The trademark application SURFEASY was filed by Gen Digital Inc., a U.S. corporation (the "Applicant"). The application was published for oppositions on July 24, 2022, and it was registered by office on October 31, 2022 without any oppositions.
The application was filed in English (Italian was selected as the second language).
Change of name and address of the trademark registration was recorded on October 25, 2023. Change of name and professional address of the trademark registration was recorded on August 6, 2024.
Goods And Services
The mark was filed in class 9 with following description of goods:
Downloadable computer software for use as a virtual private network (VPN)
Downloadable mobile applications for use as a virtual private network (VPN)
Downloadable software in the nature of a mobile application for use as a virtual private network (VPN)
Virtual private network (VPN) operating hardware
Downloadable computer software for encryption
Downloadable computer software for secure network operations.
The mark was filed in class 38 with following description of goods:
Providing virtual private network (VPN) services, namely, private and secure electronic communications over a private or public computer network
Telecommunication services, namely, providing electronic email and push notifications and delivery of software updates via a global computer network
Telecommunication services, namely, providing an on-line forum for users to provide comments and reviews of software applications, mobile applications, software design and computer security software solutions and services and cybersecurity.
The mark was filed in class 42 with following description of goods:
Computer services, namely, detection of computer viruses and computer security threats
Computer services, namely, data recovery services
Computer software installation services
Computer support services, namely, technical support in the nature of troubleshooting by diagnosing problems with computer software and software update services
Computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks
Computer virus protection services
Development, updating, and maintenance of software for networks and standalone computers in the fields of security, and anti-virus protection and monitoring
Electronic monitoring of computer networks for security purposes for protecting data and information from unauthorized access
Updating of computer software
Electronic storage of data
Computer software consultation
Encryption and decryption of data and communications
Identity theft protection services, namely, fraud prevention in the form of computerized and electronic monitoring of personal and financial information
On-line technical support services, namely, troubleshooting in the nature of diagnosing of computer hardware and software problems
Providing information about assessing computer security relating to protecting data, preventing computer threats relating to protecting data, and design and development of computer security hardware and software applications
Providing information in the field of computer network and Internet information security
Providing information in the field of information technology relating to communications devices, computers, computer hardware, computer software, computer peripherals, and computer networks
Computer services, namely, providing search engines for obtaining data on a global computer network
Providing information in the field of network and Internet information security relating to protecting data and information from unauthorized access
Providing security threat management systems relating to protecting information and data from unauthorized access, namely, electronic monitoring and tracking of security vulnerabilities and problems in computer software products, the Internet, and computer networks
Providing security threat management systems for protecting data, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the Internet, and computer networks
Providing technical information in the field of computer software applications
Hosting a secure interactive website that features technology that enables the sending of notifications of potential fraud and potential identity theft
Software as a service featuring software for use in scanning networks and websites to detect and identify vulnerabilities and malware
Technical and customer support services, namely, troubleshooting of computer software problems
Technical consultation in the field of computer software installation and maintenance
Electronic data back-up services
Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems
Updating of computer software for others
Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates
Providing online non-downloadable software that provides alerts and notifications to users regarding potential identity theft, fictitious identity monitoring, credit fraud, dark web activity, gaming account credential theft, investment account activity, social media account takeovers, phone number takeovers, home title records scanning, and court records scanning
Software as a service (SaaS) featuring software for storing and retrieving login credentials securely and generating strong passwords
Providing computer security information on protecting data and information from unauthorized use, namely, information on protection related to consumer credit, fraud and identity theft
Software as a service (SaaS) services featuring software for securely backing up and archiving electronic data
Cybersecurity services in the nature of restricting unauthorized access to computer systems
Providing computer security consultation and information in the field of identity theft protection featuring methods and techniques to safeguard computerized and online personal identifying information from unauthorized access
Data encryption services
Providing online non-downloadable software for use providing network, Internet, and computer security
Providing online non-downloadable software for use in anonymous browsing, encryption, antitracking protection, network protection, privacy protection, data compression, and data leakage prevention
Consumer data security threat analysis, namely, monitoring public reports concerning larger scale consumer data security breaches for fraud protection purposes via the internet
Providing online non-downloadable software for mining virtual currencies or virtual assets via the Internet
Computer security services for cryptocurrency mining via the Internet, namely, data encryption services
Computer programming services, namely, programming computer software for cryptocurrency mining and blockchain purposes
Computer maintenance services, namely, maintenance of computer software for cryptocurrency mining and blockchain purposes
Providing online non-downloadable computer software for use as an electronic wallet to allow users to store and transfer virtual currency and cryptocurrency
Electronic data storage, namely, storage of virtual currency and cryptocurrency
Providing user authentication services using blockchain-based software technology for cryptocurrency transactions
Authentication of data in the field of cryptocurrency using blockchain technology
Providing online non-downloadable cryptocurrency mining pool software
Cloud-based mining of cryptocurrency for others, namely, cryptocurrency mining pool services in the nature of online non-downloadable software for cryptocurrency mining
Computer services, namely, providing temporary use of online non-downloadable software that allows others to share computing processing power over a network
Hosting computer software for use by others in the field of cryptocurrency mining, namely, software allowing users to verify cryptocurrency transactions for others in order to generate cryptocurrency.