TOMORROW'S TECHNOLOGIES TODAY Trademark

Trademark Overview


On Wednesday, November 28, 2001, a trademark application was filed for TOMORROW'S TECHNOLOGIES TODAY with the United States Patent and Trademark Office. The USPTO has given the TOMORROW'S TECHNOLOGIES TODAY trademark a serial number of 76342456. The federal status of this trademark filing is ABANDONED - FAILURE TO RESPOND OR LATE RESPONSE as of Wednesday, December 11, 2002. This trademark is owned by Secure Systems Limited. The TOMORROW'S TECHNOLOGIES TODAY trademark is filed in the Computer & Software Products & Electrical & Scientific Products, Advertising, Business and Retail Services, Communication Services, Education & Entertainment Services, and Computer & Software Services & Scientific Services categories with the following description:

Hardware based computer technology programmed to design and permit the safe storage of data and software within a computer (without the need to use firewalls and data encryption software) and prevents unauthorized reads and writes to the hard disk drive; hard ware based computer technology to permit the safe transmission of data and data processing procedures (eg files, messages and e-commerce transactions) via electronic media and unique recognizable keys for computer security, hardware technology to deny access to computer systems by hackers, prevent viruses to affect computer systems; computer device which attaches to external port of computer and programs as a self contained intelligent device with its own memory operating system, onboard modifiable software store and secure access for computer systems management

Hardware based computer technology for business management and administration; programmed to design and permit the safe storage of data and software within a computer (without the need to use firewalls and data encryption software) and prevents unauthorized reads and writes to the hard disk drive; hard ware based computer technology to permit the safe transmission of data and data processing procedures (e.g. files, messages and e-commerce business to business transactions) via electronic media and unique recognizable keys for computer security; hardware technology to deny access to computer systems by hackers, prevent viruses to affect computer systems; computer device which attaches to external port of computer and programs as a self contained intelligent device with its own memory, operating system, onboard modifiable software store and secure access for computer systems management

Hardware based computer technology programmed design and permit the secured transmittal of messages from user to user and the safe storage of data and software within a computer (without the need to use firewalls and data encryption software) and prevents unauthorized reads and writes to the hard disk drive; hard ware based computer technology to permit the safe transmission of data and data processing procedures (e.g. files, messages and e-commerce transactions) via electronic media and unique recognizable keys for computer security; hardware technology to deny access to computer systems by hackers, prevent viruses to affect computer systems; computer device which attaches to external port of computer and programs as a software store and secure access for computer systems management

Hardware based computer technology which provides education and training for users of computer and electronic systems to permit the safe storage of data and software within a computer (without the need to use firewalls and data encryption software) and prevents unauthorized reads and writes to the hard disk drive; hard ware based computer technology to permit the safe transmission of data and data processing procedures (eg files, messages and e-commerce transactions) via electronic media and unique recognizable keys for computer security; hardware technology to deny access to computer systems by hackers, prevent viruses to affect computer systems; computer device which attaches to eternal port of computer and programs as a self contained intelligent device with its own memory, operating system, onboard modifiable software store and secure access for computer systems management

Hardware based computer technology programmed to design and permit the safe storage of data and software within a computer (without the need to use firewalls and data encryption software) and prevents unauthorized reads and writes to the hard disk drive; hard ware based, computer technology to permit the safe transmission of data and data processing procedures (eg files, messages and e- commerce transactions) via electronic media and unique recognizable keys for computer security; hardware technology to deny access to computer systems by hackers, prevent viruses to affect computer systems; computer device which attaches to external port of computer and programs as a self contained intelligent device with its own memory, operating system, onboard modifiable software store and secure access for computer systems management
tomorrow's technologies today

General Information


Serial Number76342456
Word MarkTOMORROW'S TECHNOLOGIES TODAY
Filing DateWednesday, November 28, 2001
Status602 - ABANDONED - FAILURE TO RESPOND OR LATE RESPONSE
Status DateWednesday, December 11, 2002
Registration Number0000000
Registration DateNOT AVAILABLE
Mark Drawing1000 - Typeset: Word(s) / letter(s) / number(s)
Published for Opposition DateNOT AVAILABLE

Trademark Statements


Goods and ServicesHardware based computer technology programmed to design and permit the safe storage of data and software within a computer (without the need to use firewalls and data encryption software) and prevents unauthorized reads and writes to the hard disk drive; hard ware based computer technology to permit the safe transmission of data and data processing procedures (eg files, messages and e-commerce transactions) via electronic media and unique recognizable keys for computer security, hardware technology to deny access to computer systems by hackers, prevent viruses to affect computer systems; computer device which attaches to external port of computer and programs as a self contained intelligent device with its own memory operating system, onboard modifiable software store and secure access for computer systems management
Goods and ServicesHardware based computer technology for business management and administration; programmed to design and permit the safe storage of data and software within a computer (without the need to use firewalls and data encryption software) and prevents unauthorized reads and writes to the hard disk drive; hard ware based computer technology to permit the safe transmission of data and data processing procedures (e.g. files, messages and e-commerce business to business transactions) via electronic media and unique recognizable keys for computer security; hardware technology to deny access to computer systems by hackers, prevent viruses to affect computer systems; computer device which attaches to external port of computer and programs as a self contained intelligent device with its own memory, operating system, onboard modifiable software store and secure access for computer systems management
Goods and ServicesHardware based computer technology programmed design and permit the secured transmittal of messages from user to user and the safe storage of data and software within a computer (without the need to use firewalls and data encryption software) and prevents unauthorized reads and writes to the hard disk drive; hard ware based computer technology to permit the safe transmission of data and data processing procedures (e.g. files, messages and e-commerce transactions) via electronic media and unique recognizable keys for computer security; hardware technology to deny access to computer systems by hackers, prevent viruses to affect computer systems; computer device which attaches to external port of computer and programs as a software store and secure access for computer systems management
Goods and ServicesHardware based computer technology which provides education and training for users of computer and electronic systems to permit the safe storage of data and software within a computer (without the need to use firewalls and data encryption software) and prevents unauthorized reads and writes to the hard disk drive; hard ware based computer technology to permit the safe transmission of data and data processing procedures (eg files, messages and e-commerce transactions) via electronic media and unique recognizable keys for computer security; hardware technology to deny access to computer systems by hackers, prevent viruses to affect computer systems; computer device which attaches to eternal port of computer and programs as a self contained intelligent device with its own memory, operating system, onboard modifiable software store and secure access for computer systems management
Goods and ServicesHardware based computer technology programmed to design and permit the safe storage of data and software within a computer (without the need to use firewalls and data encryption software) and prevents unauthorized reads and writes to the hard disk drive; hard ware based, computer technology to permit the safe transmission of data and data processing procedures (eg files, messages and e- commerce transactions) via electronic media and unique recognizable keys for computer security; hardware technology to deny access to computer systems by hackers, prevent viruses to affect computer systems; computer device which attaches to external port of computer and programs as a self contained intelligent device with its own memory, operating system, onboard modifiable software store and secure access for computer systems management

Classification Information


International Class009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus.
US Class Codes021, 023, 026, 036, 038
Class Status Code6 - Active
Class Status DateThursday, December 20, 2001
Primary Code009
First Use Anywhere DateWednesday, September 27, 2000
First Use In Commerce DateWednesday, September 27, 2000

International Class035 - Advertising; business management; business administration; office functions.
US Class Codes100, 101, 102
Class Status Code6 - Active
Class Status DateWednesday, March 13, 2002
Primary Code035
First Use Anywhere DateWednesday, September 27, 2000
First Use In Commerce DateThursday, September 27, 2001

International Class038 - Services allowing people to communicate with another by a sensory means.
US Class Codes100, 101, 104
Class Status Code6 - Active
Class Status DateWednesday, March 13, 2002
Primary Code038
First Use Anywhere DateWednesday, September 27, 2000
First Use In Commerce DateWednesday, September 27, 2000

International Class041 - Education; providing of training; entertainment; sporting and cultural activities.
US Class Codes100, 101, 107
Class Status Code6 - Active
Class Status DateThursday, December 20, 2001
Primary Code041
First Use Anywhere DateWednesday, September 27, 2000
First Use In Commerce DateWednesday, September 27, 2000

International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateThursday, December 20, 2001
Primary Code042
First Use Anywhere DateWednesday, September 27, 2000
First Use In Commerce DateWednesday, September 27, 2000

Trademark Owner History


Party NameSecure Systems Limited
Party Type10 - Original Applicant
Legal Entity Type03 - Corporation
AddressWestern Perth 6005
AU

Trademark Events


Event DateEvent Description
Wednesday, February 25, 2004TEAS CHANGE OF CORRESPONDENCE RECEIVED
Friday, January 31, 2003TEAS CHANGE OF CORRESPONDENCE RECEIVED
Wednesday, December 11, 2002ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE
Tuesday, April 2, 2002NON-FINAL ACTION MAILED
Tuesday, February 19, 2002ASSIGNED TO EXAMINER