Varemerketidende-Nr35-2021.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Varemerketidende-Nr35-2021.Pdf . nr 35/21 - 2021.08.30 NO årgang 111 ISSN 1503-4925 Norsk varemerketidende er en publikasjon som inneholder kunngjøringer innenfor varemerkeområdet BESØKSADRESSE Sandakerveien 64 POSTADRESSE Postboks 4863 Nydalen 0422 Oslo E-POST [email protected] TELEFON +47 22 38 73 00 8.00-15.45 innholdsfortegnelse og inid-koder 2021.08.30 - 35/21 Innholdsfortegnelse: Etterlysning ............................................................................................................................................................ 3 Registrerte varemerker ......................................................................................................................................... 4 Internasjonale varemerkeregistreringer ............................................................................................................ 43 Ansvarsmerker .................................................................................................................................................. 141 Innsigelser .......................................................................................................................................................... 142 Avgjørelser fra Klagenemnda........................................................................................................................... 143 Begrensing i varefortegnelsen for internasjonale varemerkeregistreringer ............................................... 146 Begrensing av varer eller tjenester for nasjonale registreringer ................................................................. 151 Trekninger/slettelser begjært av søker/innehaver ......................................................................................... 152 Merker som ikke er fornyet ............................................................................................................................... 153 Overdragelser og navne-/adresseendringer i spesifiserte rettigheter ......................................................... 159 Endringer i fullmaktsforhold ............................................................................................................................ 162 Rettelse av internasjonale varemerkeregistreringer ..................................................................................... 164 Krav om administrativ overprøving av varemerkeregistreringer ................................................................. 165 Avgjørelse etter krav om administrativ overprøving av varemerkeregistreringer ..................................... 166 Fornyelser .......................................................................................................................................................... 167 Fornyede internasjonale registreringer .......................................................................................................... 170 Ikke fornyede internasjonale registreringer ................................................................................................... 174 Slettede internasjonale registreringer ............................................................................................................. 177 Avgjørelse i krav om administrativ overprøving av registrert foretaksnavn .............................................. 178 INID-koder I kunngjøringene er de enkelte data forsynt med koder overenstemmende med INID-kodesystemet (INID= Internationally agreed Numbers for the Identification of Data). (111) Registreringsnummer (151) Registreringsdato (180) Registreringen utløper (210) Søknadsnummer (220) Inngivelsesdato (526) Unntaksannmerkning (300) Prioritetsopplysninger (450) Kunngjort registrert dato (511) Vare-/tjenesteklasse (521) Bruk/innarbeidelse (526) Unntaksannmerkning (540) Gjengivelse av varemerketekst (541) Merket er et ordmerke (546) Merket er et kombinert merke eller et rent figurmerke (551) Fellesmerkebestemmelser (554) Merket er tredimensjonalt (571) Beskrivelse av merket (591) Merket er i farger (730) Søker/innehaver (740) Fullmektig (791) Lisenshaver (793) Lisensinformasjon (891) Etterfølgende utpekning dato 2 etterlysning 2021.08.30 - 35/21 Etterlysning På bakgrunn av begjæring om slettelse etter varemerkeloven § 43, fra Bryn Aarflot på vegne av 1661, Inc., bes innehaver av registreringsnummer 287401, det kombinerte merket ZGOAT, om å melde seg til Patentstyret innen 3 måneder. 3 registrerte varemerker 2021.08.30 - nr 35/21 Registrerte varemerker Registrerte varemerker jf. varemerkeloven § 22. I løpet av tre måneder fra i dag kan det fremsettes innsigelse mot registreringen av varemerket, jf. varemerkeloven § 26 og varemerkeforskriften § 23. For søknader som har søknadsdag fra 1. juli 2010 gjelder varemerkeregistreringen i ti år fra søknadsdagen. Registreringer som har søknadsdag før 1. juli 2010 gjelder i ti år fra registreringsdagen. Se varemerkeloven § 32 jf. § 83 annet ledd. (111) Reg.nr.: 317153 (111) Reg.nr.: 317154 (151) Reg.dato.: 2021.08.19 (151) Reg.dato.: 2021.08.19 (210) Søknadsnr.: 202108731 (210) Søknadsnr.: 202108730 (220) Inndato: 2021.07.02 (220) Inndato: 2021.07.02 (180) Registreringen utløper: 2031.07.02 (180) Registreringen utløper: 2031.07.02 (540) Gjengivelse av merket: (540) Gjengivelse av merket: (593- Merket er et kombinert merke eller et rent (593- Merket er et kombinert merke eller et rent 594) figurmerke 594) figurmerke (730) Innehaver: (730) Innehaver: QI HOLDING AS, c/o Share Oslo ASatt: Qi Holding QI HOLDING AS, c/o Share Oslo ASatt: Qi Holding ASPostboks 1860 Vika, 0124 OSLO, Norge ASPostboks 1860 Vika, 0124 OSLO, Norge (511) Vare-/ tjenestefortegnelse: (511) Vare-/ tjenestefortegnelse: Klasse 9 Programvare for kommunikasjon, nettverk og sosiale Klasse 9 Programvare for integrering av kunstig intelligens og nettverk; interaktiv dataprogramvare; programvare for maskinlæring innen stordata (big data); programvare 3D-datagrafikk; programvare for bygg- og for kommunikasjon, nettverk og sosiale nettverk; anleggsvirksomhet; programvare for dataassistert programvare for kunstig intelligens og maskinlæring; konstruksjon (KAD); programvare for integrering av interaktiv dataprogramvare; programvare for 3D- kunstig intelligens og maskinlæring innen stordata (big datagrafikk; programvare for bygg- og data); programvare for kunstig intelligens og anleggsvirksomhet; programvare for dataassistert maskinlæring; programvare for simulering; konstruksjon (KAD); programvare for simulering; programvarer [innregistrerte edb programmer]. programvarer [innregistrerte edb programmer]. Klasse 35 Annonsering vedrørende forretnings- eller Klasse 35 Presentasjon av varer gjennom medier, for detaljsalg; boligeiendom; annonsering, markedsføring og annonsering vedrørende forretnings- eller salgsfremmende rådgivning, rådgivnings- og boligeiendom; annonsering, markedsføring og bistandstjenester; bedriftsrådgivnings- og salgsfremmende rådgivning, rådgivnings- og informasjonstjenester; presentasjon av varer gjennom bistandstjenester; bedriftsrådgivnings- og medier, for detaljsalg; salgsfremmende tjenester [for informasjonstjenester; salgsfremmende tjenester [for tredjemann]; innsamling av informasjon til databaser; tredjemann]; innsamling av informasjon til databaser; kompliering av registre med informasjon for handels- kompliering av registre med informasjon for handels- og reklameformål; oppdatering og vedlikeholde av data og reklameformål; oppdatering og vedlikeholde av data i databaser; systematisering av informasjon til i databaser; systematisering av informasjon til databaser. databaser. Klasse 37 Eiendomsutviklingstjenester [byggevirksomhet]; bolig- Klasse 37 Eiendomsutviklingstjenester [byggevirksomhet]; bolig- og forretningsbyggkonstruksjon; byggevirksomhet; og forretningsbyggkonstruksjon; byggevirksomhet; konsulentbistand ved byggingsarbeider. konsulentbistand ved byggingsarbeider. Klasse 42 Design av computersystemer; utarbeidelse av Klasse 42 Design av computersystemer; utarbeidelse av dataprogrammer; utleie av dataprogrammer; software dataprogrammer; utleie av dataprogrammer; software som en tjeneste [SaaS]; illustrasjonstjenester; design- som en tjeneste [SaaS]; illustrasjonstjenester; design- og byggeplanleggingstjenester, samt relatert og byggeplanleggingstjenester, samt relatert rådgivning; interiørdesigntjenester. rådgivning; interiørdesigntjenester. Klasse 45 Online sosiale nettverksbyggingstjenester. Klasse 45 Online sosiale nettverksbyggingstjenester. (450) Kunngjøringsdato: 2021.08.30 (450) Kunngjøringsdato: 2021.08.30 4 registrerte varemerker 2021.08.30 - nr 35/21 (111) Reg.nr.: 317155 (111) Reg.nr.: 317158 (151) Reg.dato.: 2021.08.19 (151) Reg.dato.: 2021.08.19 (300) Søknadsprioritet 2020.09.15, US, 90/182,586 (300) Søknadsprioritet 2021.07.08, EM, 018510911 (210) Søknadsnr.: 202103105 (210) Søknadsnr.: 202109114 (220) Inndato: 2021.03.08 (220) Inndato: 2021.07.09 (180) Registreringen utløper: 2031.03.08 (180) Registreringen utløper: 2031.07.09 (540) Gjengivelse av merket: (540) Gjengivelse av merket: BUILT TO LAST SKYTROFZO (592) Merket er et ordmerke i standard font (592) Merket er et ordmerke i standard font (730) Innehaver: (730) Innehaver: Bristol-Myers Squibb Company, 430 E. 29th Street, Ascendis Pharma Endocrinology Division A/S, Tuborg 14th Floor, NY10016 NEW YORK, USA Boulevard 12, 2900 HELLERUP, Danmark (740) Fullmektig: (740) Fullmektig: ACAPO AS, Postboks 1880 Nordnes, 5817 BERGEN, BRANDIT IPR ApS, Vejlsøvej 51, 8600 SILKEBORG, Norge Danmark (511) Vare-/ tjenestefortegnelse: (511) Vare-/ tjenestefortegnelse: Klasse 5 Farmasøytiske
Recommended publications
  • Safeguarding the Online Presence of LGBTIQ Refugees
    Safeguarding the Online Presence of LGBTIQ Refugees Team Members: Brett Foster Jenna Galli Matthew O’Donnell Alexander Puhalski Advisors: Fabio Carrera Daniel DiMassa Sponsored By: May 13th, 2021 [email protected] https://sites.google.com/view/be21-oram/ This report represents the work of WPI undergraduate students submitted to the faculty as evidence of completion of a degree requirement. WPI routinely publishes these reports on its website without editorial or peer review. For more information about the projects program at WPI, please see http://www.wpi.edu/academics/ugradstudies/project-learning.html Abstract This project aided the Organization for Refuge, Asylum, and Migration (ORAM), located in Berlin, Germany, in developing safe practices used to sustain a web-based tool that assists LGBTIQ asylum seekers. We proposed changes for ORAM’s web application and produced a guide that ORAM can use to educate refugees and asylum seekers on protecting their digital data. We also conducted interviews with experts in cybersecurity, data storage, or IT to identify security measures and services for ORAM to safely collect and store refugees’ data. ORAM can use these recommendations to serve itself and its clients. i Executive Summary The total number of displaced people worldwide has almost doubled over the past decade from 43.3 million people in 2009 to 79.5 million in 2019—the largest number ever recorded (UNHCR, 2020a). Over 30 million of these refugees have been forced to leave their country of origin and are displaced abroad. Though many of these refugees are forced out due to conflicts and wars in their countries, others flee due to persecution.
    [Show full text]
  • Technology Reseller
    THE MAGAZINE & ONLINE CHANNEL RESOURCE FOR VARS, IT RESELLERS & IT SUPPORT PROVIDERS www.technologyreseller.co.uk v22 · 2019 Growing Together Partner-first culture drives rapid growth at Virtual1 Q&A MOBILE VIEW FROM Jamie Farrelly bigs up Veritas COMPUTING THE CHANNEL Technologies’ June product Dynabook branding marks new James Doggart, CEO of mega-launch chapter for 30-year-old start-up Cloud Technology Solutions PAGE 30 PAGE 38 PAGE 40 Article TiTLE 2 01732 759725 MK6160 Nimans Cisco Smash Press Ads TechReseller.indd 1 10/04/2019 13:41 ISSN 2632-9301 (Print) ISSN 2632-931X (Online) COMMENT technologyreseller.co.uk v22 · 2019 Comment 04 What’s New An interesting column from Brother UK MD Phil Jones The month’s best new on page 18, in which he lists some of the advice he products and services would give his younger self. These nuggets of wisdom, 07 Distributor News based on his experience in the IT industry, would have Midwich Group opens been valuable at any point in the last 30 years, but Bracknell showroom seem particularly pertinent today. His advice to seek 12 Reseller News and take note of feedback, however challenging it New financial backer for 24 Communications 33 SD-WAN might be, and to be aware of one’s own prejudices, ASL Group The go-to company for New Masergy market ‘decision pathways’ and blind spots strikes me as being UCC analysis highly relevant now that more and more businesses are 26 UCaaS 36 Computing embracing teamwork and collaboration in the pursuit of The opportunity in Meet ‘the most exciting agility and innovation.
    [Show full text]
  • Data Confidentiality and Integrity in Cloud Storage Environment
    Data Confidentiality and Integrity in Cloud Storage Environment Essohanam DJEKI1, Carlyna BONDIOMBOUY2, and Jules DEGILA3 1 Institut de Mathmatiques et de Sciences Physiques, Porto-Novo, Benin [email protected] 2 Centre d’Excellence Africain - Science Mathmatiques et Applications, Benin [email protected] 3 Institut de Mathmatiques et de Sciences Physiques, Porto-Novo, Benin [email protected] Abstract. Cloud services have seen a considerable increase in recent times, as the cloud allows users to outsource their data and IT resources. Storing and backing up data in the cloud has become increasingly popular. However, data security is an increasing concern. With the number of attacks on the cloud and data leakage, users are worried about their data security in the cloud. Several works dealt with data security in the cloud, but most of these solutions largely depend on providers. They do not provide users the control of the security of their data. To deal with data security concerns, we proposed a solution called EnCrypt Cloud that allows users to encryptcheck the integrity of their files, check their files' integrity, and check their files' integrity before uploading and storing it the cloud storage. We used the encryption technique (AES 256) to ensure the confidentiality of the data. To verify the data's integrity, we used the SHA 256 hash function with a two- level integrity check. Performance analysis of the AES encryption algorithm was performed to compare execution time memory usage during the encryption and decryption process. It should be noted that decryption consumes more resources than encryption. Keywords: data confidentiality, data integrity, cloud storage, data encryption, cloud security issues, EnCrypt Cloud.
    [Show full text]
  • Meet Nordlocker: Powerful Encryption Tool for Your Files
    Meet NordLocker: Powerful Encryption Tool for Your Files Creators of NordVPN Announce Launch of New Cybersecurity Product November 12, 2019. NordVPN, the world’s most advanced VPN service provider, is proud to announce the launch of its latest cybersecurity product — NordLocker. The new digital tool secures all types of files stored on your computer or in the cloud with end-to-end encryption. “Our mission is to combine the best usability practices with the highest encryption standards. NordLocker is not cloud storage. We believe it’s better. Think of it as middleware that adds a security layer to your data. NordLocker never stores your files anywhere. Instead, it lets you maintain the flexibility of keeping them wherever you’re used to, only securely,” says Ruby Gonzalez, Head of Communications at NordVPN. NordLocker is perfect for both personal use and handling work-related data. If someone gets access to your computer or other storage without permission, you don’t want your private files, such as photos, videos, music, notes, etc. to be peeked at or stolen. With NordLocker, what others see on your computer is secure, folder-like “lockers,” which hold your encrypted files and can only be accessed with your master password. The tool is especially handy for protecting your most sensitive data, including finances, IDs, and work files. On the other hand, NordLocker is a must for companies that store financial, legal, or medical records of their clients or deal with any other confidential information. In case of a breach, the encrypted data remains ultra-safe and private. That’s because NordLocker’s cryptosystem uses the most advanced ciphers and principles, featuring Argon2, AES256, ECC (with XChaCha20, EdDSA, and Poly1305), and other creations of modern cryptography.
    [Show full text]
  • Hack Old Iphone This Week in Security: Updates, Leaks, Hacking Old Hardware, and Making New
    hack old iphone This Week In Security: Updates, Leaks, Hacking Old Hardware, And Making New. First off, Apple has issued an update for some very old devices. Well, vintage 2013, but that’s a long time in cell-phone years. Fixed are a trio of vulnerabilities, two of which are reported to be exploited in the wild. CVE-2021-30761 and CVE-2021-30762 are both flaws in Webkit, allowing for arbitrary code execution upon visiting a malicious website. The third bug fixed is a very interesting one, CVE-2021-30737, memory corruption in the ASN.1 decoder. ASN.1 is a serialization format, used in a bunch of different crypto and telecom protocols, like the PKCS key exchange protocols. This bug was reported by [xerub], who showed off an attack against locked iPhone immediately after boot. Need to break into an old iPhone? Looks like there’s an exploit for that now. Samsung’s Pre-installed Apps. Or if we were feeling less charitable, we’d call them bloatware. Either way, researchers at Oversecured took a look… and found some problems. First up is Samsung’s Knox Core app, part of their enterprise security system. This core framework file can install other apps, triggered by a world-writable URI. So first problem, anything that can load a file and call a URI can trigger an arbitrary app install. There is a second problem: part of that install process copies the app-to-be-installed to a world-readable location. This means that with a bit of work, any other app can abuse this to read any file this system app can read, and that’s all of them.
    [Show full text]
  • Potpourri Topics from Recent Issues of the Ask Woody Newsletter
    Potpourri Topics from recent issues of the Ask Woody Newsletter (a weekly email newsletter about Windows computers and software, and related issues, from askwoody.com) Compiled by Gary Patrick Lexington Computer & Technology Group 4/22/2020 Table of Contents Topic 1) The “Ask Woody” Newsletter has resumed a free edition: Once a week, a subset of the Ask Woody Plus paid newsletter: - likely three articles a week out of four-to-six in the Plus edition. - a sample copy is at: https://www.askwoody.com/askwoody-newsletter-alerts/welcome-to-the-askwoody-free-newsletter/ This issue has an article “Is a Chromebook right for you,” within the objectives of the newsletter to provide user help for Windows 7, 8, and operating systems alternatives to Windows 7 and 8, as well as the primary coverage of Windows 10 and applications. A link to sign up for the free edition is https://cdn.forms-content.sg-form.com/fadcab1b-6abe-11ea-9648-2a7e788be8da A bonus is free access to the “Forums” section of Readers’ comments and blogs - examples are: 1) “Setting up a Standard User Account in Windows 10,” and 2) Reader Discussion about Backup Imaging Software. Go to slide #29 for web links. One can search the Forums by any keyword(s). Topic 2) Is your cloud-stored data there forever? (beginning with slide #3) Including a survey of Encryption Software (But there is an unanswered question whether adding encryption now can really overwrite and hide data already stored earlier in the Cloud unencrypted - very likely not). Topic 3) Updates to the Ask Woody Ultimate Utilities List (beginning in slide #21) 2 When you delete data stored in your “Cloud” account - - is your deleted data really gone? (by Fred Langa, Ask Woody Plus Newsletter, Issue 17.10.0, March 9, 2020.) Most Windows users know that clicking "delete" does not actually erase local files; it merely modifies an index table.
    [Show full text]
  • Through the Web, Darkly Through the Web, Darkly
    Through the Web, Darkly Through the Web, Darkly © Copyright 2020 William von Hagen. All Rights Reserved. All opinions expressed in this document are the opinions of the author, except where explicitly attributed to someone else. They are just that - opinions. Free thought and speech are still legal, aren't they? Released on Amazon and as donation-ware. If you didn't get this on Amazon and liked any part(s) of this document or found it to be useful, please make a small donation via PayPal to <[email protected]> or in Bitcoin to 35DnXM3Fg9zvirbraGmUGecLy7EPZiBWsT. Thanks! Comments welcome. Updates will be ongoing. Any errors are accidental. Please report them to [email protected] [mailto:[email protected]] to ensure that this document is corrected. Heads up! The cover illustration is a public domain photograph of the skull of St. Wenceslaus [https://commons.wikimedia.org/wiki/ File:St_Wenceslas_skull.jpg]. Merry Xmas, reader! ISBN-13: 978-0-578-56194-3 Version 20200526-002 This legend may not be removed from this document by any party. That would be just plain wrong. Through the Web, Darkly Table of Contents Table of Contents About this book .............................................................................................................. xi 1. Overview ...................................................................................................................... 1 1.1. Cast of hackers ................................................................................................... 2 1.2. Differentiating between privacy
    [Show full text]