EUTM file information

018275007

SECURE RESET


July 19, 2020

Trademark Summary

The trademark application SECURE RESET was filed by Fortra, LLC, a Limited Liability Company (the "Applicant"). Application refused.

The application was filed in English (Italian was selected as the second language).

Change of name and address of the trademark registration was recorded on July 26, 2020.

The Refusal with reference B 018275007 was Rejected according to Article 7(1)(b) EUTMR with decision issued on February 8, 2021 by the EUIPO.


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks
    2. Computer software for authentication, access control and other security features within computer networks and through external connections
    3. Computer software for implementing security methodology involving encryption of payment card numbers over a global computer network
    4. Computer software for use to compile, manage, encrypt and store personal information
    5. Computer software for use to access, collect and modify network user identification
    6. Computer software for workflow, helpdesk and network security management
    7. Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks
    8. Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks
    9. Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications
    10. Computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks
    11. Computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization
    12. Computer software for registering and authenticating digital certificates
    13. Computer software for accessing, creating and modifying network user identification information
    14. Computer software for workflow management, help desk management, and network security
    15. Computer software which provides analysis of data being accessed within a network
    16. Computer software which enables users of other computer products to access and use customer help and customer support functions
    17. Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products
    18. Software as a service (saas) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information
    19. Providing temporary use of online computer software for use to access, collect and modify network user identification
    20. Providing temporary use of online computer software for workflow, helpdesk and network security management
    21. Providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks
    22. And to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks
    23. Providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications
    24. Providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks
    25. Providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization
    26. Providing temporary use of online computer software for registering and authenticating digital certificates
    27. Providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security
    28. Providing temporary use of online computer software which provides analysis of data being accessed within a network.