About 4 Trademarks found for “DETICA”
Filters
Mark | Details | Status | Class/Description | |
---|---|---|---|---|
DETICA BAE SYSTEMS PLC 1606146 11 Dec 2012 | ABANDONED SECTION 36 on 11 Aug 2015 | Compilation and systematization of information into computer databases... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Class 016 Class 016 Paper Goods and Printed Material ... Class 035 Advertising, Business & Retail Services Computer software, firmware and hardware for searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for searching for, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling transactions in the fields of crime, financial crime, fraud, anti-smuggling operations and counter-terrorism; computer software, firmware and hardware for searching, exploring, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling patterns and networks in data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for use in detecting and reporting on suspicious and abnormal behaviour in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, anti-smuggling operations, homeland security and counter-terrorism; computer software, firmware and hardware for analysing and predicting customer behaviour; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the field of information technology and communications technology security; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analysing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the fields of defence, law enforcement, and business process optimisation; data processing equipment, namely, computers; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for identifying and reporting intrusions into computer networks and communications networks; computer software, namely, firewalls; computer hardware, namely, firewalls; computer software, firmware and hardware for identifying, collecting, viewing, recording, analysing, sharing, processing, managing, filtering, storing, monitoring and transmitting data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; computer software for real-time situational awareness and workflow management; computer software, firmware and hardware for receiving, collecting, storing, viewing, sharing, monitoring, managing, processing, configuring, analysing, sanitising, cleansing, anonymising, de-anonymising, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation, transmitting, sharing and validating of data and of information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and of electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware which provide a gateway for anonymising, de-anonymising, transmitting, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation and validating data and information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for receiving, processing, converting, translating, validating, encrypting, decrypting, recording, sending and distributing data, namely financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for checking the integrity of data; computer software for transferring data between networks; computer software for message brokering; computer software for protecting the quality, integrity and security of data and information, in particular when transmitted between networks; computer software, firmware and hardware for minimising the risk of data leaks, data breach, data loss and other risks associated with the transmission of data between networks; computer software for the creation and operation of a data firewall which intercepts and transforms data sent between different networks, interfaces or security domains; computer software for checking data for viruses, malware and spyware; computer software for monitoring data levels; computer software, firmware and hardware for use in gathering intelligence and evidence; sensors, namely, motion sensors, proximity sensors and voice sensors; apparatus, namely, computers, for gathering information and evidence; computer software, firmware and hardware for use in detection, analysing, neutralisation, excavation and disposal in the field of explosive ordnance disposal; computer software, firmware, hardware, sensors, namely, motion sensors, weight sensors and proximity sensors for the purposes of countering improvised explosive devices (IEDs), including minefield clearance; parts and fittings for computer firmware and computer hardware; publications, brochures, reports, certificates, user manuals, user guides, technical manuals, instruction manuals, training manuals, educational, training and instructional materials in electronic form, namely, user guides, technical manuals, instruction sheets, instruction manuals, training manuals, online seminars, online training courses and DVDs, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed matter, namely, printed magazines, printed periodical publications, printed newsletters, printed brochures and printed product information sheets, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed reports; technical manuals; instruction manuals; user manuals; user guides; educational, training and instructional materials in printed form, namely, printed user guides, printed technical manuals, printed instruction sheets, printed instruction manuals and printed training manuals in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; certificates; newsletters; pamphlets; brochures; catalogues; printed advertising materials, namely, printed commercials (advertisements), printed posters, printed brochures, printed leaflets, printed magazines and printed product information sheets. Class 036 Insurance & Financial Services Computer software, firmware and hardware for searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for searching for, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling transactions in the fields of crime, financial crime, fraud, anti-smuggling operations and counter-terrorism; computer software, firmware and hardware for searching, exploring, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling patterns and networks in data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for use in detecting and reporting on suspicious and abnormal behaviour in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, anti-smuggling operations, homeland security and counter-terrorism; computer software, firmware and hardware for analysing and predicting customer behaviour; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the field of information technology and communications technology security; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analysing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the fields of defence, law enforcement, and business process optimisation; data processing equipment, namely, computers; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for identifying and reporting intrusions into computer networks and communications networks; computer software, namely, firewalls; computer hardware, namely, firewalls; computer software, firmware and hardware for identifying, collecting, viewing, recording, analysing, sharing, processing, managing, filtering, storing, monitoring and transmitting data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; computer software for real-time situational awareness and workflow management; computer software, firmware and hardware for receiving, collecting, storing, viewing, sharing, monitoring, managing, processing, configuring, analysing, sanitising, cleansing, anonymising, de-anonymising, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation, transmitting, sharing and validating of data and of information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and of electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware which provide a gateway for anonymising, de-anonymising, transmitting, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation and validating data and information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for receiving, processing, converting, translating, validating, encrypting, decrypting, recording, sending and distributing data, namely financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for checking the integrity of data; computer software for transferring data between networks; computer software for message brokering; computer software for protecting the quality, integrity and security of data and information, in particular when transmitted between networks; computer software, firmware and hardware for minimising the risk of data leaks, data breach, data loss and other risks associated with the transmission of data between networks; computer software for the creation and operation of a data firewall which intercepts and transforms data sent between different networks, interfaces or security domains; computer software for checking data for viruses, malware and spyware; computer software for monitoring data levels; computer software, firmware and hardware for use in gathering intelligence and evidence; sensors, namely, motion sensors, proximity sensors and voice sensors; apparatus, namely, computers, for gathering information and evidence; computer software, firmware and hardware for use in detection, analysing, neutralisation, excavation and disposal in the field of explosive ordnance disposal; computer software, firmware, hardware, sensors, namely, motion sensors, weight sensors and proximity sensors for the purposes of countering improvised explosive devices (IEDs), including minefield clearance; parts and fittings for computer firmware and computer hardware; publications, brochures, reports, certificates, user manuals, user guides, technical manuals, instruction manuals, training manuals, educational, training and instructional materials in electronic form, namely, user guides, technical manuals, instruction sheets, instruction manuals, training manuals, online seminars, online training courses and DVDs, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed matter, namely, printed magazines, printed periodical publications, printed newsletters, printed brochures and printed product information sheets, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed reports; technical manuals; instruction manuals; user manuals; user guides; educational, training and instructional materials in printed form, namely, printed user guides, printed technical manuals, printed instruction sheets, printed instruction manuals and printed training manuals in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; certificates; newsletters; pamphlets; brochures; catalogues; printed advertising materials, namely, printed commercials (advertisements), printed posters, printed brochures, printed leaflets, printed magazines and printed product information sheets. Class 037 Construction and Repair Services Computer software, firmware and hardware for searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for searching for, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling transactions in the fields of crime, financial crime, fraud, anti-smuggling operations and counter-terrorism; computer software, firmware and hardware for searching, exploring, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling patterns and networks in data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for use in detecting and reporting on suspicious and abnormal behaviour in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, anti-smuggling operations, homeland security and counter-terrorism; computer software, firmware and hardware for analysing and predicting customer behaviour; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the field of information technology and communications technology security; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analysing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the fields of defence, law enforcement, and business process optimisation; data processing equipment, namely, computers; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for identifying and reporting intrusions into computer networks and communications networks; computer software, namely, firewalls; computer hardware, namely, firewalls; computer software, firmware and hardware for identifying, collecting, viewing, recording, analysing, sharing, processing, managing, filtering, storing, monitoring and transmitting data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; computer software for real-time situational awareness and workflow management; computer software, firmware and hardware for receiving, collecting, storing, viewing, sharing, monitoring, managing, processing, configuring, analysing, sanitising, cleansing, anonymising, de-anonymising, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation, transmitting, sharing and validating of data and of information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and of electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware which provide a gateway for anonymising, de-anonymising, transmitting, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation and validating data and information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for receiving, processing, converting, translating, validating, encrypting, decrypting, recording, sending and distributing data, namely financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for checking the integrity of data; computer software for transferring data between networks; computer software for message brokering; computer software for protecting the quality, integrity and security of data and information, in particular when transmitted between networks; computer software, firmware and hardware for minimising the risk of data leaks, data breach, data loss and other risks associated with the transmission of data between networks; computer software for the creation and operation of a data firewall which intercepts and transforms data sent between different networks, interfaces or security domains; computer software for checking data for viruses, malware and spyware; computer software for monitoring data levels; computer software, firmware and hardware for use in gathering intelligence and evidence; sensors, namely, motion sensors, proximity sensors and voice sensors; apparatus, namely, computers, for gathering information and evidence; computer software, firmware and hardware for use in detection, analysing, neutralisation, excavation and disposal in the field of explosive ordnance disposal; computer software, firmware, hardware, sensors, namely, motion sensors, weight sensors and proximity sensors for the purposes of countering improvised explosive devices (IEDs), including minefield clearance; parts and fittings for computer firmware and computer hardware; publications, brochures, reports, certificates, user manuals, user guides, technical manuals, instruction manuals, training manuals, educational, training and instructional materials in electronic form, namely, user guides, technical manuals, instruction sheets, instruction manuals, training manuals, online seminars, online training courses and DVDs, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed matter, namely, printed magazines, printed periodical publications, printed newsletters, printed brochures and printed product information sheets, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed reports; technical manuals; instruction manuals; user manuals; user guides; educational, training and instructional materials in printed form, namely, printed user guides, printed technical manuals, printed instruction sheets, printed instruction manuals and printed training manuals in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; certificates; newsletters; pamphlets; brochures; catalogues; printed advertising materials, namely, printed commercials (advertisements), printed posters, printed brochures, printed leaflets, printed magazines and printed product information sheets. Class 041 Education and Entertainment Services Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modelling of data and transactions, and of patterns and networks in data and transactions; business consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; management consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; technical management consulting in the fields of information technology, communications technology and computer network security; strategy consulting in the fields of information technology, communications technology, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; provision of business information; provision of business management information; business analysis services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; analytics, namely, business intelligence and business lifecycle analysis; business operational analysis services; business research services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; carrying out studies in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure to provide evidence to support informed decision making; business consulting relating to operational availability, operational capability, capability planning, capability audits, cost analysis and effectiveness analysis; supply chain modelling, namely, mathematical modelling of supply chain networks; business modelling to support operational risk analysis and capability audits; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; business simulation to understand and explain business performance; enterprise mapping, namely, developing a breakdown of the key activities required to support a complex multi-organisational enterprise in the achievement of its goals; business facilitation services, namely, designing, running, guiding or chairing meetings to facilitate the reaching of a common goal or to facilitate a productive or successful exchange of information or ideas; identification of business or organisational performance indicators; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; information, advice and consultancy relating to detecting, combating and defending against financial crime, namely, money laundering, financial fraud, debit and credit card fraud and on-line fraud; information, advice and consultancy relating to the monitoring of financial transactions, detecting and preventing suspicious financial behaviour and reducing monetary losses; information, advice and consultancy relating to due diligence, background checks and vetting of customers and potential customers; information, advice and consultancy relating to the identification, investigation, review and management of cases of financial crime of all types; information, advice and consultancy relating to regulatory compliance, operational efficiency, risk management and corporate governance; information technology consultancy services; communications technology consultancy services; research, design, development and customisation of computer software, computer firmware, computer hardware, computer systems and computer architectures; preparation of technical reports; preparation of reports relating to computer data, computer software, computer firmware, computer hardware, computer operating systems, computer networks, communications networks, the security of computer networks and the security of communications networks; installation, integration, implementation, configuration, servicing, maintenance, updating, upgrading, repair and operational support services for computer software; computer software services relating to the searching, mining, collection, gathering, storage, exploration, analysis, processing, management, aggregation, modelling, viewing, sharing and monitoring of data and transactions, namely, patterns and networks in data and transactions; computer software services relating to the detection and prevention of fraud, on-line fraud, financial fraud, financial crime, suspicious behaviour, terrorism operations, smuggling operations, money laundering operations and monetary losses; computer software services relating to identifying, investigating, reviewing and managing cases of financial crime of all types; computer software services, namely, SaaS ("software as a service"), relating to predictive modelling, regulatory compliance, operational efficiency, risk management, risk prevention, corporate governance and customer relationship management; computer software services in the field of due diligence investigations on customers and potential customers; computer software services relating to the analysis and prediction of customer behaviour; computer system monitoring services; analytical services in the fields of computers, computer networks and communications networks; forensic analysis of computer operating systems; forensic analysis, reverse engineering, storage, recovery, conversion, compression and migration of computer data; computer software services in the fields of matching, transforming, sampling, partitioning and analysis of data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; analytical services in the field of computers, computer software, computer networks and communications networks; computer software, computer programs and manuals in electronic form, dealing with artificial intelligence; technical support services, namely, developing technologies for others in the field of artificial intelligence; neural network modelling, namely, mathematical and technical consulting services in the field of neural network technologies; project management services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; industrial analysis and research services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; providing analytical tools for raising threat alerts; computer virus, malware and spyware protection services; recovery of computer data and computer operating systems; incident management and investigations relating to threats and malicious behaviour in connection with computer operating systems, computer networks and communications networks; geographic mapping and spatial modelling; information, advice and consultancy relating to computer security, computer network security and communications network security; advising and consulting on how to reduce vulnerability to cyber-attacks, how to minimise the damage caused by cyber-attacks, and how to recover from cyber-attacks; computer software services, consultancy and advice in the field of gathering of intelligence and evidence; computer software services, consultancy and advice in the field of explosive ordnance disposal; computer software services, consultancy and advice relating to the countering of improvised explosive devices (IEDs), including minefield clearance; military and defence analysis and consulting; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; data security services, namely, provision of services for the secure gathering, storage, retrieval, analysis, monitoring, transmission and exchange of data, namely, personal data, business data, financial data, transactions data, Internet traffic data, computer data, communications network data, behavioural data, audio data, visual data and geographical data; analysis, consulting and advice in relation to national security; homeland security advisory and consultancy services, namely, advising and consulting on how to reduce vulnerability to terrorism, how to minimise the damage caused by terrorist attacks, and how to recover from terrorist attacks. Class 042 Computer & Software Services & Scientific Services Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modelling of data and transactions, and of patterns and networks in data and transactions; business consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; management consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; technical management consulting in the fields of information technology, communications technology and computer network security; strategy consulting in the fields of information technology, communications technology, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; provision of business information; provision of business management information; business analysis services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; analytics, namely, business intelligence and business lifecycle analysis; business operational analysis services; business research services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; carrying out studies in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure to provide evidence to support informed decision making; business consulting relating to operational availability, operational capability, capability planning, capability audits, cost analysis and effectiveness analysis; supply chain modelling, namely, mathematical modelling of supply chain networks; business modelling to support operational risk analysis and capability audits; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; business simulation to understand and explain business performance; enterprise mapping, namely, developing a breakdown of the key activities required to support a complex multi-organisational enterprise in the achievement of its goals; business facilitation services, namely, designing, running, guiding or chairing meetings to facilitate the reaching of a common goal or to facilitate a productive or successful exchange of information or ideas; identification of business or organisational performance indicators; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; information, advice and consultancy relating to detecting, combating and defending against financial crime, namely, money laundering, financial fraud, debit and credit card fraud and on-line fraud; information, advice and consultancy relating to the monitoring of financial transactions, detecting and preventing suspicious financial behaviour and reducing monetary losses; information, advice and consultancy relating to due diligence, background checks and vetting of customers and potential customers; information, advice and consultancy relating to the identification, investigation, review and management of cases of financial crime of all types; information, advice and consultancy relating to regulatory compliance, operational efficiency, risk management and corporate governance; information technology consultancy services; communications technology consultancy services; research, design, development and customisation of computer software, computer firmware, computer hardware, computer systems and computer architectures; preparation of technical reports; preparation of reports relating to computer data, computer software, computer firmware, computer hardware, computer operating systems, computer networks, communications networks, the security of computer networks and the security of communications networks; installation, integration, implementation, configuration, servicing, maintenance, updating, upgrading, repair and operational support services for computer software; computer software services relating to the searching, mining, collection, gathering, storage, exploration, analysis, processing, management, aggregation, modelling, viewing, sharing and monitoring of data and transactions, namely, patterns and networks in data and transactions; computer software services relating to the detection and prevention of fraud, on-line fraud, financial fraud, financial crime, suspicious behaviour, terrorism operations, smuggling operations, money laundering operations and monetary losses; computer software services relating to identifying, investigating, reviewing and managing cases of financial crime of all types; computer software services, namely, SaaS ("software as a service"), relating to predictive modelling, regulatory compliance, operational efficiency, risk management, risk prevention, corporate governance and customer relationship management; computer software services in the field of due diligence investigations on customers and potential customers; computer software services relating to the analysis and prediction of customer behaviour; computer system monitoring services; analytical services in the fields of computers, computer networks and communications networks; forensic analysis of computer operating systems; forensic analysis, reverse engineering, storage, recovery, conversion, compression and migration of computer data; computer software services in the fields of matching, transforming, sampling, partitioning and analysis of data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; analytical services in the field of computers, computer software, computer networks and communications networks; computer software, computer programs and manuals in electronic form, dealing with artificial intelligence; technical support services, namely, developing technologies for others in the field of artificial intelligence; neural network modelling, namely, mathematical and technical consulting services in the field of neural network technologies; project management services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; industrial analysis and research services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; providing analytical tools for raising threat alerts; computer virus, malware and spyware protection services; recovery of computer data and computer operating systems; incident management and investigations relating to threats and malicious behaviour in connection with computer operating systems, computer networks and communications networks; geographic mapping and spatial modelling; information, advice and consultancy relating to computer security, computer network security and communications network security; advising and consulting on how to reduce vulnerability to cyber-attacks, how to minimise the damage caused by cyber-attacks, and how to recover from cyber-attacks; computer software services, consultancy and advice in the field of gathering of intelligence and evidence; computer software services, consultancy and advice in the field of explosive ordnance disposal; computer software services, consultancy and advice relating to the countering of improvised explosive devices (IEDs), including minefield clearance; military and defence analysis and consulting; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; data security services, namely, provision of services for the secure gathering, storage, retrieval, analysis, monitoring, transmission and exchange of data, namely, personal data, business data, financial data, transactions data, Internet traffic data, computer data, communications network data, behavioural data, audio data, visual data and geographical data; analysis, consulting and advice in relation to national security; homeland security advisory and consultancy services, namely, advising and consulting on how to reduce vulnerability to terrorism, how to minimise the damage caused by terrorist attacks, and how to recover from terrorist attacks. Class 045 Personal & Legal & Social Services Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modelling of data and transactions, and of patterns and networks in data and transactions; business consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; management consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; technical management consulting in the fields of information technology, communications technology and computer network security; strategy consulting in the fields of information technology, communications technology, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; provision of business information; provision of business management information; business analysis services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; analytics, namely, business intelligence and business lifecycle analysis; business operational analysis services; business research services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; carrying out studies in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure to provide evidence to support informed decision making; business consulting relating to operational availability, operational capability, capability planning, capability audits, cost analysis and effectiveness analysis; supply chain modelling, namely, mathematical modelling of supply chain networks; business modelling to support operational risk analysis and capability audits; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; business simulation to understand and explain business performance; enterprise mapping, namely, developing a breakdown of the key activities required to support a complex multi-organisational enterprise in the achievement of its goals; business facilitation services, namely, designing, running, guiding or chairing meetings to facilitate the reaching of a common goal or to facilitate a productive or successful exchange of information or ideas; identification of business or organisational performance indicators; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; information, advice and consultancy relating to detecting, combating and defending against financial crime, namely, money laundering, financial fraud, debit and credit card fraud and on-line fraud; information, advice and consultancy relating to the monitoring of financial transactions, detecting and preventing suspicious financial behaviour and reducing monetary losses; information, advice and consultancy relating to due diligence, background checks and vetting of customers and potential customers; information, advice and consultancy relating to the identification, investigation, review and management of cases of financial crime of all types; information, advice and consultancy relating to regulatory compliance, operational efficiency, risk management and corporate governance; information technology consultancy services; communications technology consultancy services; research, design, development and customisation of computer software, computer firmware, computer hardware, computer systems and computer architectures; preparation of technical reports; preparation of reports relating to computer data, computer software, computer firmware, computer hardware, computer operating systems, computer networks, communications networks, the security of computer networks and the security of communications networks; installation, integration, implementation, configuration, servicing, maintenance, updating, upgrading, repair and operational support services for computer software; computer software services relating to the searching, mining, collection, gathering, storage, exploration, analysis, processing, management, aggregation, modelling, viewing, sharing and monitoring of data and transactions, namely, patterns and networks in data and transactions; computer software services relating to the detection and prevention of fraud, on-line fraud, financial fraud, financial crime, suspicious behaviour, terrorism operations, smuggling operations, money laundering operations and monetary losses; computer software services relating to identifying, investigating, reviewing and managing cases of financial crime of all types; computer software services, namely, SaaS ("software as a service"), relating to predictive modelling, regulatory compliance, operational efficiency, risk management, risk prevention, corporate governance and customer relationship management; computer software services in the field of due diligence investigations on customers and potential customers; computer software services relating to the analysis and prediction of customer behaviour; computer system monitoring services; analytical services in the fields of computers, computer networks and communications networks; forensic analysis of computer operating systems; forensic analysis, reverse engineering, storage, recovery, conversion, compression and migration of computer data; computer software services in the fields of matching, transforming, sampling, partitioning and analysis of data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; analytical services in the field of computers, computer software, computer networks and communications networks; computer software, computer programs and manuals in electronic form, dealing with artificial intelligence; technical support services, namely, developing technologies for others in the field of artificial intelligence; neural network modelling, namely, mathematical and technical consulting services in the field of neural network technologies; project management services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; industrial analysis and research services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; providing analytical tools for raising threat alerts; computer virus, malware and spyware protection services; recovery of computer data and computer operating systems; incident management and investigations relating to threats and malicious behaviour in connection with computer operating systems, computer networks and communications networks; geographic mapping and spatial modelling; information, advice and consultancy relating to computer security, computer network security and communications network security; advising and consulting on how to reduce vulnerability to cyber-attacks, how to minimise the damage caused by cyber-attacks, and how to recover from cyber-attacks; computer software services, consultancy and advice in the field of gathering of intelligence and evidence; computer software services, consultancy and advice in the field of explosive ordnance disposal; computer software services, consultancy and advice relating to the countering of improvised explosive devices (IEDs), including minefield clearance; military and defence analysis and consulting; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; data security services, namely, provision of services for the secure gathering, storage, retrieval, analysis, monitoring, transmission and exchange of data, namely, personal data, business data, financial data, transactions data, Internet traffic data, computer data, communications network data, behavioural data, audio data, visual data and geographical data; analysis, consulting and advice in relation to national security; homeland security advisory and consultancy services, namely, advising and consulting on how to reduce vulnerability to terrorism, how to minimise the damage caused by terrorist attacks, and how to recover from terrorist attacks. | ||
DETICA BAE SYSTEMS PLC 1233151 7 Oct 2004 | REGISTERED on 4 Nov 2010 | Computer hardware and software, namely, for use in the manipulation an... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Computer hardware and software, namely, for use in the manipulation and exploitation of large data volumes, information security applications, managing wired and wireless communications, web interfaces for use in web portal and application developments for intranets and internets; apparatus and instruments for use in relation to communications, wireless communications, interactive television, the internet, electronic databases, electronic commerce, customer contact centers, information security, signal processing and signal encryption, namely, digital signal processors, audio and video receivers, internet protocol (IP) processors; downloadable and electronic publications recorded on computer media, namely, books, pamphlets, articles, magazine sections, technical manuals, instruction and teaching materials and reports all in the field of wired and wireless communications, information security, data exploitation, business and technology consulting, and program management; printed matter, namely, books, pamphlets, articles, namely, magazine sections and technical manuals, instruction and teaching materials and reports in the field of wired and wireless communications, information security, data exploitation, business and technology consulting, and program management. Class 016 Class 016 Paper Goods and Printed Material Business consultation; business management consultation; business strategy consultation; business process advisory services, namely, business management consultancy as well as development of processes for the analysis and the implementation of strategy plans and management projects; business management information on a wide variety of topics to service providing professionals relating to the capture, storage, analysis and distribution of information; database management services; installation, repair and maintenance services in the field of computer hardware and communication equipment, namely, hardware apparatus and instruments for use in relation to communications, wireless communications, the Internet, electronic databases, electronic commerce, customer contact centers, information security, signal processing and signal encryption; telecommunications consultation; online non-downloadable publications, namely, books, pamphlets, articles, namely, magazine sections, technical manuals, instruction and teaching materials and reports in the field of wired and wireless communications, information security, data exploitation, business and technology consulting, and program management; computer consultation and design for others in the fields of computer hardware and software, apparatus and instruments for use in relation to communications, wireless communications, the Internet, electronic databases, electronic commerce, customer contact centers, information security, signal processing and signal encryption. ... Class 035 Advertising, Business & Retail Services Class 037 Construction and Repair Services Class 038 Communications Services Class 041 Education and Entertainment Services Class 042 Computer & Software Services & Scientific Services | ||
DETICA CYBERREVEAL BAE SYSTEMS PLC 1604996 4 Dec 2012 | ABANDONED SECTION 36 on 13 Jan 2015 | Information technology consultancy services; communications technology... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Class 016 Class 016 Paper Goods and Printed Material Computer software, computer firmware, computer hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, computer firmware, computer hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, computer firmware and computer hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, computer firmware, computer hardware and electronic sensors for identifying and reporting intrusions into computer and communications networks; computer firewalls; computer software, firmware and hardware for identifying, collecting, viewing, analysing, sharing, processing, managing, filtering, storing, monitoring and transmitting data; computer software for real-time situational awareness and workflow management; parts and fittings for computer firmware and hardware; publications, brochures, reports, certificates, user manuals, user guides, technical manuals, instruction manuals, training manuals, educational, training and instructional materials in electronic form ... Class 035 Advertising, Business & Retail Services Printed matter; printed reports; printed publications; technical manuals; instruction manuals; user manuals; user guides; educational, training and instructional materials; certificates; newsletters; pamphlets; brochures; catalogues; printed advertising materials Class 037 Construction and Repair Services Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely capturing, searching, exploring, identifying, analysing, processing, storing, managing, monitoring, aggregating and modelling of data; provision of business management information; business analysis services; business data analytics; business operational analysis services; business operational research services, including carrying out studies to provide evidence to support informed decision making; business consulting relating to operational availability and capability; business process modelling; business modelling to support operational risk analysis; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; information, advice and consultancy relating to all of the aforesaid services Class 039 Transportation & Storage Services Installation, configuration, customisation, servicing, maintenance, updating, upgrading, repair and operational support services for computer hardware, computer firmware, computer networks, communications networks, communications equipment and wireless communications equipment; diagnostic and maintenance services for computers, computer operating systems and computer networks; information, advice and consultancy relating to all of the aforesaid services Class 042 Computer & Software Services & Scientific Services Information technology consultancy services; communications technology consultancy services; research, design, development and customisation of computer software, computer firmware, computer hardware, computer systems and computer architectures; preparation of technical reports; preparation of reports relating to computer software, computer firmware, computer hardware, computer operating systems, the security of computer networks and the security of communications networks; design, development, installation, integration, implementation, configuration, customisation, servicing, maintenance, updating, upgrading, repair and operational support services for computer software; incident management and investigations relating to threats and malicious behaviour in connection with computer operating systems, computer networks and communications networks; information, advice and consultancy relating to computer security; advising and consulting on now to reduce vulnerability to cyber-attacks, how to minimise the damage caused by cyber-attacks, and how to recover from cyber-attacks; updating of computer software relating to computer security and prevention of computer risks; computer system monitoring services; providing analytical tools for raising threat alerts; computer virus, malware and spyware protection services; recovery of computer data; forensic analysis of computer data and computer operating systems; analytical services relating to computers, computer networks and communications networks; information, advisory and consultancy services relating to all of the aforesaid services | ||
![]() | DETICA NETREVEAL DESIGN BAE SYSTEMS PLC 1313103 16 Aug 2006 | REGISTERED on 21 Aug 2009 | Computer software designed, developed and used to analyse, process and... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Computer software designed, developed and used to analyse, process and monitor data within computer systems and networks; computer software relating to data mining and customer relationship management; computer software for use in detection and prevention of fraud, and in security, anti-terrorism and anti-smuggling operations Class 037 Class 037 Construction and Repair Services Repair and maintenance of computer hardware; advisory, consultancy and information services relating to the all of the aforesaid services; computer software services relating to the analysis, processing and monitoring of patterns and networks in data; data processing services relating to the analysis, processing and monitoring of patterns and networks in data; information technology consultancy services relating to the analysis, processing and monitoring of patterns and networks and data; computer software services relating to data mining and customer relationship management; advisory, information and consultancy services relating to all the aforesaid ... Class 042 Computer & Software Services & Scientific Services |
on 11 Aug 2015
BAE SYSTEMS PLC
1606146 · 11 Dec 2012
009
Class 009
Computer & Software Products & Electrical & Scientific Products
016
Class 016
Paper Goods and Printed Material
...
Class 035
Advertising, Business & Retail Services
Computer software, firmware and hardware for searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for searching for, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling transactions in the fields of crime, financial crime, fraud, anti-smuggling operations and counter-terrorism; computer software, firmware and hardware for searching, exploring, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling patterns and networks in data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for use in detecting and reporting on suspicious and abnormal behaviour in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, anti-smuggling operations, homeland security and counter-terrorism; computer software, firmware and hardware for analysing and predicting customer behaviour; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the field of information technology and communications technology security; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analysing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the fields of defence, law enforcement, and business process optimisation; data processing equipment, namely, computers; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for identifying and reporting intrusions into computer networks and communications networks; computer software, namely, firewalls; computer hardware, namely, firewalls; computer software, firmware and hardware for identifying, collecting, viewing, recording, analysing, sharing, processing, managing, filtering, storing, monitoring and transmitting data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; computer software for real-time situational awareness and workflow management; computer software, firmware and hardware for receiving, collecting, storing, viewing, sharing, monitoring, managing, processing, configuring, analysing, sanitising, cleansing, anonymising, de-anonymising, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation, transmitting, sharing and validating of data and of information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and of electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware which provide a gateway for anonymising, de-anonymising, transmitting, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation and validating data and information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for receiving, processing, converting, translating, validating, encrypting, decrypting, recording, sending and distributing data, namely financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for checking the integrity of data; computer software for transferring data between networks; computer software for message brokering; computer software for protecting the quality, integrity and security of data and information, in particular when transmitted between networks; computer software, firmware and hardware for minimising the risk of data leaks, data breach, data loss and other risks associated with the transmission of data between networks; computer software for the creation and operation of a data firewall which intercepts and transforms data sent between different networks, interfaces or security domains; computer software for checking data for viruses, malware and spyware; computer software for monitoring data levels; computer software, firmware and hardware for use in gathering intelligence and evidence; sensors, namely, motion sensors, proximity sensors and voice sensors; apparatus, namely, computers, for gathering information and evidence; computer software, firmware and hardware for use in detection, analysing, neutralisation, excavation and disposal in the field of explosive ordnance disposal; computer software, firmware, hardware, sensors, namely, motion sensors, weight sensors and proximity sensors for the purposes of countering improvised explosive devices (IEDs), including minefield clearance; parts and fittings for computer firmware and computer hardware; publications, brochures, reports, certificates, user manuals, user guides, technical manuals, instruction manuals, training manuals, educational, training and instructional materials in electronic form, namely, user guides, technical manuals, instruction sheets, instruction manuals, training manuals, online seminars, online training courses and DVDs, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed matter, namely, printed magazines, printed periodical publications, printed newsletters, printed brochures and printed product information sheets, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed reports; technical manuals; instruction manuals; user manuals; user guides; educational, training and instructional materials in printed form, namely, printed user guides, printed technical manuals, printed instruction sheets, printed instruction manuals and printed training manuals in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; certificates; newsletters; pamphlets; brochures; catalogues; printed advertising materials, namely, printed commercials (advertisements), printed posters, printed brochures, printed leaflets, printed magazines and printed product information sheets.
Class 036
Insurance & Financial Services
Computer software, firmware and hardware for searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for searching for, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling transactions in the fields of crime, financial crime, fraud, anti-smuggling operations and counter-terrorism; computer software, firmware and hardware for searching, exploring, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling patterns and networks in data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for use in detecting and reporting on suspicious and abnormal behaviour in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, anti-smuggling operations, homeland security and counter-terrorism; computer software, firmware and hardware for analysing and predicting customer behaviour; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the field of information technology and communications technology security; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analysing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the fields of defence, law enforcement, and business process optimisation; data processing equipment, namely, computers; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for identifying and reporting intrusions into computer networks and communications networks; computer software, namely, firewalls; computer hardware, namely, firewalls; computer software, firmware and hardware for identifying, collecting, viewing, recording, analysing, sharing, processing, managing, filtering, storing, monitoring and transmitting data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; computer software for real-time situational awareness and workflow management; computer software, firmware and hardware for receiving, collecting, storing, viewing, sharing, monitoring, managing, processing, configuring, analysing, sanitising, cleansing, anonymising, de-anonymising, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation, transmitting, sharing and validating of data and of information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and of electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware which provide a gateway for anonymising, de-anonymising, transmitting, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation and validating data and information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for receiving, processing, converting, translating, validating, encrypting, decrypting, recording, sending and distributing data, namely financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for checking the integrity of data; computer software for transferring data between networks; computer software for message brokering; computer software for protecting the quality, integrity and security of data and information, in particular when transmitted between networks; computer software, firmware and hardware for minimising the risk of data leaks, data breach, data loss and other risks associated with the transmission of data between networks; computer software for the creation and operation of a data firewall which intercepts and transforms data sent between different networks, interfaces or security domains; computer software for checking data for viruses, malware and spyware; computer software for monitoring data levels; computer software, firmware and hardware for use in gathering intelligence and evidence; sensors, namely, motion sensors, proximity sensors and voice sensors; apparatus, namely, computers, for gathering information and evidence; computer software, firmware and hardware for use in detection, analysing, neutralisation, excavation and disposal in the field of explosive ordnance disposal; computer software, firmware, hardware, sensors, namely, motion sensors, weight sensors and proximity sensors for the purposes of countering improvised explosive devices (IEDs), including minefield clearance; parts and fittings for computer firmware and computer hardware; publications, brochures, reports, certificates, user manuals, user guides, technical manuals, instruction manuals, training manuals, educational, training and instructional materials in electronic form, namely, user guides, technical manuals, instruction sheets, instruction manuals, training manuals, online seminars, online training courses and DVDs, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed matter, namely, printed magazines, printed periodical publications, printed newsletters, printed brochures and printed product information sheets, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed reports; technical manuals; instruction manuals; user manuals; user guides; educational, training and instructional materials in printed form, namely, printed user guides, printed technical manuals, printed instruction sheets, printed instruction manuals and printed training manuals in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; certificates; newsletters; pamphlets; brochures; catalogues; printed advertising materials, namely, printed commercials (advertisements), printed posters, printed brochures, printed leaflets, printed magazines and printed product information sheets.
Class 037
Construction and Repair Services
Computer software, firmware and hardware for searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for searching for, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling transactions in the fields of crime, financial crime, fraud, anti-smuggling operations and counter-terrorism; computer software, firmware and hardware for searching, exploring, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling patterns and networks in data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for use in detecting and reporting on suspicious and abnormal behaviour in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, anti-smuggling operations, homeland security and counter-terrorism; computer software, firmware and hardware for analysing and predicting customer behaviour; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the field of information technology and communications technology security; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analysing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the fields of defence, law enforcement, and business process optimisation; data processing equipment, namely, computers; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for identifying and reporting intrusions into computer networks and communications networks; computer software, namely, firewalls; computer hardware, namely, firewalls; computer software, firmware and hardware for identifying, collecting, viewing, recording, analysing, sharing, processing, managing, filtering, storing, monitoring and transmitting data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; computer software for real-time situational awareness and workflow management; computer software, firmware and hardware for receiving, collecting, storing, viewing, sharing, monitoring, managing, processing, configuring, analysing, sanitising, cleansing, anonymising, de-anonymising, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation, transmitting, sharing and validating of data and of information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and of electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware which provide a gateway for anonymising, de-anonymising, transmitting, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation and validating data and information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for receiving, processing, converting, translating, validating, encrypting, decrypting, recording, sending and distributing data, namely financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for checking the integrity of data; computer software for transferring data between networks; computer software for message brokering; computer software for protecting the quality, integrity and security of data and information, in particular when transmitted between networks; computer software, firmware and hardware for minimising the risk of data leaks, data breach, data loss and other risks associated with the transmission of data between networks; computer software for the creation and operation of a data firewall which intercepts and transforms data sent between different networks, interfaces or security domains; computer software for checking data for viruses, malware and spyware; computer software for monitoring data levels; computer software, firmware and hardware for use in gathering intelligence and evidence; sensors, namely, motion sensors, proximity sensors and voice sensors; apparatus, namely, computers, for gathering information and evidence; computer software, firmware and hardware for use in detection, analysing, neutralisation, excavation and disposal in the field of explosive ordnance disposal; computer software, firmware, hardware, sensors, namely, motion sensors, weight sensors and proximity sensors for the purposes of countering improvised explosive devices (IEDs), including minefield clearance; parts and fittings for computer firmware and computer hardware; publications, brochures, reports, certificates, user manuals, user guides, technical manuals, instruction manuals, training manuals, educational, training and instructional materials in electronic form, namely, user guides, technical manuals, instruction sheets, instruction manuals, training manuals, online seminars, online training courses and DVDs, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed matter, namely, printed magazines, printed periodical publications, printed newsletters, printed brochures and printed product information sheets, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed reports; technical manuals; instruction manuals; user manuals; user guides; educational, training and instructional materials in printed form, namely, printed user guides, printed technical manuals, printed instruction sheets, printed instruction manuals and printed training manuals in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; certificates; newsletters; pamphlets; brochures; catalogues; printed advertising materials, namely, printed commercials (advertisements), printed posters, printed brochures, printed leaflets, printed magazines and printed product information sheets.
Class 041
Education and Entertainment Services
Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modelling of data and transactions, and of patterns and networks in data and transactions; business consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; management consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; technical management consulting in the fields of information technology, communications technology and computer network security; strategy consulting in the fields of information technology, communications technology, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; provision of business information; provision of business management information; business analysis services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; analytics, namely, business intelligence and business lifecycle analysis; business operational analysis services; business research services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; carrying out studies in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure to provide evidence to support informed decision making; business consulting relating to operational availability, operational capability, capability planning, capability audits, cost analysis and effectiveness analysis; supply chain modelling, namely, mathematical modelling of supply chain networks; business modelling to support operational risk analysis and capability audits; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; business simulation to understand and explain business performance; enterprise mapping, namely, developing a breakdown of the key activities required to support a complex multi-organisational enterprise in the achievement of its goals; business facilitation services, namely, designing, running, guiding or chairing meetings to facilitate the reaching of a common goal or to facilitate a productive or successful exchange of information or ideas; identification of business or organisational performance indicators; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; information, advice and consultancy relating to detecting, combating and defending against financial crime, namely, money laundering, financial fraud, debit and credit card fraud and on-line fraud; information, advice and consultancy relating to the monitoring of financial transactions, detecting and preventing suspicious financial behaviour and reducing monetary losses; information, advice and consultancy relating to due diligence, background checks and vetting of customers and potential customers; information, advice and consultancy relating to the identification, investigation, review and management of cases of financial crime of all types; information, advice and consultancy relating to regulatory compliance, operational efficiency, risk management and corporate governance; information technology consultancy services; communications technology consultancy services; research, design, development and customisation of computer software, computer firmware, computer hardware, computer systems and computer architectures; preparation of technical reports; preparation of reports relating to computer data, computer software, computer firmware, computer hardware, computer operating systems, computer networks, communications networks, the security of computer networks and the security of communications networks; installation, integration, implementation, configuration, servicing, maintenance, updating, upgrading, repair and operational support services for computer software; computer software services relating to the searching, mining, collection, gathering, storage, exploration, analysis, processing, management, aggregation, modelling, viewing, sharing and monitoring of data and transactions, namely, patterns and networks in data and transactions; computer software services relating to the detection and prevention of fraud, on-line fraud, financial fraud, financial crime, suspicious behaviour, terrorism operations, smuggling operations, money laundering operations and monetary losses; computer software services relating to identifying, investigating, reviewing and managing cases of financial crime of all types; computer software services, namely, SaaS ("software as a service"), relating to predictive modelling, regulatory compliance, operational efficiency, risk management, risk prevention, corporate governance and customer relationship management; computer software services in the field of due diligence investigations on customers and potential customers; computer software services relating to the analysis and prediction of customer behaviour; computer system monitoring services; analytical services in the fields of computers, computer networks and communications networks; forensic analysis of computer operating systems; forensic analysis, reverse engineering, storage, recovery, conversion, compression and migration of computer data; computer software services in the fields of matching, transforming, sampling, partitioning and analysis of data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; analytical services in the field of computers, computer software, computer networks and communications networks; computer software, computer programs and manuals in electronic form, dealing with artificial intelligence; technical support services, namely, developing technologies for others in the field of artificial intelligence; neural network modelling, namely, mathematical and technical consulting services in the field of neural network technologies; project management services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; industrial analysis and research services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; providing analytical tools for raising threat alerts; computer virus, malware and spyware protection services; recovery of computer data and computer operating systems; incident management and investigations relating to threats and malicious behaviour in connection with computer operating systems, computer networks and communications networks; geographic mapping and spatial modelling; information, advice and consultancy relating to computer security, computer network security and communications network security; advising and consulting on how to reduce vulnerability to cyber-attacks, how to minimise the damage caused by cyber-attacks, and how to recover from cyber-attacks; computer software services, consultancy and advice in the field of gathering of intelligence and evidence; computer software services, consultancy and advice in the field of explosive ordnance disposal; computer software services, consultancy and advice relating to the countering of improvised explosive devices (IEDs), including minefield clearance; military and defence analysis and consulting; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; data security services, namely, provision of services for the secure gathering, storage, retrieval, analysis, monitoring, transmission and exchange of data, namely, personal data, business data, financial data, transactions data, Internet traffic data, computer data, communications network data, behavioural data, audio data, visual data and geographical data; analysis, consulting and advice in relation to national security; homeland security advisory and consultancy services, namely, advising and consulting on how to reduce vulnerability to terrorism, how to minimise the damage caused by terrorist attacks, and how to recover from terrorist attacks.
Class 042
Computer & Software Services & Scientific Services
Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modelling of data and transactions, and of patterns and networks in data and transactions; business consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; management consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; technical management consulting in the fields of information technology, communications technology and computer network security; strategy consulting in the fields of information technology, communications technology, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; provision of business information; provision of business management information; business analysis services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; analytics, namely, business intelligence and business lifecycle analysis; business operational analysis services; business research services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; carrying out studies in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure to provide evidence to support informed decision making; business consulting relating to operational availability, operational capability, capability planning, capability audits, cost analysis and effectiveness analysis; supply chain modelling, namely, mathematical modelling of supply chain networks; business modelling to support operational risk analysis and capability audits; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; business simulation to understand and explain business performance; enterprise mapping, namely, developing a breakdown of the key activities required to support a complex multi-organisational enterprise in the achievement of its goals; business facilitation services, namely, designing, running, guiding or chairing meetings to facilitate the reaching of a common goal or to facilitate a productive or successful exchange of information or ideas; identification of business or organisational performance indicators; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; information, advice and consultancy relating to detecting, combating and defending against financial crime, namely, money laundering, financial fraud, debit and credit card fraud and on-line fraud; information, advice and consultancy relating to the monitoring of financial transactions, detecting and preventing suspicious financial behaviour and reducing monetary losses; information, advice and consultancy relating to due diligence, background checks and vetting of customers and potential customers; information, advice and consultancy relating to the identification, investigation, review and management of cases of financial crime of all types; information, advice and consultancy relating to regulatory compliance, operational efficiency, risk management and corporate governance; information technology consultancy services; communications technology consultancy services; research, design, development and customisation of computer software, computer firmware, computer hardware, computer systems and computer architectures; preparation of technical reports; preparation of reports relating to computer data, computer software, computer firmware, computer hardware, computer operating systems, computer networks, communications networks, the security of computer networks and the security of communications networks; installation, integration, implementation, configuration, servicing, maintenance, updating, upgrading, repair and operational support services for computer software; computer software services relating to the searching, mining, collection, gathering, storage, exploration, analysis, processing, management, aggregation, modelling, viewing, sharing and monitoring of data and transactions, namely, patterns and networks in data and transactions; computer software services relating to the detection and prevention of fraud, on-line fraud, financial fraud, financial crime, suspicious behaviour, terrorism operations, smuggling operations, money laundering operations and monetary losses; computer software services relating to identifying, investigating, reviewing and managing cases of financial crime of all types; computer software services, namely, SaaS ("software as a service"), relating to predictive modelling, regulatory compliance, operational efficiency, risk management, risk prevention, corporate governance and customer relationship management; computer software services in the field of due diligence investigations on customers and potential customers; computer software services relating to the analysis and prediction of customer behaviour; computer system monitoring services; analytical services in the fields of computers, computer networks and communications networks; forensic analysis of computer operating systems; forensic analysis, reverse engineering, storage, recovery, conversion, compression and migration of computer data; computer software services in the fields of matching, transforming, sampling, partitioning and analysis of data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; analytical services in the field of computers, computer software, computer networks and communications networks; computer software, computer programs and manuals in electronic form, dealing with artificial intelligence; technical support services, namely, developing technologies for others in the field of artificial intelligence; neural network modelling, namely, mathematical and technical consulting services in the field of neural network technologies; project management services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; industrial analysis and research services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; providing analytical tools for raising threat alerts; computer virus, malware and spyware protection services; recovery of computer data and computer operating systems; incident management and investigations relating to threats and malicious behaviour in connection with computer operating systems, computer networks and communications networks; geographic mapping and spatial modelling; information, advice and consultancy relating to computer security, computer network security and communications network security; advising and consulting on how to reduce vulnerability to cyber-attacks, how to minimise the damage caused by cyber-attacks, and how to recover from cyber-attacks; computer software services, consultancy and advice in the field of gathering of intelligence and evidence; computer software services, consultancy and advice in the field of explosive ordnance disposal; computer software services, consultancy and advice relating to the countering of improvised explosive devices (IEDs), including minefield clearance; military and defence analysis and consulting; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; data security services, namely, provision of services for the secure gathering, storage, retrieval, analysis, monitoring, transmission and exchange of data, namely, personal data, business data, financial data, transactions data, Internet traffic data, computer data, communications network data, behavioural data, audio data, visual data and geographical data; analysis, consulting and advice in relation to national security; homeland security advisory and consultancy services, namely, advising and consulting on how to reduce vulnerability to terrorism, how to minimise the damage caused by terrorist attacks, and how to recover from terrorist attacks.
Class 045
Personal & Legal & Social Services
Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modelling of data and transactions, and of patterns and networks in data and transactions; business consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; management consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; technical management consulting in the fields of information technology, communications technology and computer network security; strategy consulting in the fields of information technology, communications technology, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; provision of business information; provision of business management information; business analysis services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; analytics, namely, business intelligence and business lifecycle analysis; business operational analysis services; business research services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; carrying out studies in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure to provide evidence to support informed decision making; business consulting relating to operational availability, operational capability, capability planning, capability audits, cost analysis and effectiveness analysis; supply chain modelling, namely, mathematical modelling of supply chain networks; business modelling to support operational risk analysis and capability audits; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; business simulation to understand and explain business performance; enterprise mapping, namely, developing a breakdown of the key activities required to support a complex multi-organisational enterprise in the achievement of its goals; business facilitation services, namely, designing, running, guiding or chairing meetings to facilitate the reaching of a common goal or to facilitate a productive or successful exchange of information or ideas; identification of business or organisational performance indicators; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; information, advice and consultancy relating to detecting, combating and defending against financial crime, namely, money laundering, financial fraud, debit and credit card fraud and on-line fraud; information, advice and consultancy relating to the monitoring of financial transactions, detecting and preventing suspicious financial behaviour and reducing monetary losses; information, advice and consultancy relating to due diligence, background checks and vetting of customers and potential customers; information, advice and consultancy relating to the identification, investigation, review and management of cases of financial crime of all types; information, advice and consultancy relating to regulatory compliance, operational efficiency, risk management and corporate governance; information technology consultancy services; communications technology consultancy services; research, design, development and customisation of computer software, computer firmware, computer hardware, computer systems and computer architectures; preparation of technical reports; preparation of reports relating to computer data, computer software, computer firmware, computer hardware, computer operating systems, computer networks, communications networks, the security of computer networks and the security of communications networks; installation, integration, implementation, configuration, servicing, maintenance, updating, upgrading, repair and operational support services for computer software; computer software services relating to the searching, mining, collection, gathering, storage, exploration, analysis, processing, management, aggregation, modelling, viewing, sharing and monitoring of data and transactions, namely, patterns and networks in data and transactions; computer software services relating to the detection and prevention of fraud, on-line fraud, financial fraud, financial crime, suspicious behaviour, terrorism operations, smuggling operations, money laundering operations and monetary losses; computer software services relating to identifying, investigating, reviewing and managing cases of financial crime of all types; computer software services, namely, SaaS ("software as a service"), relating to predictive modelling, regulatory compliance, operational efficiency, risk management, risk prevention, corporate governance and customer relationship management; computer software services in the field of due diligence investigations on customers and potential customers; computer software services relating to the analysis and prediction of customer behaviour; computer system monitoring services; analytical services in the fields of computers, computer networks and communications networks; forensic analysis of computer operating systems; forensic analysis, reverse engineering, storage, recovery, conversion, compression and migration of computer data; computer software services in the fields of matching, transforming, sampling, partitioning and analysis of data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; analytical services in the field of computers, computer software, computer networks and communications networks; computer software, computer programs and manuals in electronic form, dealing with artificial intelligence; technical support services, namely, developing technologies for others in the field of artificial intelligence; neural network modelling, namely, mathematical and technical consulting services in the field of neural network technologies; project management services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; industrial analysis and research services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; providing analytical tools for raising threat alerts; computer virus, malware and spyware protection services; recovery of computer data and computer operating systems; incident management and investigations relating to threats and malicious behaviour in connection with computer operating systems, computer networks and communications networks; geographic mapping and spatial modelling; information, advice and consultancy relating to computer security, computer network security and communications network security; advising and consulting on how to reduce vulnerability to cyber-attacks, how to minimise the damage caused by cyber-attacks, and how to recover from cyber-attacks; computer software services, consultancy and advice in the field of gathering of intelligence and evidence; computer software services, consultancy and advice in the field of explosive ordnance disposal; computer software services, consultancy and advice relating to the countering of improvised explosive devices (IEDs), including minefield clearance; military and defence analysis and consulting; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; data security services, namely, provision of services for the secure gathering, storage, retrieval, analysis, monitoring, transmission and exchange of data, namely, personal data, business data, financial data, transactions data, Internet traffic data, computer data, communications network data, behavioural data, audio data, visual data and geographical data; analysis, consulting and advice in relation to national security; homeland security advisory and consultancy services, namely, advising and consulting on how to reduce vulnerability to terrorism, how to minimise the damage caused by terrorist attacks, and how to recover from terrorist attacks.
Compilation and systematization of information into computer databases...
on 4 Nov 2010
BAE SYSTEMS PLC
1233151 · 7 Oct 2004
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Computer hardware and software, namely, for use in the manipulation and exploitation of large data volumes, information security applications, managing wired and wireless communications, web interfaces for use in web portal and application developments for intranets and internets; apparatus and instruments for use in relation to communications, wireless communications, interactive television, the internet, electronic databases, electronic commerce, customer contact centers, information security, signal processing and signal encryption, namely, digital signal processors, audio and video receivers, internet protocol (IP) processors; downloadable and electronic publications recorded on computer media, namely, books, pamphlets, articles, magazine sections, technical manuals, instruction and teaching materials and reports all in the field of wired and wireless communications, information security, data exploitation, business and technology consulting, and program management; printed matter, namely, books, pamphlets, articles, namely, magazine sections and technical manuals, instruction and teaching materials and reports in the field of wired and wireless communications, information security, data exploitation, business and technology consulting, and program management.
016
Class 016
Paper Goods and Printed Material
Business consultation; business management consultation; business strategy consultation; business process advisory services, namely, business management consultancy as well as development of processes for the analysis and the implementation of strategy plans and management projects; business management information on a wide variety of topics to service providing professionals relating to the capture, storage, analysis and distribution of information; database management services; installation, repair and maintenance services in the field of computer hardware and communication equipment, namely, hardware apparatus and instruments for use in relation to communications, wireless communications, the Internet, electronic databases, electronic commerce, customer contact centers, information security, signal processing and signal encryption; telecommunications consultation; online non-downloadable publications, namely, books, pamphlets, articles, namely, magazine sections, technical manuals, instruction and teaching materials and reports in the field of wired and wireless communications, information security, data exploitation, business and technology consulting, and program management; computer consultation and design for others in the fields of computer hardware and software, apparatus and instruments for use in relation to communications, wireless communications, the Internet, electronic databases, electronic commerce, customer contact centers, information security, signal processing and signal encryption.
...
Class 035
Advertising, Business & Retail Services
Class 037
Construction and Repair Services
Class 038
Communications Services
Class 041
Education and Entertainment Services
Class 042
Computer & Software Services & Scientific Services
Computer hardware and software, namely, for use in the manipulation an...
on 13 Jan 2015
BAE SYSTEMS PLC
1604996 · 4 Dec 2012
009
Class 009
Computer & Software Products & Electrical & Scientific Products
016
Class 016
Paper Goods and Printed Material
Computer software, computer firmware, computer hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, computer firmware, computer hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, computer firmware and computer hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, computer firmware, computer hardware and electronic sensors for identifying and reporting intrusions into computer and communications networks; computer firewalls; computer software, firmware and hardware for identifying, collecting, viewing, analysing, sharing, processing, managing, filtering, storing, monitoring and transmitting data; computer software for real-time situational awareness and workflow management; parts and fittings for computer firmware and hardware; publications, brochures, reports, certificates, user manuals, user guides, technical manuals, instruction manuals, training manuals, educational, training and instructional materials in electronic form
...
Class 035
Advertising, Business & Retail Services
Printed matter; printed reports; printed publications; technical manuals; instruction manuals; user manuals; user guides; educational, training and instructional materials; certificates; newsletters; pamphlets; brochures; catalogues; printed advertising materials
Class 037
Construction and Repair Services
Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely capturing, searching, exploring, identifying, analysing, processing, storing, managing, monitoring, aggregating and modelling of data; provision of business management information; business analysis services; business data analytics; business operational analysis services; business operational research services, including carrying out studies to provide evidence to support informed decision making; business consulting relating to operational availability and capability; business process modelling; business modelling to support operational risk analysis; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; information, advice and consultancy relating to all of the aforesaid services
Class 039
Transportation & Storage Services
Installation, configuration, customisation, servicing, maintenance, updating, upgrading, repair and operational support services for computer hardware, computer firmware, computer networks, communications networks, communications equipment and wireless communications equipment; diagnostic and maintenance services for computers, computer operating systems and computer networks; information, advice and consultancy relating to all of the aforesaid services
Class 042
Computer & Software Services & Scientific Services
Information technology consultancy services; communications technology consultancy services; research, design, development and customisation of computer software, computer firmware, computer hardware, computer systems and computer architectures; preparation of technical reports; preparation of reports relating to computer software, computer firmware, computer hardware, computer operating systems, the security of computer networks and the security of communications networks; design, development, installation, integration, implementation, configuration, customisation, servicing, maintenance, updating, upgrading, repair and operational support services for computer software; incident management and investigations relating to threats and malicious behaviour in connection with computer operating systems, computer networks and communications networks; information, advice and consultancy relating to computer security; advising and consulting on now to reduce vulnerability to cyber-attacks, how to minimise the damage caused by cyber-attacks, and how to recover from cyber-attacks; updating of computer software relating to computer security and prevention of computer risks; computer system monitoring services; providing analytical tools for raising threat alerts; computer virus, malware and spyware protection services; recovery of computer data; forensic analysis of computer data and computer operating systems; analytical services relating to computers, computer networks and communications networks; information, advisory and consultancy services relating to all of the aforesaid services
Information technology consultancy services; communications technology...
on 21 Aug 2009
BAE SYSTEMS PLC
1313103 · 16 Aug 2006
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Computer software designed, developed and used to analyse, process and monitor data within computer systems and networks; computer software relating to data mining and customer relationship management; computer software for use in detection and prevention of fraud, and in security, anti-terrorism and anti-smuggling operations
037
Class 037
Construction and Repair Services
Repair and maintenance of computer hardware; advisory, consultancy and information services relating to the all of the aforesaid services; computer software services relating to the analysis, processing and monitoring of patterns and networks in data; data processing services relating to the analysis, processing and monitoring of patterns and networks in data; information technology consultancy services relating to the analysis, processing and monitoring of patterns and networks and data; computer software services relating to data mining and customer relationship management; advisory, information and consultancy services relating to all the aforesaid
...
Class 042
Computer & Software Services & Scientific Services
Computer software designed, developed and used to analyse, process and...
Apply for Trademark
Select countries to protect your logo trademark
Trademark Name
Country Selected
Canada
$599 / 1 class + gov fee
United States
$99 / 1 class + gov fee
Canada
$599 / 1 class + gov fee
Mexico
$499 / 1 class + gov fee
European Union
$700 / 1 class + gov fee
China
$499 / 1 class + gov fee
South Korea
$699 / 1 class + gov fee
Japan
$799 / 1 class + gov fee
India
$99 / 1 class + gov fee
United Kingdom
$499 / 1 class + gov fee
Australia
$299 / 1 class + gov fee
Israel
$699 / 1 class + gov fee
United Arab Emirates
$699 / 1 class + gov fee
New Zealand
$699 / 1 class + gov fee
Brazil
$499 / 1 class + gov fee
Taiwan
$799 / 1 class + gov fee
Ukraine
$799 / 1 class + gov fee
Indonesia
$699 / 1 class + gov fee
South Africa
$499 / 1 class + gov fee
Singapore
$799 / 1 class + gov fee
Saudi Arabia
$799 / 1 class + gov fee
Afghanistan
$799 / 1 class + gov fee
Algeria
$799 / 1 class + gov fee
Argentina
$399 / 1 class + gov fee
Austria
$899 / 1 class + gov fee
Bahrain
$699 / 1 class + gov fee
Bangladesh
$599 / 1 class + gov fee
Benelux
$999 / 1 class + gov fee
Bhutan
$899 / 1 class + gov fee
Bolivia
$799 / 1 class + gov fee
Botswana
$1299 / 1 class + gov fee
British Virgin Islands
$1199 / 1 class + gov fee
Bulgaria
$799 / 1 class + gov fee
Cambodia
$799 / 1 class + gov fee
Chile
$499 / 1 class + gov fee
Colombia
$699 / 1 class + gov fee
Congo
$1199 / 1 class + gov fee
Costa Rica
$899 / 1 class + gov fee
Croatia
$899 / 1 class + gov fee
Cyprus
$999 / 1 class + gov fee
Czech Republic
$899 / 1 class + gov fee
Denmark
$799 / 1 class + gov fee
Dominican Republic
$899 / 1 class + gov fee
Ecuador
$799 / 1 class + gov fee
Egypt
$699 / 1 class + gov fee
El Salvador
$799 / 1 class + gov fee
Ethiopia
$1099 / 1 class + gov fee
France
$899 / 1 class + gov fee
Gaza
$799 / 1 class + gov fee
Germany
$899 / 1 class + gov fee
Greece
$799 / 1 class + gov fee
Guatemala
$899 / 1 class + gov fee
Haiti
$899 / 1 class + gov fee
Honduras
$899 / 1 class + gov fee
Hong Kong (SAR)
$899 / 1 class + gov fee
Hungary
$1099 / 1 class + gov fee
Iraq
$1499 / 1 class + gov fee
Italy
$899 / 1 class + gov fee
Jordan
$799 / 1 class + gov fee
Kazakhstan
$799 / 1 class + gov fee
Kenya
$899 / 1 class + gov fee
Kuwait
$799 / 1 class + gov fee
Laos
$699 / 1 class + gov fee
Lebanon
$999 / 1 class + gov fee
Lesotho
$1199 / 1 class + gov fee
Libya
$899 / 1 class + gov fee
Madrid Protocol (WIPO)
$1999 / 1 class + gov fee
Malawi
$1099 / 1 class + gov fee
Malaysia
$699 / 1 class + gov fee
Maldives
$999 / 1 class + gov fee
Morocco
$999 / 1 class + gov fee
Mozambique
$899 / 1 class + gov fee
Myanmar
$799 / 1 class + gov fee
Namibia
$799 / 1 class + gov fee
Nepal
$699 / 1 class + gov fee
Nicaragua
$899 / 1 class + gov fee
Norway
$899 / 1 class + gov fee
Oman
$1099 / 1 class + gov fee
Pakistan
$799 / 1 class + gov fee
Panama
$899 / 1 class + gov fee
Paraguay
$899 / 1 class + gov fee
Peru
$799 / 1 class + gov fee
Philippines
$899 / 1 class + gov fee
Poland
$499 / 1 class + gov fee
Portugal
$899 / 1 class + gov fee
Puerto Rico
$899 / 1 class + gov fee
Qatar
$799 / 1 class + gov fee
Romania
$899 / 1 class + gov fee
Serbia
$899 / 1 class + gov fee
Slovakia
$899 / 1 class + gov fee
Spain
$899 / 1 class + gov fee
Sri Lanka
$699 / 1 class + gov fee
Swaziland
$1299 / 1 class + gov fee
Sweden
$799 / 1 class + gov fee
Switzerland
$899 / 1 class + gov fee
Thailand
$799 / 1 class + gov fee
Tunisia
$899 / 1 class + gov fee
Turkey
$799 / 1 class + gov fee
Uganda
$699 / 1 class + gov fee
United Republic of Tanzania
$699 / 1 class + gov fee
Uruguay
$799 / 1 class + gov fee
Venezuela
$899 / 1 class + gov fee
Vietnam
$799 / 1 class + gov fee
West Bank, Palestine
$799 / 1 class + gov fee
Yemen
$1699 / 1 class + gov fee
Albania
$899 / 1 class + gov fee
Andorra
$899 / 1 class + gov fee
Angola
$1299 / 1 class + gov fee
Antigua and Barbuda
$1299 / 1 class + gov fee
Armenia
$799 / 1 class + gov fee
Azerbaijan
$799 / 1 class + gov fee
Bahamas
$1399 / 1 class + gov fee
Barbados
$1299 / 1 class + gov fee
Belgium
$999 / 1 class + gov fee
Belize
$1299 / 1 class + gov fee
Benin
$799 / 1 class + gov fee
Bosnia and Herzegovina
$999 / 1 class + gov fee
Brunei
$1299 / 1 class + gov fee
Burkina Faso
$799 / 1 class + gov fee
Burundi
$1199 / 1 class + gov fee
Cabo Verde
$899 / 1 class + gov fee
Cameroon
$799 / 1 class + gov fee
Central African Republic (CAR)
$799 / 1 class + gov fee
Chad
$799 / 1 class + gov fee
Comoros
$799 / 1 class + gov fee
Cote d'Ivoire
$799 / 1 class + gov fee
Czechia
$999 / 1 class + gov fee
Djibouti
$1199 / 1 class + gov fee
Dominica
$1299 / 1 class + gov fee
Equatorial Guinea
$799 / 1 class + gov fee
Eritrea
$999 / 1 class + gov fee
Estonia
$1299 / 1 class + gov fee
Eswatini
$1299 / 1 class + gov fee
Fiji
$899 / 1 class + gov fee
Finland
$699 / 1 class + gov fee
Gabon
$799 / 1 class + gov fee
Gambia
$899 / 1 class + gov fee
Georgia
$799 / 1 class + gov fee
Ghana
$999 / 1 class + gov fee
Grenada
$1299 / 1 class + gov fee
Guinea
$799 / 1 class + gov fee
Guinea-Bissau
$799 / 1 class + gov fee
Guyana
$1299 / 1 class + gov fee
Iceland
$1299 / 1 class + gov fee
Ireland
$899 / 1 class + gov fee
Jamaica
$1199 / 1 class + gov fee
Kiribati
$999 / 1 class + gov fee
Kosovo
$899 / 1 class + gov fee
Kyrgyzstan
$899 / 1 class + gov fee
Latvia
$699 / 1 class + gov fee
Liberia
$999 / 1 class + gov fee
Liechtenstein
$999 / 1 class + gov fee
Lithuania
$699 / 1 class + gov fee
Luxembourg
$999 / 1 class + gov fee
Madagascar
$999 / 1 class + gov fee
Mali
$799 / 1 class + gov fee
Malta
$599 / 1 class + gov fee
Marshall Islands
$999 / 1 class + gov fee
Mauritania
$799 / 1 class + gov fee
Mauritius
$999 / 1 class + gov fee
Micronesia
$999 / 1 class + gov fee
Moldova
$999 / 1 class + gov fee
Monaco
$1399 / 1 class + gov fee
Mongolia
$599 / 1 class + gov fee
Montenegro
$899 / 1 class + gov fee
Nauru
$999 / 1 class + gov fee
Netherlands
$999 / 1 class + gov fee
Niger
$799 / 1 class + gov fee
Nigeria
$399 / 1 class + gov fee
North Macedonia
$899 / 1 class + gov fee
Palau
$999 / 1 class + gov fee
Palestine
$999 / 1 class + gov fee
Papua New Guinea
$799 / 1 class + gov fee
Rwanda
$999 / 1 class + gov fee
Saint Kitts and Nevis
$1299 / 1 class + gov fee
Saint Lucia
$1299 / 1 class + gov fee
Saint Vincent and the Grenadines
$1299 / 1 class + gov fee
Samoa
$1199 / 1 class + gov fee
San Marino
$999 / 1 class + gov fee
Sao Tome and Principe
$999 / 1 class + gov fee
Senegal
$799 / 1 class + gov fee
Seychelles
$999 / 1 class + gov fee
Sierra Leone
$999 / 1 class + gov fee
Slovenia
$899 / 1 class + gov fee
Solomon Islands
$999 / 1 class + gov fee
Somalia
$999 / 1 class + gov fee
South Sudan
$999 / 1 class + gov fee
Suriname
$1599 / 1 class + gov fee
Tajikistan
$799 / 1 class + gov fee
Tanzania
$699 / 1 class + gov fee
Timor-Leste
$999 / 1 class + gov fee
Togo
$799 / 1 class + gov fee
Tonga
$1299 / 1 class + gov fee
Trinidad and Tobago
$1399 / 1 class + gov fee
Turkmenistan
$799 / 1 class + gov fee
Tuvalu
$999 / 1 class + gov fee
Uzbekistan
$699 / 1 class + gov fee
Vanuatu
$1199 / 1 class + gov fee
Zambia
$899 / 1 class + gov fee
Zimbabwe
$899 / 1 class + gov fee
OAPI
$899 / 1 class + gov fee
ARIPO
$999 / 1 class + gov fee