Australian Trade Mark Search

Australian Trade Mark Search is the Australian Government’s trade mark search system.

Additional fields:

Trade mark 2473712

Words TAILSCALE
Image
Image description LTR T IN SQUARE FORMED BY 9 DOTS
Status registered: Registered/protected
Priority date 24 Jul 2024 (Convention)
Classes 9, 42
Kind Figurative
Dates
Renewal due 13 Aug 2034
Registration advertised / published 04 Mar 2025
Entered on Register 04 Mar 2025
Acceptance advertised / published 25 Dec 2024
Acceptance 20 Aug 2024
Filing 13 Aug 2024
Registered from 13 Aug 2024

Owner Address for service
Tailscale Inc.
Davies Collison Cave Pty Ltd

Goods & Services
Class 9: Computer software in the field of computer network connectivity and security, featuring software for secure network communications, computer security, information security, enabling access and entrance control to computer networks and to protect the security of computer networks, encrypting communications, software for management, collection, aggregation and storage of user data information, namely, timestamp, IP address, host name, operating system version, event type, connection status and messages for diagnostic, troubleshooting, debugging and detection of security breaches, computer software that communicates with a centralized server to handle cryptographic key exchange and network administration, computer software that communicates with a centralized server to collect and aggregate information, computer network device access functionality, namely, software that circumvents network (firewall) access blockages, computer network security for VPNs (virtual private networks), and operating VPNs (virtual private networks)
Class 42: Software as a service (SAAS) in the field of computer network connectivity and security, featuring software for secure network communications, computer security, information security, enabling access and entrance control to computer networks and to protect the security of computer networks, encrypting communications, software for management, collection, aggregation and storage of user data information, namely, timestamp, IP address, host name, operating system version, event type, connection status and messages for diagnostic, troubleshooting, debugging and detection of security breaches, computer software that communicates with a centralized server to handle cryptographic key exchange and network administration, computer software that communicates with a centralized server to collect and aggregate information, computer network device access functionality, namely, software that circumvents network (firewall) access blockages, computer network security for VPNs (virtual private networks), and operating VPNs (virtual private networks)

Convention details
Date 24 Jul 2024
Number 2339922
Country CANADA
Goods & Services
Class 9:
Computer software in the field of computer network connectivity and security, featuring software for secure network communications, computer security, information security, enabling access and entrance control to computer networks and to protect the security of computer networks, encrypting communications, software for management, collection, aggregation and storage of user data information, namely, timestamp, IP address, host name, operating system version, event type, connection status and messages for diagnostic, troubleshooting, debugging and detection of security breaches, computer software that communicates with a centralized server to handle cryptographic key exchange and network administration, computer software that communicates with a centralized server to collect and aggregate information, computer network device access functionality, namely, software that circumvents network (firewall) access blockages, computer network security for VPNs (virtual private networks), and operating VPNs (virtual private networks).
Class 42:
Software as a service (SAAS) in the field of computer network connectivity and security, featuring software for secure network communications, computer security, information security, enabling access and entrance control to computer networks and to protect the security of computer networks, encrypting communications, software for management, collection, aggregation and storage of user data information, namely, timestamp, IP address, host name, operating system version, event type, connection status and messages for diagnostic, troubleshooting, debugging and detection of security breaches, computer software that communicates with a centralized server to handle cryptographic key exchange and network administration, computer software that communicates with a centralized server to collect and aggregate information, computer network device access functionality, namely, software that circumvents network (firewall) access blockages, computer network security for VPNs (virtual private networks), and operating VPNs (virtual private networks).

Indexing constituents
Word Image