Australian Trade Mark Search

Australian Trade Mark Search is the Australian Government’s trade mark search system.

Additional fields:

Trade mark 2535734

Words DOOZY
Image
Image description
Status registered: Registered/protected
Priority date 05 Apr 2025 (Filing)
Class 42
Kind Word
Dates
Renewal due 05 Apr 2035
Registration advertised / published 13 Nov 2025
Entered on Register 13 Nov 2025
Acceptance advertised / published 06 Sep 2025
Acceptance 23 Apr 2025
Filing 05 Apr 2025
Registered from 05 Apr 2025

Owner Address for service
Como Developments Pty Ltd
Kepdowrie Chambers

Goods & Services
Class 42: electronic storage of data; computer technology services in the field of cybersecurity; computer technology services provided on an outsourcing basis in the field of cybersecurity; computer and technology services for securing computer data; computer security services; computer security services [design and development of secure computer hardware, software and systems]; IT security, protection and restoration; assessing information technology security and vulnerability of computers and networks; authentication services for computer security; authenticating users accessing computer networks; authentication, issuance and validation of digital certificates; authentication, issuance and validation of digital keys; encryption, decryption and authentication of information, messages and data; development of software for secure network operations; testing of security systems; computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; computer security services [programming and software installation, repair and maintenance services]; computer security services in the nature of providing authentication, issuance, validation and revocation of digital keys; computer security consulting services in the field of scanning of computers and networks to assess information security vulnerability; identity validation [computer security]; identity verification [computer security]; verification of personal identification [computer security]; providing authentication of personal identification information [computer security services]; identity verification services [computer security]; user authentication services using biometric hardware and software technology for password management; design, development and implementation of computer programs; data encryption services; encryption of data; computer security consultancy in the field of scanning of computers and networks to assess information security vulnerability; consulting services in the field of computer and computer network security; computer security consultancy; consultancy in the field of computer security; consultancy in the field of computer and computer network security; professional consultancy relating to computer security; computer technology consultancy in the field of data security; data security consultancy; computer security threat analysis for protecting data; computer and internet security consultancy and data encryption services; IT services for data protection; information technology services for data protection

Indexing constituents
Word Image