EUTM file information

019060435

Eauditor


July 26, 2024

Trademark Summary

The trademark application eauditor was filed by BTC Sp. z o.o., a corporation established under the laws of the Republic of Poland (the "Applicant"). Application under examination.

The application was filed in Polish (English was selected as the second language).

Change of name and address of the trademark registration was recorded on October 5, 2024.


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Authentication software
    2. Computer software for encryption
    3. Programs for computers
    4. Computer software
    5. Computer software for monitoring the use of computers and the internet by children
    6. Computer software for communicating with users of hand-held computers
    7. Web application software
    8. Cloud network monitoring software
    9. Cloud computing software
    10. Communications server software
    11. Proxy server software
    12. Application server software
    13. File server software
    14. Content control software
    15. Facial analysis software
    16. Speech analytics software
    17. Voice recognition software
    18. Facial recognition software
    19. Artificial intelligence software for surveillance
    20. Downloadable computer software for remote monitoring and analysis
    21. Software for diagnostics and troubleshooting
    22. Predictive maintenance software
    23. Software reliability software
    24. Hardware reliability software
    25. Privacy software
    26. Optimisation software
    27. System support software
    28. Computer software to maintain and operate computer system
    29. Maintenance software
    30. System and system support software, and firmware
    31. Utility, security and cryptography software
    32. Computer utility programs [program performs computer maintenance work]
    33. Computer utility programs for file management
    34. Risk detection software
    35. Antispyware software
    36. Cryptography software
    37. Content access software
    38. Threat detection software
    39. Software for network and device security
    40. Software for ensuring the security of electronic mail
    41. Computer software for biometric systems for the identification and authentication of persons
    42. Computer software for authorising access to databases
    43. Computer software for use in computer access control
    44. Computer software for system cleaning and optimization
    45. Computer software for the creation of firewalls
    46. Computer software for the monitoring of computer systems
    47. Computer software for testing vulnerability in computers and computer networks
    48. Computer software for the detection of threats to computer networks
    49. Personal computer application software for managing document control systems
    50. Personal computer application software for document control systems
    51. Downloadable computer security software
    52. Security software
    53. Computer programs for the enabling of access or entrance control
    54. Enterprise software
    55. Business software
    56. Inventory software
    57. Character recognition software
    58. Image recognition software
    59. Software for the integration of artificial intelligence and machine learning in the field of Big Data
    60. Software for searching and retrieving information across a computer network
    61. Artificial intelligence software for analysis
    62. Machine learning software for surveillance
    63. Downloadable computer software for collecting, analyzing and organizing data in the field of deep learning
    64. Artificial intelligence software
    65. Artificial intelligence and machine learning software.
  • The mark was filed in class 42 with following description of goods:
    1. Encryption, decryption and authentication of information, messages and data
    2. Modifying of computer programs
    3. Updating of computer programs
    4. Installing computer programs
    5. Development of computer programs
    6. Compilation of computer programs
    7. Computer software design
    8. Software as a service [SaaS]
    9. Electronic storage of files and documents
    10. Electronic storage of documents and archived e-mails
    11. Infrastructure as a Service [IaaS]
    12. Software as a service [SaaS] featuring software for machine learning
    13. Software as a service [SaaS] featuring software for deep neural networks
    14. Software as a service [SaaS] featuring software for deep learning
    15. Platform as a service [PaaS]
    16. Platform as a service [PaaS] featuring software platforms for transmission of images, audio-visual content, video content and messages
    17. Platforms for artificial intelligence as software as a service [SaaS]
    18. Online data storage
    19. Providing online, non-downloadable software
    20. Provision of computer security risk management programs
    21. Providing artificial intelligence computer programs on data networks
    22. Rental of computer software and programs
    23. Rental of computer software
    24. Updating and maintenance of computer software and programs
    25. Computer software design and updating
    26. Updating and upgrading of computer software
    27. Updating of computer software relating to computer security and prevention of computer risks
    28. Updating of computer software
    29. Project studies relating to software
    30. Research in the field of computer programs and software
    31. Computer software research
    32. Research relating to computer programming
    33. Research relating to the development of computer programs and software
    34. Research relating to the development of computer software
    35. Installation, maintenance and updating of computer software
    36. Installation and actualisation of programs for data processing
    37. Installation and maintenance of computer programs
    38. Installation, setting up and maintenance of computer software
    39. Installation, maintenance, updating and upgrading of computer software
    40. Installation of computer software
    41. Installation, maintenance, repair and servicing of computer software
    42. Software engineering
    43. Computer security threat analysis for protecting data
    44. Digital forensic investigations in the field of computer crimes
    45. Providing alerts regarding children’s access to online websites and content
    46. Computer forensics
    47. Monitoring of network systems
    48. Monitoring of computer systems for security purposes
    49. Monitoring of computer systems for detecting unauthorized access or data breach
    50. Monitoring of computer systems to detect breakdowns
    51. Development of technologies for the protection of electronic networks.