EUTM file information

019061655

Authologic


July 29, 2024

Trademark Summary

The trademark application Authologic was filed by Authologic sp. z o.o., a corporation established under the laws of the Republic of Poland (the "Applicant"). Application under examination.

The application was filed in English (Spanish was selected as the second language).


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Authentication software
    2. Biometric identification systems
    3. Computer software for the identification and authentication of persons and documents
    4. Computer software for biometric systems for the identification and authentication of persons
    5. Computer-based application featuring software allowing for identity verification
    6. Software, which involves systems for the analysis of biometric data
    7. Downloadable digital collectibles software using blockchain-based software technology and smart contracts for use in the field of identity verification
    8. Software, which involves number of algorithms designed to identify abnormal areas in the image of identity document, payment card, bank statement, tax bill, utility bill, corporate documents, or other documents and sources, as well as images and videos of users
    9. Computer software, systems and platforms conducting customer identification, documents verification, anti-money laundering transaction monitoring and customer screening.
  • The mark was filed in class 42 with following description of goods:
    1. Authentication services
    2. Data authentication via blockchain technology
    3. Authentication services for computer security
    4. User authentication services using blockchain technology
    5. Authentication, issuance and validation of digital certificates
    6. Authentication of electronic documents and e-mails
    7. Authentication, issuance and validation of digital keys
    8. Providing authentication of personal identification information
    9. Authentication services for electronic documents and e-mail
    10. Computerized user authentication services in e-commerce transactions
    11. Providing authentication of personal identification information [computer security services]
    12. User authentication services using technology for e-commerce transactions
    13. User authentication services using biometric hardware and software technology for banking online
    14. User authentication services using biometric hardware and software technology for access control
    15. User authentication services using biometric hardware and software technology for social media
    16. User authentication services using single sign-on technology for online software applications
    17. User authentication services using biometric hardware and software technology for e-commerce transactions
    18. Providing user authentication services using single sign-on technology for e-commerce transactions
    19. Providing user authentication services using biometric hardware and software technology
    20. User authentication services using single sign-on technology for on-line software applications
    21. User authentication services using biometric hardware and software technology for managing human identification
    22. Providing user authentication services using single sign-on technology for online software applications
    23. Providing user authentication services using biometric hardware and software technology for managing human identification
    24. User authentication services using blockchain technology for identification and authentication of persons and documents
    25. Design and implementation of software and technology solutions for the purpose of identification and authentication of persons and documents, anti-money laundering transaction monitoring and customer screening
    26. Identity validation services [computer security]
    27. Identity verification services [computer security]
    28. Electronic signature verification services using technology to authenticate user identity
    29. Electronic storage of documents
    30. Digitization of documents [scanning]
    31. Electronic storage of files and documents
    32. Authentication services for electronic documents and e-mails
    33. Electronic storage of documents and archived e-mails
    34. Document reproduction in the nature of digitization of documents
    35. Implementation of computer software and technology solutions for identification and authentication of persons and documents, anti-money laundering transaction monitoring and customer screening
    36. Consultancy relating to the selection, implementation and use of computer programs and technology solutions for identification and authentication of persons and documents, anti-money laundering transaction monitoring and customer screening
    37. Consulting services in the design and implementation of computer-based information systems for identification and authentication of persons and documents, anti-money laundering transaction monitoring and customer screening
    38. Design, development, and implementation of software for identification and authentication of persons and documents, anti-money laundering transaction monitoring and customer screening
    39. Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for identification and authentication of persons and documents, anti-money laundering transaction monitoring and customer screening
    40. Consulting services in the fields of selection, implementation and use of computer hardware and software systems for others
    41. Consulting services for others in the field of design, planning, and implementation project management of identification and authentication of persons and documents
    42. Consulting services in the field of design, selection, implementation and use of computer hardware and software systems
    43. Consultancy relating to the selection, implementation and use of software, hardware and technology solutions for the purpose of authenticating identity and documents
    44. Design, development, and implementation of software and technology solutions for the purpose of authenticating identity and documents
    45. Security services regarding identification, authentication and encryption of data
    46. Technical research relating to automatic identification systems
    47. Authentication services (control) of data transmitted via telecommunications
    48. Electronic monitoring of personally identifying information to detect identity theft via the internet
    49. Software as a service (SAAS) services featuring software for customer identification, documents verification, anti-money laundering transaction monitoring and customer screening
    50. Platform as a service (PAAS) featuring software for customer identification, documents verification, anti-money laundering transaction monitoring and customer screening
    51. Research and electronic data processing services related to customer identification, documents verification, anti-money laundering transaction monitoring and customer screening
    52. Design and implementation of computer systems and technology solutions conducting customer identification, documents verification and anti-money laundering transaction monitoring and customer screening
    53. Development of computer platforms for customer identification, documents verification, anti-money laundering transaction monitoring and customer screening.
  • The mark was filed in class 45 with following description of goods:
    1. Providing user authentication services in e-commerce transactions
    2. Providing authentication of personal identification information [personal background investigations]
    3. Providing authentication of personal identification information [identification verification services]
    4. Identification verification services, namely, providing authentication of personal identification information
    5. Providing authentication of personal identification information [personal background or security investigations]
    6. Identification verification services, namely, providing authentication of personal identification information via secure storage and transmitting such information via the Internet
    7. Identity verification
    8. Identity validation services
    9. Verification of personal identity as part of personal background investigations
    10. Certification of legal documents
    11. Security marking of documents
    12. User identification verification services, namely, providing user authentication of personal information using single sign-on technology, biometric hardware and software technology
    13. Consulting services in the field of identity fraud
    14. Consultancy services, design and implementation relating to the selection, implementation and use of software, hardware and technology solutions for the purpose of identity and documents verification and authentication
    15. Legal research related to customer identification, documents verification, anti-money laundering transaction monitoring and customer screening
    16. Legal research based on data collected from identity document, payment card, bank statement, tax bill, utility bill, corporate documents, or other documents and sources, as well as images and videos of users
    17. Licensing of computer software [legal services].