South Wales, March 27 -- United Kingdom Intellectual Property Office (UKIPO) has registered trademark "Jeddak" on March 18. The details about the trademark application no. UK00004357072 published in the journal no. 2026/013 (March 27).

With Meissner Bolte (UK) Limited as representative, Lemon Inc. filed the trademark application for the below mentioned good(s)/service(s).

Class 9 : Computer programs, downloadable; downloadable computer software applications; downloadable smart phone application (software); mobile phone software applications, downloadable; computer software platforms, recorded or downloadable; Computer programs, recorded, for confidential data transmission between data terminal and the cloud, encryption key management, and serving as a data confidentiality container; Downloadable computer software for providing data security protection for data flow and application through confidential computing, cryptographic applications and information flow security technologies in the field of privacy computing; Downloadable middleware for providing data security protection for data flow and application, confidential data transmission between data terminal and the cloud, encryption key management, serving as a data confidentiality container through confidential computing, cryptographic applications and information flow security technologies in the field of privacy computing; Downloadable software in the nature of a mobile application for providing data security protection for data flow and application, confidential data transmission between data terminal and the cloud, encryption key management, serving as a data confidentiality container through confidential computing, cryptographic applications and information flow security technologies in the field of privacy computing; Downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Downloadable computer software for encryption; Downloadable computer software using artificial intelligence (AI) for providing data security protection for data flow and application through confidential computing, cryptographic applications and information flow security technologies in the field of privacy computing.

Class 42 : Software as a service [SaaS]; platform as a service [PaaS]; computer programming services for data processing; providing information relating to computer technology and programming via a website; development of computer platforms; design and development of computer software; design and development of application software for mobile phones; providing online non-downloadable computer software; Software as a service (SAAS) services featuring software for providing data security protection for data flow and application, confidential data transmission between data terminal and the cloud, encryption key management, serving as a data confidentiality container through confidential computing, cryptographic applications and information flow security technologies in the field of privacy computing; Platform as a service (PAAS) featuring computer software platforms for providing data security protection for data flow and application, confidential data transmission between data terminal and the cloud, encryption key management, serving as a data confidentiality container through confidential computing, cryptographic applications and information flow security technologies in the field of privacy computing; Providing temporary use of on-line non-downloadable cloud computing software using artificial intelligence (AI) for providing data security protection for data flow and application, confidential data transmission between data terminal and the cloud, encryption key management, serving as a data confidentiality container through confidential computing, cryptographic applications and information flow security technologies in the field of privacy computing; Providing a website featuring non downloadable software using artificial intelligence (AI) for providing data security protection for data flow and application, confidential data transmission between data terminal and the cloud, encryption key management, serving as a data confidentiality container through confidential computing, cryptographic applications and information flow security technologies in the field of privacy computing; Providing temporary use of on-line non-downloadable software for providing data security protection for data flow and application, confidential data transmission between data terminal and the cloud, encryption key management, serving as a data confidentiality container through confidential computing, cryptographic applications and information flow security technologies in the field of privacy computing; Providing a secure, web-based service featuring technology that enables individuals to remotely create and manage their own accounts so that whatever private content they upload now can be encrypted, then delivered to their intended recipients, at the time and in the manner requested; Data encryption services; Computer security threat analysis for protecting data; Design and development of electronic data security systems; Data security consultancy.

The original document can be viewed at: http://www.ipo.gov.uk/cgi-bin/redirect.cgi?type=tmj&link=6¶m1=UK00004357072

Disclaimer: Curated by HT Syndication.