Trademarkia Logo

Canada

C$
BB
REGISTERED

on 17 May 2023

Last Applicant/ Owned by

BLACKBERRY LIMITED

2200 University Avenue EastWaterloo, Ontario N2K 0A7

CA

Serial Number

2092529 filed on 2th Oct 2020

Registration Number

TMA1180413 registered on 17th May 2023

Registration expiry Date

2th Oct 2030

Correspondent Address

PERLEY-ROBERTSON, HILL & MCDOUGALL LLP

1400 - 340 ALBERT STREETOTTAWA

ONTARIO

CA

K1R0A5

BB

Trademark usage description

downloadable computer software for cybersecurity, detecting and mitigating network attacks using artificial intelligence, machine learning and deep le Read More

Vienna Information


26 . 4 . 2

RectanglesRectangles

26 . 4 . 6

Quadrilateral figures with one or more convex or concave sides -- Note: Not including elongated surfaces with one or more convex or concave sides (25.3.1).Figures quadrilatérales à un ou plusieurs côtés convexes ou concaves -- Note: Non compris les surfaces allongées avec un ou plusieurs côtés convexes ou concaves (25.3.1).

26 . 4 . 9

Several quadrilaterals juxtaposed, joined or intersectingPlusieurs quadrilatères, juxtaposés, accolés ou se coupant

26 . 4 . 24

Quadrilaterals with dark surfaces or parts of surfacesQuadrilatères avec surface ou partie de la surface foncée

27 . 5 . 1

Letters presenting a special form of writingLettres présentant un graphisme spécial

27 . 5 . 8

Letters linked to or containing a figurative element -- Note: Letters representing a human being or a part of the human body, an animal or a part of an animal's body, a plant, a heavenly body, a natural phenomenon or an object are classified in division 27.3.Lettres liées à un élément figuratif ou contenant un élément figuratif -- Note: Les lettres représentant un être humain ou une partie du corps humain, un animal ou une partie du corps d'un animal, un végétal, un corps céleste, un phénomène naturel ou un objet sont classées dans la division 27.3.

27 . 5 . 22

Monograms formed of intertwined, overlapping or otherwise combined lettersMonogrammes formés par des lettres enlacées, se chevauchant ou combinées autrement

Classification Information


Class [009]
Downloadable computer software for cybersecurity, detecting and mitigating network attacks using artificial intelligence, machine learning and deep learning; downloadable computer software for continuous monitoring, identifying, verifying, analyzing, comparing, classifying, sorting and scoring of collected or acquired digital data from network traffic, network communication, network flow data, and network intercommunication using artificial intelligence, machine learning and deep learning; downloadable computer software for providing initiation, distribution, delivery and response tracking of emergency notifications to users via personal communication devices, namely, smart phones, cell phones, telephones, video phones, computers, Personal Digital Assistants (PDAs) and public mass communication, devices systems, comprising, loudspeakers, television broadcasts, radio broadcast, Internet broadcasts, mass email distribution, telecommunications and global computer networks to deliver emergency notifications and facilitate collaboration amongst individuals and organizations before, during and after public emergency and mass crisis events relating to natural disasters, severe weather, floods, industrial accidents, transportation systems disasters, mass power outages, fires, terrorist attacks, health hazards, health emergencies and facility intrusions; downloadable computer software for supporting exchange of information and collaboration processes amongst organizations and people during emergency and crisis situations, namely, computer software supporting managing organization directories and connections across organizations for the purpose of connecting them and facilitating collaboration before, during and after public emergencies and mass crisis events, namely, natural disasters, severe weather, floods, industrial accidents, transportation systems disasters, mass power outages, fires, terrorist attacks, health hazards, health emergencies and facility intrusions; downloadable computer software for the purposes of data collection, monitoring, and mass notification services for managing emergency, and crisis and business critical situations and improving crisis communications capability; downloadable computer software for the secure transmission of mass notification emergency information via audio, video and electronic communications networks and devices, including social networks; downloadable computer software for managing and analyzing data feeds and data inputs in the field of crisis reporting, communication and management, and for sending notifications through multiple IP network channels and delivery services; downloadable computer software for loading data from personnel directories, and managing users for purpose of crisis communication; downloadable computer software for managing organization directories and connections across organizations for the purpose of connecting them and facilitating collaboration before, during and after crisis situations; downloadable computer software for electronically monitoring, detecting and reporting on alarms, alerts, emergencies, hazards, security threats, and dangerous weather; downloadable computer software for notifying individuals and organizations of a changed status or condition of a sensing device or input feed via network based message alerts; downloadable software in the nature of a mobile application for sending, receiving, confirming and responding to alerts, messages, and notifications via wireless communications networks or the Internet, namely, computer software for facilitating communication between organizations and individuals before, during and after public emergency and mass crisis events relating to natural disasters, severe weather, floods, industrial accidents, transportation systems disasters, mass power outages, fires, terrorist attacks, health hazards, health emergencies and facility intrusions via personal communication devices, namely, smart phones, cell phones, telephones, video phones, computers, Personal Digital Assistants (PDAs) and public mass communication devices, namely, public broadcast systems, comprising, loudspeakers, television broadcasts, radio broadcast, Internet broadcasts, mass email distribution, telecommunications and global computer networks; downloadable computer software in the nature of desktop software applications for providing desktop notifications that capture the user's attention with audio-visual signals and allow users to confirm, respond to notifications or receive additional information related to notifications; downloadable computer software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, enterprise of things (EOT) and internet of things (IoT) enabled devices; downloadable computer software for managing computer network endpoint security and predicting and monitoring security threats to computer networks; downloadable computer operating system programs; downloadable computer software for performing data security functions in the field of cryptographic network security; downloadable computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications over the Internet and other computer networks; downloadable computer software, namely, encryption software to enable secure transmission of digital information; downloadable computer software to integrate managed security, namely, virtual private network (VPN), public key infrastructure (PKI), digital certificate issuance, verification and management; downloadable Internet of things (IOT) management software platform consisting of downloadable cloud-based software, mobile and desktop applications, and premise-based gateway agent software, namely, computer software for managing, controlling and securing electronic devices via the Internet; downloadable computer software for machine-to-machine (M2M) communication, remote data collection and process control, namely, computer software that enables point-to-point communication between machines, sensors and hardware over cellular or wired networks; downloadable computer software for asset tracking, namely, computer software for fleet asset tracking in the transportation industry, software to track and manage IP-enabled machines; downloadable computer software to track and manage IP-enabled machines; downloadable software Development Kits (SDKs), Application Programming Interface (API) software, and Enterprise Application Integration (EAI) software for creating software and applications related to machine to machine (M2M) devices, network and Internet connected devices, and IOT devices; downloadable computer software, namely, software and middleware used to allow software applications to interface with mobile and remote devices and to allow connectivity, memory storage, and device management, all via a computer network; downloadable computer software and hardware for fleet asset tracking in the transportation industry; downloadable computer software and hardware to collect, filter and process electronic data, namely, audio, voice, video, images, text, electronic mail and messaging, documents, and vehicle and driver telematics and analytics concerning driver behavior, vehicle diagnostics, maintenance, performance, location, and downtime; downloadable computer software systems for use in dispatch, video monitoring, driver compliance, driver performance, driver scorecards, document management, trailer tracking, asset tracking, vehicle tracking, telematics, fuel economy tracking, driver workflow, integrations with third party software, vehicle utilization, temperature tracking, vehicle inspection reports; mobile phones, smart phones, tablet computers and wireless communication devices for voice, data, or image transmission, namely, smart phones, cell phones, telephones, video phones, computers, and Personal Digital Assistants (PDAs) ; accessories for mobile phones, smart phones, tablet computers and wireless communication devices, namely, accessories for mobile phones, smart phones, tablet computers and wireless communication devices, namely, headsets and earphones, phone chargers, battery chargers, mounts, cradles and holders for hands-free phone use, charging and docking stations, cell phone and tablet computer protective cases, protective covers and cases for handheld electronic devices, cell phone holsters, and speakers; downloadable computer software for mobile phones, portable media players, and handheld computers, namely, software for sending digital photos, videos, images, and text to others via the global computer network; downloadable computer software in the fields of Mobile Device Management (MDM), Mobile Applications Management (MAM), Mobile Security Management (MSM), Mobile Information Management (MIM), and mobile Identity and Access Management (IAM), namely, software to monitor, manage and secure corporate or personally-owned mobile devices that run across multiple operating systems, namely, smart phones, cell phones, telephones, video phones, computers, and Personal Digital Assistants (PDAs).


Classification kind code

11

Class [042]
Providing temporary use of online non-downloadable computer software for measuring, assessing, identifying, detecting, analyzing, preventing, and responding to cybersecurity threats, attacks, risks, and vulnerabilities; providing temporary use of online non-downloadable software for artificial intelligence, analytics-based machine learning, and deep learning software, all for the purpose of measuring, detecting, analyzing, preventing and responding to cybersecurity attacks; design and development of crisis communication systems comprised of computer hardware and software; engineering and systems analysis in the field of crisis communication systems; computer services, namely, providing online system management services that allow users to remotely view, monitor, program, operate and control crisis communication systems; research in the field of crisis communication technology; testing of crisis communication systems comprised of computer software and hardware; cloud computing featuring software for providing crisis communication through multiple IP network channels and delivery services; computer services, namely, integration of private and public cloud computing environments for crisis communication; computer services, namely, cloud hosting provider services for crisis communication; computer services, namely, installation of computer software for private cloud computing for crisis communication; consulting services in the field of cloud computing for crisis communication; computer services, namely, creating an online community for registered users to participate in discussions, get feedback from their peers, form virtual communities, invite other organizations to the community and engage collaboration in the field of security and crisis communication and management; Providing online non-downloadable computer software for the purposes of data collection, monitoring, and mass notification services for managing emergency and crisis situations and improving crisis communications capability, namely, providing secure mass notification services through all communication devices, namely, smart phones, cell phones, telephones, video phones, computers, and Personal Digital Assistants (PDAs); providing temporary use of online non-downloadable software featuring software for use in sending, receiving, confirming and responding to alerts, messages, and notifications in the field of crisis communication and management; providing temporary use of online non-downloadable software, namely, hosting software for use by others for use in sending, receiving, confirming and responding to alerts, messages, and notifications in the field of crisis communication and management; providing temporary use of on-line non-downloadable computer software for endpoint security, malware analysis, vulnerability testing, penetration testing, and vulnerability assessment; providing temporary use of online non-downloadable software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; providing temporary use of online non-downloadable software for predicting and monitoring security threats to computer networks; providing temporary use of online non-downloadable software for preventing unauthorized access to computers and computer networks; providing temporary use of online non-downloadable software for data analytics; design, development and maintenance of online computer software systems and software for operation and control of autonomous-driving vehicles; providing temporary use of online non-downloadable software for operation and control of autonomous-driving vehicles; providing temporary use of online non-downloadable software applications, temporary use of online non-downloadable software development tools, and platform as a service (PAAS) services featuring computer software platforms that enable software developers to program, and users to build and configure, software applications that work in conjunction with non-downloadable software applications, platforms, and third party services to transfer, share, format, manipulate and integrate data, and information; providing temporary use of online non-downloadable software in the field of electronic file security to allow users to encrypt, electronically watermark, provide restricted access to, and provide secure transmission and tracking of electronic documents and other electronic and digital files; platform as a service (PAAS) services featuring computer software platforms for creating, managing, and deploying cloud computing infrastructure services; design and development of on-line computer software systems, computer hardware and computer software; technical support services, namely, installation, administration, and troubleshooting of web and database applications; providing machine-to-machine (M2M) and Internet of Things (IoT) communication integration services, namely, the integration of disparate computer systems, networks, hardware and software through the application of wireless communication, artificial intelligence, machine learning and/or deep learning technology to facilitate M2M and IoT communication via web based browsers, personal digital assistants, mobile phones, embedded microprocessors, sensors and other electronic devices; providing temporary use of online non-downloadable software applications, online non-downloadable software developer kits (SDKs) comprised of software development tools, online non-downloadable software development tools, and platform as a service (PAAS) services featuring computer development platforms that enable software developers to design, test, deploy, manage, and monitor internet of things (IoT) and machine-to-machine (m2m) devices; computer software services, namely, development, maintenance, repair, installation, and troubleshooting of computer software problems; computer support services in the nature of diagnosing computer software problems; upgrade and updating computer software; authoring computer software; consultation, design and customization of computer software and middleware; computer security consultancy; technical consulting and assistance with computer-based information systems and components, namely, technical consulting services in the fields of Mobile Device Management (MDM), Mobile Applications Management (MAM), Mobile Security Management (MSM), Mobile Information Management (MIM), mobile Identity and Access Management (IAM), datacenter architecture, public and private cloud computing solutions, cybersecurity, and evaluation and implementation of internet technology and services; providing a secure website in the nature of a web hosting platform for, and providing temporary use of on-line non-downloadable software for allowing users and enterprise software applications to interface with remote devices and to allow connectivity, memory storage, device management, device monitoring, device tracking, and device auditing, all via a computer network; providing temporary use of online non-downloadable software featuring software for Enterprise Mobility Management (EMM), Unified Endpoint Management (UEM), Mobile Device Management (MDM), Mobile Applications Management (MAM), Mobile Security Management (MSM), Mobile Information Management (MIM), and mobile Identity and Access Management (IAM); providing temporary use of online non-downloadable software for the operation, management, security and maintenance of enterprise networks, data center management, resource management and performance optimization.


Classification kind code

11

Mark Details


Serial Number

2092529

Mark Type

Trademark

Legal History


Show more

Action TakenStatus
Submitted for opposition 256
on 18th Jan 2022
Notification of Possible Opposition Sent
Submitted for opposition 48
on 22nd Dec 2021
Agent Changed
Submitted for opposition 22
on 20th Oct 2021
Search Recorded
Submitted for opposition 20
on 20th Oct 2021
Examiner's First Report
Submitted for opposition 223
on 20th Oct 2021
Total Provisional Refusal
Submitted for opposition 257
on 18th Mar 2021
Designation Notification - Madrid Protocol
Submitted for opposition 31
on 17th Mar 2021
Formalized
Submitted for opposition 1
on 17th Mar 2021
Created
Submitted for opposition 228
on 2th Oct 2020
International Registration
Submitted for opposition 30
on 2th Oct 2020
Filed