undefined
EUTM file information

018721807

DGC


June 22, 2022

Trademark Summary

The trademark application DGC was filed by DGC Switzerland AG, a corporation established under the laws of the Swiss Confederation (the "Applicant"). The application was published for oppositions on October 18, 2022, and it was registered by office on January 25, 2023 without any oppositions.

The application was filed in German (English was selected as the second language).

Deletion of the representative of the trademark registration was recorded on October 8, 2023.


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Electronic publications (recorded or downloadable)
    2. Recorded multimedia files, Downloadable multimedia files
    3. Recorded electronic reports, Downloadable electronic reports
    4. Recorded electronic reports, Downloadable electronic reports, in relation to the following fields: Computer security, Network security
    5. Recorded electronic reports, Downloadable electronic reports, in relation to the following fields: Computers, Computer software, Software systems, Computer networks, Other information technology systems [IT systems]
    6. Recorded or downloadable electronic reports relating to information technology architecture and infrastructure
    7. Recorded electronic reports, Downloadable electronic reports, in relation to the following fields: information technology security, Data security
    8. Recorded electronic reports, Downloadable electronic reports, in relation to the following fields: Computer applications, Smart contracts, Blockchain infrastructures and distributed ledger technology infrastructures
    9. Recorded or downloadable test reports
    10. Electronic newsletters (recorded or downloadable)
    11. Recorded graphics, Downloadable graphics
    12. Software
    13. Application software
    14. Computer software for operations over a secure network
    15. Software for threat detection and risk detection
    16. Software for use in monitoring, security inspection and security risk management of software systems and information technology systems [IT systems], in particular of computer networks
    17. Software for use in monitoring and protecting data, software systems and information technology systems [IT systems]
    18. Databases (electronic)
    19. Computer software for accessing, browsing and searching online databases
    20. Educational software
    21. Software for use in monitoring, security inspection and security risk management of applications, smart contracts, blockchain infrastructures and distributed ledger technology infrastructures
    22. Authentication software
    23. Computer software for biometric systems for the identification and authentication of persons
    24. Software for managing data and cryptocurrency transactions using blockchain technology
    25. Security tokens [encryption devices]
    26. Access control as a service [ACaaS] software
    27. Hardware for penetration tests, in particular relating to IT infrastructures, software systems and information technology systems [IT systems]
    28. Virtual Reality [VR] cinemas
    29. Virtual reality models
    30. Virtual reality software
    31. Virtual reality hardware
    32. Parts and accessories for all the aforesaid goods, included in this class.
  • The mark was filed in class 35 with following description of goods:
    1. Retail and wholesale services, Including in the context of mail order, brick-and-mortar shops and trade via the internet, via teleshopping channels or other digital distribution channels, in relation to the following goods: hardware, virtual reality hardware, security tokens [encryption devices]
    2. Retail and wholesale services, Including in the context of mail order, brick-and-mortar shops and trade via the internet, via teleshopping channels or other digital distribution channels, in relation to the following goods: Hardware for penetration tests, in particular relating to IT infrastructures, software systems and information technology systems [IT systems]
    3. Retail and wholesale services, Including in the context of mail order, brick-and-mortar shops and trade via the internet, via teleshopping channels or other digital distribution channels, in relation to the following goods: Software, Educational software, Software for secure network operations, software for threat detection and risk detection
    4. Retail and wholesale services, Including in the context of mail order, brick-and-mortar shops and trade via the internet, via teleshopping channels or other digital distribution channels, in relation to the following goods: Software for use in monitoring, security inspection and security risk management of software systems and information technology systems [IT systems], in particular of computer networks
    5. Retail and wholesale services, Including in the context of mail order, brick-and-mortar shops and trade via the internet, via teleshopping channels or other digital distribution channels, in relation to the following goods: Software for use in monitoring and protecting data, software systems and information technology systems [IT systems]
    6. Retail and wholesale services, Including in the context of mail order, brick-and-mortar shops and trade via the internet, via teleshopping channels or other digital distribution channels, in relation to the following goods: Software for use in monitoring, security inspection and security risk management of applications, smart contracts, blockchain infrastructures and distributed ledger technology infrastructures
    7. Retail and wholesale services, Including in the context of mail order, brick-and-mortar shops and trade via the internet, via teleshopping channels or other digital distribution channels, in relation to the following goods: virtual reality software, Authentication software, Access control as a service [ACaaS] software
    8. Retail and wholesale services, Including in the context of mail order, brick-and-mortar shops and trade via the internet, via teleshopping channels or other digital distribution channels, in relation to the following goods: Biometric system software for identifying and authenticating individuals
    9. Retail and wholesale services, Including in the context of mail order, brick-and-mortar shops and trade via the internet, via teleshopping channels or other digital distribution channels, in relation to the following goods: Software for accessing, browsing and searching online databases
    10. Retail and wholesale services, Including in the context of mail order, brick-and-mortar shops and trade via the internet, via teleshopping channels or other digital distribution channels, in relation to the following goods: Software for managing data and cryptocurrency transactions using blockchain technology
    11. Rental of objects in connection with the providing of the aforesaid services, included in this class
    12. Consultancy and information in relation to the aforesaid services, included in this class.
  • The mark was filed in class 36 with Financial transactions via blockchain and Financial transactions via distributed ledger technology infrastructures..
  • The mark was filed in class 38 with following description of goods:
    1. Providing access to global computer networks and other computer networks
    2. Providing access to a computer database
    3. Providing access to and leasing access time to computer databases
    4. Provision of access to web pages
    5. Electronic exchange of data stored in databases accessible via telecommunication networks
    6. Transmission of data, messages and information
    7. Providing access to platforms and portals on the Internet
    8. Providing of access, On the Internet, In other networks, in relation to the following fields: information, Texts, Graphics, pictures, other data
    9. Providing of access to software, apps, multimedia products and databases, including on the internet and other networks
    10. Communication by online blogs
    11. Rental of objects in connection with the providing of the aforesaid services, included in this class
    12. Consultancy and information in relation to the aforesaid services, included in this class.
  • The mark was filed in class 41 with following description of goods:
    1. Statements, Providing, in relation to the following fields: Non-downloadable electronic publications, downloadable electronic publications
    2. Preparation of non-downloadable and/or downloadable electronic newsletters, Providing non-downloadable and/or downloadable electronic newsletters
    3. Drawing up of information, Provision of information, in relation to the following fields: skills development
    4. Organising, conducting, arranging, in relation to the following fields: Training courses for skills development, in relation to the following fields: IT-security
    5. Organising, conducting, arranging, in relation to the following fields: Online skill assessment courses, in relation to the following fields: IT-security
    6. Organisation, conducting and arranging of workshops [IT skills training], in particular by means of simulation technology
    7. Organising, conducting and arranging, in relation to the following fields: Seminars, Colloquiums, in relation to the following fields: IT-security
    8. Organising, conducting and arranging, in relation to the following fields: Tuition, Workshops, Seminars, Colloquiums, in relation to the following fields: Data protection
    9. Virtual reality arcade services
    10. Virtual reality game services provided on-line from a computer network
    11. Providing virtual reality game services
    12. Rental of objects in connection with the providing of the aforesaid services, included in this class
    13. Consultancy and information in relation to the aforesaid services, included in this class.
  • The mark was filed in class 42 with following description of goods:
    1. IT services
    2. IT security, protection and restoration
    3. Development, creation and deployment, Relating to the following sectors: Security services, Relating to the following sectors: data, Computer networks, Computer access, Computerised transactions
    4. Remote monitoring of software systems and information technology systems [IT systems], in particular of computer systems
    5. Remote monitoring of applications, smart contracts, blockchain infrastructures and distributed ledger technology infrastructures
    6. Simulation of threat situations relating to software systems and information technology systems [IT systems]
    7. Simulation of threat situations relating to applications, smart contracts, blockchain infrastructures and distributed ledger technology infrastructures
    8. Design, Development, creation, deployment, Relating to the following sectors: Electronic data security systems
    9. Online monitoring of computer networks and access thereto
    10. Computer network services
    11. Computer virus protection services
    12. Application service provider services
    13. Monitoring of network systems
    14. Computer security services for protection against illegal network access
    15. Testing, authentication and quality control
    16. Measurement evaluation services
    17. Computer security threat analysis for protecting data
    18. Analysis, diagnosis and monitoring of weak points in software systems and information technology systems [IT systems], in particular network systems
    19. Analysis, diagnosis and monitoring of weak points in applications, smart contracts, blockchain infrastructures and distributed ledger technology infrastructures
    20. Computer system analysis
    21. Monitoring, security inspection and security risk management of software systems and information technology systems [IT systems], in particular of computer networks
    22. Monitoring, security inspection and security risk management of applications, smart contracts, blockchain infrastructures and distributed ledger technology infrastructures
    23. Engineering testing, Especially, Conducting of penetration tests, Relating to the following sectors: IT infrastructures, Software systems, Information technology systems [IT systems]
    24. Conducting of technical tests, in particular penetration tests relating to applications, smart contracts, blockchain infrastructures and distributed ledger technology infrastructures
    25. Website usability testing services, Usability testing of domains
    26. Preparation of information, provision of information, Relating to the following sectors: Computer security, Network security
    27. Preparation and providing of information relating to information technology architecture and infrastructure
    28. Preparation of information, provision of information, Relating to the following sectors: information technology security, Data security
    29. Statements and deployment, Relating to the following sectors: information, reports, Relating to the following sectors: Computer, Computer software, Software systems, Computer networks, Other information technology systems [IT systems]
    30. Preparation and providing of information and/or reports relating to applications, smart contracts, blockchain infrastructures and distributed ledger technology infrastructures
    31. Providing online non-downloadable and/or downloadable electronic reports relating to software systems and information technology systems [IT systems], in particular with graphics and test reports
    32. Technical services for the downloading of digital data
    33. Information technology [IT] consultancy
    34. Counselling, Relating to the following sectors: Computer security, Data security and internet security
    35. Research
    36. Technical support services, Counselling, Relating to the following sectors: Software systems, Information technology systems [IT systems] and Computer security
    37. Technical support services and Counselling, Relating to the following sectors: Applications, smart contracts, blockchain infrastructure and Distributed ledger technology infrastructures
    38. Computer security services in the form of issuing digital certificates
    39. Technical support services, Relating to the following sectors: information technology security, Including technical project planning
    40. Disaster recovery services for computer systems
    41. Recovery of computer data
    42. Recording and evaluation of security-related information relating to software systems and information technology systems [IT systems], by means of external sources
    43. Recording and evaluation of security-related information relating to applications, smart contracts, blockchain infrastructures and distributed ledger technology infrastructures, by means of external sources
    44. Development, updating and maintenance of data bases
    45. Creating software for databases
    46. Providing database in the fields of information technology
    47. Providing virtual computer environments through cloud computing
    48. Cloud computing
    49. Platform as a service [PaaS]
    50. Infrastructure as a Service [IaaS]
    51. Blockchain as a Service [BaaS]
    52. Distributed ledger technology as a service
    53. Technological development, Creation of technologies, providing technology, Relating to the following sectors: Applications, smart contracts, blockchain infrastructure and Distributed ledger technology infrastructures
    54. Development, creation and providing of blockchain technologies for payment methods and payment transactions
    55. Development, creation and deployment, Relating to the following sectors: Applications, smart contracts, blockchain infrastructure and Distributed ledger technology infrastructures
    56. Development, creation and providing of technologies for the protection of applications, smart contracts, blockchain infrastructures and distributed ledger technology infrastructures
    57. Development, creation and providing of virtual reality applications
    58. Development, creation and providing of interactive online learning platforms
    59. Development of technologies for the protection of electronic networks
    60. Programming services, Relating to the following sectors: information technology
    61. Design, development and implementation of software
    62. Software programming
    63. Maintenance and updating of computer software
    64. Adaptation of software
    65. Implementation of software on networks
    66. Design, development, Programming services, Implementation, Servicing, Updating, Adaptation, in relation to the followig goods: software for secure network operations
    67. Design, development, Programming services, Implementation, Servicing, Updating, Adaptation, in relation to the followig goods: Software for threat detection and risk detection
    68. Design, development, Programming services, Implementation, Servicing, Updating, Adaptation, in relation to the followig goods: Software for use in monitoring, security inspection and security risk management of software systems and information technology systems [IT systems], in particular of computer networks
    69. Design, development, Programming services, Implementation, Servicing, Updating, Adaptation, in relation to the followig goods: Software for use in monitoring and protecting data, software systems and information technology systems [IT systems]
    70. Design, development, Programming services, Implementation, Servicing, Updating, Adaptation, in relation to the followig goods: Software for accessing and browsing and searching online databases
    71. Design, development, Programming services, Implementation, Servicing, Updating, Adaptation, in relation to the followig goods: Educational software
    72. Design, development, Programming services, Implementation, Servicing, Updating, Adaptation, in relation to the followig goods: Software for use in monitoring, security inspection and security risk management of applications, smart contracts, blockchain infrastructures and distributed ledger technology infrastructures
    73. Design, development, Programming services, Implementation, Servicing, Updating, Adaptation, in relation to the followig goods: Authentication software
    74. Design, development, Programming services, Implementation, Servicing, Updating, Adaptation, in relation to the followig goods: Computer software for biometric systems for the identification and authentication of persons
    75. Design, development, Programming services, Implementation, Servicing, Updating, Adaptation, in relation to the followig goods: Access control as a service [ACaaS] software
    76. Design, development, Programming services, Implementation, Servicing, Updating, Adaptation, in relation to the followig goods: Virtual reality software
    77. Design, development, Programming services, Implementation, Servicing, Updating, Adaptation, in relation to the followig goods: Software for managing data and cryptocurrency transactions using blockchain technology
    78. Support services for users of websites, software systems and information technology systems [IT systems]
    79. Support services for users of applications, smart contracts, blockchain infrastructures and distributed ledger technology infrastructures
    80. Software as a service (SaaS) and rental of software
    81. Online provision of non-downloadable and/or downloadable software
    82. Providing online non-downloadable and/or downloadable software for secure network operations
    83. Providing online non-downloadable and/or downloadable software for threat detection and risk detection
    84. Providing online non-downloadable and/or downloadable software for use in monitoring, security inspection and security risk management of software systems and information technology systems [IT systems], in particular of computer networks
    85. Providing online non-downloadable and/or downloadable software for use in monitoring and protecting data, software systems and information technology systems [IT systems]
    86. Providing online non-downloadable and/or downloadable software for access to and for browsing and research in online databases
    87. Online providing of non-downloadable and/or downloadable learning software
    88. Providing online non-downloadable and/or downloadable software for use in monitoring, security inspection and security risk management of applications, smart contracts, blockchain infrastructures and distributed ledger technology infrastructures
    89. Online providing of non-downloadable and/or downloadable authentication software
    90. Online providing of non-downloadable and/or downloadable software for biometric systems for identifying and authenticating individuals
    91. Online providing of non-downloadable and/or downloadable access control as a service [ACaaS] software
    92. Online providing of non-downloadable and/or downloadable virtual reality software
    93. Online providing of non-downloadable and/or downloadable software for managing data and cryptocurrency transactions using blockchain technology
    94. Software as a service [SaaS] featuring software for secure network operations
    95. Software as a service [SaaS] featuring software for use in monitoring, security inspection and security risk management of software systems and information technology systems [IT systems], in particular of computer networks
    96. Software as a service [SaaS] featuring software for threat detection and risk detection
    97. Software as a service [SaaS] featuring software for use in monitoring and protecting data, software systems and information technology systems [IT systems]
    98. Software as a service [SaaS] featuring software for access to and for browsing and research in online databases
    99. Software as a service (SAAS) services, in relation to the followig goods: Educational software
    100. Software as a service [SaaS] featuring software for use in monitoring, security inspection and security risk management of applications, smart contracts, blockchain infrastructures and distributed ledger technology infrastructures
    101. Software as a service [SaaS] featuring authentication software
    102. Software as a Service [SaaS] with software for biometric systems for the identification and authentication of persons
    103. Software as a service [SaaS] featuring access control as a service [ACaaS] software
    104. Software as a service [SaaS] featuring virtual reality software
    105. Software as a service [SaaS] featuring software for managing data and cryptocurrency transactions using blockchain technology
    106. Development of virtual reality game services
    107. Rental of hardware
    108. Consultation services relating to computer hardware
    109. Development of hardware for penetration tests, Especially, Relating to the following sectors: IT infrastructures, Software systems and Information technology systems [IT systems]
    110. Hosting platforms on the Internet
    111. Data storage via blockchain
    112. Certification of data via blockchain
    113. Electronic monitoring of personally identifying information to detect identity theft via the internet
    114. Hosting of Access Control as a Service (ACaaS) servers and software
    115. Access Control as a Service (ACaaS)
    116. Installation of Access Control as a Service (ACaaS) software
    117. Authentication services (control) of messages transmitted via telecommunications
    118. Encryption, decryption and authentication of information, messages and data
    119. Providing user authentication services using biometric hardware and software technology for e-commerce transactions
    120. Authentication services for computer security
    121. Authentication services (control) of data transmitted via telecommunications
    122. User authentication services using technology for e-commerce transactions
    123. Authentication services
    124. Data encryption and decoding services
    125. Data encryption services
    126. Encoding of magnetic cards
    127. Data encryption services
    128. Providing of online interactive learning platforms
    129. Development, creation and providing of virtual reality applications
    130. Rental of objects in connection with the providing of the aforesaid services, included in this class
    131. Consultancy and information in relation to the aforesaid services, included in this class.
  • The mark was filed in class 45 with following description of goods:
    1. Providing of information relating to compliance requirements
    2. Authentication of personal identification information [identification verification services]
    3. Identity validation services.