LIBERATE Trademark

Trademark Overview


On Friday, October 20, 2017, a trademark application was filed for LIBERATE with the United States Patent and Trademark Office. The USPTO has given the LIBERATE trademark a serial number of 79248449. The federal status of this trademark filing is REGISTERED as of Tuesday, January 7, 2020. This trademark is owned by Jisc. The LIBERATE trademark is filed in the Computer & Software Products & Electrical & Scientific Products, Computer & Software Services & Scientific Services, Personal, and Legal & Social Services categories with the following description:

Downloadable computer software that facilitates identity federation, facilitates multi-factor and strong authentication, facilitates access control for web, mobile and application programmable interface (API); downloadable computer software that facilitates directory, identity provisioning and identity administration services, facilitates identity services auditing and reporting, and facilitates other identity and access management services in the field of digital security and identity verification; downloadable software for API traffic security; downloadable software for API activity monitoring and attack detection and reporting; security software, being downloadable, for data, applications, and computer systems accessed via API or other programmatic methods; downloadable software for computer network security; downloadable software for cloud-based computer security; downloadable software for monitoring computer networks; downloadable software for detecting computer network intrusion;...

Licensing of computer software for the protection of computers, computer systems, computer networks and internet websites against attacks from computer viruses, hackers, tampering, unauthorized intrusion and unauthorized manipulation of data

Computer security consultancy; computer security consulting services in the fields of information security, computer security, network security, cyber security, internet security, and data security; monitoring of computer systems for security purposes for the protection of information and data; computer security consulting services in the field of incident response to information, computer, network and internet security breaches; computer network security services and computer security services in the nature of network intrusion protection testing, computer testing for vulnerability management and assessment, risk management and assessment, data breach threat analysis, network threat analysis, all of the foregoing for the protection of information and data; cybersecurity services, namely, penetration testing of computers and information systems and networks for vulnerability assessment and management, risk assessment in the nature of testing of information systems to determine vulnerab...
liberate

General Information


Serial Number79248449
Word MarkLIBERATE
Filing DateFriday, October 20, 2017
Status700 - REGISTERED
Status DateTuesday, January 7, 2020
Registration Number5952248
Registration DateTuesday, January 7, 2020
Mark Drawing4000 - Illustration: Drawing with word(s) / letter(s) / number(s) in Block form
Published for Opposition DateTuesday, October 22, 2019

Trademark Statements


Goods and ServicesDownloadable computer software that facilitates identity federation, facilitates multi-factor and strong authentication, facilitates access control for web, mobile and application programmable interface (API); downloadable computer software that facilitates directory, identity provisioning and identity administration services, facilitates identity services auditing and reporting, and facilitates other identity and access management services in the field of digital security and identity verification; downloadable software for API traffic security; downloadable software for API activity monitoring and attack detection and reporting; security software, being downloadable, for data, applications, and computer systems accessed via API or other programmatic methods; downloadable software for computer network security; downloadable software for cloud-based computer security; downloadable software for monitoring computer networks; downloadable software for detecting computer network intrusion; downloadable software for monitoring and maintaining network security; downloadable computer software for use in the safeguarding of network data or network services; downloadable computer software for detecting security threat; downloadable software for securing API traffic across hybrid clouds; downloadable software for protecting computers and network services from attack; computer software for the detection and removal of computer viruses and threats; computer software for managing and filtering electronic and wireless communications; computer software for protecting and securing the integrity of data computer networks, mobile devices, electronic and wireless communications and applications; anti-virus software; computer software for creating and maintaining firewalls to prevent unauthorized access to and use of computer networks and systems; computer software for providing security for email, internal and other electronic communications, for identifying and blocking potentially dangerous or undesirable electronic communications and content, for identifying and blocking electronic communications from illegitimate sources, and for identifying and blocking computer and electronic mail viruses, spam, spyware, malware, and other undesirable content; computer software for tracking, locating, locking and wiping lost or stolen computers, tablets, mobile devices and other digital devices; computer software for secure storage and management of usernames and passwords; computer hardware and software used to allow individuals to upload and download information, software, programs, media or documents from an online digital network, cloud network or server; computer hardware and software for publishing data to digital and cloud networks
Goods and ServicesLicensing of computer software for the protection of computers, computer systems, computer networks and internet websites against attacks from computer viruses, hackers, tampering, unauthorized intrusion and unauthorized manipulation of data
Goods and ServicesComputer security consultancy; computer security consulting services in the fields of information security, computer security, network security, cyber security, internet security, and data security; monitoring of computer systems for security purposes for the protection of information and data; computer security consulting services in the field of incident response to information, computer, network and internet security breaches; computer network security services and computer security services in the nature of network intrusion protection testing, computer testing for vulnerability management and assessment, risk management and assessment, data breach threat analysis, network threat analysis, all of the foregoing for the protection of information and data; cybersecurity services, namely, penetration testing of computers and information systems and networks for vulnerability assessment and management, risk assessment in the nature of testing of information systems to determine vulnerability, data breach threat analysis, and network threat analysis, all of the foregoing for the protection of information and data; consulting in the field of computer security and electronic data security services, namely, providing cyber threat data intelligence collection and analysis services and solutions therefor; computer security services in the nature of providing an internet trust centre; computer security assurance; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; authentication, issuance and validation of digital certificates; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the internet;computer security services in the nature of detecting, reporting, investigating and resolving security incidents of network abuse and email abuse; computer security services in the nature of providing an internet trust centre, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; managed computer network and internet security services; computer security services in the nature of filtering content on the internet; software as a service namely, hosting non-downloadable computer software for use by others that scans networks and websites to detect and identify vulnerabilities and malware; online services, namely, providing internet-based and network-based computer virus protection services for others; security verification of computer network firewalls, servers and other network devices from unauthorized access; computer services, namely, detection of viruses and threats; Providing user authentication services using single sign-on technology for online software applications; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates identity federation, multi-factor and strong authentication of computer users and identity verification protocols, and access control for web, mobile and application programmable interfaces (API); Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates directory, identity provisioning and identity administration services, facilitates identity services auditing and reporting, and facilitates other identity and access management services in the field of digital security and identity verification, Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates API traffic security; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates API activity monitoring and attack detection and reporting; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates computer network security; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates cloud-based computer security; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates monitoring computer networks; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates the detection of computer network intrusion; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others for monitoring and maintaining network security; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates safeguarding of network data or network services; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates the detection of security threat; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates the protection of computers and network services from attack; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates the detection and removal of computer viruses and threats; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others for managing and filtering electronic and wireless communications; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates the protection and securing the integrity of data computer networks, mobile devices, electronic and wireless communications and applications; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others for creating and maintaining firewalls to prevent unauthorized access to and use of computer networks and systems; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates security for email, internal and other electronic communications, for identifying and blocking potentially dangerous or undesirable electronic communications and content, for identifying and blocking electronic communications from illegitimate sources, and for identifying and blocking computer and electronic mail viruses, spam, spyware, malware, and other undesirable content; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates tracking, locating, locking and wiping lost or stolen computers, tablets, mobile devices and other digital devices; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others for secure storage and management of usernames and passwords; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates the upload and download of information, software, programs, media or documents from an online digital network, cloud network or server; identity verification services, namely, providing user authentication between two or more entities using digital certificates, multi factor authentication and strong identification protocols in the field of digital security for allowing user access to web, mobile and application programmable interfaces (API)

Classification Information


International Class009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus.
US Class Codes021, 023, 026, 036, 038
Class Status Code6 - Active
Class Status DateSunday, January 6, 2019
Primary Code009
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateSunday, January 6, 2019
Primary Code042
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class045 - Legal services; security services for the protection of property and individuals; personal and social services rendered by others to meet the needs of individuals.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateSunday, January 6, 2019
Primary Code045
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

Trademark Owner History


Party NameJisc
Party Type30 - Original Registrant
Legal Entity Type99 - Other
AddressGB

Party NameJisc
Party Type20 - Owner at Publication
Legal Entity Type99 - Other
AddressGB

Party NameJisc
Party Type10 - Original Applicant
Legal Entity Type99 - Other
AddressGB

Trademark Events


Event DateEvent Description
Friday, April 21, 2023CHANGE OF NAME/ADDRESS REC'D FROM IB
Friday, March 24, 2023NEW REPRESENTATIVE AT IB RECEIVED
Friday, May 8, 2020FINAL DECISION TRANSACTION PROCESSED BY IB
Saturday, April 18, 2020FINAL DISPOSITION NOTICE SENT TO IB
Saturday, April 18, 2020FINAL DISPOSITION PROCESSED
Tuesday, April 7, 2020FINAL DISPOSITION NOTICE CREATED, TO BE SENT TO IB
Thursday, February 6, 2020NEW REPRESENTATIVE AT IB RECEIVED
Tuesday, January 7, 2020REGISTERED-PRINCIPAL REGISTER
Tuesday, October 22, 2019OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
Tuesday, October 22, 2019PUBLISHED FOR OPPOSITION
Saturday, October 19, 2019NOTIFICATION PROCESSED BY IB
Wednesday, October 2, 2019NOTIFICATION OF POSSIBLE OPPOSITION SENT TO IB
Wednesday, October 2, 2019NOTICE OF START OF OPPOSITION PERIOD CREATED, TO BE SENT TO IB
Wednesday, October 2, 2019NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
Tuesday, September 17, 2019APPROVED FOR PUB - PRINCIPAL REGISTER
Monday, August 5, 2019TEAS/EMAIL CORRESPONDENCE ENTERED
Monday, August 5, 2019CORRESPONDENCE RECEIVED IN LAW OFFICE
Monday, August 5, 2019TEAS RESPONSE TO OFFICE ACTION RECEIVED
Friday, February 22, 2019REFUSAL PROCESSED BY IB
Monday, February 4, 2019NON-FINAL ACTION MAILED - REFUSAL SENT TO IB
Monday, February 4, 2019REFUSAL PROCESSED BY MPU
Wednesday, January 23, 2019NON-FINAL ACTION (IB REFUSAL) PREPARED FOR REVIEW
Tuesday, January 22, 2019NON-FINAL ACTION WRITTEN
Thursday, January 10, 2019APPLICATION FILING RECEIPT MAILED
Sunday, January 6, 2019ASSIGNED TO EXAMINER
Sunday, January 6, 2019NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Thursday, December 27, 2018SN ASSIGNED FOR SECT 66A APPL FROM IB