Certicom Corp.

 Certicom Corp. contact information is shown below
Owner:CERTICOM CORP.
Owner Address:4th Floor 5520 Explorer Drive Mississauga L4W5L1 Canada
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byCerticom Corp.

Brand:

(CE)2

Description:

computer and communication software, firmware and hardware for use in information and data communication, information and data transactions, networking, cryptography, digital signatures and public and private key generation, security including encryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity; integrated circuits, pagers, modems, cellular phones, telecommunications equipment, magnetic coded cards and smart cards; marketing materials; user manuals and documentation therewith;cryptographic and information security consulting, technology licensing, computer systems development and systems integration relating to information security;

Category: COMPUTER COMMUNICATION SOFTWARE
Brand:

BULLET

Description:

computer and communications software, firmware and hardware for use in information and data communication, information and data transactions, networking, cryptography, digital signatures and public and private key generation, security including encryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity; integrated circuits; computer software storage media namely pre-recorded CD-ROMS and computer diskettes for use in the area of storage of documentation, data and programs for use in computer, information, data and information processing, data and information display, information and data transactions, networking, cryptography, digital signatures and private and public key generation, security including encryption, certification, authentication, verification, data privacy, confidentiality and data integrity; pagers, modems, cellular phones, telecommunications equipment namely radio, telephone and satellite transmitters, receivers, switches, networks, phones, wireless networks, wireless communication processors, two-way pagers, radio and satellite phones and wireless handheld computers, magnetic coded cards and plastic cards with an embedded integrated circuits or stored information and data;cash transaction cards, credit and debit cards, terminals for use with plastic cards with an embedded integrated circuits or stored information and data, cash transaction cards and credit and debit cards;

Category: COMPUTER COMMUNICATIONS SOFTWARE
Brand:

CE

Description:

computer and communication software, firmware and hardware for use in information and data communication, information and data transactions, networking, cryptography, digital signatures and public and private key generation, security including encryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity; integrated circuits, pagers, modems, cellular phones, telecommunications equipment, magnetic coded cards and smart cards; marketing materials; user manuals and documentation therewith;cryptographic and information security consulting, technology licensing, computer systems development and systems integration relating to information security;

Category: COMPUTER COMMUNICATION SOFTWARE
Brand:

CERTICOM

Description:

computer communication hardware and software for ensuring the security of computer programs, namely, performing the functions of encryption, certification, authentication, data privacy and data integrity; user manuals and pamphlets sold as a unit therewith;IN THE STATEMENT, COLUMN 1, LINE 4-6, SHOULD BE DELETED, AND, IN THE STATEMENT, COLUMN 2, LINE 10, 505438, SHOULD BE DELETED, AND, 505433 SHOULD BE INSERTED.;technology licensing of security hardware and software;cryptographic and information security consulting; computer systems development and system integration relating to information security for others, and technology licensing of cryptographic methods and protocols and information;The lining shown in the drawing is a feature of the mark and not intended to indicate color.;

Category: COMPUTER COMMUNICATION HARDWARE SOFTWARE
Brand:

CERTICOM ELLIPTIC CURVE ENGINE

Description:

COMPUTER AND COMMUNICATION SOFTWARE, FIRMWARE AND HARDWARE FOR USE IN INFORMATION AND DATA COMMUNICATION, NAMELY, PROCESSING, STORAGE, TRANSMISSION AND RECEPTION OF INFORMATION AND DATA, FOR USE IN NETWORK MANAGEMENT,FOR USE IN CRYPTOGRAPHY, DIGITAL SIGNATURES AND PUBLIC AND PRIVATE KEY GENERATION, AND SECURITY PURPOSES, NAMELY, ENCRYPTION, CERTIFICATION, AUTHORIZATION, AUTHENTICATION,VERIFICATION, DATA PRIVACY, CONFIDENTIALITY AND DATA INTEGRITY; INTEGRATED CIRCUITS, PAGERS, MODEMS, CELLULAR PHONES, TELECOMMUNICATIONS EQUIPMENT, NAMELY, RADIO, TELEPHONE AND SATELLITE TRANSMITTERS, RECEIVERS, WIRELESS NETWORKS COMPRISING COMPUTER HARDWARE AND SOFTWARE FOR FACILITATING NETWORK COMMUNICATIONS, WIRELESS COMMUNICATION PROCESSORS, TWO-WAY PAGERS, RADIO AND SATELLITE PHONES, AND WIRELESS HAND-HELD COMPUTERS; BLANK MAGNETIC CODED CARDS, NAMELY, CARDS WITH MAGNETIC STRIPS, AND SMART CARDS; USER MANUALS AND DOCUMENTATION SOLD THEREWITH;TECHNOLOGY LICENSING OF SECURITY HARDWARE AND SOFTWARE;ENGINE;CRYPTOGRAPHIC AND INFORMATION SECURITY CONSULTING; COMPUTER SYSTEMS DEVELOPMENT AND SYSTEM INTEGRATION RELATING TO INFORMATION SECURITY;

Category: COMPUTER COMMUNICATION SOFTWARE
Brand:

CERTICOM SECURE

Description:

COMPUTER SOFTWARE AND ELECTRONIC DOCUMENTATION, NAMELY, SOFTWARE DEVELOPMENT TOOLS USED IN ENCRYPTION, CERTIFICATION, AUTHORIZATION, AUTHENTICATION, VERIFICATION, DATA PRIVACY, CONFIDENTIALITY AND DATA INTEGRITY; COMPUTER SOFTWARE, NAMELY, FOR USE IN TRANSMISSION AND AUTHENTICATION OF ENCRYPTED INFORMATION IN THE FIELD OF COMMUNICATIONS; COMPUTER FIRMWARE, NAMELY, FOR USE IN ENCRYPTION, AUTHENTICATION AND TRANSMISSION OF INFORMATION; COMPUTER HARDWARE FOR USE IN THE ENCRYPTION, DECRYPTION, AUTHENTICATION AND TRANSMISSION OF INFORMATION AND DATA COMMUNICATION, INFORMATION AND DATA TRANSACTIONS, NETWORKING, CRYPTOGRAPHY, DIGITAL SIGNATURES AND PUBLIC AND PRIVATE KEY GENERATION, SECURITY FUNCTIONS, NAMELY, ENCRYPTION, CERTIFICATION, AUTHORIZATION, AUTHENTICATION, VERIFICATION, DATA PRIVACY, CONFIDENTIALITY AND DATA INTEGRITY; INTEGRATED CIRCUITS; COMPUTER SOFTWARE STORAGE MEDIA, NAMELY, PRE-RECORDED CD-ROMS AND COMPUTER DISKETTES FEATURING COMPUTER SOFTWARE AND DOCUMENTATION FOR PROVIDING ENCRYPTION, CERTIFICATION, AUTHORIZATION, AUTHENTICATION, VERIFICATION, DATA PRIVACY, CONFIDENTIALITY AND DATA INTEGRITY; COMPUTER NETWORKS, CRYPTOGRAPHY, DIGITAL SIGNATURES AND PRIVATE AND PUBLIC KEYS, ALL OF WHICH PROVIDE SECURITY, ENCRYPTION, CERTIFICATION, AUTHENTICATION, VERIFICATION, DATA PRIVACY CONFIDENTIALITY AND DATA INTEGRITY; RADIO PAGERS; MODEMS; CELLULAR TELEPHONES; TELECOMMUNICATIONS EQUIPMENT, NAMELY, RADIO TRANSMITTERS, TELEPHONE TRANSMITTERS, SATELLITE TRANSMITTERS, RECEIVERS, NAMELY, TELEPHONE, AUDIO, VIDEO AND DATA; ELECTRIC SWITCHES; WIRED AND WIRELESS COMPUTER COMMUNICATIONS NETWORK MAINLY COMPRISED OF VIRTUAL PRIVATE NETWORKS, INTERNET, SERVER AND CLIENT DEVICES, SIGNAL PROCESSORS AND WIRELESS HANDHELD COMPUTERS, MAGNETIC CODED CARDS AND PLASTIC CARDS WITH EMBEDDED INTEGRATED CIRCUITS AND STORED INFORMATION AND DATA, NAMELY SMARTCARDS; COMPUTER TERMINALS FOR USE WITH CREDIT CARDS, DEBIT CARDS AND SMARTCARDS, NAMELY MAGNETIC CODED CARD READERS AND SMARTCARD READERS;STORED VALUE SMART CARDS; CREDIT CARDS; DEBIT CARDS WITHOUT MAGNETIC ENCODING;CERTIFICATION COM SECURE;SECURE;

Category: COMPUTER SOFTWARE ELECTRONIC DOCUMENTATION
Brand:

CERTICOM SECURE

Description:

The mark consists of the word CERTICOM in lower case bold evofont style directly above the word SECURE in bold typeface. Centered above the words are eight diamond shape figures positioned in three levels, with two diamonds in the first and third levels and four diamonds in the second level. The diamond shapes have rounded edges and are gradually shaded light to dark from the upper right to the lower left flat sides of each diamond shape.;(Based on 44(e)) Computer software and software development tools, namely, software development tools, comprised of code based computer programs, computer software used for public key encryption, certification, access control and digital rights management, verification, privacy, confidentiality and integrity of voice and text, wired and wireless transmission of voice, web services and text of encrypted information in the field of communications and authentication of encrypted information in the field of communications; computer firmware, for use in encryption, authentication and wired and wireless transmission of voice, web services and text; computer hardware for use in the encryption, decryption, authentication and wired and wireless transmission of voice, web services and text of encrypted information in the field of communications and authentication of encrypted information in the field of communications, device to device communication, cryptography, digital signatures and public and private key generation, security functions, namely, encryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity; integrated circuits; computer software storage media, namely, pre-recorded CD-ROMS and computer diskettes featuring computer software and documentation for providing encryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity, computer networking, cryptography, digital signatures and private and public key generation, and security functions, namely, encryption, certification, authentication, verification, data privacy confidentiality and data integrity; radio pagers; modems; cellular telephones; telecommunications equipment, namely, radio transmitters, telephone transmitters, satellite transmitters, receivers, namely, telephone receivers, audio receivers, video receivers and data receivers, electric switches, computer networks, namely, local area networks hardware, wide area networks hardware, virtual private networks hardware, telephones, wireless computer networks, namely, networks comprised of client and server devices, namely, wireless devices in the nature of devices for wireless radio transmission, wireless network devices in the nature or wireless network extenders and their respective trust center devices, namely, integrated circuits, wireless mesh network devices, namely, computer network interface devices and their associated coordinator access points, and wireless local area network, wireless communication processors, namely, satellite processors, cellular telephony base stations, namely, cellular telephone apparatus, digital signal processors, two-way radio pagers, radio and satellite telephones, wireless handheld computers, magnetic coded and plastic smart cards, namely, electronic circuit cards with an embedded integrated circuit and stored information and data in the field of silicon semiconductors and intellectual property cores; computer terminals for use with credit cards, debit cards and plastic smart cards with an embedded integrated circuit or stored information and data, namely, magnetic coded card readers and readers of plastic smart cards with an embedded integrated circuit and stored information or data in the field of silicon semiconductors and intellectual property cores; plastic smart cards, namely, electronic circuit cards with an embedded integrated circuit and stored information and data; magnetically encoded credit cards;(Based on 44(e)) Credit cards without magnetic coding; debit cards without magnetic encoding; printed materials relating to educational and training programs in information technology, namely, educational and training books, guides, user manuals and marketing collateral, namely, advertising pamphlets;Color is not claimed as a feature of the mark.;(Based on 44(e)) Technology licensing of cryptographic methods and protocols; technology licensing of security hardware and software;SECURE;(Based on Use in Commerce) (Based on 44(e)) Information technology services, namely, cryptographic and information security consulting; providing on-line non-downloadable computer software for systems integration relating to information security for others; design of computer systems for others; security analysis services, namely, computer security consultancy;

Category: