undefined
EUTM file information

018700646

SURFEASY


May 9, 2022

Trademark Summary

The trademark application SURFEASY was filed by Gen Digital Inc., a U.S. corporation (the "Applicant"). The application was published for oppositions on July 24, 2022, and it was registered by office on October 31, 2022 without any oppositions.

The application was filed in English (Italian was selected as the second language).

Change of name and address of the trademark registration was recorded on October 25, 2023. Change of name and professional address of the trademark registration was recorded on August 6, 2024.


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. USB computer access control key
    2. Downloadable virtual private network (VPN) operating software
    3. Downloadable computer software for use as a virtual private network (VPN)
    4. Downloadable mobile applications for use as a virtual private network (VPN)
    5. Downloadable software in the nature of a mobile application for use as a virtual private network (VPN)
    6. Virtual private network (VPN) operating hardware
    7. Downloadable computer software for encryption
    8. Downloadable computer software for secure network operations.
  • The mark was filed in class 38 with following description of goods:
    1. Providing virtual private network (VPN) services, namely, private and secure electronic communications over a private or public computer network
    2. Telecommunication services, namely, providing electronic email and push notifications and delivery of software updates via a global computer network
    3. Telecommunication services, namely, providing an on-line forum for users to provide comments and reviews of software applications, mobile applications, software design and computer security software solutions and services and cybersecurity.
  • The mark was filed in class 42 with following description of goods:
    1. Computer services, namely, detection of computer viruses and computer security threats
    2. Computer services, namely, data recovery services
    3. Computer software installation services
    4. Computer support services, namely, technical support in the nature of troubleshooting by diagnosing problems with computer software and software update services
    5. Computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks
    6. Computer virus protection services
    7. Development, updating, and maintenance of software for networks and standalone computers in the fields of security, and anti-virus protection and monitoring
    8. Electronic monitoring of computer networks for security purposes for protecting data and information from unauthorized access
    9. Updating of computer software
    10. Electronic storage of data
    11. Computer software consultation
    12. Encryption and decryption of data and communications
    13. Identity theft protection services, namely, fraud prevention in the form of computerized and electronic monitoring of personal and financial information
    14. On-line technical support services, namely, troubleshooting in the nature of diagnosing of computer hardware and software problems
    15. Providing information about assessing computer security relating to protecting data, preventing computer threats relating to protecting data, and design and development of computer security hardware and software applications
    16. Providing information in the field of computer network and Internet information security
    17. Providing information in the field of information technology relating to communications devices, computers, computer hardware, computer software, computer peripherals, and computer networks
    18. Computer services, namely, providing search engines for obtaining data on a global computer network
    19. Providing information in the field of network and Internet information security relating to protecting data and information from unauthorized access
    20. Providing security threat management systems relating to protecting information and data from unauthorized access, namely, electronic monitoring and tracking of security vulnerabilities and problems in computer software products, the Internet, and computer networks
    21. Providing security threat management systems for protecting data, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the Internet, and computer networks
    22. Providing technical information in the field of computer software applications
    23. Hosting a secure interactive website that features technology that enables the sending of notifications of potential fraud and potential identity theft
    24. Software as a service featuring software for use in scanning networks and websites to detect and identify vulnerabilities and malware
    25. Technical and customer support services, namely, troubleshooting of computer software problems
    26. Technical consultation in the field of computer software installation and maintenance
    27. Electronic data back-up services
    28. Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems
    29. Updating of computer software for others
    30. Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates
    31. Providing online non-downloadable software that provides alerts and notifications to users regarding potential identity theft, fictitious identity monitoring, credit fraud, dark web activity, gaming account credential theft, investment account activity, social media account takeovers, phone number takeovers, home title records scanning, and court records scanning
    32. Software as a service (SaaS) featuring software for storing and retrieving login credentials securely and generating strong passwords
    33. Providing computer security information on protecting data and information from unauthorized use, namely, information on protection related to consumer credit, fraud and identity theft
    34. Software as a service (SaaS) services featuring software for securely backing up and archiving electronic data
    35. Cybersecurity services in the nature of restricting unauthorized access to computer systems
    36. Providing computer security consultation and information in the field of identity theft protection featuring methods and techniques to safeguard computerized and online personal identifying information from unauthorized access
    37. Data encryption services
    38. Providing online non-downloadable software for use providing network, Internet, and computer security
    39. Providing online non-downloadable software for use in anonymous browsing, encryption, antitracking protection, network protection, privacy protection, data compression, and data leakage prevention
    40. Consumer data security threat analysis, namely, monitoring public reports concerning larger scale consumer data security breaches for fraud protection purposes via the internet
    41. Providing online non-downloadable software for mining virtual currencies or virtual assets via the Internet
    42. Computer security services for cryptocurrency mining via the Internet, namely, data encryption services
    43. Computer programming services, namely, programming computer software for cryptocurrency mining and blockchain purposes
    44. Computer maintenance services, namely, maintenance of computer software for cryptocurrency mining and blockchain purposes
    45. Providing online non-downloadable computer software for use as an electronic wallet to allow users to store and transfer virtual currency and cryptocurrency
    46. Electronic data storage, namely, storage of virtual currency and cryptocurrency
    47. Providing user authentication services using blockchain-based software technology for cryptocurrency transactions
    48. Authentication of data in the field of cryptocurrency using blockchain technology
    49. Providing online non-downloadable cryptocurrency mining pool software
    50. Cloud-based mining of cryptocurrency for others, namely, cryptocurrency mining pool services in the nature of online non-downloadable software for cryptocurrency mining
    51. Computer services, namely, providing temporary use of online non-downloadable software that allows others to share computing processing power over a network
    52. Hosting computer software for use by others in the field of cryptocurrency mining, namely, software allowing users to verify cryptocurrency transactions for others in order to generate cryptocurrency.