attacks, the tracing of hacker attacks, the detection of weak spots in data processing systems
Sporting and cultural activities.
The mark was filed in class 42 with following description of goods:
Scientific and technological services and research and design relating thereto, In particular in the field of computer, network and data processing security
Industrial analysis and research services, in particular in the field of computer, network and data processing security
Consultancy in the field of computer hardware and computer software, in particular in relation to security solutions in the field of information technology
Professional consultancy relating to computer security
IT security, protection and restoration
Development of technologies for the protection of electronic networks
Design services relating to the creation of networks
Provision of security services for computer networks, computer access and computerised transactions
Technological security testing, in particular in the field of computer, network and data processing security
Monitoring of network systems
Design and development of computer hardware and software, in particular for computer, network and data processing security
Design and development of computer hardware and software for detecting hacker attacks, for tracing hacker attacks, for detecting weak spots in data processing systems
Design and development of computer hardware and software for detecting and protecting against viruses, worms, trojans and similar malware
Statements, Implementation, The installation, Servicing, Care, Updating and Adaptation of software, In particular in the field of computer, network and data processing security
Creating, implementing, installation, maintenance, upkeep, updating and adapting of software for detecting and protecting against viruses, worms, trojans and similar malware
Implementation of computer programs on networks
Computer software technical support services
Software customisation services, In particular in the field of computer, network and data processing security
Technical project studies, In particular in the field of computer, network and data processing security
Technical project planning and technical project management, in particular in the field of computer, network and data processing security
Technical project planning and technical project management for preventing hacking into computers, networks and data processing systems
Technical project planning and technical project management for detecting hacker attacks, for tracing hacker attacks, for detecting weak spots in data processing systems.