Trademark Overview
On Wednesday, November 28, 2001, a trademark application was filed for TOMORROW'S TECHNOLOGIES TODAY with the United States Patent and Trademark Office. The USPTO has given the TOMORROW'S TECHNOLOGIES TODAY trademark a serial number of 76342456. The federal status of this trademark filing is ABANDONED - FAILURE TO RESPOND OR LATE RESPONSE as of Wednesday, December 11, 2002. This trademark is owned by Secure Systems Limited. The TOMORROW'S TECHNOLOGIES TODAY trademark is filed in the Computer & Software Products & Electrical & Scientific Products, Advertising, Business and Retail Services, Communication Services, Education & Entertainment Services, and Computer & Software Services & Scientific Services categories with the following description:
Hardware based computer technology programmed to design and permit the safe storage of data and software within a computer (without the need to use firewalls and data encryption software) and prevents unauthorized reads and writes to the hard disk drive; hard ware based computer technology to permit the safe transmission of data and data processing procedures (eg files, messages and e-commerce transactions) via electronic media and unique recognizable keys for computer security, hardware technology to deny access to computer systems by hackers, prevent viruses to affect computer systems; computer device which attaches to external port of computer and programs as a self contained intelligent device with its own memory operating system, onboard modifiable software store and secure access for computer systems management
Hardware based computer technology for business management and administration; programmed to design and permit the safe storage of data and software within a computer (without the need to use firewalls and data encryption software) and prevents unauthorized reads and writes to the hard disk drive; hard ware based computer technology to permit the safe transmission of data and data processing procedures (e.g. files, messages and e-commerce business to business transactions) via electronic media and unique recognizable keys for computer security; hardware technology to deny access to computer systems by hackers, prevent viruses to affect computer systems; computer device which attaches to external port of computer and programs as a self contained intelligent device with its own memory, operating system, onboard modifiable software store and secure access for computer systems management
Hardware based computer technology programmed design and permit the secured transmittal of messages from user to user and the safe storage of data and software within a computer (without the need to use firewalls and data encryption software) and prevents unauthorized reads and writes to the hard disk drive; hard ware based computer technology to permit the safe transmission of data and data processing procedures (e.g. files, messages and e-commerce transactions) via electronic media and unique recognizable keys for computer security; hardware technology to deny access to computer systems by hackers, prevent viruses to affect computer systems; computer device which attaches to external port of computer and programs as a software store and secure access for computer systems management
Hardware based computer technology which provides education and training for users of computer and electronic systems to permit the safe storage of data and software within a computer (without the need to use firewalls and data encryption software) and prevents unauthorized reads and writes to the hard disk drive; hard ware based computer technology to permit the safe transmission of data and data processing procedures (eg files, messages and e-commerce transactions) via electronic media and unique recognizable keys for computer security; hardware technology to deny access to computer systems by hackers, prevent viruses to affect computer systems; computer device which attaches to eternal port of computer and programs as a self contained intelligent device with its own memory, operating system, onboard modifiable software store and secure access for computer systems management
Hardware based computer technology programmed to design and permit the safe storage of data and software within a computer (without the need to use firewalls and data encryption software) and prevents unauthorized reads and writes to the hard disk drive; hard ware based, computer technology to permit the safe transmission of data and data processing procedures (eg files, messages and e- commerce transactions) via electronic media and unique recognizable keys for computer security; hardware technology to deny access to computer systems by hackers, prevent viruses to affect computer systems; computer device which attaches to external port of computer and programs as a self contained intelligent device with its own memory, operating system, onboard modifiable software store and secure access for computer systems management