undefined
EUTM file information

018247940

RISKRECON


June 1, 2020

Trademark Summary

The trademark application RISKRECON was filed by Mastercard International Incorporated, a U.S. corporation (the "Applicant"). The application was published for oppositions on June 22, 2020, and it was registered by office on September 29, 2020 without any oppositions.

The application was filed in English (German was selected as the second language).


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Computer hardware, software and peripherals including mobile devices and application, namely, cell phones and software for cell phones in the nature of software for ensuring the security of financial transactions
    2. Computer software for encrypting and protecting the integrity of data and electronic communications over computer networks: computer software for implementing encryption, authentication, access control and other security features within computer networks and through external connections: computer software, namely, mobile devices software and applications for biometric systems for the identification and authentication of persons
    3. Computer software for implementing security methodology involving encryption of payment card numbers and related data and transmission over computer networks
    4. Computer hardware and software platform for facilitating and administering payment, banking, credit card, debit card, payment card, automatic teller machine, stored value, electronic funds transfer, electronic payments, electronic processing and transmission of bill payment data, cash disbursement, transaction authentication, routing, authorization and settlement services, fraud detection and control, disaster recovery and encryption services
    5. Computer software and hardware that facilitates the identification and authentication of near field communication (NFC) devices and radio frequency identification (RFID) devices
    6. Apparatus for tracking, management and analysis of financial accounts via a global computer network
    7. Computer hardware and software, in particular for the development, maintenance and use of local and wide area computer networks
    8. Computer hardware and software for facilitating payment transactions by electronic means over wireless networks, global computer networks and/or mobile telecommunications devices
    9. Computer hardware and encryption software, encryption keys, digital certificates, digital signatures, software for secure data storage and retrieval and transmission of confidential customer information used by individuals, banking and financial institutions
    10. Computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks
    11. Computer software for biometric systems for the identification and authentication of persons
    12. Computer software for encrypting and protecting the integrity of data and electronic communications over computer networks
    13. Computer software for implementing encryption, authentification, access control and other security features within computer networks and through external connections
    14. Computer software for use in analysis and reporting of firewall log data.
  • The mark was filed in class 42 with following description of goods:
    1. Information technology and computer network security consultancy services, namely, scanning networks to assess information security vulnerability
    2. Fraud and identity theft services, namely, personal information and financial identity monitoring, namely, electronic monitoring of potential identity theft via scans of the dark web, chat rooms, forums and online databases to detect personally identifiable information
    3. Monitoring the internet and public records to facilitate the detection and prevention of identity theft and fraud by identifying personally identifiable information
    4. Computer network security and management services, namely, providing on-line security for electronic transmitted credit card transactions
    5. Consulting services in the field of authentication services for credit cards, debit cards, and prepaid cards utilizing mobile devices and applications and biometric systems
    6. Authentication services for credit cards, debit cards, and prepaid cards utilizing mobile devices and applications and biometric systems, namely, providing user authentication services using biometric hardware and software technology in e-commerce transactions
    7. Design, development, maintenance and update of computer software
    8. Data encryption and decryption of financial information
    9. Digital signature authentication services for authentication of others, namely, data encryption and data integrity
    10. Providing for others encrypted and digitally signed and authenticated data for use in issuance, and validation of digital certificates in the field of document authentication
    11. Digital certificate verification, authentication, issuance, distribution and management
    12. Technical consultation services in the fields of computer programming, financial computer networks, data processing, secure communications, data encryption and decryption and local area network security
    13. Computer and Internet related services, namely, providing on-line electronic databases via a global computer network in the field of identity authentication and verification, payment cards, fraud and risk management, and banking
    14. Software as a service [SaaS]
    15. Electronic monitoring of personally identifying information to detect identity theft via the internet
    16. Computer network security and management services
    17. Computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security
    18. Security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability
    19. Authentication services, namely, providing user and identity authentication services using software and hardware technology
    20. Providing authentication of identity
    21. Development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware, computer networks, and websites
    22. Development, integration and operation of computer systems to support issuance and management of digital certificates.