EUTM file information

018854009

Transfer of Trust


March 26, 2023

Trademark Summary

The trademark application Transfer of Trust was filed by Transmit Security Ltd., a corporation established under the laws of the State of Israel (the "Applicant"). Application under examination.

The application was filed in English (French was selected as the second language).


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Downloadable software, programs and applications for authenticating user identification
    2. Downloadable identity management and identity security software, programs and applications for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools
    3. Downloadable software, programs and applications for securing communications between computers
    4. Downloadable user authentication software, programs and applications for online communications, e-commerce transactions, and online software applications for network access control, security management and security application auditing
    5. Downloadable software, programs and applications for validation and authentication of personal identification information and user credentials to securely access software programs and products
    6. Downloadable authentication software, programs and applications for communications and transactions via a global computer network, namely, validating personal identification information and user credentials to securely access software programs and products
    7. Downloadable computer security software for verifying user and machine identities, user and machine permissions, and for the management of user and machine identity data
    8. Downloadable software, programs and applications namely, identity management software, programs and applications for use by others for authentication and authorization of individual users and software programs using machine authentication
    9. Downloadable software, programs and applications for verification and authentication of digital certificates
    10. Downloadable software, programs and applications for verification and authentication of digital tokens, sessions, browser or website cookies and information in the nature of personal identification and credentials.
  • The mark was filed in class 42 with following description of goods:
    1. Computer security services, namely, providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data, namely, software as a service (SaaS) services featuring software for authenticating user identification
    2. Providing temporary use of online non-downloadable software, namely, identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools
    3. Software as a service (SaaS) services featuring software for securing communications between computers
    4. Computer services, namely, providing online non-downloadable user authentication software for online communications, e-commerce transactions, and online software applications for network access control, security management and security application auditing
    5. Computerized identification verification services, namely, providing online non-downloadable software for validation and authentication of personal identification information and user credentials to securely access software programs and products
    6. Computerized identification verification services, namely, providing online non-downloadable authentication software for communications and transactions via a global computer network, namely, validating personal identification information and user credentials to securely access software programs and products
    7. Computer security services, namely, providing online non-downloadable computer security software for verifying user and machine identities, user and machine permissions, and for the management of user and machine identity data
    8. Providing temporary use of online non-downloadable software, namely, identity management software for use by others for authentication and authorization of individual users and software programs using machine authentication
    9. Computer network identification verification and authentication services, namely, verification and authentication of digital certificates
    10. Computer network identification verification and authentication services, namely, providing online non-downloadable software for verification and authentication of digital tokens, sessions, browser or website cookies and information in the nature of personal identification and credentials.
Trademarkers