The trademark application was filed by Tortuga Logic, Inc., a U.S. corporation (the "Applicant"). The application was published for oppositions on May 2, 2022, and it was registered by office on August 9, 2022 without any oppositions.
The application was filed in English (German was selected as the second language).
Goods And Services
The mark was filed in class 9 with following description of goods:
Downloadable software for software, firmware, and hardware security
Downloadable software for detecting and preventing hardware, software, and firmware vulnerabilities
Downloadable software providing a hardware security verification framework
Downloadable software for preventing unauthorized access to proprietary or confidential data
Downloadable software for ensuring compliance with hardware security policies
Downloadable software for generating reports on software, firmware, and hardware security vulnerabilities
Downloadable software, namely, a hardware security platform for testing, detecting, and preventing hardware security vulnerabilities
Downloadable software providing security validation for computer hardware designs
Downloadable software for detecting hardware security vulnerabilities resulting from architecture, implementations, software configuration errors, or firmware configuration errors.
The mark was filed in class 35 with following description of goods:
Business consultation services in the fields of hardware security policy compliance and vulnerability detection
Business consultation in the field of risk management, cybersecurity and security
Business risk assessment and management services
Business services, namely, formulation of best practices for hardware cybersecurity
Preparation of business security reports
Promoting the use of the security assurance best practices of others in the field computer hardware, software, and firmware design.
The mark was filed in class 42 with following description of goods:
Computer security consultancy in the field of software, firmware, and hardware security testing
Cybersecurity services in the nature of restricting unauthorized access to computer systems
Cybersecurity services in the nature of software, firmware, and hardware security testing
Cybersecurity services in the nature of independent hardware cybersecurity assessments
Cybersecurity hardware compliance and assessment services
Technological planning and consulting services in the field of hardware, software, and firmware security
Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software security.