Trademarkia Logo

Canada

C$
FORTINET DESIGN
SEARCHED

on 24 Oct 2024

Last Applicant/ Owned by

FORTINET INC.

899 Kifer RoadSunnyvale, CA 94086

US

Serial Number

2170681 filed on 4th Mar 2022

Correspondent Address

AMY CROLL

(Origins IP)1750 Courtwood Crescent, Suite 300Ottawa

ONTARIO

CA

K2C2B5

FORTINET DESIGN

Trademark usage description

data processing equipment; computer hardware; network hardware; network gateway hardware; software; downloadable software; firmware; data processors; Read More

Vienna Information


26 . 4 . 2

RectanglesRectangles

26 . 4 . 9

Several quadrilaterals juxtaposed, joined or intersectingPlusieurs quadrilatères, juxtaposés, accolés ou se coupant

26 . 4 . 24

Quadrilaterals with dark surfaces or parts of surfacesQuadrilatères avec surface ou partie de la surface foncée

27 . 5 . 1

Letters presenting a special form of writingLettres présentant un graphisme spécial

27 . 5 . 8

Letters linked to or containing a figurative element -- Note: Letters representing a human being or a part of the human body, an animal or a part of an animal's body, a plant, a heavenly body, a natural phenomenon or an object are classified in division 27.3.Lettres liées à un élément figuratif ou contenant un élément figuratif -- Note: Les lettres représentant un être humain ou une partie du corps humain, un animal ou une partie du corps d'un animal, un végétal, un corps céleste, un phénomène naturel ou un objet sont classées dans la division 27.3.

25 . 7 . 1

Surfaces or backgrounds covered with repeated geometrical figures or designsSurfaces ou fonds couverts de figures ou de motifs géométriques répétés

25 . 7 . 3

Surfaces or backgrounds covered with squares or rectangles (except a 25.7.4)Surfaces ou fonds couverts de carrés ou de rectangles (excepté a 25.7.4)

Classification Information


Class [009]
Data processing equipment; computer hardware; network hardware; network gateway hardware; software; downloadable software; firmware; data processors; microprocessors; semiconductors; wireless access point devices; computer network operating systems; computer network operating system featuring wireless connectivity, network security, network management, processing of network traffic, and provision of network security; software updates; computer hardware, network hardware, network gateway hardware, software, downloadable software, software updates, firmware, data processors and network operating systems in the fields of internet connectivity, wireless connectivity, computer intrusions, viruses, spam, or other malicious applications or threats and security functions; computer hardware, network hardware, network gateway hardware, software, downloadable software, software updates, firmware, data processors and network operating system for use in computer, data, network and mobile device security; computer hardware and software for the creation of firewalls; computer hardware, network hardware, network gateway hardware, software, downloadable software, software updates, firmware, data processors and network operating system for enabling computer gateway services, for providing network security, for assuring, managing, processing, maintaining, and protecting the integrity of computer hardware, software, mobile devices, electronic and wireless communications, networks, electronic data, servers, applications, data, personal identity, and databases, for analyzing and filtering of network traffic, for securing internet and communications protocol, for the detection, filtering, and/or removal of computer intrusions, viruses, spam, or other malicious applications or threats, for providing virtual private networking and security functions, for monitoring, analyzing or reporting of network information, data and traffic, for antivirus, anti-spam, anti-spyware, anti-malware, VPN (virtual private network) access security, intrusion prevention, web filtering and firewall protection, for monitoring, logging, aggregation, collecting, analysis and reporting of network information, data and traffic and to optimize network efficiency, security and integrity, for providing security for email, internet or other electronic communications, for fail-open network protection, for the management, monitoring and reporting of network firewalls and security systems, for securing internet protocol, and for the provision of secure, mobile connectivity through a wireless access point; computer hardware, network hardware, network gateway hardware, software, downloadable software, software updates, firmware, data processors and network operating systems for use with networks, computers, servers, communications apparatus, and mobile devices; security token hardware and software; security surveillance robots, hardware, software, and firmware; electronic software updates and associated data files for updating computer software in the fields of computer intrusions, viruses, spam, or other malicious applications or threats and security functions and for protecting the integrity of computer hardware, software, networks and electronic data; telecommunications devices and apparatus; apparatus for recording, transmission or reproduction of sound or images; computer software for detecting and repairing computer software and hardware problems; downloadable cloud computing software; video cameras; computers; downloadable reports about wireless connectivity, computer security analysis and network security analysis; computer hardware, namely, wireless access point (WAP) devices; LAN (local area network) hardware; computer software to monitor internet, wireless and PC connectivity status; computer chips; Ethernet cables; Ethernet adapters; radio transmitters, receivers, and transceivers; computer software that facilitates access to and modification of SSID (service set identifier) and security of routers; software to diagnose and repair network connectivity problems; computer software that facilitates access to and modification of SSID and security of routers; software to facilitate firmware upgrades.


Classification kind code

11

Class [042]
Computer consulting services; computer software, hardware, firmware, network and network security consulting services; technical support services related to the provision of antivirus, anti-spam, anti-spyware, anti-malware, web-content filtering, network management, network traffic and/or intrusion detection and prevention for network and computer security; troubleshooting of computer software, firmware, and hardware problems and technical monitoring of network systems; maintenance and updating of computer software, namely, computer security and prevention of computer risks; testing of computer systems; computer services, namely, providing a web-based system and online portal for users to access and track customer support request tickets, to access real-time customer support service, to access technical documentation, to access troubleshooting guides, to request technical support, and to troubleshoot software, firmware, hardware, and network issues; upgrading and updating of computer software; technical support services, namely, providing reports in the fields of computer software, firmware, hardware, and network systems for diagnosing computer software, hardware, firmware and network problems; technical support services, namely, providing reports for analyzing network traffic, including, computer intrusions, viruses, spam, or other malicious applications or threats; technical support services, namely, providing reports for security functions; technical support services, namely, providing a website featuring information for diagnosing computer software, firmware, hardware, and network systems problems; technical support services, namely, providing a website featuring information for diagnosing network traffic, including, computer intrusions, viruses, spam, or other malicious applications or threats; technical support services, namely, engineering services in connection with computer software, firmware, hardware, and network systems; technical support services, namely, troubleshooting in the nature of the repair of computer software and firmware; installation, maintenance and repair of computer software and firmware; scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer software, hardware, firmware, network systems and electronic data security systems; computer consultation in the field of computer security; research in the field of intelligence and security technology; cloud services; computer services, namely, cloud hosting provider services and cloud computing; updating and maintaining cloud-based computer software through on-line updates, enhancements and patches; electronic storage of reports, files, media and documents; cloud based computer services for collecting, storing, synthesizing, analyzing, and managing data and information from computer security systems; software as a service (SAAS) services; Platform as a service (PAAS) services; software as a service (SAAS) and platform as a service (PAAS) services featuring software for data analysis and management, security analytics, data automation, data collection and reporting; software as a service (SAAS) and platform as a service (PAAS) services featuring software for providing cloud-based analytics for network, data, internet, and computer security systems; software as a service (SAAS) services and platform as a service (PAAS) featuring software for providing real-time monitoring, alerting, updating and upgrading services for network, data, internet, and computer security systems; software as a service (SAAS) services and platform as a service (PAAS) featuring software for monitoring network and security activity and for generating reports and statistics on such activity; software as a service (SAAS) services featuring software for allowing third parties to secure and monitor computer applications; computer services, namely, monitoring for intrusions and proactively reconfiguring computer operating system and application security configuration parameters to stop detected intrusions; computer network security management and analysis, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application system; computer services allowing for remote communication between computer hardware devices; software as a service (SAAS) featuring software for use in computer, data, network and mobile device security; software as a service (SAAS) featuring software for enabling computer gateway services, for providing network security, for assuring, managing, processing, maintaining, and protecting the integrity of computer hardware, software, mobile devices, electronic and wireless communications, networks, electronic data, servers, applications, data, and databases, for analyzing and filtering of network traffic, for securing internet and communications protocol, for the detection, filtering, and/or removal of computer intrusions, viruses, spam, or other malicious applications or threats, for providing virtual private networking and security functions, for monitoring, analyzing or reporting of network information, data and traffic, for antivirus, anti-spam, anti-spyware, anti-malware, VPN (virtual private network) access security, intrusion prevention, web filtering and firewall protection, for monitoring, logging, aggregation, collecting, analysis and reporting of network information, data and traffic and to optimize network efficiency, security and integrity, for providing security for email, internet or other electronic communications, for fail-open network protection, for the management, monitoring and reporting of network firewalls and security systems, for securing internet protocol, and for the provision of secure, mobile connectivity through a wireless access point; Development of software for secure network operations; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; computer network design for others; Computer systems analysis; Renting out hardware and software; Development of software for secure network operations; Data encryption services; Data decryption services; Computer security consulting services, namely, consulting with enterprises on efficiently and safely managing remote employee access to servers and supporting implementation of work-from-home computer and network security strategies.


Classification kind code

11

Class [045]
Monitoring of computer systems for security purposes; consulting services in the field of maintaining the security and integrity of databases; security consultancy; monitoring of security systems; security services, namely, providing security assessments for businesses and governmental agencies; consulting services in the field of security threat assessment.


Classification kind code

11

Mark Details


Serial Number

2170681

Mark Type

Trademark

Legal History


Action TakenStatus
Submitted for opposition 22
on 24th Oct 2024
Search Recorded
Submitted for opposition 20
on 24th Oct 2024
Examiner's First Report
Submitted for opposition 287
on 15th Jul 2022
Pre-Assessment Letter Sent
Submitted for opposition 30
on 4th Mar 2022
Filed
Submitted for opposition 1
on 4th Mar 2022
Created
Submitted for opposition 31
on 4th Mar 2022
Formalized