undefined
EUTM file information

018734029

GARRISON


July 14, 2022

Trademark Summary

The trademark application GARRISON was filed by Garrison Technology Limited, a corporation established under the laws of the United Kingdom of Great Britain and Northern Ireland (the "Applicant"). The application was published for oppositions on October 3, 2022, and it was registered by office on January 10, 2023 without any oppositions.

The application was filed in English (French was selected as the second language).

Creation of rights in rem of the trademark registration was recorded on March 12, 2024.


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signalling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments
    2. Apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity
    3. Apparatus and instruments for recording, transmitting, reproducing or processing sound, images or data
    4. Recorded and downloadable media, computer software, blank digital or analogue recording and storage media
    5. Mechanisms for coin-operated apparatus
    6. Cash registers, calculating devices
    7. Computers and computer peripheral devices
    8. Diving suits, divers' masks, ear plugs for divers, nose clips for divers and swimmers, gloves for divers, breathing apparatus for underwater swimming
    9. Fire-extinguishing apparatus
    10. Computer software
    11. Computer hardware
    12. Computer firmware
    13. Application software
    14. Platform software
    15. Antivirus software
    16. Downloadable software
    17. Privacy software
    18. Security software
    19. System software
    20. Reporting software
    21. Antispyware software
    22. Privacy protection software
    23. Cloud server software
    24. Computer antivirus software
    25. Machine learning software for surveillance
    26. Machine learning software for analysis
    27. Artificial intelligence software for surveillance
    28. Artificial intelligence software for analysis
    29. Web application and server software
    30. Utility, security and cryptography software
    31. System and system support software, and firmware
    32. Computer software to enable the searching of data
    33. Telecommunication apparatus
    34. Electronic publications
    35. Media content
    36. Computer hardware and software for secure web browsing
    37. Computer hardware and software for internet and browser isolation for use in securing endpoints from internet-based security threats
    38. Computer hardware and software for remote internet browsing
    39. Computer hardware and software for interacting securely with high-risk and vulnerable computer systems
    40. Computer software, software applications, software platforms and firmware, all for use in data security, network security, secure browsing of data, secure transmission of data, virus and malware detection
    41. Computer software, software applications, software platforms and firmware, all for content filtering, blocking access to malicious websites, detecting and preventing network intrusions and malware, and for controlling and managing network security policies and user access
    42. Data security software
    43. Cryptography software
    44. Computer hardware, computer peripheral devices and electronic devices, including microchips, accelerators, cryptographic accelerators, for use in data security, network security, secure browsing of data, secure transmission of data, virus and malware detection
    45. Computer hardware, computer peripheral devices and electronic devices for content filtering, blocking access to malicious websites, detecting and preventing network intrusions and malware, and for controlling and managing network security policies and user access
    46. Computer hardware, computer peripheral devices and electronic devices for secure unidirectional transmission of data from a source computer to a destination computer
    47. Computer hardware, computer peripheral devices and electronic devices for secure unidirectional transmission of data from one computer network to another
    48. Parts and fittings for all the aforesaid goods.
  • The mark was filed in class 37 with following description of goods:
    1. Construction services
    2. Mining extraction, oil and gas drilling
    3. Installation of hardware for Internet access
    4. Repair of computers
    5. Repair of computer hardware
    6. Repair of office machinery
    7. Maintenance and repair of hardware
    8. Repair or maintenance of computers
    9. Information services relating to repairs
    10. Installation and repair of computer hardware
    11. Maintenance and repair of computer hardware
    12. Computer hardware and telecommunication apparatus installation, maintenance and repair
    13. Maintenance and repair of computer hardware for internet or network isolation, for use in securing endpoints from internet based security threats
    14. Maintenance and repair of computer hardware for interacting securely with high-risk and vulnerable computer systems
    15. Maintenance and repair of computer hardware for providing remote access to the internet
    16. Maintenance and repair of computer hardware for minimizing security threats, namely, providing a secure internet browsing experience via access to a real-time video feed
    17. Maintenance and repair of computer hardware, computer peripheral devices and electronic devices for secure unidirectional transmission of data from a source computer to a destination computer
    18. Maintenance and updating of computer hardware relating to computer and network security and prevention of computer risks
    19. Information, advice and consultancy relating to all of the aforesaid services.
  • The mark was filed in class 38 with following description of goods:
    1. Telecommunications services
    2. Telecommunication network services
    3. Telecommunications
    4. Internet based telecommunication services
    5. Mobile telecommunications network services
    6. Providing telecommunications connections to databases
    7. Transmission of database information via telecommunications networks
    8. Providing telecommunications connection to a global computer network
    9. Telecommunications services provided via fiber optic, wireless and cable networks
    10. Electronic exchange of data stored in databases accessible via telecommunication networks
    11. Data transmission
    12. Electronic data transmission
    13. Transmission of data
    14. Data communications services
    15. Electronic transmission of data
    16. Providing access to databases
    17. Remote data access services
    18. Transfer of data by telecommunications
    19. Transmission of data, messages and information
    20. Electronic communication services for the transmission of data
    21. Cable transmission of sounds, images, signals and data
    22. Provision of access to data via the Internet
    23. Provision of access to content, websites and portals
    24. Secure data transmission
    25. Secure transmission of data between computers and computer networks
    26. Secure transmission of data via the Internet
    27. Secure data transmission over a global remote data processing network
    28. Providing secure remote access via the internet to computers and computer networks
    29. Providing access to computer databases
    30. Providing secure unidirectional transmission of data from a source computer to a destination computer
    31. Providing secure unidirectional transmission of data from one computer network to another
    32. Providing secure, one-way transfer of data from a source computer via an optical link that allows information to flow from the source computer to the destination computer but does not allow information to flow out of the destination computer
    33. Secure data transmission
    34. Information, advice and consultancy relating to all of the aforesaid services.
  • The mark was filed in class 42 with following description of goods:
    1. Scientific and technological services and research and design relating thereto
    2. Industrial analysis, industrial research and industrial design services
    3. Quality control and authentication services
    4. Design and development of computer hardware and software
    5. Database development services
    6. Maintenance of data bases
    7. Database design and development
    8. Technical data analysis services
    9. Computerised analysis of technical data
    10. Hosting of databases
    11. Hosting websites
    12. Hosting web portals
    13. Installation and maintenance of database software
    14. Design and development of software for database management
    15. Updating of software databases
    16. Data cleansing services
    17. Electronic data storage
    18. Computerised data storage
    19. Recovery of computer data
    20. Data security services [firewalls]
    21. Development of data programs
    22. Designing of data processing systems
    23. Software engineering
    24. Software design
    25. Software research
    26. Software development
    27. Software installation
    28. Maintenance of software
    29. Software customisation services
    30. Computer software engineering
    31. Computer software consultancy
    32. Internet security consultancy
    33. Data security consultancy
    34. IT security, protection and restoration
    35. Data recovery services
    36. Software as a service [SaaS]
    37. Platform as a service [PaaS]
    38. Cloud computing services
    39. Cloud storage services for electronic data
    40. Design of hardware, firmware and software for internet security and access solutions, namely, the design and development of technology for content sanitisation
    41. Design and development of electronic data security systems
    42. Computer security services, namely, the sanitisation of content from untrusted networks
    43. Maintenance and updating of computer firmware and software relating to computer and network security and prevention of computer risks
    44. Cloud computing featuring software for use in computer and network security
    45. Software as a service (SAAS) services, namely, hosting software for use by others for content sanitisation
    46. Cloud computing services in the field of computer and network security, namely, design and development of technology for content sanitisation
    47. Computer services, namely, cloud hosting provider services
    48. Updating and maintaining cloud-based computer software through on-line updates, enhancements, and patches
    49. Providing temporary use of non-downloadable computer software for content sanitisation
    50. Providing temporary use of non-downloadable computer software for computer and network security
    51. Providing temporary use of non-downloadable computer software for digital security
    52. Providing temporary use of non-downloadable computer software for preventing security threats on computer systems
    53. Providing temporary use of non-downloadable computer software for minimising security threats, namely, providing a platform for hardware-based content sanitisation
    54. Information, advisory and consultancy services relating to the aforesaid.
  • The mark was filed in class 45 with following description of goods:
    1. Legal services
    2. Security services for the physical protection of tangible property and individuals
    3. Security services
    4. Security monitoring services
    5. Security consultancy
    6. Monitoring of security systems
    7. Electronic monitoring services for security purposes
    8. Security guarding of facilities via remote monitoring systems
    9. Consultancy in the field of data theft and identity theft
    10. Identity verification
    11. Identity validation services
    12. Tracking of stolen property
    13. Fraud and identity theft protection services
    14. Tracking, monitoring and reporting in relation to customer data and credit reports to protect against data theft
    15. Identification verification services, namely providing authentication of personal identification information
    16. Monitoring the internet for the purpose of identity theft detection and protection
    17. Monitoring the internet for the purpose of identifying data breaches
    18. Computer software licensing
    19. Licensing of technology
    20. Intellectual property licensing services
    21. Information, advisory and consultancy services relating to the aforesaid.