EUTM file information

019056096

INCOGNIA


July 16, 2024

Trademark Summary

The trademark application INCOGNIA was filed by Incognia US Inc., a U.S. corporation (the "Applicant") and Incognia Tecnologia da Informação Ltda., a corporation established under the laws of the Federative Republic of Brazil (the "Co-Applicant", and jointly with the "Applicant" referred to as the "Applicants" going forward). The application was published for oppositions on October 17, 2024, and still open for oppositions.

The application was filed in Portuguese (English was selected as the second language).


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Software
    2. Application software
    3. Application processors
    4. Software and/or applications for devices sensors data collection
    5. Software and applications for geolocation data collection
    6. Data processing and management software, including data processing and management software for sensors data
    7. Computer software for processing devices sensor data
    8. Computer software for processing geo-location data
    9. Non-downloadable computer software
    10. Software for managing large volumes of data
    11. Utility, security, and cryptographic software
    12. Software for cybersecurity, identity verification, digital identity, authentication and/or fraud prevention
    13. Computer software development tools
    14. Computer software for processing, maintaining, systematizing, and distributing sensor data, including geolocation data, from a database
    15. Computer software that enables inference of identity patterns to enhance user security and experience in digital services
    16. Downloadable computer software that enables inference of identity patterns to enhance user security and experience in digital services
    17. Data processors
    18. Downloadable software for privacy protection
    19. Software for collecting, editing, organizing, modifying, tagging, transmitting, storing, and sharing data and information
    20. Cybersecurity, authentication, identity verification, and/or fraud prevention computer software that enhances user privacy
    21. Downloadable computer software platforms for cybersecurity, authentication, identity verification and/or fraud prevention
    22. Computer Software for data processing and management, sensors data, including geolocation data, processing, and managing large volumes of data
    23. Downloadable computer software for data processing and management, sensors data, including geolocation data, processing, and managing large volumes of data
    24. Downloadable computer software for database management
    25. Non-downloadable computer software for database management
    26. Downloadable computer software for processing, maintaining, systematizing and distributing sensor data, including geolocation data, from a database, to enable inference of identity patterns to enhance user security and experience in digital services
    27. Computer software for authentication, user verification, device recognition or identification, identity verification, digital identity and/or device tamper-detection
    28. Software platform for authentication, user verification, device recognition or identification, identity verification, digital identity and/or device tamper-detection
    29. Downloadable Computer software for authentication, user verification, device recognition or identification, identity verification, digital identity device identification, and/or device tamper-detection
    30. Downloadable software platform for authentication, user verification, device recognition or identification, identity verification, digital identity device identification, and/or device tamper-detection
    31. Software for Internet of Things devices registration, identification, authentication and/or management
    32. Software for device Intelligence, and/or Device Recognition, and or Device Identification and/or Device Integrity
    33. Downloadable Software for device Intelligence, and/or Device Recognition, and or Device Identification and/or Device Integrity
    34. Software Platform for device Intelligence, and/or Device Recognition, and or Device Identification and/or Device Integrity
    35. Software for financial transactions authentication.
  • The mark was filed in class 36 with following description of goods:
    1. Credit card payment processing
    2. Debit card payment processing
    3. Electronic wallet payment processing
    4. Services for validation of financial transactions
    5. Debit card validation or verification services
    6. Credit card validation or verification services
    7. Financial Account verification services
    8. Financial services.
  • The mark was filed in class 42 with following description of goods:
    1. Software design
    2. Software as a service (SaaS)
    3. Updating of computer software
    4. Providing online non-downloadable computer software
    5. Computer programming
    6. IT security, protection and restoration
    7. Monitoring of computer systems
    8. Installation of computer software
    9. Information technology [IT] support services [troubleshooting of software]
    10. Software consultancy services
    11. Software consultancy services relating to Digital Identity, identity verification, authentication, or fraud prevention
    12. Software consultancy services relating to fraud Prevention and/or to Digital Identity
    13. Monitoring of computer system operation by remote access
    14. Electronic data storage, including of sensors data
    15. Computer programming services for data processing
    16. Research in the field of data processing, including device sensors data
    17. Engineering services related to data processing, including device sensors data
    18. Professional consultancy related to computer, devices and/or applications security
    19. Authentication services for computer, devices and/or applications security
    20. Cybersecurity consultancy
    21. Monitoring of computer security systems
    22. Monitoring of computer systems for security purposes
    23. Computer engineering
    24. Consultancy in the field of security software
    25. Authentication services
    26. Computer services for the analyses of data, including analysis of device sensors data, and geolocation data
    27. Computer services for the analysis of data related to fraud detection and prevention
    28. Design and development of software for the Internet of Things (IoT)
    29. Design and development of Software for Internet of Things (IoT) devices registration, identification, authentication and/or management
    30. Software development, programming, and implementation
    31. Software as a service (SaaS) for Internet of Things management
    32. Software as a service (SaaS) for data processing and management, including sensors data, geolocation data, big data, security data, and authentication data
    33. Software as a service (SaaS) for authentication, user verification, device recognition or identification, identity verification, digital identity device identification, and/or device tamper-detection
    34. Information Technology Services for Device Intelligence, Device Identification, and/or Device Recognition and/or Device Integrity Software
    35. Information Technology Services
    36. IT Consultancy, avisory and information services relating to personal data misuse and/or breach
    37. Cloud computing
    38. Data security consultancy
    39. Data safeguarding services
    40. Data security consultancy, including consultancy in device sensors data
    41. Development of systems for data storage
    42. Research in the field of data processing technology
    43. Development of systems for data transmission
    44. Online data storage
    45. Electronic data storage, including device sensors data
    46. User authentication services using technology for e-commerce transactions
    47. Research in the field of artificial intelligence technology
    48. Authentication services of financial transactions
    49. Authentication services, including account authentication
    50. Electronic monitoring of accounts activity to prevent fraud.