Loading...
Loading...
Application UK00911876331 · Dead

| Application Number | UK00911876331 |
| Status | Dead |
| Owner | NTT Com Security AG |
| Filed | 2013-06-06 |
| Registered | 2013-11-11 |
| Renewal Due | 2023-06-06 |
| Type | Individual |
| Feature | Figurative |
| Attorney | See claim section below |
WIDE ANGLE has a current status of Dead.
The specification below is taken directly from the filed record at the UK IPO for each Nice class this trademark is registered in.
Devices and apparatus for recording, capturing, processing, transmitting, receiving, reading, storing, displaying, exporting and playing data, messages, text, speech, audio signals, pictures (as far as comprised in class 09); computers, data processing apparatus, computer peripheral devices, computer firmware, IT-platforms, IT-infrastructures, IT-security devices, information risk management devices, and parts thereof; computer programs, computer software, computer operating programs, also recorded or downloadable and/or as updates; data media, also recorded; interfaces for computers; cards with integrated circuits; all of the afore mentioned goods in class 09 in particular in the field of information technology (IT), IT-security, information risk management, IT-security-technology, IT-security-systems, IT-security-solutions, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention, authentication, in particular in the field of virus protection, spam protection, spyware protection, computer security, network security, internet security, data protection, decryption and encryption of data, protection of unauthorized intrusions, system monitoring, protection of mobile devices, identity and/or access management, policy compliance, e-mail management, vulnerability and threat management, risk management, content-, managed perimeter-, infrastructure security, Virtual Private Network (VPN), remote access, secure communication links, firewall systems.
Advertising; business management; business administration; office functions; compiling of different goods and services for others in the field of computer and telecommunication networks, IT-platforms, IT-infrastructures, computer hardware, computer software, IT-security, information risk management, IT-security-systems, IT-security-solutions, in order to facilitate the inspection and purchase of such goods and services, also by use of electronic media; business inquiries; business management and organization consultancy; commercial information and advice for consumers; advisory services for business management; procurement services for others; professional business consultancy; business investigations, information, research; compilation of statistics; business appraisals; business management assistance; commercial administration of the licensing of the goods and services of others; business research; computerized file management; systemization and compilation of information into computer databases; publicity; publication of publicity texts; all of the afore mentioned services in class 35 in particular in the field of information technology (IT), IT-security, information risk management, IT-security-technology, IT-security-systems, IT-security-solutions, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention, authentication, in particular in the field of virus protection, spam protection, spyware protection, computer security, network security, internet security, data protection, decryption and encryption of data, protection of unauthorized intrusions, system monitoring, protection of mobile devices, identity and/or access management, policy compliance, e-mail management, vulnerability and threat management, risk management, content-, managed perimeter-, infrastructure security, Virtual Private Network (VPN), remote access, secure communication links, firewall systems.
Installation services; repair services; installation and repair of computer and telecommunication networks, IT-platforms, IT-infrastructures, computer hardware and computer software; installation and repair of information technology (IT), IT-security-technology, information risk management technology, IT-security-systems, IT-security-solutions; repair information; all of the afore mentioned services in class 37 in particular in the field of information technology (IT), IT-security, information risk management, IT-security-technology, IT-security-systems, IT-security-solutions, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention, authentication, in particular in the field of virus protection, spam protection, spyware protection, computer security, network security, internet security, data protection, decryption and encryption of data, protection of unauthorized intrusions, system monitoring, protection of mobile devices, identity and/or access management, policy compliance, e-mail management, vulnerability and threat management, risk management, content-, managed perimeter-, infrastructure security, Virtual Private Network (VPN), remote access, secure communication links, firewall systems.
Telecommunications; providing user access to computer and telecommunication networks, IT-platforms, IT-infrastructures, data and information, data bases, computer software; providing of secure internet accesses; message sending; electronic mail and internet services, in particular filtering of electronic mail and internet content for third parties; providing of interactive communication networks and data processing systems for the transmission of data and information; transmission of data and information; protecting communication links; telecommunications routing and junction services; communications by telephone and computer terminals; providing of a support centre, a call centre, an information hotline, an emergency hotline; all of the afore mentioned services in class 38 in particular in the field of information technology (IT), IT-security, information risk management, IT-security-technology, IT-security-systems, IT-security-solutions, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention, authentication, in particular in the field of virus protection, spam protection, spyware protection, computer security, network security, internet security, data protection, decryption and encryption of data, protection of unauthorized intrusions, system monitoring, protection of mobile devices, identity and/or access management, policy compliance, e-mail management, vulnerability and threat management, risk management, content-, managed perimeter-, infrastructure security, Virtual Private Network (VPN), remote access, secure communication links, firewall systems.
Education; teaching; providing of training; all of the afore mentioned services in particular in the field of computers, networks, IT-platforms, IT-infrastructures, data bases, internet, computer software, computer hardware, computer peripheral devices, computer firmware, computer systems, the design of computer software, IT security and information risk management; arranging and conduction of seminars, symposiums, trainings, workshops, congresses, conferences, colloquiums, in particular in connection with computers, networks, IT-platforms, IT-infrastructures, data bases, internet, computer software, computer hardware, computer peripheral devices, computer firmware, computer systems, the design of computer software, IT security and information risk management; publication of information (as far as covered by class 41), books, texts (other than publicity texts), journals, also in electronic fashion; all of the afore mentioned services in class 41 in particular in the field of information technology (IT), IT-security, information risk management, IT-security-technology, IT-security-systems, IT-security-solutions, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention, authentication, in particular in the field of virus protection, spam protection, spyware protection, computer security, network security, internet security, data protection, decryption and encryption of data, protection of unauthorized intrusions, system monitoring, protection of mobile devices, identity and/or access management, policy compliance, e-mail management, vulnerability and threat management, risk management, content-, managed perimeter-, infrastructure security, Virtual Private Network (VPN), remote access, secure communication links, firewall systems.
Scientific and technological services and research and design relating thereto; industrial analysis and research services; engineering; technical research; technical consultancy; technical surveys; technical project studies; technical analysis; technical project management; technical evaluations; services of a physics; services of a software engineer; information security consulting, in particular in the field of security governance, management and strategy, assets and risk management, compliance, standards and regulations, threats and vulnerabilities, technical architecture, programme and project management; technology security consulting, in particular in the field of assessments and reviews, design and audit, configuration, deployment and policies, risk assessments, support management, asset management and decommission; providing IT security solutions and information risk management solutions; computer software and computer hardware consultancy; computer system design; computer software design; computer programming; computer protection services; computer systems analysis; recovery of computer data; design, development, installation, configuration, updating, implementation, integration, maintenance, modification, extension of computer hardware, computer software, computer software updates, downloadable computer software, data bases, operation systems, computer networks, IT-platforms, IT-infrastructures; cloud deployment services; technical support, also remote, via hotline or telephone; managed security services in the field of computer hardware, computer software, computer software updates, downloadable computer software, data bases, operation systems, computer and telecommunication networks, IT-platforms, IT-infrastructures; data backup services; data storage services; analysis, processing and integration of data; technical administration of accesses to computer networks; provision of technical security directives; inspection of technical guidelines and processes; all of the afore mentioned services in class 42 in particular in the field of information technology (IT), IT-security, information risk management, IT-security-technology, IT-security-systems, IT-security-solutions, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention, authentication, in particular in the field of virus protection, spam protection, spyware protection, computer security, network security, internet security, data protection, decryption and encryption of data, protection of unauthorized intrusions, system monitoring, protection of mobile devices, identity and/or access management, policy compliance, e-mail management, vulnerability and threat management, risk management, content-, managed perimeter-, infrastructure security, Virtual Private Network (VPN), remote access, secure communication links, firewall systems.
This figurative mark is indexed under the following Vienna categories by the UK IPO:
'WIDE ANGLE' is a dead trademark on the UK IPO register, owned by NTT Com Security AG. The application (UK00911876331) was filed on 6 June 2013 and registered on 11 November 2013. The registration is set to expire on 6 June 2023.
This mark is recorded under multiple classes: Class 9 (scientific, electrical & IT apparatus); Class 35 (advertising, business management & retail services); Class 37 (construction, repair & installation services); Class 38 (telecommunications services); Class 41 (education, entertainment & sporting services); Class 42 (scientific, IT & design services).
The trademark is represented by Williams Powell.
UK trademark UK00911876331 for the mark 'WIDE ANGLE' in Class 9, 35, 37, 38, 41, 42 is recorded on the UK IPO register as owned by NTT Com Security AG. This covers one specific UK trademark record only — the same brand name may be owned by different parties in other classes, other countries, or as separate registrations.
No — the UK IPO records the status of UK trademark UK00911876331 for the mark 'WIDE ANGLE' as dead.
UK trademark UK00911876331 for the mark 'WIDE ANGLE' is recorded in Class 9 (scientific, electrical & IT apparatus); Class 35 (advertising, business management & retail services); Class 37 (construction, repair & installation services); Class 38 (telecommunications services); Class 41 (education, entertainment & sporting services); Class 42 (scientific, IT & design services). The filed specification reads: Class 9: Devices and apparatus for recording, capturing, processing, transmitting, receiving, reading, storing, displaying, exporting and playing data, messages, text, speech, audio signals, pictures (as far as comprised in class 09); computers, data processing apparatus, computer peripheral devices, computer firmwa…
UK trademark UK00911876331 for the mark 'WIDE ANGLE' was filed at the UK IPO on 6 June 2013 and registered on 11 November 2013.
UK trademark UK00911876331 for the mark 'WIDE ANGLE' is currently recorded as valid until 6 June 2023, at which point it will need to be renewed with the UK IPO to remain in force.
Williams Powell is listed as the attorney / representative of record for UK trademark UK00911876331 for the mark 'WIDE ANGLE' on the UK IPO register.
This trademark has an attorney of record listed on the UK register. The firm has not yet claimed its listing on Trademark Dashboard.
Trademarks matching "WIDE ANGLE" have been found on the following foreign registers. Exact matches appear first; where the name also appears inside longer filings, those are listed below as similar marks. A “Same applicant” badge appears next to a mark when the applicant name aligns with the source filing.
| Mark | Ref | Status | Filed |
|---|---|---|---|
| WIDE ANGLESame applicant | 79142574 | 404 | 2013-09-06 |
| WIDE°ANGLE | 79373428 | 700 | 2023-04-14 |
| WIDE ANGLE | 88202334 | 601 | 2018-11-21 |
| WIDE ANGLE | 86900286 | 602 | 2016-02-08 |
| WIDE ANGLE | 77206914 | 710 | 2007-06-15 |
UK trademark data is supplied by the Intellectual Property Office under the Open Government Licence v3.0.
US trademark data is supplied by the United States Patent and Trademark Office. Works of the US federal government are in the public domain under 17 U.S.C. §105.
The “About This Trademark” summary and FAQ above are AI-generated from the register data shown on this page. They are factual summaries only — always verify details against the official register before making legal decisions.