US20120144499A1 - System to inform about trademarks similar to provided input - Google Patents

System to inform about trademarks similar to provided input Download PDF

Info

Publication number
US20120144499A1
US20120144499A1 US13/310,557 US201113310557A US2012144499A1 US 20120144499 A1 US20120144499 A1 US 20120144499A1 US 201113310557 A US201113310557 A US 201113310557A US 2012144499 A1 US2012144499 A1 US 2012144499A1
Authority
US
United States
Prior art keywords
trademark
trademarks
notification
search
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/310,557
Inventor
Edwin Tan
Michael E. St. John, JR.
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sky Castle Global Ltd
Original Assignee
Sky Castle Global Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sky Castle Global Ltd filed Critical Sky Castle Global Ltd
Priority to US13/310,557 priority Critical patent/US20120144499A1/en
Assigned to SKY CASTLE GLOBAL LIMITED reassignment SKY CASTLE GLOBAL LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ST. JOHN, JR., MICHAEL E., TAN, EDWIN
Publication of US20120144499A1 publication Critical patent/US20120144499A1/en
Priority to US13/830,655 priority patent/US20130275427A1/en
Priority to US13/830,450 priority patent/US8667609B2/en
Priority to US14/316,694 priority patent/US20140372316A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/40Information retrieval; Database structures therefor; File system structures therefor of multimedia data, e.g. slideshows comprising image and additional audio data
    • G06F16/48Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6272Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database by registering files or documents with a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/20Natural language analysis
    • G06F40/205Parsing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services; Handling legal documents
    • G06Q50/184Intellectual property management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/36Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols with means for detecting characters not meant for transmission

Definitions

  • Various embodiments of the present invention generally relate to trademark searching and notification systems. More specifically, various embodiments of the present invention relate to systems and methods for informing requesters about trademarks similar to a provided input.
  • a trademark is a distinctive sign or indicator used by businesses, individuals, organizations and other legal entities to identify and distinguish their goods and services from those from other entities.
  • a trademark may be a name, word, phrase, logo, symbol, design, image, or a combination of these elements.
  • Business, individuals, organizations and other legally-recognized entities may register a trademark with appropriate government or international bodies. The owner of a registered trademark may take legal action against any unauthorized use of their trademark.
  • Internet domain names are one area where infringement of trademarks may occur.
  • the Internet has been a prominent feature of our lives since the latter part of the 20th century.
  • Examples of services, resources and functions that get delivered over the Internet include the World Wide Web, with the delivery of requested information in HTML (Hypertext Markup Language) and other similar formats that include but is most certainly not limited to PHP, JSP, Flash, DHTML, ASP, ASPX and more.
  • HTML Hypertext Markup Language
  • This information is often delivered over a web browser such as Apple Safari and Mozilla Firefox, and is commonly accessed and identified by primary identifiers known as internet domain names.
  • These internet domain names provide easily recognizable and memorizable names to numerically-addressed Internet resources. Examples of domain names include apple.com, whitehouse.gov, google.co.uk, and mit.edu.
  • Internet domain names are used as an addressing method for accessing a plethora of other services, such as accessing and transferring files via the File Transfer Protocol (FTP).
  • FTP File Transfer Protocol
  • Internet domain names are also, among other purposes, used to identify the senders and recipients of electronic mail (e-mail) and to manage routes for the actual transmission of these e-mail messages. It is clear that domain names play an extremely critical function in the operation of the Internet.
  • Other uses of domain names as an addressing method include SFTP (Secure File Transfer Protocol), RTSP (Real Time Streaming Protocol), and more.
  • TLD top-level domain
  • SLD second-level domain
  • TLD top-level domain
  • Examples of TLDs are .com, .net, .org, .info, .biz, .mobi, and .name.
  • Other TLDs include country-code variants (otherwise known as ccTLDs) such as .de, .co.uk, and .com.cn.
  • TLDs are managed by registries (also known as registry operators). For example, ‘.com’ is managed and run by Verisign, Inc., while ‘.org’ is managed and run by the Public Interest Registry and ‘.uk’ is managed and run by Nominet UK.
  • registries maintain domain name registration information.
  • registry operators contract with designated (or accredited) domain name registrars (for example, eNom, Inc., Network Solutions, LLC, etc.) to provide domain name registration services to the public (end users) with minimal limitations.
  • Registrars may then offer registration of domain names through reseller affiliates. End-users may register any domain name through registrars or their resellers.
  • a domain name may generally be registered for up to a maximum period of 10 years.
  • End-users are generally allowed to register any domain name they want, so long as the domain name is not presently registered. In most cases, the registration process is a simple one. The end-user goes to the website of a domain name registrar (or its reseller), types in the domain name that he/she is interested in registering, and the registrar (or its reseller) performs a check for the availability of that domain name with the registry. If the domain name is available, the end-user may then register that domain name with a payment. At this time, the registrar ensures that the domain name is added to the registry. When the registration process is complete, the end-user who is now the owner of a domain name is known as a ‘registrant’.
  • the registrant may elect to create subdomains (third-level domains, or even more).
  • subdomains third-level domains, or even more.
  • Google, Inc. a search engine provider with a primary domain name of google.com, may elect to create a subdomain name ‘news’, resulting in a public-facing address ‘news.google.com’.
  • Subdomains allow for an extremely large number of potential addresses to be created on the internet.
  • New TLDs are constantly being introduced (mostly global TLDs, or gTLDs), formerly dormant/unused ccTLDs are being reintroduced or relaunched (an example being .co), and new countries result in the creation of completely new ccTLDs.
  • 7 new TLDs were introduced in 2001 and 2002. These were .biz, .info, .name, .pro, .aero, .coop, and .museum.
  • six more new TLDs (.asia, .cat, .jobs, .mobi, .tel and .travel) were introduced.
  • TLDs result in more opportunities for unique SLDs to be registered (for example, telephone.com may not be available, but telephone.mobi may be available for registration).
  • More gTLDs are being introduced in coming years as ICANN (the Internet Corporation for Assigned Names and Numbers) loosens limitations and allows for applications from entities who want to run their own gTLD.
  • Another area where end-users on the Internet may register names of their own is on services (social networking sites, blog sites, instant messaging, and more) such as Facebook, MySpace, Twitter, Blogspot, Linkedin, and AOL Instant Messenger.
  • Many of these privately run services provide users with opportunities to secure a username that becomes part of a public-facing web address. For example, Mark Zuckerberg, who is an instance of a Facebook (social network site) user, may register ‘facebook.com/zuck’, where the ‘zuck’ component of the web address was selected by the end user.
  • Nouriel Roubini who is an instance of a Blogspot (weblog/web journal service) user, may register ‘nourielroubini.blogspot.com’, where the ‘nourielroubini’ component of the web address was selected by the end user.
  • Starbucks Corporation which is a corporation that has a Twitter (service for high-speed status update transmission and sharing) profile/presence, may register http://twitter.com/starbucks, where the ‘starbucks’ component of the web address was selected by the end user.
  • the list of examples mentioned in this paragraph is by no means exhaustive.
  • Justin Bieber who is an instance of an AOL Instant Messenger (AIM) user, may register ‘justinbieber’ as his AIM screen name.
  • AIM AOL Instant Messenger
  • an individual or entity may create a new web address (e.g. domain names, subdomains, networking sites, and blog services), or a unique identifier (e.g. instant messaging services) associated with the use of web-based services.
  • a new web address e.g. domain names, subdomains, networking sites, and blog services
  • a unique identifier e.g. instant messaging services
  • Various embodiments of the present invention generally relate to trademark searching and notification systems. More specifically, various embodiments of the present invention relate to systems and methods for informing requesters about trademarks similar to a provided input (e.g., a domain name, an e-mail address, instant messaging user name, or an advertisement). For example, some embodiments include receiving, from a requester, a request to perform a trademark search for a provided input.
  • the requester for example, can be an individual, an organization, a service provided, etc.
  • One or more databases can be searched for trademarks related to the provided input.
  • the provided input can be directly used for searching the databases. In other cases, the provided input can be processed or parsed into phrases for searching the databases.
  • a relevance score for each trademark can be determined.
  • the relevance score can be based on a variety of inputs and factors such as status of a trademark, filing date, first use date, litigation history, comparison of potential classes with classes assigned to the trademarks, and others.
  • a notification can be generated based at least in part on the relevance score.
  • Some embodiments of the notification system include a communications module, a parsing module, a searching module, a notification module, a graphical user interface module, a verification module, and/or other modules or components.
  • the communications module can be configure to receive a request to perform a trademark search for a provided input.
  • the parsing module can be configured to parse or process the provided input into phrases for searching.
  • the searching module can be configured to receive the phrases from the parsing module and search (e.g., using exact matches, phonetic matches, and/or natural language matches) one or more database for trademarks related to the phrases.
  • the notification module can be configured to receive the trademarks related to the phrases and generate a notification.
  • the notification module can determine a relevance of the trademarks related to the phrases before generating the notification, wherein the relevance of the trademark is based on a status, a filing date, a first use date, a registration date, keyword matches between the description of the trademark and the context of use of the keyword within the provided input, a trademark jurisdiction, or an involvement of the trademark owner.
  • the graphical user interface module can be configured to generate one or more user interface screens configured to display the notification to a recipient and receive a verification from the user that the user has reviewed the notification.
  • FIG. 1 illustrates an example of an environment in which some embodiments of the present invention may be utilized
  • FIG. 2 shows a block diagram with exemplary components of an informing engine in accordance with one or more embodiments of the present invention
  • FIG. 3 is a flow chart illustrating exemplary operations for performing a trademark search in accordance with some embodiments of the present invention
  • FIG. 4 is a flow chart illustrating exemplary operations for generating a notification in accordance with various embodiments of the present invention
  • FIG. 5 is a flow chart illustrating a set of exemplary operations for a service provider to allow a registration in accordance with one or more embodiments of the present invention.
  • FIG. 6 illustrates an example of a computer system with which some embodiments of the present invention may be utilized.
  • Various embodiments of the present invention generally relate to trademark searching and notification systems. More specifically, various embodiments of the present invention relate to systems and methods for informing requesters about trademarks similar to a provided input.
  • Current means of enforcement of trademark rights by trademark owners involve filing lawsuits, using arbitration, and sending cease and desist letters, and more. Use of such methods in today's information-rich world is often ham-fisted and akin to attempting to smash a fly with a hammer. There exists a great deal of information asymmetry between those who can unwittingly or deliberately misuse a trademark or a term similar to the trademark, and what the actual owners of trademarks actually want the world to know.
  • some embodiments of the present invention provide for a proactive system in which users are notified of similar trademarks before using specific term(s) and users proceed after understanding which trademarks actually exist and what areas those trademarks actually entail, and possibly being notified of newly applied trademarks and modified trademarks at later times that are similar to the specific term(s) being used.
  • This notification or alert from a service provider and a recipient of services may optionally be a component of the Terms of Service of the service provider.
  • Various embodiments of the systems and methods described herein provide for a fast, simple way to search/request/check whether the manner in which they are about to use a given term, phrase, or identification string is not likely to be infringing on an existing trademark.
  • This search/request/check, and the subsequent verifiability that such a step had taken place reduces the likelihood that willful infringement of a trademark will take place, thereby eliminating unnecessary distress and costs to all parties.
  • some embodiments of the proposed systems and methods enable individuals and organizations to obtain/receive a list of trademarks similar to a given keyword or phrase, and to achieve a verifiable record of them doing so, which may serve various purposes including (i) demonstrating that adequate due diligence had been performed prior to the usage of a specific keyword or phrase in any context, (ii) altering their behavior of usage of the term(s) in question to avoid conflicts with existing classes of similar trademarks, (iii) performing precautionary checks/scans on a regular basis to ensure that their usage of a keyword or phrase is not in conflict with a new trademark, (iv) responsibly providing alerts and notifications as a provider of a platform or medium that allows for potential misuse of a trademark or trademark-similar term, (v) detecting attempts to register a trademark where the user of the keyword/phrase has already had de facto rights to the term by virtue of continued use of the term, or more.
  • various embodiments provide for the initiation of a means of data compilation including a list, indexed database, XML database, relational database, object database, or other data storage method, in preparation for subsequent storage of trademark information and data.
  • Trademark data includes, but is not limited, date(s), status, classes, serial number/identifiers, image(s), description(s), jurisdiction(s), and other identifying and/or classifying information such as legal precedents—past lawsuits/disputes over the use of that keyword.
  • the compilation of trademark data can be updated regularly against their respective sources. In some embodiments, the sources are accessed directly for the searching.
  • Various embodiments also provide for various interfaces, mechanisms, and system by which entities can submit their own marks (which may be unregistered, non-default) with possible/optional verification of credentials for injection into data compilation. The compilation of submitted data may be regularly against their respective sources.
  • various embodiments Upon receiving an analysis request, various embodiments process raw input in preparation for comparison search.
  • the comparison searches can be verified through the use of unique identifier(s) created for each search/request/check.
  • an identifier can include a timestamp, search id, user id, search type, etc.
  • unique identifiers can be assigned to the requester and the recipient. Logging (recording/storage) in system of verifiable (time stamp, etc) record/message of the properties and results of executed search/request/check, storing date and time of search, search party ID, search query, results transmitted, result count, and all other information as previously outlined.
  • Some embodiments also log a verifiable record/message that said results were actually displayed or transmitted to a recipient.
  • the system can make records available to registrar, registrant, possibly in the form of control panel. Back up record of properties of search/request/check, the results, and subsequent transmission, to alternate system (e.g. geographically diverse offsite location).
  • Output of search/request/check can be a list, which can take the form of a table with these possible columns: the relevant trademark detected, % degree of relevance and/or the % degree of similarity, date(s), status, classes, serial number/identifiers, image(s), description(s), jurisdiction(s), and other identifying and/or classifying information such as past lawsuits/disputes over the use of that keyword.
  • Other forms of data output include a digital or printable report, a database, a webpage with links, an e-mail message, an audio message, and more.
  • a specific search/request/check is a regular, repeating event, optionally check for previously displayed results to ensure that only new or changed results are emphasized. This may take the form of date comparisons, whole-list comparisons, annotations, or other forms of differentiating when a particular result has changed since the last time it appeared in a previous search/request/check.
  • inventions introduced here can be embodied as special-purpose hardware (e.g., circuitry), or as programmable circuitry appropriately programmed with software and/or firmware, or as a combination of special-purpose and programmable circuitry.
  • embodiments may include a machine-readable medium having stored thereon instructions which may be used to program a computer (or other electronic devices) to perform a process.
  • the machine-readable medium may include, but is not limited to, floppy diskettes, optical disks, compact disc read-only memories (CD-ROMs), and magneto-optical disks, ROMs, random access memories (RAMs), erasable programmable read-only memories (EPROMs), electrically erasable programmable read-only memories (EEPROMs), magnetic or optical cards, flash memory, or other type of media/machine-readable medium suitable for storing electronic instructions.
  • connection or coupling and related terms are used in an operational sense and are not necessarily limited to a direct physical connection or coupling.
  • two devices may be coupled directly, or via one or more intermediary media or devices.
  • devices may be coupled in such a way that information can be passed there between, while not sharing any physical connection with one another.
  • connection or coupling exists in accordance with the aforementioned definition.
  • module refers broadly to software, hardware, or firmware (or any combination thereof) components. Modules are typically functional components that can generate useful data or other output using specified input(s). A module may or may not be self-contained.
  • An application program also called an “application”
  • An application may include one or more modules, or a module can include one or more application programs.
  • FIG. 1 illustrates an example of an environment 100 in which some embodiments of the present invention may be utilized.
  • a requester such as, a domain name registrar 110 , a social networking site 120 , an e-mail service 130 , or other service provider 140 , can send a request for a trademark analysis of an identification string or other provided inputs (e.g., such as graphics or logos which can be analyzed with a graphical analysis).
  • the request can be sent through network 150 to notification system 160 .
  • Network 150 generally refers to a group of interconnected devices capable of exchanging information.
  • a network may be as few as several personal computers on a Local Area Network (LAN) or as large as the Internet, a worldwide network of computers.
  • network 150 includes any network capable of transmitting information from one entity to another.
  • network 150 may be comprised of multiple networks, even multiple heterogeneous networks, such as one or more border networks, voice networks, broadband networks, financial networks, service provider networks, Internet Service Provider (ISP) networks, and/or Public Switched Telephone Networks (PSTNs), interconnected via gateways operable to facilitate communications between and among the various networks.
  • ISP Internet Service Provider
  • PSTNs Public Switched Telephone Networks
  • notification system 160 can search various trademark databases 170 and/or self-reported trademark databases 180 .
  • a list of related trademarks can be returned to the requester and/or to third-party 190 (e.g., one of the trademark owners).
  • the requester for a search/request/check may be a different party from a recipient of the notification.
  • a domain name registrar 110 (the requester) may request for a search before a potential registrant (the recipient) registers a domain name.
  • the registrar (the requester) initiates the search each month and have the results delivered to the registrant (the recipient).
  • the requester and the recipient are two separate parties.
  • the registrant of a domain name may individually elect to initiate a search/request/check for trademarks similar to a given keyword without involving any other party. In this case, the requester and the recipient of results is the same party.
  • Trademarks databases 170 could include external databases from around the world.
  • the US Patent & Trademark Office accepts registrations for and manages records of pending and registered US trademarks
  • the UK Intellectual Property Office accepts registrations for and manages records of pending and registered UK trademarks.
  • One such system is the Madrid System.
  • Another such system is the Community Trade Mark system in the European Union. Trademark data from the largest and well-known trademark offices, systems and jurisdictions can be included in the system as a base layer of data, while retaining the option of adding more data at any time.
  • trademark owners may submit their trademarks (e.g., because some jurisdictions/countries restrict access to lists of trademarks, or were simply not included in the system or unregistered marks).
  • the submission may occur via a web form, e-mail, telephone, or other method of communication to the management of this system, or to some other repository of such trademark data that may then be fed to the management of this system.
  • This information can be stored in self reported trademark databases 180 .
  • notification system 160 may alternatively rely entirely on self-reported trademarks, where only trademarks that are reported to the management of the system will be included and returned in results.
  • the self-reported trademark can optionally be verified by some means by the management of the search/check system (for instance, a manual search of the respective country/jurisdiction to ensure accuracy of the data provided by the owner of the self-reported trademark).
  • Self-interested trademark owners may also elect to highlight or annotate their trademark(s) if their trademark(s) appear in the results that are returned to the requester of the search/check. This request/election may be made via a web form, e-mail, telephone, or other method of communication to the management of this system. This election may also be included as part of other systems. For example, if a trademark owner decides to subscribe to an ancillary trademark-monitoring service that monitors specific trademark(s), or if trademark(s) are added to a trademark docketing system, the trademark(s) can optionally or automatically (as part of the example monitoring service or docketing system) be included for highlighting or annotating when the results (notification) are returned from a check request. This serves the purpose of notifying the result recipient that the trademark owner pays particular attention to the enforcement of their trademark.
  • the system's databases can accommodate additional inputs for long-term archival and storage in some embodiments.
  • the system can receive a confirmation of acknowledgement, receipt and understanding directly from the recipient of the results.
  • the system can also subsequently receive, from a designated party (e.g. a requester such as a domain name registrar) information about whether a term was eventually used (e.g. if a domain name SLD that was the subject of a search/request/check was eventually registered).
  • a designated party e.g. a requester such as a domain name registrar
  • each of the service providers illustrated in FIG. 1 may request the trademark analysis and notification.
  • Each one has slightly different problems to motivate the request.
  • domain name registrar 110 In this case, the number of opportunities where an individual or entity may create a custom web address or online unique identifier has led to inadvertent and intentional instances of trademark infringement.
  • Other examples are typosquatters and cybersquatters.
  • a typosquatter may register ‘trupadvisor.com’ in place of the popular TripAdvisor (which has its web site at tripadvisor.com).
  • a cybersquatter may register ‘existingtrademark.com’ where ‘existingtrademark’ is a hypothetical registered trademark whose owner has not registered the equivalent domain name.
  • the unlicensed user may (a) derive advertising revenue from these domain names by placing advertisements on them, (b) pressure the rightful trademark owner into purchasing the domain name for a profitable amount of consideration (e.g. money or benefits), or (c) use the domain name for other purposes, infringing or otherwise. It may alternatively be the case that the domain name registrant has inadvertently/unwittingly registered a domain name that matches or is similar to an existing registered trademark, and is being unwittingly regarded by the owner of the registered trademark as a trademark infringer.
  • Examples of social networking sites 120 include, but are not limited to, Facebook, Linkedin, MySpace, and Friendster. Users of these sites have the ability to create individual ‘profile pages’. Users often have the ability to 1) for personal profile pages, specify their own name (which should be a real name) that is displayed on the profile page, 2) for group/corporate profile pages, specify their group name that appears on the profile page, and 3) specify a username that is displayed as part of the web address for their personal or group profile page.
  • Mark Zuckerberg who is an instance of a Facebook social networking user, may register ‘facebook.com/zuck’, where the ‘zuck’ component of the web address was any string of text selected by the end user.
  • social networking sites 120 face the risk of being entangled in legal action should users register, inadvertently or otherwise, usernames that infringe on trademarks, with these usernames being displayed on personal or group profile pages, or web addresses leading to those profile pages. As such, social networking sites can submit identification strings to notification system 160 .
  • Regular e-mail addresses consist of two components: the username (also known as the local-part), and the domain name.
  • the part ‘fool’ before the @ is the username
  • the part ‘bard.com’ is the domain name.
  • Owners of domain names may create any number of e-mail addresses by creating usernames that are a subset of the domain name. For example, the owner of the domain name ‘bard.com’ can create the e-mail usernames ‘fool1’, ‘fool2’, and ‘fool3’, resulting in the e-mail addresses fool1@bard.com, fool2@bard.com, and fool3@bard.com.
  • bard.com were to offer free web and e-mail hosting services, someone may set up bom.bard.com, which may conflict with a hypothetical trademark, ‘bombard’). These e-mails could infringe trademarks or be used for phishing. As such, e-mail service providers 130 may use notification system 160 check for possible issues.
  • service providers 140 include instant messaging (IM) services that allow for the creation of custom usernames or ‘handles’ which are the primary means by which an individual may be identified on these IM services. Still yet, online advertising including domain parking and domain name redirection can be problems.
  • IM instant messaging
  • Written text can also be submitted to notification system 160 .
  • Written text can take the form of a webpages with written content, blog posts, social networking status updates or notes, press releases, newspaper articles, books, novels, magazines, newspaper articled, advertisements, journals, directories, product manuals, products and packaging, research papers, textbooks, essays, e-books, audiobooks, movie scripts, television broadcast scripts or transcripts, song lyrics, talking books, text in Braille code, and more.
  • these can take a printed form, a digital/electronic form, or other forms.
  • the purpose may be academic, scientific, recreational, social, entertainment, or more.
  • the author of the text, or the owner/management of the medium on which the text is published, may wish to avoid use of any trademark or ensure that any mentioned trademark is fully attributed to the rightful owner by means of annotating next to the text mark a TM (for a trade mark), a ⁇ (for a service mark), or a ® (for a registered trade mark), or by a disclaimer.
  • TM for a trade mark
  • for a service mark
  • a ® for a registered trade mark
  • Examples of marks that may be present include Xerox® (a registered trademark for photocopiers), Kleenex® (a registered trademark for paper products), and Kiwi® (a registered trademark for shoe polish).
  • FIG. 2 shows a block diagram with exemplary components of an informing engine in accordance with one or more embodiments of the present invention.
  • the notification system 160 can include memory 210 , one or more processors 220 , GUI generation module 230 , communications module 250 , parsing module 250 , searching module 260 , verification module 270 , notification module 280 , and submission module 290 .
  • Other embodiments of the present invention may include some, all, or none of these modules and components along with other modules, engines, interfaces, applications, and/or components.
  • some embodiments may incorporate two or more of these elements into a single module and/or associate a portion of the functionality of one or more of these elements with a different element.
  • parsing module 250 and searching module 260 can be combined into a single module.
  • Memory 210 can be any device, mechanism, or populated data structure used for storing information.
  • memory 210 can encompass any type of, but is not limited to, volatile memory, nonvolatile memory and dynamic memory.
  • memory 210 can be random access memory, memory storage devices, optical memory devices, media magnetic media, floppy disks, magnetic tapes, hard drives, SIMMs, SDRAM, DIMMs, RDRAM, DDR RAM, SODIMMS, erasable programmable read-only memories (EPROMs), electrically erasable programmable read-only memories (EEPROMs), compact disks, DVDs, and/or the like.
  • memory 210 may include one or more disk drives, flash drives, one or more databases, one or more tables, one or more files, local cache memories, processor cache memories, relational databases, flat databases, and/or the like.
  • memory 210 may include one or more disk drives, flash drives, one or more databases, one or more tables, one or more files, local cache memories, processor cache memories, relational databases, flat databases, and/or the like.
  • Memory 210 may be used to store instructions for running one or more modules, engines, interfaces, and/or applications on processor(s) 220 .
  • memory 210 could be used in one or more embodiments to house all or some of the instructions needed to execute the functionality of GUI generation module 230 , communications module 250 , parsing module 250 , searching module 260 , verification module 270 , notification module 280 , and/or submission module 290 .
  • GUI generation module 230 may be used to generate one or more user interface screens.
  • the GUI generation module 230 can be used to generate a user interface screen for receiving the provided input or identification string.
  • GUI generation module 230 can generate a user interface screen to display the notification to a recipient and/or receive a verification from the user that the user has reviewed the notification
  • communications module 250 may receive a request to perform a trademark search for a provided input.
  • Communications module 250 can translate all or part of the request into a format required by one or more other module. For example, if the request is encrypted communications module 250 can decrypt the request.
  • the provided input may result from an Internationalized Domain Name (e.g., Arabic, Chinese, Russian, and other languages that do not strictly stick to an ASCII character set can be used). This applies to two areas: the top level domains (e.g. China ccTLD domain names ending in a localized script instead of .cn) and the SLD (e.g. the ‘myowndomain’ part of the domain name ‘myowndomain.com’). This introduces more possible SLDs, which increases chances of infringement of non-ASCII trademarks by domain names.
  • Some embodiments of communications module 250 can handle domain names that are non-ASCII translations of ASCII trademarks. Phonetical similarity may be weighed in some embodiments of notification system 160 when considering whether a domain name that is being registered is potentially infringing on native-script trademarks from around the world.
  • Parsing module 250 can be used to parse the provided input into phrases for searching.
  • parsing module 250 generates phrases from each domain level for searching. For example, an individual or entity may set up a subdomain as a subsidiary component of a domain name that is owned by that individual or entity. The individual or entity owns the domain name ‘myowndomain.com’, and may freely set up ‘tripadvisor.myowndomain.com’, where ‘tripadvisor’ is the subdomain component of the domain name, and in this case, ‘tripadvisor’ is a registered trademark.
  • Parsing module 250 also generates phrases by removing ‘.'s in the domain name. For example, there has been increased use of domain hacks such as ‘del.icio.us’ (where .us is the TLD, and ‘del’ and ‘icio’ are subdomains, and ‘icio.us’ is the registered domain name). These domain hacks, when concatenated by removing the ‘.'s that form the entire chain (of subdomains, the SLD, and the TLD), form words that make some sense. In the case of ‘del.icio.us’, a popular social bookmarking website, the entire address can be concatenated into ‘delicious’, an easy-to-remember English word.
  • domain hacks such as ‘del.icio.us’ (where .us is the TLD, and ‘del’ and ‘icio’ are subdomains, and ‘icio.us’ is the registered domain name).
  • domain name owners may take action because, inter alia, domain hacks can be used for nefarious purposes such as phishing websites and fake, deceptive e-mail addresses. Trademark owners may take action simply because of the need to protect their brand equity. As a result, various embodiments of notification system 160 perform phonetic searches.
  • Searching module 260 receives the phrases from the parsing module and searches one or more databases for trademarks related to the phrases.
  • the searching can include searches the databases for exact matches, phonetic matches, and natural language matches.
  • verification module 270 can be used to verify that the recipient of the results of the search/request/check has received, understood, accepted, or acknowledged the results. This verification may take place via a web button generated by GUI generation module 230 (if results are displayed on a web page), via a telefax transmission (sign and fax back for manual or automated review and acceptance), via responses to telephone voice prompts (Third Party Verification via transfer or 3-way call; or simply an audio recording of vocal responses), express or regular mail (sign document that bears the results and return to system operator via mail), via delivery confirmation (similar to legal service of documents), or a combination of any of these with any original method of delivering the request for acknowledgment (e.g. print out a webpage or e-mail attachment, sign, then return via scan, telefax, or postal mail).
  • the original requester of the search/request/check or the recipient of the result may want to make the confirmation of verification of receipt, understanding, acceptance or acknowledgement available to a third party, such as a trademark owner.
  • the original requester of the search/request/check or the recipient of the result may optionally make the fact that the search has taken place available to a third party.
  • This notification of a third party may take place immediately and automatically, or manually/optionally. Immediately/automatically—for example, immediate notification may be useful for trademark owners (a third party) who may want to aggregate statistics about where their trademarks are being used.
  • Manually/optionally delayed and optional notification of a third party may be useful where a recipient or requester wants to show that adequate due diligence had been performed prior to the use of a certain keyword.
  • verification module 270 generates a digital stamp generated from (i) the time of the search/request/check, and (ii) the results of the search/request/check, accompanies the notification to prove that the results were truly valid at the time of the search.
  • the notification/information may optionally include the fact that the recipient had confirmed receipt of the results of the search/request/check.
  • Notification module 280 can be used to generate and track the notifications.
  • notification module 280 receives the trademarks related to the phrases and generates the notification.
  • the notification can be delivered to a third party and/or the original requestor.
  • the notification of a third party could be useful in an example of a domain name owner, who may own a domain name.
  • the domain name owner is under legal pressure to transfer it to a trademark owner due to allegations that the domain name was infringing on a registered trademark.
  • the results received by the domain name owner may not have included the trademark in question (for example, the trademark may have become public knowledge shortly after the domain name was registered), and a notification may be made to the third party (in this case, a trademark owner) that reasonable effort had already been made to determine that the domain name registration would not be infringing.
  • the notification of a third party could also be useful in an example of a domain name registrar, which may receive tens of thousands of registrations or renewals per year. If a domain name is regarded as possibly infringing on a trademark, the trademark owner may attempt to take legal action against the registrar as well. The registrar can notify the trademark owner with the results of the search/request/check to demonstrate that it had already made a good faith effort (as the requester) in providing notice to the domain name registrant (as the recipient of results) before the registration of the domain name had taken place, and that the registrant was fully responsible for the domain name.
  • a registrar may chose to automatically provide trademark owners (a third party) with a notice that the registrant had registered a name and was aware of similar trademarks, in exchange for immunity against claims of trademark infringement.
  • this notification/information may be made available to the trademark owner or any other third party (e.g. a court) through a web- or software-based user interface.
  • the trademark owner or other third party may alternatively be notified by a multitude of other means: a webpage, an table within a webpage, an overlay on a webpage, a website pop-up, an e-mail message, an e-mail message with a link to a webpage (essentially, anything that results in the results being displayed on a visual display unit or VDU), a telefax transmission, a telegraphic transmission, a telephone call, express mail services (e.g. UPS, FedEx, DHL), regular mail services (e.g.
  • UPS UPS, FedEx, DHL)
  • regular mail services e.g.
  • the original requester may require the third party abide by a legal agreement, e.g. indemnify the requester or the recipient of results from legal action, or may bind the third party to a non-disclosure agreement.
  • the output of search/request/check is possibly a list, which can take the form of a table with these possible columns: the relevant trademark detected, % degree of relevance and/or the % degree of similarity, date(s), status, classes, serial number/identifiers, image(s), description(s), jurisdiction(s), owner data, and other identifying and/or classifying information such as past lawsuits/disputes over the use of that keyword.
  • Other forms of data output include a digital or printable report, a database, a webpage with links, an e-mail message, an audio message, and more.
  • Notification module 280 can determine a degree of relevance for each trademark and possibly remove any below a certain threshold.
  • the degree of relevance (which can take the form of a weight, ranking, rating, score, or percentage) is calculated from one or a combination of several factors, including but not limited to the following:
  • notification module 280 will sort the trademarks by the degree of relevance when first presented to the recipient of the results. The recipient may then choose to sort the results by other metrics e.g. filing date.
  • submission module 290 can be configured to receive submissions from trademark owners with information regarding one or more trademarks. The information can be stored in self-reported trademark database 180 . In some embodiments, submission module 290 can use GUI generation module to create a submission interface that allows owners to submit the information.
  • FIG. 3 is a flow chart illustrating exemplary operations for performing a trademark search in accordance with some embodiments of the present invention.
  • one or more of the operation illustrated in FIG. 3 can be performed by communications module 240 , parsing module 250 , searching module 260 , notification module 280 , and/or other system components or modules.
  • an input e.g., domain name, e-mail address, or other identification string
  • the requester can be an individual, an organization, or a service provider (e.g., domain name registrar 110 , social networking site 120 , e-mail service provider 130 , etc.)
  • processing operation 320 processes the input.
  • the processing can include parsing out the keyword ‘domain’ in ‘domain.com’, if keyword had not already been parsed out before search/request/check commences.
  • These strings can be used during searching operation 330 where the string is compared against database of all trademarks to detect trademarks that are similar.
  • searching operation detects trademarks that are similar (e.g., via a comparison of (i) description/statement of intended use of domain name, and/or (ii) web content of domain name including multilevel content, with the descriptions/classes of all trademarks that were detected as similar to determine the degree of similarity with greater accuracy.
  • *‘multilevel content’ refers to ‘deep crawling’ of a given domain name
  • notification operation 340 can generate a notification of the results.
  • comparison of keyword and database of known trademarks
  • transliteration may be utilized during processing operation 320 .
  • Conversion of encoding may also be necessary. Additional methods include parsing or comparing for similarity in appearance and pronunciation (e.g. usage of similar ideograms, radicals, and morphemes). As the same written form may be pronounced differently in different regions, the region in which the keyword will be used is an important factor in helping to source for similar trademarks.
  • Processing operation 320 can be utilize a domain hack detection algorithm in some embodiments.
  • a domain hack takes the form of ‘part1.part2.part3’, and as with any domain name, has to have at least two parts.
  • domain hack detection algorithm concatenates the keyword inputs. For example, in the case of ‘part1.part2.part3’, concatenating combinations of levels, divided by a (full stop/period), creates a number of inputs: ‘part1part2’, ‘part2part3’, and ‘part1part2part3’.
  • del.icio.us yields ‘delico’, ‘icious’, and ‘delicious’. Each of these is used as input for multiple search/request/checks.
  • Procession operation 320 can process descriptive content (a statement or multilevel web content) for comparison with the descriptions/classes of all trademarks that were detected as similar to determine the degree of similarity with greater accuracy.
  • the input is a user name from a social networking website or a IM user name
  • processing operation 320 receives input of username string and comparison of said string against database of all trademarks to detect trademarks that are similar.
  • the username is often a public-facing identifier that may be displayed and transmitted via a page or as a component of a web address.
  • processing operation 320 can process an input of a string of one or multiple words that could be used in profile names, group names, comments, or anywhere else where a long string may be entered on the social networking site. Then searching operation 320 generates a comparison (i) of each word of string and (ii) of combination of words and phrases within string—with known trademarks in system can then take place.
  • processing operation when the input is an e-mail address, processing operation generates a username string i.e. portion before @ sign in e-mail address (e.g. ‘username’ part of username@domain.com). Comparison of that string against database of all trademarks to detect trademarks that are similar occurs with searching operation 330 .
  • a username string i.e. portion before @ sign in e-mail address (e.g. ‘username’ part of username@domain.com).
  • the input can be a string of one or multiple words obtained from written text, advertising text, or header/headline. Then, searching operation 330 can generate a comparison (i) of each word of string and (ii) of combination of words and phrases within string—with known trademarks in system can then take place.
  • the input is a list of domain names, e-mail addresses, user names, etc.
  • processing operation 320 first determines the type of input and processes each item in accordance with the input type.
  • the searching operation 330 generates a search of each entry.
  • FIG. 4 is a flow chart illustrating exemplary operations for generating a notification in accordance with various embodiments of the present invention.
  • one or more of the operation illustrated in FIG. 4 can be performed by notification module 280 and/or other system components or modules.
  • receiving operation receives a list of trademarks from a search.
  • Generation operation generates a relevance score for each of the trademarks in the list.
  • the degree of relevance (which can take the form of a weight, ranking, rating, score, or percentage) is calculated from one or a combination of several factors discussed above in conjunction with notification module 280 .
  • Sorting operation 430 can sort the trademarks based on the calculated relevance. In some embodiments, sorting operation 430 may remove trademarks from the list that fall below a certain relevance level.
  • the ‘degree of relevance of result set’ can be calculated based on information derived from or associated with individual results within each result set. This ‘degree of relevance of result set’ may take the form of a score/rank/percentage weight given to each result set. This ‘degree of relevance of result set’ can help a person who is viewing a large number of result sets to choose the most relevant ones to review.
  • the requester may optionally request that the system returns the ‘degree of relevance of result set’ to the requester. For example, a requester may wish to allow all actions (such as username registration) to proceed, but review or block only those actions (such as username registration) that, after being subject to a search/request/check, produces a result set that falls above a ‘degree of relevance result set’ threshold.
  • the results can be presented to a recipient (e.g., through a GUI generated by GUI generation module 230 ).
  • the user can request addition sorting based on one or more fields (e.g., application number, first use date, etc).
  • Detection operation 440 determines if the recipient has requested any additional sorting. If a determination is made that additional sorting has been requested detection operation 440 branches to sorting operation 430 where additional sorting is performed based on the criteria received. If a determination is made that no additional sorting has been requested, the detection operation 440 branches to generation operation 450 where a notification can be generated.
  • all actions are subject to a search/request/check process, and a score/rank/percentage weight given to each action, so that the requester can prioritize which sets of results to review, e.g. the top 1000 sets per day, or the top 10% of each week's search/request/check results.
  • This allows the requester to allow all actions (e.g. domain name registrations), and review them at a later time.
  • the requester e.g. a domain name registrar
  • Various embodiments also allow a service provider to elect to integrate the search/request/check into its Terms of Sale, Terms of Service, or some other kind of legal agreement. It may require the search/request/check as a prerequisite for the sale of a good or the registration of a term (e.g. registration of a domain name, renewal of a domain name, transfer of a domain name, signup for an e-mail address). It may alternatively or additionally state that the registration may be revoked if the results of a search/request/check indicate issues of concern.
  • the service provider as a requester, may choose to initiate the search/request/check only upon a party's agreement to the legal agreement. This may take the form of a web form.
  • FIG. 5 is a flow chart illustrating a set of exemplary operations for a service provider to allow a registration in accordance with one or more embodiments of the present invention.
  • a request for a trademark analysis of a domain name, e-mail address, or other identification string is received during receiving operation 510 .
  • a trademark analysis is requested during requesting operation 520 .
  • Initiating a search/request/check during request operation 520 will result in a ‘notification’ of results that may be delivered to a recipient (not necessarily the original requester) via a combination of one or more of the following methods: a webpage, an table within a webpage, an overlay on a webpage, a website pop-up, an e-mail message, an e-mail message with a link to a webpage (essentially, anything that results in the results being displayed on a visual display unit or VDU), a telefax transmission, a telegraphic transmission, a telephone call, express mail services (e.g. UPS, FedEx, DHL), regular mail services (e.g. via USPS mail), via hand delivery, and/or other information transmission methods.
  • a webpage an table within a webpage, an overlay on a webpage, a website pop-up, an e-mail message, an e-mail message with a link to a webpage (essentially, anything that results in the results being displayed on a visual display unit or VDU), a
  • the request or checks may optionally take place only once upon the occurrence of a specific event, e.g. when someone is registering a domain name, creating a subdomain, creating domain hacks using a string of subdomains, creating a publicly-accessible and viewable username or handle for social networking, IM, e-mail and other services, or transferring, selling, or auctioning any of the earlier examples of domain names, subdomains, usernames, or when a piece of written text needs to be reviewed for the presence of trademarks or trademark-similar terms or phrases.
  • Checks for any given term may alternatively take place at modifiable or pre-defined regular intervals, where new trademarks and previously-detected (but since modified) trademarks are detected and returned to the initiator of the check. Checks may also take place on an ad-hoc basis, where the results are only requested when needed.
  • Results returned for any request can take the form of all relevant trademarks, or can include only trademarks that are new or have changed since the previous search/request. If determination operation 530 determines that no related trademarks, or no new trademarks, have been found, the registration is completed during allowance operation 540 . If determination operation 530 determines that related trademarks, or new trademarks, have been found then generation operation 550 can generate an indemnification request. Once the user accepts the indemnification request, the service provider will complete the registration.
  • the agreement to indemnity may be one or many agreements.
  • a confidentiality and or other legal agreement by third party for benefit of requester and/or recipient if a third party (such as a trademark owner) wants to be notified of whenever a trademark appears in any result.
  • Third party may confirm indemnity and/or confidentiality for requester and/or recipient via a variety of means: via a web button (if agreement is displayed on a web page), via a telefax transmission (sign and fax back for manual or automated review and acceptance), via responses to telephone voice prompts (Third Party Verification via transfer or 3-way call; or simply an audio recording of vocal responses), express or regular mail (sign document that bears the agreement and return to system operator or any designated party via mail), any other original method of delivering the request for an agreement (e.g. print out a webpage or e-mail attachment, sign, then return via scan, telefax, or postal mail), or a combination of any of these.
  • an agreement (of any sort) had been endorsed and executed may be made available to the subject of the agreement, e.g. the requester or recipient.
  • the execution of an agreement by a third party may be delivered as part of the results (possibly as an indicator that accompanies each trademark result) received by recipient.
  • Embodiments of the present invention include various steps and operations, which have been described above. A variety of these steps and operations may be performed by hardware components or may be embodied in machine-executable instructions, which may be used to cause a general-purpose or special-purpose processor programmed with the instructions to perform the steps. Alternatively, the steps may be performed by a combination of hardware, software, and/or firmware.
  • FIG. 6 is an example of a computer system 600 with which embodiments of the present invention may be utilized.
  • the computer system includes a bus 605 , at least one processor 610 , at least one communication port 615 , a main memory 620 , a removable storage media 625 , a read only memory 630 , and a mass storage 635 .
  • Processor(s) 610 can be any known processor, such as, but not limited to, an Intel® Itanium® or Itanium 2® processor(s), or AMD® Opteron® or Athlon MP® processor(s), or Motorola® lines of processors.
  • Communication port(s) 615 can be any of an RS-232 port for use with a modem based dialup connection, a 10/100 Ethernet port, or a Gigabit port using copper or fiber.
  • Communication port(s) 615 may be chosen depending on a network such a Local Area Network (LAN), Wide Area Network (WAN), or any network to which the computer system 600 connects.
  • LAN Local Area Network
  • WAN Wide Area Network
  • Main memory 620 can be Random Access Memory (RAM), or any other dynamic storage device(s) commonly known in the art.
  • Read only memory 630 can be any static storage device(s) such as Programmable Read Only Memory (PROM) chips for storing static information such as instructions for processor 610 .
  • PROM Programmable Read Only Memory
  • Mass storage 635 can be used to store information and instructions.
  • hard disks such as the Adaptec® family of SCSI drives, an optical disc, an array of disks such as RAID, such as the Adaptec family of RAID drives, or any other mass storage devices may be used.
  • Bus 605 communicatively couples processor(s) 610 with the other memory, storage and communication blocks.
  • Bus 605 can be a PCI/PCI-X or SCSI based system bus depending on the storage devices used.
  • Removable storage media 625 can be any kind of external hard-drives, floppy drives, IOMEGA® Zip Drives, Compact Disc-Read Only Memory (CD-ROM), Compact Disc-Re-Writable (CD-RW), Digital Video Disk-Read Only Memory (DVD-ROM).
  • CD-ROM Compact Disc-Read Only Memory
  • CD-RW Compact Disc-Re-Writable
  • DVD-ROM Digital Video Disk-Read Only Memory
  • the present invention provides novel systems, methods and arrangements for trademark searching and notification. While detailed descriptions of one or more embodiments of the invention have been given above, various alternatives, modifications, and equivalents will be apparent to those skilled in the art without varying from the spirit of the invention. For example, while the embodiments described above refer to particular features, the scope of this invention also includes embodiments having different combinations of features and embodiments that do not include all of the described features. Accordingly, the scope of the present invention is intended to embrace all such alternatives, modifications, and variations as fall within the scope of the claims, together with all equivalents thereof. Therefore, the above description should not be taken as limiting the scope of the invention, which is defined by the appended claims.

Abstract

Various embodiments of the present invention generally relate to trademark searching and notification systems. More specifically, various embodiments of the present invention relate to systems and methods for informing requesters about trademarks similar to a provided input. Some embodiments of the present invention provide for a proactive system in which users are notified of similar trademarks before using specific term(s) and users proceed after understanding which trademarks actually exist and what areas those trademarks actually entail, and possibly being notified of newly applied trademarks and modified trademarks at later times that are similar to the specific term(s) being used.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application claims the benefit of U.S. Provisional Application No. 61/419,128 filed on Dec. 2, 2010 entitled “System to Inform about Trademarks Similar to Provided Input” which is hereby incorporated by reference for all purposes in its entirety.
  • TECHNICAL FIELD
  • Various embodiments of the present invention generally relate to trademark searching and notification systems. More specifically, various embodiments of the present invention relate to systems and methods for informing requesters about trademarks similar to a provided input.
  • BACKGROUND
  • A trademark is a distinctive sign or indicator used by businesses, individuals, organizations and other legal entities to identify and distinguish their goods and services from those from other entities. A trademark may be a name, word, phrase, logo, symbol, design, image, or a combination of these elements. Business, individuals, organizations and other legally-recognized entities may register a trademark with appropriate government or international bodies. The owner of a registered trademark may take legal action against any unauthorized use of their trademark.
  • Rights to a trademark are commonly, but not always limited by legal jurisdictions. For example, the US Patent & Trademark Office accepts registrations for and manages records of pending and registered US trademarks, while the UK Intellectual Property Office accepts registrations for and manages records of pending and registered UK trademarks. There exist organizations and
  • groupings that allow for multi-jurisdictional registration of marks. One such system is the Madrid System. Another such system is the Community Trade Mark system in the European Union.
  • Business, individuals, organizations and other legally-recognized entities need not necessarily register their distinctive name, word, phrase, logo, symbol, design, image or other identifying elements with a government or international entity such as the USPTO or the Madrid System. This is because there exists, in certain countries such as Germany, provisions that provide limited common law rights for unregistered marks of goods and services that occupy a highly significant position in the marketplace.
  • Internet domain names are one area where infringement of trademarks may occur. The Internet has been a prominent feature of our lives since the latter part of the 20th century. Examples of services, resources and functions that get delivered over the Internet include the World Wide Web, with the delivery of requested information in HTML (Hypertext Markup Language) and other similar formats that include but is most certainly not limited to PHP, JSP, Flash, DHTML, ASP, ASPX and more. This information is often delivered over a web browser such as Apple Safari and Mozilla Firefox, and is commonly accessed and identified by primary identifiers known as internet domain names. These internet domain names provide easily recognizable and memorizable names to numerically-addressed Internet resources. Examples of domain names include apple.com, whitehouse.gov, google.co.uk, and mit.edu.
  • Internet domain names are used as an addressing method for accessing a plethora of other services, such as accessing and transferring files via the File Transfer Protocol (FTP). Internet domain names are also, among other purposes, used to identify the senders and recipients of electronic mail (e-mail) and to manage routes for the actual transmission of these e-mail messages. It is clear that domain names play an extremely critical function in the operation of the Internet. Other uses of domain names as an addressing method include SFTP (Secure File Transfer Protocol), RTSP (Real Time Streaming Protocol), and more.
  • Domain names have multiple components. In the example of apple.com, ‘apple’ is the second-level domain (SLD), while ‘com’ is the top-level domain (TLD), otherwise known as a suffix. Examples of TLDs are .com, .net, .org, .info, .biz, .mobi, and .name. Other TLDs include country-code variants (otherwise known as ccTLDs) such as .de, .co.uk, and .com.cn. TLDs are managed by registries (also known as registry operators). For example, ‘.com’ is managed and run by Verisign, Inc., while ‘.org’ is managed and run by the Public Interest Registry and ‘.uk’ is managed and run by Nominet UK. These registries maintain domain name registration information. In most cases, registry operators contract with designated (or accredited) domain name registrars (for example, eNom, Inc., Network Solutions, LLC, etc.) to provide domain name registration services to the public (end users) with minimal limitations. Registrars may then offer registration of domain names through reseller affiliates. End-users may register any domain name through registrars or their resellers. A domain name may generally be registered for up to a maximum period of 10 years.
  • End-users are generally allowed to register any domain name they want, so long as the domain name is not presently registered. In most cases, the registration process is a simple one. The end-user goes to the website of a domain name registrar (or its reseller), types in the domain name that he/she is interested in registering, and the registrar (or its reseller) performs a check for the availability of that domain name with the registry. If the domain name is available, the end-user may then register that domain name with a payment. At this time, the registrar ensures that the domain name is added to the registry. When the registration process is complete, the end-user who is now the owner of a domain name is known as a ‘registrant’.
  • The registrant (domain name owner) may elect to create subdomains (third-level domains, or even more). For example, Google, Inc., a search engine provider with a primary domain name of google.com, may elect to create a subdomain name ‘news’, resulting in a public-facing address ‘news.google.com’. Subdomains allow for an extremely large number of potential addresses to be created on the internet.
  • New TLDs are constantly being introduced (mostly global TLDs, or gTLDs), formerly dormant/unused ccTLDs are being reintroduced or relaunched (an example being .co), and new countries result in the creation of completely new ccTLDs. For example, 7 new TLDs were introduced in 2001 and 2002. These were .biz, .info, .name, .pro, .aero, .coop, and .museum. In 2003, six more new TLDs (.asia, .cat, .jobs, .mobi, .tel and .travel) were introduced. These new TLDs result in more opportunities for unique SLDs to be registered (for example, telephone.com may not be available, but telephone.mobi may be available for registration). More gTLDs are being introduced in coming years as ICANN (the Internet Corporation for Assigned Names and Numbers) loosens limitations and allows for applications from entities who want to run their own gTLD.
  • Additionally, new name character sets (aside from the former ASCII limitations) have been introduced, allowing for the registration of Internationalized Domain Names in native characters from languages such as Arabic, Chinese, Russian and more.
  • Another area where end-users on the Internet may register names of their own is on services (social networking sites, blog sites, instant messaging, and more) such as Facebook, MySpace, Twitter, Blogspot, Linkedin, and AOL Instant Messenger. Many of these privately run services provide users with opportunities to secure a username that becomes part of a public-facing web address. For example, Mark Zuckerberg, who is an instance of a Facebook (social network site) user, may register ‘facebook.com/zuck’, where the ‘zuck’ component of the web address was selected by the end user. In another case, Nouriel Roubini, who is an instance of a Blogspot (weblog/web journal service) user, may register ‘nourielroubini.blogspot.com’, where the ‘nourielroubini’ component of the web address was selected by the end user. In yet another example, Starbucks Corporation, which is a corporation that has a Twitter (service for high-speed status update transmission and sharing) profile/presence, may register http://twitter.com/starbucks, where the ‘starbucks’ component of the web address was selected by the end user. The list of examples mentioned in this paragraph is by no means exhaustive. There are many more examples of public-facing usernames hosted by privately-run services. In a final example for this section, Justin Bieber, who is an instance of an AOL Instant Messenger (AIM) user, may register ‘justinbieber’ as his AIM screen name.
  • In summary, there is a multitude of opportunities on the Internet where an individual or entity may create a new web address (e.g. domain names, subdomains, networking sites, and blog services), or a unique identifier (e.g. instant messaging services) associated with the use of web-based services. The number of such opportunities is expanding as new TLDs are launched and as dormant TLDs get revived or relaunched. This number of opportunities is also increased by the ever-growing number of social networks, blog services, and more.
  • SUMMARY
  • Various embodiments of the present invention generally relate to trademark searching and notification systems. More specifically, various embodiments of the present invention relate to systems and methods for informing requesters about trademarks similar to a provided input (e.g., a domain name, an e-mail address, instant messaging user name, or an advertisement). For example, some embodiments include receiving, from a requester, a request to perform a trademark search for a provided input. The requester, for example, can be an individual, an organization, a service provided, etc. One or more databases can be searched for trademarks related to the provided input. In some embodiments, for example, the provided input can be directly used for searching the databases. In other cases, the provided input can be processed or parsed into phrases for searching the databases. Based on the returned trademarks, a relevance score for each trademark can be determined. The relevance score can be based on a variety of inputs and factors such as status of a trademark, filing date, first use date, litigation history, comparison of potential classes with classes assigned to the trademarks, and others. Then, a notification can be generated based at least in part on the relevance score.
  • Some embodiments of the notification system include a communications module, a parsing module, a searching module, a notification module, a graphical user interface module, a verification module, and/or other modules or components. The communications module can be configure to receive a request to perform a trademark search for a provided input. The parsing module can be configured to parse or process the provided input into phrases for searching. The searching module can be configured to receive the phrases from the parsing module and search (e.g., using exact matches, phonetic matches, and/or natural language matches) one or more database for trademarks related to the phrases.
  • The notification module can be configured to receive the trademarks related to the phrases and generate a notification. In some cases, the notification module can determine a relevance of the trademarks related to the phrases before generating the notification, wherein the relevance of the trademark is based on a status, a filing date, a first use date, a registration date, keyword matches between the description of the trademark and the context of use of the keyword within the provided input, a trademark jurisdiction, or an involvement of the trademark owner. The graphical user interface module can be configured to generate one or more user interface screens configured to display the notification to a recipient and receive a verification from the user that the user has reviewed the notification.
  • While multiple embodiments are disclosed, still other embodiments of the present invention will become apparent to those skilled in the art from the following detailed description, which shows and describes illustrative embodiments of the invention. As will be realized, the invention is capable of modifications in various aspects, all without departing from the scope of the present invention. Accordingly, the drawings and detailed description are to be regarded as illustrative in nature and not restrictive.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Embodiments of the present invention will be described and explained through the use of the accompanying drawings in which:
  • FIG. 1 illustrates an example of an environment in which some embodiments of the present invention may be utilized;
  • FIG. 2 shows a block diagram with exemplary components of an informing engine in accordance with one or more embodiments of the present invention;
  • FIG. 3 is a flow chart illustrating exemplary operations for performing a trademark search in accordance with some embodiments of the present invention;
  • FIG. 4 is a flow chart illustrating exemplary operations for generating a notification in accordance with various embodiments of the present invention;
  • FIG. 5 is a flow chart illustrating a set of exemplary operations for a service provider to allow a registration in accordance with one or more embodiments of the present invention; and
  • FIG. 6 illustrates an example of a computer system with which some embodiments of the present invention may be utilized.
  • The drawings have not necessarily been drawn to scale. For example, the dimensions of some of the elements in the figures may be expanded or reduced to help improve the understanding of the embodiments of the present invention. Similarly, some components and/or operations may be separated into different blocks or combined into a single block for the purposes of discussion of some of the embodiments of the present invention. Moreover, while the invention is amenable to various modifications and alternative forms, specific embodiments have been shown by way of example in the drawings and are described in detail below. The intention, however, is not to limit the invention to the particular embodiments described. On the contrary, the invention is intended to cover all modifications, equivalents, and alternatives falling within the scope of the invention as defined by the appended claims.
  • DETAILED DESCRIPTION
  • Various embodiments of the present invention generally relate to trademark searching and notification systems. More specifically, various embodiments of the present invention relate to systems and methods for informing requesters about trademarks similar to a provided input. Current means of enforcement of trademark rights by trademark owners involve filing lawsuits, using arbitration, and sending cease and desist letters, and more. Use of such methods in today's information-rich world is often ham-fisted and akin to attempting to smash a fly with a hammer. There exists a great deal of information asymmetry between those who can unwittingly or deliberately misuse a trademark or a term similar to the trademark, and what the actual owners of trademarks actually want the world to know.
  • Instead of a complaints-based system where a platform operator has to respond to complaints from trademark owners, some embodiments of the present invention provide for a proactive system in which users are notified of similar trademarks before using specific term(s) and users proceed after understanding which trademarks actually exist and what areas those trademarks actually entail, and possibly being notified of newly applied trademarks and modified trademarks at later times that are similar to the specific term(s) being used. This notification or alert from a service provider and a recipient of services may optionally be a component of the Terms of Service of the service provider.
  • Various embodiments of the systems and methods described herein provide for a fast, simple way to search/request/check whether the manner in which they are about to use a given term, phrase, or identification string is not likely to be infringing on an existing trademark. This search/request/check, and the subsequent verifiability that such a step had taken place, reduces the likelihood that willful infringement of a trademark will take place, thereby eliminating unnecessary distress and costs to all parties.
  • Among other things, some embodiments of the proposed systems and methods enable individuals and organizations to obtain/receive a list of trademarks similar to a given keyword or phrase, and to achieve a verifiable record of them doing so, which may serve various purposes including (i) demonstrating that adequate due diligence had been performed prior to the usage of a specific keyword or phrase in any context, (ii) altering their behavior of usage of the term(s) in question to avoid conflicts with existing classes of similar trademarks, (iii) performing precautionary checks/scans on a regular basis to ensure that their usage of a keyword or phrase is not in conflict with a new trademark, (iv) responsibly providing alerts and notifications as a provider of a platform or medium that allows for potential misuse of a trademark or trademark-similar term, (v) detecting attempts to register a trademark where the user of the keyword/phrase has already had de facto rights to the term by virtue of continued use of the term, or more.
  • In addition, various embodiments provide for the initiation of a means of data compilation including a list, indexed database, XML database, relational database, object database, or other data storage method, in preparation for subsequent storage of trademark information and data. Trademark data includes, but is not limited, date(s), status, classes, serial number/identifiers, image(s), description(s), jurisdiction(s), and other identifying and/or classifying information such as legal precedents—past lawsuits/disputes over the use of that keyword. The compilation of trademark data can be updated regularly against their respective sources. In some embodiments, the sources are accessed directly for the searching. Various embodiments also provide for various interfaces, mechanisms, and system by which entities can submit their own marks (which may be unregistered, non-default) with possible/optional verification of credentials for injection into data compilation. The compilation of submitted data may be regularly against their respective sources.
  • Upon receiving an analysis request, various embodiments process raw input in preparation for comparison search. The comparison searches can be verified through the use of unique identifier(s) created for each search/request/check. In some embodiments, an identifier can include a timestamp, search id, user id, search type, etc. In some cases, unique identifiers can be assigned to the requester and the recipient. Logging (recording/storage) in system of verifiable (time stamp, etc) record/message of the properties and results of executed search/request/check, storing date and time of search, search party ID, search query, results transmitted, result count, and all other information as previously outlined. Some embodiments also log a verifiable record/message that said results were actually displayed or transmitted to a recipient. The system can make records available to registrar, registrant, possibly in the form of control panel. Back up record of properties of search/request/check, the results, and subsequent transmission, to alternate system (e.g. geographically diverse offsite location).
  • Output of search/request/check can be a list, which can take the form of a table with these possible columns: the relevant trademark detected, % degree of relevance and/or the % degree of similarity, date(s), status, classes, serial number/identifiers, image(s), description(s), jurisdiction(s), and other identifying and/or classifying information such as past lawsuits/disputes over the use of that keyword. Other forms of data output include a digital or printable report, a database, a webpage with links, an e-mail message, an audio message, and more.
  • If a specific search/request/check is a regular, repeating event, optionally check for previously displayed results to ensure that only new or changed results are emphasized. This may take the form of date comparisons, whole-list comparisons, annotations, or other forms of differentiating when a particular result has changed since the last time it appeared in a previous search/request/check.
  • The techniques introduced here can be embodied as special-purpose hardware (e.g., circuitry), or as programmable circuitry appropriately programmed with software and/or firmware, or as a combination of special-purpose and programmable circuitry. Hence, embodiments may include a machine-readable medium having stored thereon instructions which may be used to program a computer (or other electronic devices) to perform a process. The machine-readable medium may include, but is not limited to, floppy diskettes, optical disks, compact disc read-only memories (CD-ROMs), and magneto-optical disks, ROMs, random access memories (RAMs), erasable programmable read-only memories (EPROMs), electrically erasable programmable read-only memories (EEPROMs), magnetic or optical cards, flash memory, or other type of media/machine-readable medium suitable for storing electronic instructions.
  • Terminology
  • Brief definitions of terms, abbreviations, and phrases used throughout this application are given below.
  • The terms “connected” or “coupled” and related terms are used in an operational sense and are not necessarily limited to a direct physical connection or coupling. Thus, for example, two devices may be coupled directly, or via one or more intermediary media or devices. As another example, devices may be coupled in such a way that information can be passed there between, while not sharing any physical connection with one another. Based on the disclosure provided herein, one of ordinary skill in the art will appreciate a variety of ways in which connection or coupling exists in accordance with the aforementioned definition.
  • The phrases “in some embodiments,” “according to various embodiments,” “in the embodiments shown,” “in one embodiment,” “in other embodiments,” and the like generally mean the particular feature, structure, or characteristic following the phrase is included in at least one embodiment of the present invention, and may be included in more than one embodiment of the present invention. In addition, such phrases do not necessarily refer to the same embodiments or to different embodiments.
  • If the specification states a component or feature “may”, “can”, “could”, or “might” be included or have a characteristic, that particular component or feature is not required to be included or have the characteristic.
  • The term “module” refers broadly to software, hardware, or firmware (or any combination thereof) components. Modules are typically functional components that can generate useful data or other output using specified input(s). A module may or may not be self-contained. An application program (also called an “application”) may include one or more modules, or a module can include one or more application programs.
  • General Description
  • FIG. 1 illustrates an example of an environment 100 in which some embodiments of the present invention may be utilized. As illustrated in FIG. 1 a requester, such as, a domain name registrar 110, a social networking site 120, an e-mail service 130, or other service provider 140, can send a request for a trademark analysis of an identification string or other provided inputs (e.g., such as graphics or logos which can be analyzed with a graphical analysis). In accordance with some embodiments, the request can be sent through network 150 to notification system 160.
  • Network 150 generally refers to a group of interconnected devices capable of exchanging information. A network may be as few as several personal computers on a Local Area Network (LAN) or as large as the Internet, a worldwide network of computers. In accordance with some embodiments, network 150 includes any network capable of transmitting information from one entity to another. In some cases, network 150 may be comprised of multiple networks, even multiple heterogeneous networks, such as one or more border networks, voice networks, broadband networks, financial networks, service provider networks, Internet Service Provider (ISP) networks, and/or Public Switched Telephone Networks (PSTNs), interconnected via gateways operable to facilitate communications between and among the various networks.
  • Once the notification request has been received, notification system 160 can search various trademark databases 170 and/or self-reported trademark databases 180. A list of related trademarks can be returned to the requester and/or to third-party 190 (e.g., one of the trademark owners). The requester for a search/request/check may be a different party from a recipient of the notification. For example, a domain name registrar 110 (the requester) may request for a search before a potential registrant (the recipient) registers a domain name. In a second example, the registrar (the requester) initiates the search each month and have the results delivered to the registrant (the recipient). In both cases, the requester and the recipient are two separate parties. In a third example, the registrant of a domain name may individually elect to initiate a search/request/check for trademarks similar to a given keyword without involving any other party. In this case, the requester and the recipient of results is the same party.
  • Trademarks databases 170 could include external databases from around the world. For example, the US Patent & Trademark Office accepts registrations for and manages records of pending and registered US trademarks, while the UK Intellectual Property Office accepts registrations for and manages records of pending and registered UK trademarks. There exist organizations and groupings that allow for multi-jurisdictional registration of marks. One such system is the Madrid System. Another such system is the Community Trade Mark system in the European Union. Trademark data from the largest and well-known trademark offices, systems and jurisdictions can be included in the system as a base layer of data, while retaining the option of adding more data at any time.
  • Some trademark owners may submit their trademarks (e.g., because some jurisdictions/countries restrict access to lists of trademarks, or were simply not included in the system or unregistered marks). In accordance with various embodiments, the submission may occur via a web form, e-mail, telephone, or other method of communication to the management of this system, or to some other repository of such trademark data that may then be fed to the management of this system. This information can be stored in self reported trademark databases 180.
  • In some embodiments, notification system 160 may alternatively rely entirely on self-reported trademarks, where only trademarks that are reported to the management of the system will be included and returned in results. In any case of a self-reported trademark being added to the system, the self-reported trademark can optionally be verified by some means by the management of the search/check system (for instance, a manual search of the respective country/jurisdiction to ensure accuracy of the data provided by the owner of the self-reported trademark).
  • Self-interested trademark owners may also elect to highlight or annotate their trademark(s) if their trademark(s) appear in the results that are returned to the requester of the search/check. This request/election may be made via a web form, e-mail, telephone, or other method of communication to the management of this system. This election may also be included as part of other systems. For example, if a trademark owner decides to subscribe to an ancillary trademark-monitoring service that monitors specific trademark(s), or if trademark(s) are added to a trademark docketing system, the trademark(s) can optionally or automatically (as part of the example monitoring service or docketing system) be included for highlighting or annotating when the results (notification) are returned from a check request. This serves the purpose of notifying the result recipient that the trademark owner pays particular attention to the enforcement of their trademark.
  • The system's databases can accommodate additional inputs for long-term archival and storage in some embodiments. The system can receive a confirmation of acknowledgement, receipt and understanding directly from the recipient of the results. The system can also subsequently receive, from a designated party (e.g. a requester such as a domain name registrar) information about whether a term was eventually used (e.g. if a domain name SLD that was the subject of a search/request/check was eventually registered).
  • As described above, each of the service providers illustrated in FIG. 1, may request the trademark analysis and notification. Each one, however, has slightly different problems to motivate the request. For example, consider domain name registrar 110. In this case, the number of opportunities where an individual or entity may create a custom web address or online unique identifier has led to inadvertent and intentional instances of trademark infringement. Other examples are typosquatters and cybersquatters. A typosquatter may register ‘trupadvisor.com’ in place of the popular TripAdvisor (which has its web site at tripadvisor.com). A cybersquatter may register ‘existingtrademark.com’ where ‘existingtrademark’ is a hypothetical registered trademark whose owner has not registered the equivalent domain name.
  • In these two cases, the unlicensed user (taking the form of a typosquatter or a cybersquatter) may (a) derive advertising revenue from these domain names by placing advertisements on them, (b) pressure the rightful trademark owner into purchasing the domain name for a profitable amount of consideration (e.g. money or benefits), or (c) use the domain name for other purposes, infringing or otherwise. It may alternatively be the case that the domain name registrant has inadvertently/unwittingly registered a domain name that matches or is similar to an existing registered trademark, and is being unwittingly regarded by the owner of the registered trademark as a trademark infringer.
  • The extremely large number of registered domain names and registered trademarks, with more being registered each day, poses problems for at least three parties: 1) the domain name owners, 2) the trademark owners; and 3) the domain name registries and registrars. The owners are unable to keep track of all the trademarks (and their associated classes) that they might be infringing upon. For example, the use of automated parking services for domain names that are currently not in active use may cause the display of infringing advertisements. A domain name in active use with web content may also inadvertently infringe upon the rights of a trademark owner. The infringement of trademark(s) by a domain name owner could result in legal action (UDRP arbitration, ACPA lawsuit, etc.) taken against the domain name owner, which could lead to the loss of the domain name and even becoming liable for monetary damages that are awarded to the trademark owner. This problem is compounded by the fact that the number of trademarks grows continually—it is hard to keep track of new trademarks and ensure compliance of all owned domain names.
  • Owners of trademarks are unable to track which of the domain names may be infringing on their trademark(s). New domain names are constantly being registered, transferred, renewed, and deleted. Registrars may face devastating consequences (in the form of monetary damages being awarded against them) from ACPA and other lawsuits that allege their having a contributory role in any infringement of trademarks by allowing those potentially infringing domain names to be registered.
  • Examples of social networking sites 120 include, but are not limited to, Facebook, Linkedin, MySpace, and Friendster. Users of these sites have the ability to create individual ‘profile pages’. Users often have the ability to 1) for personal profile pages, specify their own name (which should be a real name) that is displayed on the profile page, 2) for group/corporate profile pages, specify their group name that appears on the profile page, and 3) specify a username that is displayed as part of the web address for their personal or group profile page. In the example mentioned in the preface, Mark Zuckerberg, who is an instance of a Facebook social networking user, may register ‘facebook.com/zuck’, where the ‘zuck’ component of the web address was any string of text selected by the end user. The operators of social networking sites 120 face the risk of being entangled in legal action should users register, inadvertently or otherwise, usernames that infringe on trademarks, with these usernames being displayed on personal or group profile pages, or web addresses leading to those profile pages. As such, social networking sites can submit identification strings to notification system 160.
  • Regular e-mail addresses consist of two components: the username (also known as the local-part), and the domain name. In the example fool@bard.com, the part ‘fool’ before the @ is the username, while the part ‘bard.com’ is the domain name. Owners of domain names may create any number of e-mail addresses by creating usernames that are a subset of the domain name. For example, the owner of the domain name ‘bard.com’ can create the e-mail usernames ‘fool1’, ‘fool2’, and ‘fool3’, resulting in the e-mail addresses fool1@bard.com, fool2@bard.com, and fool3@bard.com.
  • With a 64-character long limit for the username/local-part of an e-mail address, and that subdomain names can also be used in the creation of e-mail addresses (e.g. fool@bom.bard.com for the subdomain bom.bard.com), the issue of potential misuse or trademark infringement can be a major concern for domain name owners. This is especially so for operators of free e-mail services such as aol.com, comcast.net, gmail.com and hotmail.com (e.g. someone may set up microsoftinc@gmail.com, which would be infringing on a trademark, ‘Microsoft’), and for operators of free web and e-mail hosting services that allow for subdomains (e.g. if bard.com were to offer free web and e-mail hosting services, someone may set up bom.bard.com, which may conflict with a hypothetical trademark, ‘bombard’). These e-mails could infringe trademarks or be used for phishing. As such, e-mail service providers 130 may use notification system 160 check for possible issues.
  • Other examples of service providers 140 include instant messaging (IM) services that allow for the creation of custom usernames or ‘handles’ which are the primary means by which an individual may be identified on these IM services. Still yet, online advertising including domain parking and domain name redirection can be problems.
  • Written text can also be submitted to notification system 160. Written text can take the form of a webpages with written content, blog posts, social networking status updates or notes, press releases, newspaper articles, books, novels, magazines, newspaper articled, advertisements, journals, directories, product manuals, products and packaging, research papers, textbooks, essays, e-books, audiobooks, movie scripts, television broadcast scripts or transcripts, song lyrics, talking books, text in Braille code, and more. As can be seen, these can take a printed form, a digital/electronic form, or other forms. The purpose may be academic, scientific, recreational, social, entertainment, or more.
  • The author of the text, or the owner/management of the medium on which the text is published, may wish to avoid use of any trademark or ensure that any mentioned trademark is fully attributed to the rightful owner by means of annotating next to the text mark a ™ (for a trade mark), a □ (for a service mark), or a ® (for a registered trade mark), or by a disclaimer. Examples of marks that may be present include Xerox® (a registered trademark for photocopiers), Kleenex® (a registered trademark for paper products), and Kiwi® (a registered trademark for shoe polish).
  • FIG. 2 shows a block diagram with exemplary components of an informing engine in accordance with one or more embodiments of the present invention. According to the embodiments shown in FIG. 2, the notification system 160 can include memory 210, one or more processors 220, GUI generation module 230, communications module 250, parsing module 250, searching module 260, verification module 270, notification module 280, and submission module 290. Other embodiments of the present invention may include some, all, or none of these modules and components along with other modules, engines, interfaces, applications, and/or components. Still yet, some embodiments may incorporate two or more of these elements into a single module and/or associate a portion of the functionality of one or more of these elements with a different element. For example, in one embodiment, parsing module 250 and searching module 260 can be combined into a single module.
  • Memory 210 can be any device, mechanism, or populated data structure used for storing information. In accordance with some embodiments of the present invention, memory 210 can encompass any type of, but is not limited to, volatile memory, nonvolatile memory and dynamic memory. For example, memory 210 can be random access memory, memory storage devices, optical memory devices, media magnetic media, floppy disks, magnetic tapes, hard drives, SIMMs, SDRAM, DIMMs, RDRAM, DDR RAM, SODIMMS, erasable programmable read-only memories (EPROMs), electrically erasable programmable read-only memories (EEPROMs), compact disks, DVDs, and/or the like. In accordance with some embodiments, memory 210 may include one or more disk drives, flash drives, one or more databases, one or more tables, one or more files, local cache memories, processor cache memories, relational databases, flat databases, and/or the like. In addition, those of ordinary skill in the art will appreciate many additional devices and techniques for storing information which can be used as memory 210.
  • Memory 210 may be used to store instructions for running one or more modules, engines, interfaces, and/or applications on processor(s) 220. For example, memory 210 could be used in one or more embodiments to house all or some of the instructions needed to execute the functionality of GUI generation module 230, communications module 250, parsing module 250, searching module 260, verification module 270, notification module 280, and/or submission module 290.
  • GUI generation module 230 may be used to generate one or more user interface screens. For example, the GUI generation module 230 can be used to generate a user interface screen for receiving the provided input or identification string. As another example, GUI generation module 230 can generate a user interface screen to display the notification to a recipient and/or receive a verification from the user that the user has reviewed the notification
  • In some embodiments, communications module 250 may receive a request to perform a trademark search for a provided input. Communications module 250 can translate all or part of the request into a format required by one or more other module. For example, if the request is encrypted communications module 250 can decrypt the request.
  • In some embodiments the provided input may result from an Internationalized Domain Name (e.g., Arabic, Chinese, Russian, and other languages that do not strictly stick to an ASCII character set can be used). This applies to two areas: the top level domains (e.g. China ccTLD domain names ending in a localized script instead of .cn) and the SLD (e.g. the ‘myowndomain’ part of the domain name ‘myowndomain.com’). This introduces more possible SLDs, which increases chances of infringement of non-ASCII trademarks by domain names. Some embodiments of communications module 250 can handle domain names that are non-ASCII translations of ASCII trademarks. Phonetical similarity may be weighed in some embodiments of notification system 160 when considering whether a domain name that is being registered is potentially infringing on native-script trademarks from around the world.
  • Parsing module 250 can be used to parse the provided input into phrases for searching. In some embodiments, parsing module 250 generates phrases from each domain level for searching. For example, an individual or entity may set up a subdomain as a subsidiary component of a domain name that is owned by that individual or entity. The individual or entity owns the domain name ‘myowndomain.com’, and may freely set up ‘tripadvisor.myowndomain.com’, where ‘tripadvisor’ is the subdomain component of the domain name, and in this case, ‘tripadvisor’ is a registered trademark.
  • Parsing module 250 also generates phrases by removing ‘.'s in the domain name. For example, there has been increased use of domain hacks such as ‘del.icio.us’ (where .us is the TLD, and ‘del’ and ‘icio’ are subdomains, and ‘icio.us’ is the registered domain name). These domain hacks, when concatenated by removing the ‘.'s that form the entire chain (of subdomains, the SLD, and the TLD), form words that make some sense. In the case of ‘del.icio.us’, a popular social bookmarking website, the entire address can be concatenated into ‘delicious’, an easy-to-remember English word. It is possible for domain name owners to create subdomains under their domain names, and create a domain hack that may not be obvious from just the domain name (i.e. the SLD+TLD, e.g. ‘nyti.ms’ run by the New York Times). In certain cases, just the domain name itself can be a domain hack (i.e. the SLD+TLD, e.g. ‘sen.se’-concatenated into the word ‘sense’). Trademark owners may take action because, inter alia, domain hacks can be used for nefarious purposes such as phishing websites and fake, deceptive e-mail addresses. Trademark owners may take action simply because of the need to protect their brand equity. As a result, various embodiments of notification system 160 perform phonetic searches.
  • Searching module 260 receives the phrases from the parsing module and searches one or more databases for trademarks related to the phrases. The searching can include searches the databases for exact matches, phonetic matches, and natural language matches.
  • In some embodiments, verification module 270 can be used to verify that the recipient of the results of the search/request/check has received, understood, accepted, or acknowledged the results. This verification may take place via a web button generated by GUI generation module 230 (if results are displayed on a web page), via a telefax transmission (sign and fax back for manual or automated review and acceptance), via responses to telephone voice prompts (Third Party Verification via transfer or 3-way call; or simply an audio recording of vocal responses), express or regular mail (sign document that bears the results and return to system operator via mail), via delivery confirmation (similar to legal service of documents), or a combination of any of these with any original method of delivering the request for acknowledgment (e.g. print out a webpage or e-mail attachment, sign, then return via scan, telefax, or postal mail).
  • Upon confirming this verification (of receipt, understanding, acceptance or acknowledgement), the original requester of the search/request/check or the recipient of the result may want to make the confirmation of verification of receipt, understanding, acceptance or acknowledgement available to a third party, such as a trademark owner. The original requester of the search/request/check or the recipient of the result may optionally make the fact that the search has taken place available to a third party. This notification of a third party may take place immediately and automatically, or manually/optionally. Immediately/automatically—for example, immediate notification may be useful for trademark owners (a third party) who may want to aggregate statistics about where their trademarks are being used. Manually/optionally—delayed and optional notification of a third party may be useful where a recipient or requester wants to show that adequate due diligence had been performed prior to the use of a certain keyword.
  • In some embodiments, verification module 270 generates a digital stamp generated from (i) the time of the search/request/check, and (ii) the results of the search/request/check, accompanies the notification to prove that the results were truly valid at the time of the search. The notification/information may optionally include the fact that the recipient had confirmed receipt of the results of the search/request/check.
  • Notification module 280 can be used to generate and track the notifications. In some embodiments, notification module 280 receives the trademarks related to the phrases and generates the notification. The notification can be delivered to a third party and/or the original requestor.
  • The notification of a third party could be useful in an example of a domain name owner, who may own a domain name. The domain name owner is under legal pressure to transfer it to a trademark owner due to allegations that the domain name was infringing on a registered trademark. However, the results received by the domain name owner may not have included the trademark in question (for example, the trademark may have become public knowledge shortly after the domain name was registered), and a notification may be made to the third party (in this case, a trademark owner) that reasonable effort had already been made to determine that the domain name registration would not be infringing.
  • The notification of a third party could also be useful in an example of a domain name registrar, which may receive tens of thousands of registrations or renewals per year. If a domain name is regarded as possibly infringing on a trademark, the trademark owner may attempt to take legal action against the registrar as well. The registrar can notify the trademark owner with the results of the search/request/check to demonstrate that it had already made a good faith effort (as the requester) in providing notice to the domain name registrant (as the recipient of results) before the registration of the domain name had taken place, and that the registrant was fully responsible for the domain name. The notification of a third party could also be useful in the following example: Upon the registration of a domain name, a registrar (requester) may chose to automatically provide trademark owners (a third party) with a notice that the registrant had registered a name and was aware of similar trademarks, in exchange for immunity against claims of trademark infringement.
  • In accordance with some embodiments, this notification/information may be made available to the trademark owner or any other third party (e.g. a court) through a web- or software-based user interface. The trademark owner or other third party may alternatively be notified by a multitude of other means: a webpage, an table within a webpage, an overlay on a webpage, a website pop-up, an e-mail message, an e-mail message with a link to a webpage (essentially, anything that results in the results being displayed on a visual display unit or VDU), a telefax transmission, a telegraphic transmission, a telephone call, express mail services (e.g. UPS, FedEx, DHL), regular mail services (e.g. via USPS mail), via hand delivery, and/or other information transmission methods. The original requester may require the third party abide by a legal agreement, e.g. indemnify the requester or the recipient of results from legal action, or may bind the third party to a non-disclosure agreement.
  • In some embodiments, the output of search/request/check is possibly a list, which can take the form of a table with these possible columns: the relevant trademark detected, % degree of relevance and/or the % degree of similarity, date(s), status, classes, serial number/identifiers, image(s), description(s), jurisdiction(s), owner data, and other identifying and/or classifying information such as past lawsuits/disputes over the use of that keyword. Other forms of data output include a digital or printable report, a database, a webpage with links, an e-mail message, an audio message, and more. Notification module 280 can determine a degree of relevance for each trademark and possibly remove any below a certain threshold. The degree of relevance (which can take the form of a weight, ranking, rating, score, or percentage) is calculated from one or a combination of several factors, including but not limited to the following:
      • (i) Using phonetic and natural language processing techniques, the keyword used for the search/request/check can be compared to all similar trademarks and a similarity score assigned to each individual match.
      • (ii) By automatic detection (e.g. contextual analysis of i—surrounding text on a webpage or newspaper article, or ii—a description provided by the enquirer) or manual input (e.g. typed in by the enquirer or the completion of a questionnaire) of the likely classes in which the enquirer (e.g. the domain name registrant, or potential trademark registrant) is likely to or is already using the keyword, followed by a comparison of those classes with the classes of trademarks with similar keywords. A higher number of matching classes indicates a greater degree of relevance.
      • (iii) Status—a live or pending trademark is more relevant than a dead, expired, or abandoned trademark.
      • (iv) Filing, First Use, and/or Registration Date—an earlier trademark is possibly, in certain cases, more important than a newer trademark. User or operator of system may specify what weights are applied to each category of dates.
      • (v) Description—a higher number of keyword matches between the description of the trademark and the context of use of the keyword that is being enquired (e.g. text on a webpage, text surrounding the keyword being used) implies a higher degree of relevance.
      • (vi) Jurisdiction—a result from the search/request/check is deemed more relevant if it falls into the trademark jurisdiction where the recipient of the result is planning to use the keyword. In the specific case of domain names, this may depend on the TLD extension—a ccTLD owner, for example, would need to be especially notified of similar trademarks in the jurisdiction of the country that is represented by said ccTLD.
      • (vii) Involvement of trademark owner—if trademark owner has elected to highlight the owned trademark in results of each enquiry, then trademark is possibly more relevant due to the vigilant state of the trademark owner.
      • (viii) Additionally, if there has been dispute(s) over the trademark (e.g. at the USPTO's Trademark Trial and Appeal Board), or if there has been enforcement activity over the trademark (e.g. legal cases), then the trademark is likely to be more relevant.
      • (ix) The degree of ‘noise’ surrounding a trademark needs to be calculated to produce the degree of relevance of a particular result. A greater deal of mentions of a particular trademark in the mass media, on the Internet (e.g. number of search results), the greater the relevance.
      • (x) Top brands—a custom list of top brands for each jurisdiction can be custom-curated and additional relevance assigned to those top brands when the degree of relevance is being calculated.
      • (xi) Relative relevance—to achieve a rank, the results of an enquiry may have to be compared with each other to determine the absolute rank/order of each trademark in the results.
      • (xii) Recurring result—whether this search/request/check has been performed before for this particular recipient, and a specific result it has been ‘marked as read’ or ‘regarded as irrelevant’, could potentially change or decrease the degree of relevance.
  • In some embodiments, notification module 280 will sort the trademarks by the degree of relevance when first presented to the recipient of the results. The recipient may then choose to sort the results by other metrics e.g. filing date.
  • Submission module 290 can be configured to receive submissions from trademark owners with information regarding one or more trademarks. The information can be stored in self-reported trademark database 180. In some embodiments, submission module 290 can use GUI generation module to create a submission interface that allows owners to submit the information.
  • FIG. 3 is a flow chart illustrating exemplary operations for performing a trademark search in accordance with some embodiments of the present invention. In accordance with some embodiments, one or more of the operation illustrated in FIG. 3 can be performed by communications module 240, parsing module 250, searching module 260, notification module 280, and/or other system components or modules. As illustrated in FIG. 3, an input (e.g., domain name, e-mail address, or other identification string) is received from a requester during receiving operation 310. The requester can be an individual, an organization, or a service provider (e.g., domain name registrar 110, social networking site 120, e-mail service provider 130, etc.)
  • Once the input is received, processing operation 320 processes the input. In some embodiments, when the input is a SLD, the processing can include parsing out the keyword ‘domain’ in ‘domain.com’, if keyword had not already been parsed out before search/request/check commences. These strings can be used during searching operation 330 where the string is compared against database of all trademarks to detect trademarks that are similar. When searching operation detects trademarks that are similar (e.g., via a comparison of (i) description/statement of intended use of domain name, and/or (ii) web content of domain name including multilevel content, with the descriptions/classes of all trademarks that were detected as similar to determine the degree of similarity with greater accuracy. *‘multilevel content’ refers to ‘deep crawling’ of a given domain name), notification operation 340 can generate a notification of the results..
  • If the input is in a foreign, native script, then comparison (of keyword and database of known trademarks) via transliteration may be utilized during processing operation 320. Conversion of encoding may also be necessary. Additional methods include parsing or comparing for similarity in appearance and pronunciation (e.g. usage of similar ideograms, radicals, and morphemes). As the same written form may be pronounced differently in different regions, the region in which the keyword will be used is an important factor in helping to source for similar trademarks.
  • Processing operation 320 can be utilize a domain hack detection algorithm in some embodiments. A domain hack takes the form of ‘part1.part2.part3’, and as with any domain name, has to have at least two parts. As a result, domain hack detection algorithm concatenates the keyword inputs. For example, in the case of ‘part1.part2.part3’, concatenating combinations of levels, divided by a (full stop/period), creates a number of inputs: ‘part1part2’, ‘part2part3’, and ‘part1part2part3’. For example, del.icio.us yields ‘delico’, ‘icious’, and ‘delicious’. Each of these is used as input for multiple search/request/checks. Procession operation 320 can process descriptive content (a statement or multilevel web content) for comparison with the descriptions/classes of all trademarks that were detected as similar to determine the degree of similarity with greater accuracy.
  • In some embodiments, the input is a user name from a social networking website or a IM user name, processing operation 320 receives input of username string and comparison of said string against database of all trademarks to detect trademarks that are similar. The username is often a public-facing identifier that may be displayed and transmitted via a page or as a component of a web address. In addition, processing operation 320 can process an input of a string of one or multiple words that could be used in profile names, group names, comments, or anywhere else where a long string may be entered on the social networking site. Then searching operation 320 generates a comparison (i) of each word of string and (ii) of combination of words and phrases within string—with known trademarks in system can then take place.
  • In accordance with some embodiments, when the input is an e-mail address, processing operation generates a username string i.e. portion before @ sign in e-mail address (e.g. ‘username’ part of username@domain.com). Comparison of that string against database of all trademarks to detect trademarks that are similar occurs with searching operation 330.
  • In some embodiments, the input can be a string of one or multiple words obtained from written text, advertising text, or header/headline. Then, searching operation 330 can generate a comparison (i) of each word of string and (ii) of combination of words and phrases within string—with known trademarks in system can then take place.
  • In some embodiments, the input is a list of domain names, e-mail addresses, user names, etc. When multiple inputs are received in a batch, processing operation 320 first determines the type of input and processes each item in accordance with the input type. The searching operation 330 generates a search of each entry.
  • FIG. 4 is a flow chart illustrating exemplary operations for generating a notification in accordance with various embodiments of the present invention. In accordance with some embodiments, one or more of the operation illustrated in FIG. 4 can be performed by notification module 280 and/or other system components or modules. As illustrated in FIG. 4, receiving operation receives a list of trademarks from a search. Generation operation generates a relevance score for each of the trademarks in the list. The degree of relevance (which can take the form of a weight, ranking, rating, score, or percentage) is calculated from one or a combination of several factors discussed above in conjunction with notification module 280. Sorting operation 430 can sort the trademarks based on the calculated relevance. In some embodiments, sorting operation 430 may remove trademarks from the list that fall below a certain relevance level.
  • The ‘degree of relevance of result set’ can be calculated based on information derived from or associated with individual results within each result set. This ‘degree of relevance of result set’ may take the form of a score/rank/percentage weight given to each result set. This ‘degree of relevance of result set’ can help a person who is viewing a large number of result sets to choose the most relevant ones to review. The requester may optionally request that the system returns the ‘degree of relevance of result set’ to the requester. For example, a requester may wish to allow all actions (such as username registration) to proceed, but review or block only those actions (such as username registration) that, after being subject to a search/request/check, produces a result set that falls above a ‘degree of relevance result set’ threshold.
  • The results can be presented to a recipient (e.g., through a GUI generated by GUI generation module 230). The user can request addition sorting based on one or more fields (e.g., application number, first use date, etc). Detection operation 440 determines if the recipient has requested any additional sorting. If a determination is made that additional sorting has been requested detection operation 440 branches to sorting operation 430 where additional sorting is performed based on the criteria received. If a determination is made that no additional sorting has been requested, the detection operation 440 branches to generation operation 450 where a notification can be generated.
  • In some embodiments, all actions (e.g. tens of thousands of domain name registrations) are subject to a search/request/check process, and a score/rank/percentage weight given to each action, so that the requester can prioritize which sets of results to review, e.g. the top 1000 sets per day, or the top 10% of each week's search/request/check results. This allows the requester to allow all actions (e.g. domain name registrations), and review them at a later time. In some embodiments, the requester (e.g. a domain name registrar) may opt to perform a background check for all actions, and allow only those whose score/rank/percentage weights fall below a certain threshold, with the remainder requiring manual review and authorization.
  • Various embodiments also allow a service provider to elect to integrate the search/request/check into its Terms of Sale, Terms of Service, or some other kind of legal agreement. It may require the search/request/check as a prerequisite for the sale of a good or the registration of a term (e.g. registration of a domain name, renewal of a domain name, transfer of a domain name, signup for an e-mail address). It may alternatively or additionally state that the registration may be revoked if the results of a search/request/check indicate issues of concern. The service provider, as a requester, may choose to initiate the search/request/check only upon a party's agreement to the legal agreement. This may take the form of a web form.
  • FIG. 5 is a flow chart illustrating a set of exemplary operations for a service provider to allow a registration in accordance with one or more embodiments of the present invention. A request for a trademark analysis of a domain name, e-mail address, or other identification string is received during receiving operation 510. A trademark analysis is requested during requesting operation 520.
  • Initiating a search/request/check during request operation 520, whether as part of an automated process (e.g. upon a user attempting to register a domain name, or on a regular basis such as monthly or daily) or as a result of a manual request, will result in a ‘notification’ of results that may be delivered to a recipient (not necessarily the original requester) via a combination of one or more of the following methods: a webpage, an table within a webpage, an overlay on a webpage, a website pop-up, an e-mail message, an e-mail message with a link to a webpage (essentially, anything that results in the results being displayed on a visual display unit or VDU), a telefax transmission, a telegraphic transmission, a telephone call, express mail services (e.g. UPS, FedEx, DHL), regular mail services (e.g. via USPS mail), via hand delivery, and/or other information transmission methods.
  • The request or checks may optionally take place only once upon the occurrence of a specific event, e.g. when someone is registering a domain name, creating a subdomain, creating domain hacks using a string of subdomains, creating a publicly-accessible and viewable username or handle for social networking, IM, e-mail and other services, or transferring, selling, or auctioning any of the earlier examples of domain names, subdomains, usernames, or when a piece of written text needs to be reviewed for the presence of trademarks or trademark-similar terms or phrases. Checks for any given term may alternatively take place at modifiable or pre-defined regular intervals, where new trademarks and previously-detected (but since modified) trademarks are detected and returned to the initiator of the check. Checks may also take place on an ad-hoc basis, where the results are only requested when needed.
  • Results returned for any request can take the form of all relevant trademarks, or can include only trademarks that are new or have changed since the previous search/request. If determination operation 530 determines that no related trademarks, or no new trademarks, have been found, the registration is completed during allowance operation 540. If determination operation 530 determines that related trademarks, or new trademarks, have been found then generation operation 550 can generate an indemnification request. Once the user accepts the indemnification request, the service provider will complete the registration.
  • In accordance with some embodiments, the agreement to indemnity may be one or many agreements. For example, in some embodiments, in or to allow registration a confidentiality and or other legal agreement by third party for benefit of requester and/or recipient if a third party (such as a trademark owner) wants to be notified of whenever a trademark appears in any result. Third party may confirm indemnity and/or confidentiality for requester and/or recipient via a variety of means: via a web button (if agreement is displayed on a web page), via a telefax transmission (sign and fax back for manual or automated review and acceptance), via responses to telephone voice prompts (Third Party Verification via transfer or 3-way call; or simply an audio recording of vocal responses), express or regular mail (sign document that bears the agreement and return to system operator or any designated party via mail), any other original method of delivering the request for an agreement (e.g. print out a webpage or e-mail attachment, sign, then return via scan, telefax, or postal mail), or a combination of any of these.
  • A note that an agreement (of any sort) had been endorsed and executed may be made available to the subject of the agreement, e.g. the requester or recipient. The execution of an agreement by a third party may be delivered as part of the results (possibly as an indicator that accompanies each trademark result) received by recipient.
  • Exemplary Computer System Overview
  • Embodiments of the present invention include various steps and operations, which have been described above. A variety of these steps and operations may be performed by hardware components or may be embodied in machine-executable instructions, which may be used to cause a general-purpose or special-purpose processor programmed with the instructions to perform the steps. Alternatively, the steps may be performed by a combination of hardware, software, and/or firmware. As such, FIG. 6 is an example of a computer system 600 with which embodiments of the present invention may be utilized. According to the present example, the computer system includes a bus 605, at least one processor 610, at least one communication port 615, a main memory 620, a removable storage media 625, a read only memory 630, and a mass storage 635.
  • Processor(s) 610 can be any known processor, such as, but not limited to, an Intel® Itanium® or Itanium 2® processor(s), or AMD® Opteron® or Athlon MP® processor(s), or Motorola® lines of processors. Communication port(s) 615 can be any of an RS-232 port for use with a modem based dialup connection, a 10/100 Ethernet port, or a Gigabit port using copper or fiber. Communication port(s) 615 may be chosen depending on a network such a Local Area Network (LAN), Wide Area Network (WAN), or any network to which the computer system 600 connects.
  • Main memory 620 can be Random Access Memory (RAM), or any other dynamic storage device(s) commonly known in the art. Read only memory 630 can be any static storage device(s) such as Programmable Read Only Memory (PROM) chips for storing static information such as instructions for processor 610.
  • Mass storage 635 can be used to store information and instructions. For example, hard disks such as the Adaptec® family of SCSI drives, an optical disc, an array of disks such as RAID, such as the Adaptec family of RAID drives, or any other mass storage devices may be used.
  • Bus 605 communicatively couples processor(s) 610 with the other memory, storage and communication blocks. Bus 605 can be a PCI/PCI-X or SCSI based system bus depending on the storage devices used.
  • Removable storage media 625 can be any kind of external hard-drives, floppy drives, IOMEGA® Zip Drives, Compact Disc-Read Only Memory (CD-ROM), Compact Disc-Re-Writable (CD-RW), Digital Video Disk-Read Only Memory (DVD-ROM).
  • The components described above are meant to exemplify some types of possibilities. In no way should the aforementioned examples limit the scope of the invention, as they are only exemplary embodiments.
  • In conclusion, the present invention provides novel systems, methods and arrangements for trademark searching and notification. While detailed descriptions of one or more embodiments of the invention have been given above, various alternatives, modifications, and equivalents will be apparent to those skilled in the art without varying from the spirit of the invention. For example, while the embodiments described above refer to particular features, the scope of this invention also includes embodiments having different combinations of features and embodiments that do not include all of the described features. Accordingly, the scope of the present invention is intended to embrace all such alternatives, modifications, and variations as fall within the scope of the claims, together with all equivalents thereof. Therefore, the above description should not be taken as limiting the scope of the invention, which is defined by the appended claims.

Claims (21)

1. A method comprising:
receiving, from a requester, a request to perform a trademark search for a provided input;
searching a database for trademarks related to the provided input;
determining a relevance score for each trademark returned from the database search; and
generating a notification based at least in part on the relevance score.
2. The method of claim 1, further comprising parsing the provided input into phrases for searching the database.
3. The method of claim 1, further comprising identifying potential classes for the provided input based on a natural language analysis, a phonetic analysis, and a contextual analysis.
4. The method of claim 3, wherein determining the relevance score includes a comparison of the potential classes with classes assigned to the trademarks.
5. The method of claim 1, wherein determining the relevance score for each trademark includes determining if each trademark is live or pending, involvement of the trademark owner, and litigation history.
6. The method of claim 1, wherein the requester is a service provider that automatically generates the request upon a request to register the provided input.
7. The method of claim 1, wherein the provided input is a domain name, an e-mail address, instant messaging user name, or an advertisement.
8. The method of claim 1, further comprising updating the search on a periodic schedule.
9. A system comprising:
a communications module to receive a request to perform a trademark search for a provided input;
a parsing module configured to parse the provided input into phrases for searching;
a searching module to receive the phrases from the parsing module and search a database for trademarks related to the phrases; and
a notification module configured to receive the trademarks related to the phrases and generate a notification.
10. The system of claim 9, further comprising a graphical user interface module configured to generate one or more user interface screens configured to display the notification to a recipient and receive a verification from the user that the user has reviewed the notification.
11. The system of claim 9, wherein the searching module searches the databases for exact matches, phonetic matches, and natural language matches.
12. The system of claim 9, further comprising a verification module to create and store a unique identifier for each search.
13. The system of claim 12, wherein the unique identifier includes a timestamp, a search identification, a user identification, or a search type.
14. The system of claim 9, further comprising a submission module to receive submissions from trademark owners with information regarding one or more trademarks.
15. The system of claim 9, wherein the notification module determines a relevance of the trademarks related to the phrases before generating the notification, wherein the relevance of the trademark is based on a status, a filing date, a first use date, a registration date, keyword matches between the description of the trademark and the context of use of the keyword within the provided input, a trademark jurisdiction, or an involvement of the trademark owner.
16. A method comprising:
receiving a request to register an identification string with a service provider;
requesting a trademark analysis of the identification string to identify one or more trademarks related to the identification string; and
determining, based on the one or more trademarks returned from the trademark analysis, whether to permit registration of the identification string.
17. The method of claim 16, further comprising notifying a recipient of the one or more trademarks related to the identification string,
18. The method of claim 17, wherein the recipient includes an owner of at least one of the one or more trademarks.
19. The method of claim 17, wherein the recipient includes a user who sent the request to register the identification string and the method further comprising:
sending a verifiable notification to the user;
receiving confirmation of that the user has reviewed the verifiable notification; and
determining, based on the one or more trademarks returned from the trademark analysis and the confirmation, whether to permit registration of the identification string.
20. The method of claim 19, wherein the verifiable notification includes an indemnity agreement.
21. The method of claim 17, wherein the notification includes a degree of relevance, status, classes, serial number, image, description, jurisdiction, ownership data, or litigation history for each of the one or more trademarks.
US13/310,557 2010-12-02 2011-12-02 System to inform about trademarks similar to provided input Abandoned US20120144499A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US13/310,557 US20120144499A1 (en) 2010-12-02 2011-12-02 System to inform about trademarks similar to provided input
US13/830,655 US20130275427A1 (en) 2010-12-02 2013-03-14 System to inform about trademarks similar to provided input
US13/830,450 US8667609B2 (en) 2010-12-02 2013-03-14 System to inform about trademarks similar to provided input
US14/316,694 US20140372316A1 (en) 2010-12-02 2014-06-26 System to inform about trademarks similar to provided input

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US41912810P 2010-12-02 2010-12-02
US13/310,557 US20120144499A1 (en) 2010-12-02 2011-12-02 System to inform about trademarks similar to provided input

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US13/830,655 Continuation US20130275427A1 (en) 2010-12-02 2013-03-14 System to inform about trademarks similar to provided input
US13/830,450 Continuation US8667609B2 (en) 2010-12-02 2013-03-14 System to inform about trademarks similar to provided input

Publications (1)

Publication Number Publication Date
US20120144499A1 true US20120144499A1 (en) 2012-06-07

Family

ID=46163560

Family Applications (4)

Application Number Title Priority Date Filing Date
US13/310,557 Abandoned US20120144499A1 (en) 2010-12-02 2011-12-02 System to inform about trademarks similar to provided input
US13/830,450 Active US8667609B2 (en) 2010-12-02 2013-03-14 System to inform about trademarks similar to provided input
US13/830,655 Abandoned US20130275427A1 (en) 2010-12-02 2013-03-14 System to inform about trademarks similar to provided input
US14/316,694 Abandoned US20140372316A1 (en) 2010-12-02 2014-06-26 System to inform about trademarks similar to provided input

Family Applications After (3)

Application Number Title Priority Date Filing Date
US13/830,450 Active US8667609B2 (en) 2010-12-02 2013-03-14 System to inform about trademarks similar to provided input
US13/830,655 Abandoned US20130275427A1 (en) 2010-12-02 2013-03-14 System to inform about trademarks similar to provided input
US14/316,694 Abandoned US20140372316A1 (en) 2010-12-02 2014-06-26 System to inform about trademarks similar to provided input

Country Status (1)

Country Link
US (4) US20120144499A1 (en)

Cited By (192)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140181007A1 (en) * 2012-12-21 2014-06-26 Onomatics Inc Trademark reservation system
US20140258383A1 (en) * 2013-02-27 2014-09-11 Nicholas Peter Milne System for serving a cross domain trade mark application interface
EP2854047A1 (en) * 2013-09-27 2015-04-01 Konica Minolta Laboratory U.S.A., Inc. Automatic keyword tracking and association
US20150100507A1 (en) * 2013-07-09 2015-04-09 Benoit Levac Domain protected marks list service
US20150154720A1 (en) * 2013-12-02 2015-06-04 Jonathan Matkowsky System and method for detecting and defending trademarks against serial cybersquatters
US20150324469A1 (en) * 2014-05-09 2015-11-12 Thomson Reuters Global Resources System and Methods for Automating Trademark and Service Mark Searches
US20160140355A1 (en) * 2014-11-19 2016-05-19 Salesforce.Com, Inc. User trust scores based on registration features
US9430720B1 (en) 2011-09-21 2016-08-30 Roman Tsibulevskiy Data processing systems, devices, and methods for content analysis
US20160260033A1 (en) * 2014-05-09 2016-09-08 Peter Keyngnaert Systems and Methods for Similarity and Context Measures for Trademark and Service Mark Analysis and Repository Searchess
CN107330109A (en) * 2016-12-30 2017-11-07 徐庆 A kind of trade mark inquiry result degree of approximation is evaluated and sort method, device
US10068018B2 (en) 2015-09-09 2018-09-04 Alibaba Group Holding Limited System and method for determining whether a product image includes a logo pattern
US20180268038A1 (en) * 2014-05-09 2018-09-20 Camelot Uk Bidco Limited Systems and Methods for Similarity and Context Measures for Trademark and Service Mark Analysis and Repository Searches
US10102533B2 (en) 2016-06-10 2018-10-16 OneTrust, LLC Data processing and communications systems and methods for the efficient implementation of privacy by design
US10104103B1 (en) * 2018-01-19 2018-10-16 OneTrust, LLC Data processing systems for tracking reputational risk via scanning and registry lookup
US20180336285A1 (en) * 2017-05-20 2018-11-22 C T Corporation System Automatically Generating and Evaluating Candidate Terms for Trademark Clearance
US10158676B2 (en) 2016-06-10 2018-12-18 OneTrust, LLC Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance
US10169788B2 (en) 2016-04-01 2019-01-01 OneTrust, LLC Data processing systems and communication systems and methods for the efficient generation of privacy risk assessments
US10169609B1 (en) 2016-06-10 2019-01-01 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US10169790B2 (en) 2016-04-01 2019-01-01 OneTrust, LLC Data processing systems and methods for operationalizing privacy compliance via integrated mobile applications
US10169789B2 (en) 2016-04-01 2019-01-01 OneTrust, LLC Data processing systems for modifying privacy campaign data via electronic messaging systems
US10176502B2 (en) 2016-04-01 2019-01-08 OneTrust, LLC Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design
US10176503B2 (en) 2016-04-01 2019-01-08 OneTrust, LLC Data processing systems and methods for efficiently assessing the risk of privacy campaigns
US10181051B2 (en) 2016-06-10 2019-01-15 OneTrust, LLC Data processing systems for generating and populating a data inventory for processing data access requests
US10181019B2 (en) 2016-06-10 2019-01-15 OneTrust, LLC Data processing systems and communications systems and methods for integrating privacy compliance systems with software development and agile tools for privacy design
US10204154B2 (en) 2016-06-10 2019-02-12 OneTrust, LLC Data processing systems for generating and populating a data inventory
WO2019028616A1 (en) * 2017-08-07 2019-02-14 深圳益强信息科技有限公司 Trademark application system based on big data and artificial intelligence
CN109472723A (en) * 2018-08-30 2019-03-15 广州企图腾科技有限公司 A kind of trade mark method for early warning and device based on structural analysis
US10235534B2 (en) 2016-06-10 2019-03-19 OneTrust, LLC Data processing systems for prioritizing data subject access requests for fulfillment and related methods
US10242228B2 (en) 2016-06-10 2019-03-26 OneTrust, LLC Data processing systems for measuring privacy maturity within an organization
US10275614B2 (en) 2016-06-10 2019-04-30 OneTrust, LLC Data processing systems for generating and populating a data inventory
US20190130508A1 (en) * 2017-10-27 2019-05-02 Facebook, Inc. Searching for trademark violations in content items distributed by an online system
US10282559B2 (en) 2016-06-10 2019-05-07 OneTrust, LLC Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques
US10282700B2 (en) 2016-06-10 2019-05-07 OneTrust, LLC Data processing systems for generating and populating a data inventory
US10282692B2 (en) 2016-06-10 2019-05-07 OneTrust, LLC Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques
US10284604B2 (en) 2016-06-10 2019-05-07 OneTrust, LLC Data processing and scanning systems for generating and populating a data inventory
US10289866B2 (en) 2016-06-10 2019-05-14 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US10289870B2 (en) 2016-06-10 2019-05-14 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US10289867B2 (en) 2014-07-27 2019-05-14 OneTrust, LLC Data processing systems for webform crawling to map processing activities and related methods
US10318761B2 (en) 2016-06-10 2019-06-11 OneTrust, LLC Data processing systems and methods for auditing data request compliance
USD852821S1 (en) 2016-05-05 2019-07-02 Corsearch, Inc. Portion of display panel with a graphical user interface
US10346637B2 (en) 2016-06-10 2019-07-09 OneTrust, LLC Data processing systems for the identification and deletion of personal data in computer systems
US10346638B2 (en) 2016-06-10 2019-07-09 OneTrust, LLC Data processing systems for identifying and modifying processes that are subject to data subject access requests
US10353673B2 (en) 2016-06-10 2019-07-16 OneTrust, LLC Data processing systems for integration of consumer feedback with data subject access requests and related methods
US10353674B2 (en) 2016-06-10 2019-07-16 OneTrust, LLC Data processing and communications systems and methods for the efficient implementation of privacy by design
US10419477B2 (en) * 2016-11-16 2019-09-17 Zscaler, Inc. Systems and methods for blocking targeted attacks using domain squatting
US10416966B2 (en) 2016-06-10 2019-09-17 OneTrust, LLC Data processing systems for identity validation of data subject access requests and related methods
US10423996B2 (en) 2016-04-01 2019-09-24 OneTrust, LLC Data processing systems and communication systems and methods for the efficient generation of privacy risk assessments
US10430740B2 (en) 2016-06-10 2019-10-01 One Trust, LLC Data processing systems for calculating and communicating cost of fulfilling data subject access requests and related methods
US10437412B2 (en) 2016-06-10 2019-10-08 OneTrust, LLC Consent receipt management systems and related methods
US10440062B2 (en) 2016-06-10 2019-10-08 OneTrust, LLC Consent receipt management systems and related methods
US10438017B2 (en) 2016-06-10 2019-10-08 OneTrust, LLC Data processing systems for processing data subject access requests
US10437845B2 (en) 2016-05-05 2019-10-08 Corsearch, Inc. System and method for displaying search results for a trademark query in an interactive graphical representation
US10452864B2 (en) 2016-06-10 2019-10-22 OneTrust, LLC Data processing systems for webform crawling to map processing activities and related methods
US10452866B2 (en) 2016-06-10 2019-10-22 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US10454973B2 (en) 2016-06-10 2019-10-22 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US10467432B2 (en) 2016-06-10 2019-11-05 OneTrust, LLC Data processing systems for use in automatically generating, populating, and submitting data subject access requests
US10496846B1 (en) 2016-06-10 2019-12-03 OneTrust, LLC Data processing and communications systems and methods for the efficient implementation of privacy by design
US10496803B2 (en) 2016-06-10 2019-12-03 OneTrust, LLC Data processing systems and methods for efficiently assessing the risk of privacy campaigns
US10503926B2 (en) 2016-06-10 2019-12-10 OneTrust, LLC Consent receipt management systems and related methods
US10509920B2 (en) 2016-06-10 2019-12-17 OneTrust, LLC Data processing systems for processing data subject access requests
US10510031B2 (en) 2016-06-10 2019-12-17 OneTrust, LLC Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques
US10509894B2 (en) 2016-06-10 2019-12-17 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
CN110599373A (en) * 2019-08-30 2019-12-20 北京金堤科技有限公司 Trademark data generation method and device
US10565397B1 (en) 2016-06-10 2020-02-18 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US10565236B1 (en) 2016-06-10 2020-02-18 OneTrust, LLC Data processing systems for generating and populating a data inventory
US10565161B2 (en) 2016-06-10 2020-02-18 OneTrust, LLC Data processing systems for processing data subject access requests
US10572686B2 (en) 2016-06-10 2020-02-25 OneTrust, LLC Consent receipt management systems and related methods
US10586075B2 (en) 2016-06-10 2020-03-10 OneTrust, LLC Data processing systems for orphaned data identification and deletion and related methods
US10585968B2 (en) 2016-06-10 2020-03-10 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US10592692B2 (en) 2016-06-10 2020-03-17 OneTrust, LLC Data processing systems for central consent repository and related methods
US10592648B2 (en) 2016-06-10 2020-03-17 OneTrust, LLC Consent receipt management systems and related methods
US10607028B2 (en) 2016-06-10 2020-03-31 OneTrust, LLC Data processing systems for data testing to confirm data deletion and related methods
US10606916B2 (en) 2016-06-10 2020-03-31 OneTrust, LLC Data processing user interface monitoring systems and related methods
US10614247B2 (en) 2016-06-10 2020-04-07 OneTrust, LLC Data processing systems for automated classification of personal information from documents and related methods
US10642870B2 (en) 2016-06-10 2020-05-05 OneTrust, LLC Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software
US10678945B2 (en) 2016-06-10 2020-06-09 OneTrust, LLC Consent receipt management systems and related methods
US10685140B2 (en) 2016-06-10 2020-06-16 OneTrust, LLC Consent receipt management systems and related methods
US10706176B2 (en) 2016-06-10 2020-07-07 OneTrust, LLC Data-processing consent refresh, re-prompt, and recapture systems and related methods
US10706131B2 (en) 2016-06-10 2020-07-07 OneTrust, LLC Data processing systems and methods for efficiently assessing the risk of privacy campaigns
US10706379B2 (en) 2016-06-10 2020-07-07 OneTrust, LLC Data processing systems for automatic preparation for remediation and related methods
US10708305B2 (en) 2016-06-10 2020-07-07 OneTrust, LLC Automated data processing systems and methods for automatically processing requests for privacy-related information
US10706447B2 (en) 2016-04-01 2020-07-07 OneTrust, LLC Data processing systems and communication systems and methods for the efficient generation of privacy risk assessments
US10706174B2 (en) 2016-06-10 2020-07-07 OneTrust, LLC Data processing systems for prioritizing data subject access requests for fulfillment and related methods
US10713387B2 (en) 2016-06-10 2020-07-14 OneTrust, LLC Consent conversion optimization systems and related methods
US10726158B2 (en) 2016-06-10 2020-07-28 OneTrust, LLC Consent receipt management and automated process blocking systems and related methods
US10740487B2 (en) 2016-06-10 2020-08-11 OneTrust, LLC Data processing systems and methods for populating and maintaining a centralized database of personal data
US10762236B2 (en) 2016-06-10 2020-09-01 OneTrust, LLC Data processing user interface monitoring systems and related methods
US10769301B2 (en) 2016-06-10 2020-09-08 OneTrust, LLC Data processing systems for webform crawling to map processing activities and related methods
US10776517B2 (en) 2016-06-10 2020-09-15 OneTrust, LLC Data processing systems for calculating and communicating cost of fulfilling data subject access requests and related methods
US10776518B2 (en) 2016-06-10 2020-09-15 OneTrust, LLC Consent receipt management systems and related methods
US10776514B2 (en) 2016-06-10 2020-09-15 OneTrust, LLC Data processing systems for the identification and deletion of personal data in computer systems
US10783256B2 (en) 2016-06-10 2020-09-22 OneTrust, LLC Data processing systems for data transfer risk identification and related methods
US10796260B2 (en) 2016-06-10 2020-10-06 OneTrust, LLC Privacy management systems and methods
US10798133B2 (en) 2016-06-10 2020-10-06 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US10803200B2 (en) 2016-06-10 2020-10-13 OneTrust, LLC Data processing systems for processing and managing data subject access in a distributed environment
US10803202B2 (en) 2018-09-07 2020-10-13 OneTrust, LLC Data processing systems for orphaned data identification and deletion and related methods
CN111813976A (en) * 2020-07-16 2020-10-23 为创生(深圳)科技有限公司 Method and device for customizing graphic trademark and storage medium
US10839102B2 (en) 2016-06-10 2020-11-17 OneTrust, LLC Data processing systems for identifying and modifying processes that are subject to data subject access requests
US10846571B2 (en) 2018-09-17 2020-11-24 Cognizant Technology Solutions India Pvt. Ltd System and method for recognizing logos
US10848523B2 (en) 2016-06-10 2020-11-24 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US10846433B2 (en) 2016-06-10 2020-11-24 OneTrust, LLC Data processing consent management systems and related methods
US10853501B2 (en) 2016-06-10 2020-12-01 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US10873606B2 (en) 2016-06-10 2020-12-22 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US10878127B2 (en) 2016-06-10 2020-12-29 OneTrust, LLC Data subject access request processing systems and related methods
US10885485B2 (en) 2016-06-10 2021-01-05 OneTrust, LLC Privacy management systems and methods
US10896394B2 (en) 2016-06-10 2021-01-19 OneTrust, LLC Privacy management systems and methods
US10909265B2 (en) 2016-06-10 2021-02-02 OneTrust, LLC Application privacy scanning systems and related methods
US10909488B2 (en) 2016-06-10 2021-02-02 OneTrust, LLC Data processing systems for assessing readiness for responding to privacy-related incidents
US10944725B2 (en) 2016-06-10 2021-03-09 OneTrust, LLC Data processing systems and methods for using a data model to select a target data asset in a data migration
US10949565B2 (en) 2016-06-10 2021-03-16 OneTrust, LLC Data processing systems for generating and populating a data inventory
US10949170B2 (en) 2016-06-10 2021-03-16 OneTrust, LLC Data processing systems for integration of consumer feedback with data subject access requests and related methods
US10997318B2 (en) 2016-06-10 2021-05-04 OneTrust, LLC Data processing systems for generating and populating a data inventory for processing data access requests
US10997315B2 (en) 2016-06-10 2021-05-04 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US11004125B2 (en) 2016-04-01 2021-05-11 OneTrust, LLC Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design
US11023842B2 (en) 2016-06-10 2021-06-01 OneTrust, LLC Data processing systems and methods for bundled privacy policies
US11025675B2 (en) 2016-06-10 2021-06-01 OneTrust, LLC Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance
US11038925B2 (en) 2016-06-10 2021-06-15 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11057356B2 (en) 2016-06-10 2021-07-06 OneTrust, LLC Automated data processing systems and methods for automatically processing data subject access requests using a chatbot
US11074367B2 (en) 2016-06-10 2021-07-27 OneTrust, LLC Data processing systems for identity validation for consumer rights requests and related methods
US11087260B2 (en) 2016-06-10 2021-08-10 OneTrust, LLC Data processing systems and methods for customizing privacy training
US11100444B2 (en) 2016-06-10 2021-08-24 OneTrust, LLC Data processing systems and methods for providing training in a vendor procurement process
US11134086B2 (en) 2016-06-10 2021-09-28 OneTrust, LLC Consent conversion optimization systems and related methods
US11138299B2 (en) 2016-06-10 2021-10-05 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11138242B2 (en) 2016-06-10 2021-10-05 OneTrust, LLC Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software
US11146566B2 (en) 2016-06-10 2021-10-12 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US11144622B2 (en) 2016-06-10 2021-10-12 OneTrust, LLC Privacy management systems and methods
US11144675B2 (en) 2018-09-07 2021-10-12 OneTrust, LLC Data processing systems and methods for automatically protecting sensitive data within privacy management systems
US11151233B2 (en) 2016-06-10 2021-10-19 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11157600B2 (en) 2016-06-10 2021-10-26 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11188862B2 (en) 2016-06-10 2021-11-30 OneTrust, LLC Privacy management systems and methods
US11188615B2 (en) 2016-06-10 2021-11-30 OneTrust, LLC Data processing consent capture systems and related methods
US11200341B2 (en) 2016-06-10 2021-12-14 OneTrust, LLC Consent receipt management systems and related methods
US11210420B2 (en) 2016-06-10 2021-12-28 OneTrust, LLC Data subject access request processing systems and related methods
US11222142B2 (en) 2016-06-10 2022-01-11 OneTrust, LLC Data processing systems for validating authorization for personal data collection, storage, and processing
US11222309B2 (en) 2016-06-10 2022-01-11 OneTrust, LLC Data processing systems for generating and populating a data inventory
US11222139B2 (en) 2016-06-10 2022-01-11 OneTrust, LLC Data processing systems and methods for automatic discovery and assessment of mobile software development kits
US11227247B2 (en) 2016-06-10 2022-01-18 OneTrust, LLC Data processing systems and methods for bundled privacy policies
US11228620B2 (en) 2016-06-10 2022-01-18 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11238390B2 (en) 2016-06-10 2022-02-01 OneTrust, LLC Privacy management systems and methods
US11244367B2 (en) 2016-04-01 2022-02-08 OneTrust, LLC Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design
US11277448B2 (en) 2016-06-10 2022-03-15 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11295316B2 (en) 2016-06-10 2022-04-05 OneTrust, LLC Data processing systems for identity validation for consumer rights requests and related methods
US11294939B2 (en) 2016-06-10 2022-04-05 OneTrust, LLC Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software
US11301796B2 (en) 2016-06-10 2022-04-12 OneTrust, LLC Data processing systems and methods for customizing privacy training
US11328092B2 (en) 2016-06-10 2022-05-10 OneTrust, LLC Data processing systems for processing and managing data subject access in a distributed environment
US11336697B2 (en) 2016-06-10 2022-05-17 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11341447B2 (en) 2016-06-10 2022-05-24 OneTrust, LLC Privacy management systems and methods
US11343284B2 (en) 2016-06-10 2022-05-24 OneTrust, LLC Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance
US11354435B2 (en) 2016-06-10 2022-06-07 OneTrust, LLC Data processing systems for data testing to confirm data deletion and related methods
US11354434B2 (en) 2016-06-10 2022-06-07 OneTrust, LLC Data processing systems for verification of consent and notice processing and related methods
US11366786B2 (en) 2016-06-10 2022-06-21 OneTrust, LLC Data processing systems for processing data subject access requests
US11366909B2 (en) 2016-06-10 2022-06-21 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11373007B2 (en) 2017-06-16 2022-06-28 OneTrust, LLC Data processing systems for identifying whether cookies contain personally identifying information
US11392720B2 (en) 2016-06-10 2022-07-19 OneTrust, LLC Data processing systems for verification of consent and notice processing and related methods
US11397819B2 (en) 2020-11-06 2022-07-26 OneTrust, LLC Systems and methods for identifying data processing activities based on data discovery results
US11403377B2 (en) 2016-06-10 2022-08-02 OneTrust, LLC Privacy management systems and methods
US11416590B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11418492B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing systems and methods for using a data model to select a target data asset in a data migration
US11416798B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing systems and methods for providing training in a vendor procurement process
US11416589B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11416109B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Automated data processing systems and methods for automatically processing data subject access requests using a chatbot
US11436373B2 (en) 2020-09-15 2022-09-06 OneTrust, LLC Data processing systems and methods for detecting tools for the automatic blocking of consent requests
US11438386B2 (en) 2016-06-10 2022-09-06 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11442906B2 (en) 2021-02-04 2022-09-13 OneTrust, LLC Managing custom attributes for domain objects defined within microservices
US11444976B2 (en) 2020-07-28 2022-09-13 OneTrust, LLC Systems and methods for automatically blocking the use of tracking tools
US11461500B2 (en) 2016-06-10 2022-10-04 OneTrust, LLC Data processing systems for cookie compliance testing with website scanning and related methods
US11475136B2 (en) 2016-06-10 2022-10-18 OneTrust, LLC Data processing systems for data transfer risk identification and related methods
US11475165B2 (en) 2020-08-06 2022-10-18 OneTrust, LLC Data processing systems and methods for automatically redacting unstructured data from a data subject access request
US11481710B2 (en) 2016-06-10 2022-10-25 OneTrust, LLC Privacy management systems and methods
US11494515B2 (en) 2021-02-08 2022-11-08 OneTrust, LLC Data processing systems and methods for anonymizing data samples in classification analysis
US11520928B2 (en) 2016-06-10 2022-12-06 OneTrust, LLC Data processing systems for generating personal data receipts and related methods
US11526624B2 (en) 2020-09-21 2022-12-13 OneTrust, LLC Data processing systems and methods for automatically detecting target data transfers and target data processing
US11533315B2 (en) 2021-03-08 2022-12-20 OneTrust, LLC Data transfer discovery and analysis systems and related methods
US11544667B2 (en) 2016-06-10 2023-01-03 OneTrust, LLC Data processing systems for generating and populating a data inventory
US11544409B2 (en) 2018-09-07 2023-01-03 OneTrust, LLC Data processing systems and methods for automatically protecting sensitive data within privacy management systems
US11546661B2 (en) 2021-02-18 2023-01-03 OneTrust, LLC Selective redaction of media content
US11552923B2 (en) 2015-12-30 2023-01-10 Donuts, Inc. Whitelist domain name registry
US11562078B2 (en) 2021-04-16 2023-01-24 OneTrust, LLC Assessing and managing computational risk involved with integrating third party computing functionality within a computing system
US11562097B2 (en) 2016-06-10 2023-01-24 OneTrust, LLC Data processing systems for central consent repository and related methods
US11586700B2 (en) 2016-06-10 2023-02-21 OneTrust, LLC Data processing systems and methods for automatically blocking the use of tracking tools
US11601464B2 (en) 2021-02-10 2023-03-07 OneTrust, LLC Systems and methods for mitigating risks of third-party computing system functionality integration into a first-party computing system
US11620142B1 (en) 2022-06-03 2023-04-04 OneTrust, LLC Generating and customizing user interfaces for demonstrating functions of interactive user environments
US11625502B2 (en) 2016-06-10 2023-04-11 OneTrust, LLC Data processing systems for identifying and modifying processes that are subject to data subject access requests
US11636171B2 (en) 2016-06-10 2023-04-25 OneTrust, LLC Data processing user interface monitoring systems and related methods
US11651106B2 (en) 2016-06-10 2023-05-16 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US11651402B2 (en) 2016-04-01 2023-05-16 OneTrust, LLC Data processing systems and communication systems and methods for the efficient generation of risk assessments
US11651104B2 (en) 2016-06-10 2023-05-16 OneTrust, LLC Consent receipt management systems and related methods
US11675929B2 (en) 2016-06-10 2023-06-13 OneTrust, LLC Data processing consent sharing systems and related methods
US11687528B2 (en) 2021-01-25 2023-06-27 OneTrust, LLC Systems and methods for discovery, classification, and indexing of data in a native computing system
US11727141B2 (en) 2016-06-10 2023-08-15 OneTrust, LLC Data processing systems and methods for synching privacy-related user consent across multiple computing devices
US11775348B2 (en) 2021-02-17 2023-10-03 OneTrust, LLC Managing custom workflows for domain objects defined within microservices
US11797528B2 (en) 2020-07-08 2023-10-24 OneTrust, LLC Systems and methods for targeted data discovery

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090083055A1 (en) * 2007-09-20 2009-03-26 Edwin Tan Method and system for a scratchcard
US20100106642A1 (en) * 2008-06-05 2010-04-29 Namedepot.Com, Inc. Method and system for delayed payment of prepaid cards
US10438167B2 (en) * 2013-03-15 2019-10-08 Cindy Summerfield Trademark search results presentation systems and methods
CN105376192B (en) * 2014-07-02 2019-09-17 阿里巴巴集团控股有限公司 The reminding method and suggestion device of login account
JP5875057B1 (en) * 2015-04-27 2016-03-02 株式会社将星 Trademark support system
CN107193832A (en) * 2016-03-15 2017-09-22 北京京东尚科信息技术有限公司 Similarity method for digging and device
CN107886419A (en) * 2017-12-26 2018-04-06 文盈(广州)科技咨询有限公司 A kind of trademark agency's service system
CN108985584A (en) * 2018-06-27 2018-12-11 广州朝舜网络科技有限公司 A kind of trade mark intelligent analysis method, device, terminal and storage medium
US20230124194A1 (en) * 2020-05-30 2023-04-20 W&W Co., Ltd. Information processing device, information processing program, and carrier medium
US11049206B1 (en) * 2020-08-20 2021-06-29 Eric Schneider Enhanced content generation system, method, and device

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5881131A (en) * 1993-11-16 1999-03-09 Bell Atlantic Network Services, Inc. Analysis and validation system for provisioning network related facilities
US20020174132A1 (en) * 2001-05-04 2002-11-21 Allresearch, Inc. Method and system for detecting unauthorized trademark use on the internet
US20030149690A1 (en) * 2002-02-01 2003-08-07 Kudlacik Mark E. Method and apparatus to search domain name variations world wide
US20040220903A1 (en) * 2003-04-30 2004-11-04 Emarkmonitor Inc. Method and system to correlate trademark data to internet domain name data
US20060161879A1 (en) * 2005-01-18 2006-07-20 Microsoft Corporation Methods for managing standards
US7246046B2 (en) * 1999-03-01 2007-07-17 Coakley Lisabeth H Computer-implemented trademark brokerage network
US20080065611A1 (en) * 1999-07-22 2008-03-13 Markmonitor Inc. Method and system for searching and monitoring internet trademark usage
US20080270203A1 (en) * 2007-04-27 2008-10-30 Corporation Service Company Assessment of Risk to Domain Names, Brand Names and the Like
US20090138466A1 (en) * 2007-08-17 2009-05-28 Accupatent, Inc. System and Method for Search
US20090299731A1 (en) * 2007-03-12 2009-12-03 Mongoose Ventures Limited Aural similarity measuring system for text
US20110166935A1 (en) * 2005-09-19 2011-07-07 Paxfire, Inc. Analysis and monetization of lookup terms
US20110225019A1 (en) * 2008-10-14 2011-09-15 David Taylor Search, analysis and categorization
US8285830B1 (en) * 2009-01-06 2012-10-09 Citizenhawk, Inc. System and method for combating cybersquatting
US20120323804A1 (en) * 1999-09-30 2012-12-20 Lee Eugene M Method and system for providing information related to docket

Family Cites Families (67)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE59605849D1 (en) 1996-08-29 2000-10-12 Swisscom Ag Bern Method for loading or reloading a data carrier card with a monetary value
US7747522B1 (en) 1996-12-09 2010-06-29 Walker Digital, Llc Method and apparatus for issuing and managing gift certificates
US6138106A (en) 1997-05-19 2000-10-24 Walker Asset Management Limited Partnership Dynamically changing system for fulfilling concealed value gift certificate obligations
US6467684B2 (en) 1999-03-02 2002-10-22 Netvisions, Inc. Pre-paid card system for purchasing products or services
WO2001011443A2 (en) 1999-08-06 2001-02-15 Namezero.Com, Inc. Internet hosting system
US7328190B2 (en) 2002-09-24 2008-02-05 E2Interactive, Inc. System and method for adding value to a stored-value account
US6615190B1 (en) 2000-02-09 2003-09-02 Bank One, Delaware, National Association Sponsor funded stored value card
US20020046341A1 (en) 2000-02-28 2002-04-18 Alex Kazaks System, and method for prepaid anonymous and pseudonymous credit card type transactions
US20030004828A1 (en) 2000-04-27 2003-01-02 S/B Exchange Enterprises, Inc. Prepaid card authorization and security system
US7000028B1 (en) 2000-06-02 2006-02-14 Verisign, Inc. Automated domain name registration
US20020091541A1 (en) 2000-06-16 2002-07-11 Seekip.Com Method and apparatus for intellectual property management on the internet
FI115355B (en) 2000-06-22 2005-04-15 Icl Invia Oyj Arrangement for the authentication and authentication of a secure system user
US7742993B2 (en) 2005-10-31 2010-06-22 James Leonard Driessen SCART-card (secure consumer advantaged retail trading)
US7003500B1 (en) 2000-08-01 2006-02-21 James Leonard Driessen Retail point of sale (RPOS) apparatus for internet merchandising
US6834796B2 (en) 2000-08-31 2004-12-28 Level Z, L.L.C. Anonymous redemption and stored value system and method
US20020091649A1 (en) 2001-01-11 2002-07-11 Level Z, L.L.C. System and method providing stored value payment in multiple level enterprise
WO2002057880A2 (en) 2001-01-17 2002-07-25 Benik Hovsepian Pre-paid electronic access system and method
US7440922B1 (en) 2001-05-04 2008-10-21 West Corporation System, method, and business method for settling micropayment transactions to a pre-paid instrument
KR20010084957A (en) 2001-06-11 2001-09-07 홍성태 The methods of manufacture and management of on-line gift certificate, but which is sold on off-line.
KR20030013074A (en) 2001-08-07 2003-02-14 주식회사데이콤 Method to provide Web hard service
US6529592B1 (en) 2001-08-15 2003-03-04 Bellsouth Intellectual Property Corporation Internet-based message delivery with PSTN billing
US20030069918A1 (en) 2001-10-08 2003-04-10 Tommy Lu Method and apparatus for dynamic provisioning over a world wide web
US20030104174A1 (en) 2001-10-26 2003-06-05 Tetsuyuki Itakura Scratch card
US20030144935A1 (en) 2002-01-30 2003-07-31 Sobek Michael F. Methods and systems for processing, accounting, and administration of stored value cards
US20030154179A1 (en) 2002-02-08 2003-08-14 Mercer David E.W. Virtual scratch card system and method
US6873690B2 (en) 2002-03-15 2005-03-29 Locus Telecommunications, Inc. System and method for providing prepaid telecommunication services
US7191210B2 (en) 2002-05-01 2007-03-13 James Grossman Computer implemented system and method for registering websites and for displaying registration indicia in a search results list
US8370205B2 (en) 2003-10-28 2013-02-05 First Data Corporation System for activation of multiple cards
US20040007618A1 (en) 2002-07-10 2004-01-15 Scott Oram Prepaid credit card method
US7697920B1 (en) 2006-05-05 2010-04-13 Boojum Mobile System and method for providing authentication and authorization utilizing a personal wireless communication device
US20040088250A1 (en) 2002-10-31 2004-05-06 Bartter William Dale Subscriber account replenishment in a netework-based electronic commerce system incorporating prepaid service offerings
US20040181453A1 (en) 2002-11-06 2004-09-16 Ray James Thomas Configurable stored value platform
WO2004044770A1 (en) 2002-11-06 2004-05-27 Digital Interactive Entertainment, L.L.C. Activation and personalization of downloadable content
US20040260607A1 (en) 2003-01-28 2004-12-23 Robbins Andrew H. Stored product personal identification system
KR100505481B1 (en) 2003-02-20 2005-08-05 오현규 Certification system for WEB service access using a mobile terminal
US20040193490A1 (en) 2003-02-21 2004-09-30 Pro Marketing Systems, Inc. A Nevada Corporation Games involving scratch-off cards to promote business
NL1024547C2 (en) 2003-03-31 2004-10-01 Koninkl Kpn Nv Method for using an electromagnetic scratch card for providing services.
KR100691252B1 (en) 2003-10-28 2007-03-12 송덕호 A control method for credit card settlement using the wireless network
US20070094129A1 (en) 2003-12-19 2007-04-26 E2Interactive, Inc. D/B/A E2Interactive, Inc. System and method for adding value to a stored-value account using provider specific pin
US7339999B2 (en) 2004-01-21 2008-03-04 Qualcomm Incorporated Pilot transmission and channel estimation for an OFDM system with excess delay spread
US7191939B2 (en) 2004-03-12 2007-03-20 American Express Travel Related Services Company, Inc. Systems, methods, and devices for selling transaction instruments via web-based tool
US8712377B2 (en) 2004-08-19 2014-04-29 Sk Planet Co., Ltd. Managing method and apparatus for servicing contents provided by content provider
US7797413B2 (en) 2004-10-29 2010-09-14 The Go Daddy Group, Inc. Digital identity registration
US8224754B2 (en) 2004-12-15 2012-07-17 Microsoft Corporation Generation, distribution and verification of tokens using a secure hash algorithm
US7334724B2 (en) 2004-12-17 2008-02-26 Enrique Pallares System for operating a prepaid reloadable debit card having ancillary services
US20060190275A1 (en) 2005-02-18 2006-08-24 Paul Frank Industries, Inc. Intellectual property management system
WO2006094275A2 (en) * 2005-03-02 2006-09-08 Markmonitor, Inc. Trust evaluation systems and methods
US7609773B2 (en) 2005-04-18 2009-10-27 Qualcomm Incorporated Method of determining the location of the FFT window and the delay spread for the platinum broadcast channel estimator
US20060293963A1 (en) 2005-06-27 2006-12-28 Hoblit Robert S Basket restaurant gift card
US7337947B1 (en) 2005-06-30 2008-03-04 Capitol One Financial Corporation Prepaid account and card
US20070112655A1 (en) 2005-10-28 2007-05-17 Jones James G Prepaid financial account incentives system and method
US7675962B2 (en) 2005-11-15 2010-03-09 Qualcomm Incorporated Method and apparatus for deriving a channel impulse response estimate for a wireless channel
WO2007086068A2 (en) 2006-01-30 2007-08-02 Fortressgb Ltd. System for accepting value from closed groups
US7552467B2 (en) 2006-04-24 2009-06-23 Jeffrey Dean Lindsay Security systems for protecting an asset
US20070272743A1 (en) 2006-05-22 2007-11-29 American Express Travel Related Services Company, Inc. Kiosk and Method for Vending Stored Value Cards
US20080022375A1 (en) 2006-06-09 2008-01-24 Stanley David J Method and apparatus for using a cell phone to facilitate user authentication
US20070288326A1 (en) 2006-06-09 2007-12-13 Anthony Boldin Billing method and system with preauthorization feature
US7677446B2 (en) 2006-08-16 2010-03-16 Kurt Wise System and apparatus for transactions using prepaid cards
US20080059485A1 (en) 2006-08-23 2008-03-06 Finn James P Systems and methods for entering and retrieving data
US20090013396A1 (en) 2006-09-21 2009-01-08 Daniel E. Lyford Secure music, video, audio, and other digital file downloading system and method using encoded plastic magnetic-type information card or smart card chip, or printed terminal receipt, or scratch off panel
KR100882563B1 (en) 2006-09-27 2009-02-13 주식회사 에스브이엘 Coupon publication authentic system and method using temporary coupon and real coupon at offline shop
US8359241B2 (en) 2007-04-25 2013-01-22 Michele Colucci-Zieger System and method for bidding on contingency-based matters
US8244640B2 (en) 2007-06-21 2012-08-14 Microsoft Corporation Packet schema for pay-as-you-go service provisioning
US8812401B2 (en) 2007-11-20 2014-08-19 Propay Usa Inc. Secure payment capture processes
US7953654B2 (en) 2008-01-29 2011-05-31 Transaction Wireless, Inc. Integration of gift card services for mobile devices and social networking services
US7792751B2 (en) 2008-06-05 2010-09-07 Namedepot.Com, Inc. Method and system for delayed payment of prepaid cards
US8406392B2 (en) 2008-08-13 2013-03-26 Sky Castle Global Limited Method and system for automated user authentication

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5881131A (en) * 1993-11-16 1999-03-09 Bell Atlantic Network Services, Inc. Analysis and validation system for provisioning network related facilities
US7246046B2 (en) * 1999-03-01 2007-07-17 Coakley Lisabeth H Computer-implemented trademark brokerage network
US20080065611A1 (en) * 1999-07-22 2008-03-13 Markmonitor Inc. Method and system for searching and monitoring internet trademark usage
US20120323804A1 (en) * 1999-09-30 2012-12-20 Lee Eugene M Method and system for providing information related to docket
US20020174132A1 (en) * 2001-05-04 2002-11-21 Allresearch, Inc. Method and system for detecting unauthorized trademark use on the internet
US20030149690A1 (en) * 2002-02-01 2003-08-07 Kudlacik Mark E. Method and apparatus to search domain name variations world wide
US20040220903A1 (en) * 2003-04-30 2004-11-04 Emarkmonitor Inc. Method and system to correlate trademark data to internet domain name data
US20060161879A1 (en) * 2005-01-18 2006-07-20 Microsoft Corporation Methods for managing standards
US20110166935A1 (en) * 2005-09-19 2011-07-07 Paxfire, Inc. Analysis and monetization of lookup terms
US20090299731A1 (en) * 2007-03-12 2009-12-03 Mongoose Ventures Limited Aural similarity measuring system for text
US20080270203A1 (en) * 2007-04-27 2008-10-30 Corporation Service Company Assessment of Risk to Domain Names, Brand Names and the Like
US20090138466A1 (en) * 2007-08-17 2009-05-28 Accupatent, Inc. System and Method for Search
US20110225019A1 (en) * 2008-10-14 2011-09-15 David Taylor Search, analysis and categorization
US8285830B1 (en) * 2009-01-06 2012-10-09 Citizenhawk, Inc. System and method for combating cybersquatting

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"Ron White", "How Computers Work", Que, Oct-2003 *

Cited By (316)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10311134B2 (en) 2011-09-21 2019-06-04 Roman Tsibulevskiy Data processing systems, devices, and methods for content analysis
US9508027B2 (en) 2011-09-21 2016-11-29 Roman Tsibulevskiy Data processing systems, devices, and methods for content analysis
US9558402B2 (en) 2011-09-21 2017-01-31 Roman Tsibulevskiy Data processing systems, devices, and methods for content analysis
US9953013B2 (en) 2011-09-21 2018-04-24 Roman Tsibulevskiy Data processing systems, devices, and methods for content analysis
US11830266B2 (en) 2011-09-21 2023-11-28 Roman Tsibulevskiy Data processing systems, devices, and methods for content analysis
US10325011B2 (en) 2011-09-21 2019-06-18 Roman Tsibulevskiy Data processing systems, devices, and methods for content analysis
US9430720B1 (en) 2011-09-21 2016-08-30 Roman Tsibulevskiy Data processing systems, devices, and methods for content analysis
US11232251B2 (en) 2011-09-21 2022-01-25 Roman Tsibulevskiy Data processing systems, devices, and methods for content analysis
US20140181007A1 (en) * 2012-12-21 2014-06-26 Onomatics Inc Trademark reservation system
US20140258383A1 (en) * 2013-02-27 2014-09-11 Nicholas Peter Milne System for serving a cross domain trade mark application interface
US20150100507A1 (en) * 2013-07-09 2015-04-09 Benoit Levac Domain protected marks list service
EP2854047A1 (en) * 2013-09-27 2015-04-01 Konica Minolta Laboratory U.S.A., Inc. Automatic keyword tracking and association
US20150154720A1 (en) * 2013-12-02 2015-06-04 Jonathan Matkowsky System and method for detecting and defending trademarks against serial cybersquatters
US20160260033A1 (en) * 2014-05-09 2016-09-08 Peter Keyngnaert Systems and Methods for Similarity and Context Measures for Trademark and Service Mark Analysis and Repository Searchess
US20180268038A1 (en) * 2014-05-09 2018-09-20 Camelot Uk Bidco Limited Systems and Methods for Similarity and Context Measures for Trademark and Service Mark Analysis and Repository Searches
US20180225363A1 (en) * 2014-05-09 2018-08-09 Camelot Uk Bidco Limited System and Methods for Automating Trademark and Service Mark Searches
US20150324469A1 (en) * 2014-05-09 2015-11-12 Thomson Reuters Global Resources System and Methods for Automating Trademark and Service Mark Searches
US9965547B2 (en) * 2014-05-09 2018-05-08 Camelot Uk Bidco Limited System and methods for automating trademark and service mark searches
US11100124B2 (en) * 2014-05-09 2021-08-24 Camelot Uk Bidco Limited Systems and methods for similarity and context measures for trademark and service mark analysis and repository searches
US10565533B2 (en) * 2014-05-09 2020-02-18 Camelot Uk Bidco Limited Systems and methods for similarity and context measures for trademark and service mark analysis and repository searches
US10896212B2 (en) * 2014-05-09 2021-01-19 Camelot Uk Bidco Limited System and methods for automating trademark and service mark searches
US10289867B2 (en) 2014-07-27 2019-05-14 OneTrust, LLC Data processing systems for webform crawling to map processing activities and related methods
US20160140355A1 (en) * 2014-11-19 2016-05-19 Salesforce.Com, Inc. User trust scores based on registration features
US10068018B2 (en) 2015-09-09 2018-09-04 Alibaba Group Holding Limited System and method for determining whether a product image includes a logo pattern
US11689495B2 (en) 2015-12-30 2023-06-27 Identity Digital Inc. Whitelist domain name registry
US11552923B2 (en) 2015-12-30 2023-01-10 Donuts, Inc. Whitelist domain name registry
US10169789B2 (en) 2016-04-01 2019-01-01 OneTrust, LLC Data processing systems for modifying privacy campaign data via electronic messaging systems
US10706447B2 (en) 2016-04-01 2020-07-07 OneTrust, LLC Data processing systems and communication systems and methods for the efficient generation of privacy risk assessments
US10176503B2 (en) 2016-04-01 2019-01-08 OneTrust, LLC Data processing systems and methods for efficiently assessing the risk of privacy campaigns
US10956952B2 (en) 2016-04-01 2021-03-23 OneTrust, LLC Data processing systems and communication systems and methods for the efficient generation of privacy risk assessments
US10169790B2 (en) 2016-04-01 2019-01-01 OneTrust, LLC Data processing systems and methods for operationalizing privacy compliance via integrated mobile applications
US11004125B2 (en) 2016-04-01 2021-05-11 OneTrust, LLC Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design
US10853859B2 (en) 2016-04-01 2020-12-01 OneTrust, LLC Data processing systems and methods for operationalizing privacy compliance and assessing the risk of various respective privacy campaigns
US10176502B2 (en) 2016-04-01 2019-01-08 OneTrust, LLC Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design
US10169788B2 (en) 2016-04-01 2019-01-01 OneTrust, LLC Data processing systems and communication systems and methods for the efficient generation of privacy risk assessments
US11651402B2 (en) 2016-04-01 2023-05-16 OneTrust, LLC Data processing systems and communication systems and methods for the efficient generation of risk assessments
US10423996B2 (en) 2016-04-01 2019-09-24 OneTrust, LLC Data processing systems and communication systems and methods for the efficient generation of privacy risk assessments
US11244367B2 (en) 2016-04-01 2022-02-08 OneTrust, LLC Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design
USD852821S1 (en) 2016-05-05 2019-07-02 Corsearch, Inc. Portion of display panel with a graphical user interface
US10437845B2 (en) 2016-05-05 2019-10-08 Corsearch, Inc. System and method for displaying search results for a trademark query in an interactive graphical representation
US10949544B2 (en) 2016-06-10 2021-03-16 OneTrust, LLC Data processing systems for data transfer risk identification and related methods
US11030274B2 (en) 2016-06-10 2021-06-08 OneTrust, LLC Data processing user interface monitoring systems and related methods
US10284604B2 (en) 2016-06-10 2019-05-07 OneTrust, LLC Data processing and scanning systems for generating and populating a data inventory
US10289866B2 (en) 2016-06-10 2019-05-14 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US10289870B2 (en) 2016-06-10 2019-05-14 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US10282370B1 (en) 2016-06-10 2019-05-07 OneTrust, LLC Data processing systems for generating and populating a data inventory
US10282700B2 (en) 2016-06-10 2019-05-07 OneTrust, LLC Data processing systems for generating and populating a data inventory
US10318761B2 (en) 2016-06-10 2019-06-11 OneTrust, LLC Data processing systems and methods for auditing data request compliance
US10282559B2 (en) 2016-06-10 2019-05-07 OneTrust, LLC Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques
US11921894B2 (en) 2016-06-10 2024-03-05 OneTrust, LLC Data processing systems for generating and populating a data inventory for processing data access requests
US10346637B2 (en) 2016-06-10 2019-07-09 OneTrust, LLC Data processing systems for the identification and deletion of personal data in computer systems
US10346638B2 (en) 2016-06-10 2019-07-09 OneTrust, LLC Data processing systems for identifying and modifying processes that are subject to data subject access requests
US10346598B2 (en) 2016-06-10 2019-07-09 OneTrust, LLC Data processing systems for monitoring user system inputs and related methods
US10348775B2 (en) 2016-06-10 2019-07-09 OneTrust, LLC Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance
US10353673B2 (en) 2016-06-10 2019-07-16 OneTrust, LLC Data processing systems for integration of consumer feedback with data subject access requests and related methods
US10354089B2 (en) 2016-06-10 2019-07-16 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US10353674B2 (en) 2016-06-10 2019-07-16 OneTrust, LLC Data processing and communications systems and methods for the efficient implementation of privacy by design
US10417450B2 (en) 2016-06-10 2019-09-17 OneTrust, LLC Data processing systems for prioritizing data subject access requests for fulfillment and related methods
US10419493B2 (en) 2016-06-10 2019-09-17 OneTrust, LLC Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance
US11868507B2 (en) 2016-06-10 2024-01-09 OneTrust, LLC Data processing systems for cookie compliance testing with website scanning and related methods
US10416966B2 (en) 2016-06-10 2019-09-17 OneTrust, LLC Data processing systems for identity validation of data subject access requests and related methods
US10275614B2 (en) 2016-06-10 2019-04-30 OneTrust, LLC Data processing systems for generating and populating a data inventory
US10430740B2 (en) 2016-06-10 2019-10-01 One Trust, LLC Data processing systems for calculating and communicating cost of fulfilling data subject access requests and related methods
US10437412B2 (en) 2016-06-10 2019-10-08 OneTrust, LLC Consent receipt management systems and related methods
US10438020B2 (en) 2016-06-10 2019-10-08 OneTrust, LLC Data processing systems for generating and populating a data inventory for processing data access requests
US10440062B2 (en) 2016-06-10 2019-10-08 OneTrust, LLC Consent receipt management systems and related methods
US10437860B2 (en) 2016-06-10 2019-10-08 OneTrust, LLC Data processing systems for generating and populating a data inventory
US10438017B2 (en) 2016-06-10 2019-10-08 OneTrust, LLC Data processing systems for processing data subject access requests
US10242228B2 (en) 2016-06-10 2019-03-26 OneTrust, LLC Data processing systems for measuring privacy maturity within an organization
US10438016B2 (en) 2016-06-10 2019-10-08 OneTrust, LLC Data processing systems for generating and populating a data inventory
US10445526B2 (en) 2016-06-10 2019-10-15 OneTrust, LLC Data processing systems for measuring privacy maturity within an organization
US10452864B2 (en) 2016-06-10 2019-10-22 OneTrust, LLC Data processing systems for webform crawling to map processing activities and related methods
US10452866B2 (en) 2016-06-10 2019-10-22 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US10454973B2 (en) 2016-06-10 2019-10-22 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US10467432B2 (en) 2016-06-10 2019-11-05 OneTrust, LLC Data processing systems for use in automatically generating, populating, and submitting data subject access requests
US10498770B2 (en) 2016-06-10 2019-12-03 OneTrust, LLC Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance
US10496846B1 (en) 2016-06-10 2019-12-03 OneTrust, LLC Data processing and communications systems and methods for the efficient implementation of privacy by design
US10496803B2 (en) 2016-06-10 2019-12-03 OneTrust, LLC Data processing systems and methods for efficiently assessing the risk of privacy campaigns
US10503926B2 (en) 2016-06-10 2019-12-10 OneTrust, LLC Consent receipt management systems and related methods
US10509920B2 (en) 2016-06-10 2019-12-17 OneTrust, LLC Data processing systems for processing data subject access requests
US10510031B2 (en) 2016-06-10 2019-12-17 OneTrust, LLC Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques
US10509894B2 (en) 2016-06-10 2019-12-17 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11847182B2 (en) 2016-06-10 2023-12-19 OneTrust, LLC Data processing consent capture systems and related methods
US10558821B2 (en) 2016-06-10 2020-02-11 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US10567439B2 (en) 2016-06-10 2020-02-18 OneTrust, LLC Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance
US10565397B1 (en) 2016-06-10 2020-02-18 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US10564935B2 (en) 2016-06-10 2020-02-18 OneTrust, LLC Data processing systems for integration of consumer feedback with data subject access requests and related methods
US10235534B2 (en) 2016-06-10 2019-03-19 OneTrust, LLC Data processing systems for prioritizing data subject access requests for fulfillment and related methods
US10565236B1 (en) 2016-06-10 2020-02-18 OneTrust, LLC Data processing systems for generating and populating a data inventory
US10565161B2 (en) 2016-06-10 2020-02-18 OneTrust, LLC Data processing systems for processing data subject access requests
US10564936B2 (en) 2016-06-10 2020-02-18 OneTrust, LLC Data processing systems for identity validation of data subject access requests and related methods
US10572686B2 (en) 2016-06-10 2020-02-25 OneTrust, LLC Consent receipt management systems and related methods
US10574705B2 (en) 2016-06-10 2020-02-25 OneTrust, LLC Data processing and scanning systems for generating and populating a data inventory
US10586072B2 (en) 2016-06-10 2020-03-10 OneTrust, LLC Data processing systems for measuring privacy maturity within an organization
US10586075B2 (en) 2016-06-10 2020-03-10 OneTrust, LLC Data processing systems for orphaned data identification and deletion and related methods
US10585968B2 (en) 2016-06-10 2020-03-10 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US10592692B2 (en) 2016-06-10 2020-03-17 OneTrust, LLC Data processing systems for central consent repository and related methods
US10592648B2 (en) 2016-06-10 2020-03-17 OneTrust, LLC Consent receipt management systems and related methods
US10594740B2 (en) 2016-06-10 2020-03-17 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US10599870B2 (en) 2016-06-10 2020-03-24 OneTrust, LLC Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques
US10607028B2 (en) 2016-06-10 2020-03-31 OneTrust, LLC Data processing systems for data testing to confirm data deletion and related methods
US10606916B2 (en) 2016-06-10 2020-03-31 OneTrust, LLC Data processing user interface monitoring systems and related methods
US10614247B2 (en) 2016-06-10 2020-04-07 OneTrust, LLC Data processing systems for automated classification of personal information from documents and related methods
US10614246B2 (en) 2016-06-10 2020-04-07 OneTrust, LLC Data processing systems and methods for auditing data request compliance
US10642870B2 (en) 2016-06-10 2020-05-05 OneTrust, LLC Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software
US10678945B2 (en) 2016-06-10 2020-06-09 OneTrust, LLC Consent receipt management systems and related methods
US10685140B2 (en) 2016-06-10 2020-06-16 OneTrust, LLC Consent receipt management systems and related methods
US10692033B2 (en) 2016-06-10 2020-06-23 OneTrust, LLC Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques
US10706176B2 (en) 2016-06-10 2020-07-07 OneTrust, LLC Data-processing consent refresh, re-prompt, and recapture systems and related methods
US10705801B2 (en) 2016-06-10 2020-07-07 OneTrust, LLC Data processing systems for identity validation of data subject access requests and related methods
US10706131B2 (en) 2016-06-10 2020-07-07 OneTrust, LLC Data processing systems and methods for efficiently assessing the risk of privacy campaigns
US10706379B2 (en) 2016-06-10 2020-07-07 OneTrust, LLC Data processing systems for automatic preparation for remediation and related methods
US10708305B2 (en) 2016-06-10 2020-07-07 OneTrust, LLC Automated data processing systems and methods for automatically processing requests for privacy-related information
US10102533B2 (en) 2016-06-10 2018-10-16 OneTrust, LLC Data processing and communications systems and methods for the efficient implementation of privacy by design
US10706174B2 (en) 2016-06-10 2020-07-07 OneTrust, LLC Data processing systems for prioritizing data subject access requests for fulfillment and related methods
US10713387B2 (en) 2016-06-10 2020-07-14 OneTrust, LLC Consent conversion optimization systems and related methods
US10726158B2 (en) 2016-06-10 2020-07-28 OneTrust, LLC Consent receipt management and automated process blocking systems and related methods
US10740487B2 (en) 2016-06-10 2020-08-11 OneTrust, LLC Data processing systems and methods for populating and maintaining a centralized database of personal data
US10754981B2 (en) 2016-06-10 2020-08-25 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US10762236B2 (en) 2016-06-10 2020-09-01 OneTrust, LLC Data processing user interface monitoring systems and related methods
US10769302B2 (en) 2016-06-10 2020-09-08 OneTrust, LLC Consent receipt management systems and related methods
US10769303B2 (en) 2016-06-10 2020-09-08 OneTrust, LLC Data processing systems for central consent repository and related methods
US10769301B2 (en) 2016-06-10 2020-09-08 OneTrust, LLC Data processing systems for webform crawling to map processing activities and related methods
US10776517B2 (en) 2016-06-10 2020-09-15 OneTrust, LLC Data processing systems for calculating and communicating cost of fulfilling data subject access requests and related methods
US10776515B2 (en) 2016-06-10 2020-09-15 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US10776518B2 (en) 2016-06-10 2020-09-15 OneTrust, LLC Consent receipt management systems and related methods
US10776514B2 (en) 2016-06-10 2020-09-15 OneTrust, LLC Data processing systems for the identification and deletion of personal data in computer systems
US10783256B2 (en) 2016-06-10 2020-09-22 OneTrust, LLC Data processing systems for data transfer risk identification and related methods
US10791150B2 (en) 2016-06-10 2020-09-29 OneTrust, LLC Data processing and scanning systems for generating and populating a data inventory
US10796260B2 (en) 2016-06-10 2020-10-06 OneTrust, LLC Privacy management systems and methods
US10798133B2 (en) 2016-06-10 2020-10-06 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US10796020B2 (en) 2016-06-10 2020-10-06 OneTrust, LLC Consent receipt management systems and related methods
US10803198B2 (en) 2016-06-10 2020-10-13 OneTrust, LLC Data processing systems for use in automatically generating, populating, and submitting data subject access requests
US10803200B2 (en) 2016-06-10 2020-10-13 OneTrust, LLC Data processing systems for processing and managing data subject access in a distributed environment
US10805354B2 (en) 2016-06-10 2020-10-13 OneTrust, LLC Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance
US10803199B2 (en) 2016-06-10 2020-10-13 OneTrust, LLC Data processing and communications systems and methods for the efficient implementation of privacy by design
US10803097B2 (en) 2016-06-10 2020-10-13 OneTrust, LLC Data processing systems for generating and populating a data inventory
US11727141B2 (en) 2016-06-10 2023-08-15 OneTrust, LLC Data processing systems and methods for synching privacy-related user consent across multiple computing devices
US11675929B2 (en) 2016-06-10 2023-06-13 OneTrust, LLC Data processing consent sharing systems and related methods
US10839102B2 (en) 2016-06-10 2020-11-17 OneTrust, LLC Data processing systems for identifying and modifying processes that are subject to data subject access requests
US10846261B2 (en) 2016-06-10 2020-11-24 OneTrust, LLC Data processing systems for processing data subject access requests
US11651104B2 (en) 2016-06-10 2023-05-16 OneTrust, LLC Consent receipt management systems and related methods
US10848523B2 (en) 2016-06-10 2020-11-24 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US10846433B2 (en) 2016-06-10 2020-11-24 OneTrust, LLC Data processing consent management systems and related methods
US11651106B2 (en) 2016-06-10 2023-05-16 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US10853501B2 (en) 2016-06-10 2020-12-01 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US10867007B2 (en) 2016-06-10 2020-12-15 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US10867072B2 (en) 2016-06-10 2020-12-15 OneTrust, LLC Data processing systems for measuring privacy maturity within an organization
US10873606B2 (en) 2016-06-10 2020-12-22 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US10878127B2 (en) 2016-06-10 2020-12-29 OneTrust, LLC Data subject access request processing systems and related methods
US10885485B2 (en) 2016-06-10 2021-01-05 OneTrust, LLC Privacy management systems and methods
US10204154B2 (en) 2016-06-10 2019-02-12 OneTrust, LLC Data processing systems for generating and populating a data inventory
US10896394B2 (en) 2016-06-10 2021-01-19 OneTrust, LLC Privacy management systems and methods
US10909265B2 (en) 2016-06-10 2021-02-02 OneTrust, LLC Application privacy scanning systems and related methods
US10909488B2 (en) 2016-06-10 2021-02-02 OneTrust, LLC Data processing systems for assessing readiness for responding to privacy-related incidents
US10929559B2 (en) 2016-06-10 2021-02-23 OneTrust, LLC Data processing systems for data testing to confirm data deletion and related methods
US11645418B2 (en) 2016-06-10 2023-05-09 OneTrust, LLC Data processing systems for data testing to confirm data deletion and related methods
US10944725B2 (en) 2016-06-10 2021-03-09 OneTrust, LLC Data processing systems and methods for using a data model to select a target data asset in a data migration
US10181019B2 (en) 2016-06-10 2019-01-15 OneTrust, LLC Data processing systems and communications systems and methods for integrating privacy compliance systems with software development and agile tools for privacy design
US10949565B2 (en) 2016-06-10 2021-03-16 OneTrust, LLC Data processing systems for generating and populating a data inventory
US10949170B2 (en) 2016-06-10 2021-03-16 OneTrust, LLC Data processing systems for integration of consumer feedback with data subject access requests and related methods
US10949567B2 (en) 2016-06-10 2021-03-16 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US10181051B2 (en) 2016-06-10 2019-01-15 OneTrust, LLC Data processing systems for generating and populating a data inventory for processing data access requests
US11645353B2 (en) 2016-06-10 2023-05-09 OneTrust, LLC Data processing consent capture systems and related methods
US10970371B2 (en) 2016-06-10 2021-04-06 OneTrust, LLC Consent receipt management systems and related methods
US10972509B2 (en) 2016-06-10 2021-04-06 OneTrust, LLC Data processing and scanning systems for generating and populating a data inventory
US10970675B2 (en) 2016-06-10 2021-04-06 OneTrust, LLC Data processing systems for generating and populating a data inventory
US10984132B2 (en) 2016-06-10 2021-04-20 OneTrust, LLC Data processing systems and methods for populating and maintaining a centralized database of personal data
US10997318B2 (en) 2016-06-10 2021-05-04 OneTrust, LLC Data processing systems for generating and populating a data inventory for processing data access requests
US10997315B2 (en) 2016-06-10 2021-05-04 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US10997542B2 (en) 2016-06-10 2021-05-04 OneTrust, LLC Privacy management systems and methods
US11636171B2 (en) 2016-06-10 2023-04-25 OneTrust, LLC Data processing user interface monitoring systems and related methods
US10169609B1 (en) 2016-06-10 2019-01-01 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US11023842B2 (en) 2016-06-10 2021-06-01 OneTrust, LLC Data processing systems and methods for bundled privacy policies
US11023616B2 (en) 2016-06-10 2021-06-01 OneTrust, LLC Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques
US11025675B2 (en) 2016-06-10 2021-06-01 OneTrust, LLC Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance
US11030563B2 (en) 2016-06-10 2021-06-08 OneTrust, LLC Privacy management systems and methods
US10282692B2 (en) 2016-06-10 2019-05-07 OneTrust, LLC Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques
US11030327B2 (en) 2016-06-10 2021-06-08 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11038925B2 (en) 2016-06-10 2021-06-15 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11036882B2 (en) 2016-06-10 2021-06-15 OneTrust, LLC Data processing systems for processing and managing data subject access in a distributed environment
US11036674B2 (en) 2016-06-10 2021-06-15 OneTrust, LLC Data processing systems for processing data subject access requests
US11036771B2 (en) 2016-06-10 2021-06-15 OneTrust, LLC Data processing systems for generating and populating a data inventory
US11057356B2 (en) 2016-06-10 2021-07-06 OneTrust, LLC Automated data processing systems and methods for automatically processing data subject access requests using a chatbot
US11062051B2 (en) 2016-06-10 2021-07-13 OneTrust, LLC Consent receipt management systems and related methods
US11070593B2 (en) 2016-06-10 2021-07-20 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11068618B2 (en) 2016-06-10 2021-07-20 OneTrust, LLC Data processing systems for central consent repository and related methods
US11074367B2 (en) 2016-06-10 2021-07-27 OneTrust, LLC Data processing systems for identity validation for consumer rights requests and related methods
US11087260B2 (en) 2016-06-10 2021-08-10 OneTrust, LLC Data processing systems and methods for customizing privacy training
US11100444B2 (en) 2016-06-10 2021-08-24 OneTrust, LLC Data processing systems and methods for providing training in a vendor procurement process
US10165011B2 (en) 2016-06-10 2018-12-25 OneTrust, LLC Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance
US11100445B2 (en) 2016-06-10 2021-08-24 OneTrust, LLC Data processing systems for assessing readiness for responding to privacy-related incidents
US11113416B2 (en) 2016-06-10 2021-09-07 OneTrust, LLC Application privacy scanning systems and related methods
US11122011B2 (en) 2016-06-10 2021-09-14 OneTrust, LLC Data processing systems and methods for using a data model to select a target data asset in a data migration
US11120162B2 (en) 2016-06-10 2021-09-14 OneTrust, LLC Data processing systems for data testing to confirm data deletion and related methods
US11120161B2 (en) 2016-06-10 2021-09-14 OneTrust, LLC Data subject access request processing systems and related methods
US11126748B2 (en) 2016-06-10 2021-09-21 OneTrust, LLC Data processing consent management systems and related methods
US11134086B2 (en) 2016-06-10 2021-09-28 OneTrust, LLC Consent conversion optimization systems and related methods
US11138336B2 (en) 2016-06-10 2021-10-05 OneTrust, LLC Data processing systems for generating and populating a data inventory
US11138299B2 (en) 2016-06-10 2021-10-05 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11138242B2 (en) 2016-06-10 2021-10-05 OneTrust, LLC Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software
US11138318B2 (en) 2016-06-10 2021-10-05 OneTrust, LLC Data processing systems for data transfer risk identification and related methods
US11146566B2 (en) 2016-06-10 2021-10-12 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US11144670B2 (en) 2016-06-10 2021-10-12 OneTrust, LLC Data processing systems for identifying and modifying processes that are subject to data subject access requests
US11144622B2 (en) 2016-06-10 2021-10-12 OneTrust, LLC Privacy management systems and methods
US11625502B2 (en) 2016-06-10 2023-04-11 OneTrust, LLC Data processing systems for identifying and modifying processes that are subject to data subject access requests
US11151233B2 (en) 2016-06-10 2021-10-19 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11157600B2 (en) 2016-06-10 2021-10-26 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11609939B2 (en) 2016-06-10 2023-03-21 OneTrust, LLC Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software
US11182501B2 (en) 2016-06-10 2021-11-23 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US11188862B2 (en) 2016-06-10 2021-11-30 OneTrust, LLC Privacy management systems and methods
US11188615B2 (en) 2016-06-10 2021-11-30 OneTrust, LLC Data processing consent capture systems and related methods
US11195134B2 (en) 2016-06-10 2021-12-07 OneTrust, LLC Privacy management systems and methods
US11200341B2 (en) 2016-06-10 2021-12-14 OneTrust, LLC Consent receipt management systems and related methods
US11210420B2 (en) 2016-06-10 2021-12-28 OneTrust, LLC Data subject access request processing systems and related methods
US11222142B2 (en) 2016-06-10 2022-01-11 OneTrust, LLC Data processing systems for validating authorization for personal data collection, storage, and processing
US11222309B2 (en) 2016-06-10 2022-01-11 OneTrust, LLC Data processing systems for generating and populating a data inventory
US11222139B2 (en) 2016-06-10 2022-01-11 OneTrust, LLC Data processing systems and methods for automatic discovery and assessment of mobile software development kits
US11227247B2 (en) 2016-06-10 2022-01-18 OneTrust, LLC Data processing systems and methods for bundled privacy policies
US11228620B2 (en) 2016-06-10 2022-01-18 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US10158676B2 (en) 2016-06-10 2018-12-18 OneTrust, LLC Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance
US11240273B2 (en) 2016-06-10 2022-02-01 OneTrust, LLC Data processing and scanning systems for generating and populating a data inventory
US11238390B2 (en) 2016-06-10 2022-02-01 OneTrust, LLC Privacy management systems and methods
US11244071B2 (en) 2016-06-10 2022-02-08 OneTrust, LLC Data processing systems for use in automatically generating, populating, and submitting data subject access requests
US11244072B2 (en) 2016-06-10 2022-02-08 OneTrust, LLC Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques
US11586762B2 (en) 2016-06-10 2023-02-21 OneTrust, LLC Data processing systems and methods for auditing data request compliance
US11256777B2 (en) 2016-06-10 2022-02-22 OneTrust, LLC Data processing user interface monitoring systems and related methods
US11277448B2 (en) 2016-06-10 2022-03-15 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11295316B2 (en) 2016-06-10 2022-04-05 OneTrust, LLC Data processing systems for identity validation for consumer rights requests and related methods
US11294939B2 (en) 2016-06-10 2022-04-05 OneTrust, LLC Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software
US11301796B2 (en) 2016-06-10 2022-04-12 OneTrust, LLC Data processing systems and methods for customizing privacy training
US11301589B2 (en) 2016-06-10 2022-04-12 OneTrust, LLC Consent receipt management systems and related methods
US11308435B2 (en) 2016-06-10 2022-04-19 OneTrust, LLC Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques
US11328092B2 (en) 2016-06-10 2022-05-10 OneTrust, LLC Data processing systems for processing and managing data subject access in a distributed environment
US11328240B2 (en) 2016-06-10 2022-05-10 OneTrust, LLC Data processing systems for assessing readiness for responding to privacy-related incidents
US11334682B2 (en) 2016-06-10 2022-05-17 OneTrust, LLC Data subject access request processing systems and related methods
US11334681B2 (en) 2016-06-10 2022-05-17 OneTrust, LLC Application privacy scanning systems and related meihods
US11336697B2 (en) 2016-06-10 2022-05-17 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11341447B2 (en) 2016-06-10 2022-05-24 OneTrust, LLC Privacy management systems and methods
US11343284B2 (en) 2016-06-10 2022-05-24 OneTrust, LLC Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance
US11347889B2 (en) 2016-06-10 2022-05-31 OneTrust, LLC Data processing systems for generating and populating a data inventory
US11354435B2 (en) 2016-06-10 2022-06-07 OneTrust, LLC Data processing systems for data testing to confirm data deletion and related methods
US11354434B2 (en) 2016-06-10 2022-06-07 OneTrust, LLC Data processing systems for verification of consent and notice processing and related methods
US11361057B2 (en) 2016-06-10 2022-06-14 OneTrust, LLC Consent receipt management systems and related methods
US11366786B2 (en) 2016-06-10 2022-06-21 OneTrust, LLC Data processing systems for processing data subject access requests
US11366909B2 (en) 2016-06-10 2022-06-21 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11586700B2 (en) 2016-06-10 2023-02-21 OneTrust, LLC Data processing systems and methods for automatically blocking the use of tracking tools
US11392720B2 (en) 2016-06-10 2022-07-19 OneTrust, LLC Data processing systems for verification of consent and notice processing and related methods
US11562097B2 (en) 2016-06-10 2023-01-24 OneTrust, LLC Data processing systems for central consent repository and related methods
US11403377B2 (en) 2016-06-10 2022-08-02 OneTrust, LLC Privacy management systems and methods
US11409908B2 (en) 2016-06-10 2022-08-09 OneTrust, LLC Data processing systems and methods for populating and maintaining a centralized database of personal data
US11418516B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Consent conversion optimization systems and related methods
US11416636B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing consent management systems and related methods
US11416590B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11416634B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Consent receipt management systems and related methods
US11418492B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing systems and methods for using a data model to select a target data asset in a data migration
US11416798B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing systems and methods for providing training in a vendor procurement process
US11416589B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11416576B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing consent capture systems and related methods
US11416109B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Automated data processing systems and methods for automatically processing data subject access requests using a chatbot
US11556672B2 (en) 2016-06-10 2023-01-17 OneTrust, LLC Data processing systems for verification of consent and notice processing and related methods
US11438386B2 (en) 2016-06-10 2022-09-06 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11558429B2 (en) 2016-06-10 2023-01-17 OneTrust, LLC Data processing and scanning systems for generating and populating a data inventory
US11550897B2 (en) 2016-06-10 2023-01-10 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11449633B2 (en) 2016-06-10 2022-09-20 OneTrust, LLC Data processing systems and methods for automatic discovery and assessment of mobile software development kits
US11461500B2 (en) 2016-06-10 2022-10-04 OneTrust, LLC Data processing systems for cookie compliance testing with website scanning and related methods
US11461722B2 (en) 2016-06-10 2022-10-04 OneTrust, LLC Questionnaire response automation for compliance management
US11468386B2 (en) 2016-06-10 2022-10-11 OneTrust, LLC Data processing systems and methods for bundled privacy policies
US11468196B2 (en) 2016-06-10 2022-10-11 OneTrust, LLC Data processing systems for validating authorization for personal data collection, storage, and processing
US11475136B2 (en) 2016-06-10 2022-10-18 OneTrust, LLC Data processing systems for data transfer risk identification and related methods
US11551174B2 (en) 2016-06-10 2023-01-10 OneTrust, LLC Privacy management systems and methods
US11481710B2 (en) 2016-06-10 2022-10-25 OneTrust, LLC Privacy management systems and methods
US11488085B2 (en) 2016-06-10 2022-11-01 OneTrust, LLC Questionnaire response automation for compliance management
US11544405B2 (en) 2016-06-10 2023-01-03 OneTrust, LLC Data processing systems for verification of consent and notice processing and related methods
US11520928B2 (en) 2016-06-10 2022-12-06 OneTrust, LLC Data processing systems for generating personal data receipts and related methods
US11544667B2 (en) 2016-06-10 2023-01-03 OneTrust, LLC Data processing systems for generating and populating a data inventory
US10419477B2 (en) * 2016-11-16 2019-09-17 Zscaler, Inc. Systems and methods for blocking targeted attacks using domain squatting
CN107330109A (en) * 2016-12-30 2017-11-07 徐庆 A kind of trade mark inquiry result degree of approximation is evaluated and sort method, device
US20180336285A1 (en) * 2017-05-20 2018-11-22 C T Corporation System Automatically Generating and Evaluating Candidate Terms for Trademark Clearance
US10942973B2 (en) * 2017-05-20 2021-03-09 Corsearch, Inc. Automatically generating and evaluating candidate terms for trademark clearance
WO2018217555A1 (en) * 2017-05-20 2018-11-29 Corsearch, Inc. Automatically generating and evaluating candidate terms for trademark clearance
US11373007B2 (en) 2017-06-16 2022-06-28 OneTrust, LLC Data processing systems for identifying whether cookies contain personally identifying information
US11663359B2 (en) 2017-06-16 2023-05-30 OneTrust, LLC Data processing systems for identifying whether cookies contain personally identifying information
WO2019028616A1 (en) * 2017-08-07 2019-02-14 深圳益强信息科技有限公司 Trademark application system based on big data and artificial intelligence
US20190130508A1 (en) * 2017-10-27 2019-05-02 Facebook, Inc. Searching for trademark violations in content items distributed by an online system
US11004164B2 (en) * 2017-10-27 2021-05-11 Facebook, Inc. Searching for trademark violations in content items distributed by an online system
US10104103B1 (en) * 2018-01-19 2018-10-16 OneTrust, LLC Data processing systems for tracking reputational risk via scanning and registry lookup
CN109472723A (en) * 2018-08-30 2019-03-15 广州企图腾科技有限公司 A kind of trade mark method for early warning and device based on structural analysis
US11593523B2 (en) 2018-09-07 2023-02-28 OneTrust, LLC Data processing systems for orphaned data identification and deletion and related methods
US11544409B2 (en) 2018-09-07 2023-01-03 OneTrust, LLC Data processing systems and methods for automatically protecting sensitive data within privacy management systems
US11157654B2 (en) 2018-09-07 2021-10-26 OneTrust, LLC Data processing systems for orphaned data identification and deletion and related methods
US10803202B2 (en) 2018-09-07 2020-10-13 OneTrust, LLC Data processing systems for orphaned data identification and deletion and related methods
US11144675B2 (en) 2018-09-07 2021-10-12 OneTrust, LLC Data processing systems and methods for automatically protecting sensitive data within privacy management systems
US10963591B2 (en) 2018-09-07 2021-03-30 OneTrust, LLC Data processing systems for orphaned data identification and deletion and related methods
US11947708B2 (en) 2018-09-07 2024-04-02 OneTrust, LLC Data processing systems and methods for automatically protecting sensitive data within privacy management systems
US10846571B2 (en) 2018-09-17 2020-11-24 Cognizant Technology Solutions India Pvt. Ltd System and method for recognizing logos
CN110599373A (en) * 2019-08-30 2019-12-20 北京金堤科技有限公司 Trademark data generation method and device
US11797528B2 (en) 2020-07-08 2023-10-24 OneTrust, LLC Systems and methods for targeted data discovery
CN111813976A (en) * 2020-07-16 2020-10-23 为创生(深圳)科技有限公司 Method and device for customizing graphic trademark and storage medium
US11444976B2 (en) 2020-07-28 2022-09-13 OneTrust, LLC Systems and methods for automatically blocking the use of tracking tools
US11475165B2 (en) 2020-08-06 2022-10-18 OneTrust, LLC Data processing systems and methods for automatically redacting unstructured data from a data subject access request
US11704440B2 (en) 2020-09-15 2023-07-18 OneTrust, LLC Data processing systems and methods for preventing execution of an action documenting a consent rejection
US11436373B2 (en) 2020-09-15 2022-09-06 OneTrust, LLC Data processing systems and methods for detecting tools for the automatic blocking of consent requests
US11526624B2 (en) 2020-09-21 2022-12-13 OneTrust, LLC Data processing systems and methods for automatically detecting target data transfers and target data processing
US11397819B2 (en) 2020-11-06 2022-07-26 OneTrust, LLC Systems and methods for identifying data processing activities based on data discovery results
US11615192B2 (en) 2020-11-06 2023-03-28 OneTrust, LLC Systems and methods for identifying data processing activities based on data discovery results
US11687528B2 (en) 2021-01-25 2023-06-27 OneTrust, LLC Systems and methods for discovery, classification, and indexing of data in a native computing system
US11442906B2 (en) 2021-02-04 2022-09-13 OneTrust, LLC Managing custom attributes for domain objects defined within microservices
US11494515B2 (en) 2021-02-08 2022-11-08 OneTrust, LLC Data processing systems and methods for anonymizing data samples in classification analysis
US11601464B2 (en) 2021-02-10 2023-03-07 OneTrust, LLC Systems and methods for mitigating risks of third-party computing system functionality integration into a first-party computing system
US11775348B2 (en) 2021-02-17 2023-10-03 OneTrust, LLC Managing custom workflows for domain objects defined within microservices
US11546661B2 (en) 2021-02-18 2023-01-03 OneTrust, LLC Selective redaction of media content
US11533315B2 (en) 2021-03-08 2022-12-20 OneTrust, LLC Data transfer discovery and analysis systems and related methods
US11562078B2 (en) 2021-04-16 2023-01-24 OneTrust, LLC Assessing and managing computational risk involved with integrating third party computing functionality within a computing system
US11816224B2 (en) 2021-04-16 2023-11-14 OneTrust, LLC Assessing and managing computational risk involved with integrating third party computing functionality within a computing system
US11620142B1 (en) 2022-06-03 2023-04-04 OneTrust, LLC Generating and customizing user interfaces for demonstrating functions of interactive user environments

Also Published As

Publication number Publication date
US8667609B2 (en) 2014-03-04
US20130275427A1 (en) 2013-10-17
US20140372316A1 (en) 2014-12-18
US20130254124A1 (en) 2013-09-26

Similar Documents

Publication Publication Date Title
US8667609B2 (en) System to inform about trademarks similar to provided input
Richtig et al. Problems and challenges of predatory journals
JP6491638B2 (en) Computerized way
US20210248624A1 (en) System, Device, and Method of Protecting Brand Names
US10686609B2 (en) Promoting learned discourse in online media with consideration of sources and provenance
US7043489B1 (en) Litigation-related document repository
US20100082652A1 (en) Method and system for managing user interaction
Halvorson et al. From. academy to. zone: An analysis of the new tld land rush
US20150215190A1 (en) Future Messaging System
Alrawadieh Publishing in predatory tourism and hospitality journals: Mapping the academic market and identifying response strategies
da Silva et al. Cabells' Predatory Reports criteria: Assessment and proposed revisions
Young et al. Evaluating the credibility of English web sources as a foreign‐language searcher
US9846782B2 (en) Validating user control over contact information in a domain name registration database
Wang et al. Digital object identifier and its use in core Chinese academic journals: A Chinese perspective
Spencer Much Ado About Nothing: ICANN's New gTLDs
Giglia Open access in the biomedical field: a unique opportunity for researchers (and research itself)
Lipinski et al. Look before You License: The Use of Public Sharing Websites in Building Co-Created Community Repositories
Sale The key things to know
Lincoln Authenticity criteria
Karimipour et al. The Altmetric era in eating disorder research: Assessing the association between Altmetric scores and citation scores for articles in the International Journal of Eating Disorders
Horaichuk Problematic Aspects of Legal Regulation of Domain Name Disputes
Kumar et al. SPAM E-MAIL DETECTION WITH PROABABLISTIC DATA STRUCTURE USING JAVA
Halvorson Registration Intent in the Domain Name Market
Nawi et al. Examining Influencer Marketing Practices and Disclosure in Malaysia
Hosseini et al. A Bilingual Longitudinal Analysis of Privacy Policies Measuring the Impacts of the GDPR and the CCPA/CPRA

Legal Events

Date Code Title Description
AS Assignment

Owner name: SKY CASTLE GLOBAL LIMITED, VIRGIN ISLANDS, BRITISH

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:TAN, EDWIN;ST. JOHN, JR., MICHAEL E.;SIGNING DATES FROM 20120119 TO 20120122;REEL/FRAME:027667/0848

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION