審決


不服2022-650033

2200 University Avenue East Waterloo ON N2K 0A7(CA)
 請求人
BlackBerry Limited
  
東京都千代田区大手町1丁目1番2号 大手門タワー 西村あさひ法律事務所
 代理人弁護士
岩瀬 ひとみ
  
東京都千代田区大手町1丁目1番2号 大手門タワー 西村あさひ法律事務所
 代理人弁護士
大向 尚子
  
東京都千代田区大手町1丁目1番2号 大手門タワー 西村あさひ法律事務所
 代理人弁理士
船橋 理恵
  


 国際登録第1534639号に係る国際商標登録出願の拒絶査定に対する審判事件について、次のとおり審決する。



 結 論
  
 原査定を取り消す。
 本願商標は、登録すべきものとする。



 理 由
  
1 本願商標及び手続の経緯
 本願商標は、「BLACKBERRY」の文字を横書きしてなり、第9類、第38類及び第42類に属する日本国を指定する国際登録において指定された商品及び役務を指定商品及び指定役務として、2019年(令和元年)7月23日にアメリカ合衆国においてした商標登録出願に基づきパリ条約第4条による優先権を主張して、2020年(令和2年)1月23日に国際商標登録出願されたものである。
 原審では、2021年(令和3年)6月28日付けで拒絶理由の通知、2022年(令和4年)1月20日付けで拒絶査定されたもので、これに対して同年5月2日に本件拒絶査定不服審判が請求され、同年6月30日付けで国際登録簿に記録された限定の通報があった。
 本願の指定商品及び指定役務は、上記限定の結果、別掲のとおりの商品及び役務になった。
 
2 原査定の拒絶の理由
 本願の指定商品及び指定役務は、第9類、第38類及び第42類の商品及び役務に、内容及び範囲が不明確な商品及び役務を含むものである。
 したがって、本願は、商標法第6条第1項の要件を具備しない。
 
3 当審の判断
 本願は、その指定商品及び指定役務について、別掲のとおりの商品及び役務に限定(補正)された結果、商品及び役務の内容及び範囲が明確なものになったと認められる。
 その結果、本願の指定商品及び指定役務は、商標法第6条第1項の規定の要件を具備するものとなったから、本願が同項の要件を具備しないとして本願を拒絶した原査定の拒絶の理由は解消した。
 その他、本願について拒絶の理由を発見しない。
 よって、結論のとおり審決する。
 


        令和 5年 5月22日

     審判長  特許庁審判官 矢澤 一幸
          特許庁審判官 小田 昌子
          特許庁審判官 阿曾 裕樹

 
別掲(本願の指定商品及び指定役務)
第9類「Downloadable computer software for cybersecurity, detecting and mitigating network attacks using artificial intelligence, machine learning and/or deep learning; downloadable computer software for continuous monitoring, identifying, verifying, analyzing, comparing, classifying, sorting and scoring of collected or acquired data from network traffic, network communication, network flow data, and network intercommunication using artificial intelligence, machine learning and/or deep learning; downloadable computer software for providing initiation, distribution, delivery and response tracking of emergency notifications to users via personal communication devices and public mass communication devices; downloadable computer software for supporting exchange of information and collaboration processes amongst organizations and people during emergency and crisis situations; downloadable computer software for the purposes of data collection, monitoring, and mass notification services for managing emergency, and crisis and business critical situations and improving crisis communications capability; downloadable computer software for the secure transmission of mass notification emergency information via audio, video and electronic communications networks and devices, including social networks; downloadable computer software for managing and analyzing data feeds and data inputs in the field of crisis reporting, communication and management, and for sending notifications through multiple IP network channels and delivery services; downloadable computer software for loading data from personnel directories, and managing users for purpose of crisis communication; downloadable computer software for managing organization directories and connections across organizations for the purpose of connecting them and facilitating collaboration before, during and after crisis situations; downloadable computer software for locating personnel for security and safety purposes using a global positioning system, user self-reporting, and other locating means; downloadable computer software for electronically monitoring, detecting and reporting on alarms, alerts, emergencies, hazards, security threats, and dangerous weather; downloadable computer software for notifying individuals and organizations of a changed status or condition of a sensing device or input feed via network based message alerts; downloadable software in the nature of a mobile application for sending, receiving, confirming and responding to alerts, messages, and notifications via wireless communications networks or the Internet; downloadable computer software in the nature of desktop software applications for providing desktop notifications that capture the user's attention with audio-visual signals and allow users to confirm, respond to notifications or receive additional information related to notifications; downloadable computer software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, enterprise of things (EOT) and internet of things (IoT) enabled devices; computer software for managing computer network endpoint security and predicting and monitoring security threats to computer networks; downloadable computer operating system programs; downloadable computer software for performing data security functions in the field of cryptographic network security; downloadable computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications over the Internet and other computer networks; downloadable computer software, namely, encryption software to enable secure transmission of digital information; downloadable computer software to integrate managed security, namely, virtual private network (VPN), public key infrastructure (PKI), digital certificate issuance, verification and management; cloud computing software; downloadable Internet of things (IOT) management software platform consisting of downloadable cloud-based software, mobile and desktop applications, and premise-based gateway agent software; downloadable computer software for use in managing device-to-device, device-to-cloud and cloud-to-device communications; downloadable computer software for machine-to-machine (M2M) communication, remote data collection and process control; downloadable computer software for asset tracking; downloadable computer software to track and manage IP-enabled machines and other connected devices; downloadable software Development Kits (SDKs) [computer hardware and software for software development, as kits], Application Programming Interface (API) software, and Enterprise Application Integration (EAI) software for creating software and applications related to machine to machine (M2M) devices, network and Internet connected devices, and IOT device; downloadable computer software for sending, receiving and analyzing data from network and Internet-connected devices; downloadable computer software, namely, software and middleware used to allow software applications to interface with mobile and remote devices and to allow connectivity, memory storage, and device management, all via a computer network; downloadable computer software and hardware for fleet asset tracking in the transportation industry; downloadable computer software and hardware for tracking and managing IP-enabled machines; downloadable computer software and hardware to collect, filter and process electronic data, namely, audio, voice, video, images, text, electronic mail and messaging, documents, and vehicle and driver telematics and analytics concerning driver behavior, vehicle diagnostics, maintenance, performance, location, and downtime; downloadable computer software systems for use in dispatch, video monitoring, driver compliance, driver performance, driver scorecards, document management, trailer tracking, asset tracking, vehicle tracking, telematics, fuel economy tracking, driver workflow, integrations with third party software, vehicle utilization, temperature tracking, vehicle inspection reports; mobile phones, smart phones, tablet computers and wireless communication devices for voice, data, or image transmission; accessories for mobile phones, smart phones, tablet computers and wireless communication devices, namely, headsets and earphones, cell phone battery chargers; battery chargers, mounts, cradles and holders for hands-free phone use, battery chargers and connection devices for use in function enhancement of mobile telephones, cell phone and tablet computer protective cases, protective covers and cases for handheld electronic devices, cell phone holsters, and speakers; downloadable computer software for mobile phones, portable media players, and handheld computers, namely, software for sending digital photos, videos, images, and text to others via the global computer network; downloadable computer software in the fields of Mobile Device Management (MDM), Mobile Applications Management (MAM), Mobile Security Management (MSM), Mobile Information Management (MIM), and mobile Identity and Access Management (IAM); downloadable computer software to allow network administrators to monitor, manage, and quarantine devices that are granted access to a network.」
第38類「Providing secure mass notification services through all communication devices, telephones, tablets, smartphones, email, text messaging, and instant messaging; providing electronic transmission of data and digital messaging via mobile handheld devices and via wired and wireless communication devices before, during and after critical situations; telecommunications services that enable users and organizations to electronically transmit messages, text, multimedia content, videos, audio, animation and images via a global computer network before, during and after critical situations; providing multiple user access to interactive databases through web sites on a global computer network to manage, administrate and use crisis communication capabilities; providing electronic transmission of converged data, address location information, text, pictures, and streaming media, all for use in crisis communications; providing telecommunication connectivity services for transfer of messages, audio, visual, and data information for crisis communications; secure electronic messaging services, namely, providing services to access, process, and transmit critical, time-sensitive notifications to individuals and organizations; telecommunication services, namely, data transmission and reception services via telecommunications networks; electronic exchange of voice, data, audio, video, text and graphics accessible via computer and telecommunications networks; instant messaging services: electronic transmission of secure message alerts via the Internet, global computer and telecommunications networks.」
第42類「Providing temporary use of non-downloadable computer software for measuring, assessing, identifying, detecting, analyzing, preventing, and responding to cybersecurity threats, attacks, risks, and vulnerabilities; providing temporary use of non-downloadable software for artificial intelligence, analytics-based machine learning, and deep learning software, all for the purpose of measuring, detecting, analyzing, preventing and responding to cybersecurity attacks; design and development of crisis communication systems comprised of computer hardware and software; engineering and systems analysis in the field of crisis communication systems; computer services, namely, design, development and maintenance of computer software, and server hosting for online system management services that allow users to remotely view, monitor, program. operate and control crisis communication systems; research in the field of crisis communication technology; testing of crisis communication systems comprised of computer software and hardware; cloud computing featuring software for providing crisis communication through multiple IP network channels and delivery services; computer services, namely, integration of private and public cloud computing environments for crisis communication; computer services, namely, cloud hosting provider services for crisis communication; computer services, namely, installation of computer software for private cloud computing for crisis communication; consulting services in the field of cloud computing for crisis communication; computer services, namely, creating web sites for an online community for registered users to participate in discussions, get feedback from their peers, form virtual communities, invite other organizations to the community and engage collaboration in the field of security and crisis communication and management; providing temporary use of online non-downloadable software featuring software for use in sending, receiving, confirming and responding to alerts, messages, and notifications in the field of crisis communication and management; providing temporary use of online non downloadable software featuring software for use in sending, receiving, confirming and responding to alerts, messages, and notifications in the field of crisis communication and management; providing temporary use of online non-downloadable software, namely, hosting software for use by others for use in sending, receiving, confirming and responding to alerts, messages, and notifications in the field of crisis communication and management; providing online non-downloadable computer software for the purposes of data collection, monitoring, and mass notification services for managing emergency and crisis situations and improving crisis communications capability; providing temporary use of on-line non-downloadable computer software for endpoint security, malware analysis, vulnerability testing, penetration testing, and vulnerability assessment; providing temporary use of online non downloadable computer software for endpoint security, malware analysis, vulnerability testing, penetration testing, and vulnerability assessment; providing temporary use of online non-downloadable software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; providing temporary use of online non-downloadable software for predicting and monitoring security threats to computer networks; providing temporary use of online non-downloadable software for preventing unauthorized access to computers and computer networks; providing temporary use of online non-downloadable software for data analytics; design, development and maintenance of online computer software systems and software for operation and control of autonomous-driving vehicles; providing temporary use of online non-downloadable software for operation and control of autonomous-driving vehicles; providing temporary use of non-downloadable software applications and software development tools and platform as a services (PAAS) featuring computer software platforms that enable software developers to program and users to build and configure software applications that work in conjunction with such non-downloadable software applications and platforms to transfer, share, format, manipulate and integrate data, information and such developer software applications working in conjunction with and between such non-downloadable software applications and platforms and third party services; providing temporary use of online non-downloadable software featuring computer software in the field of electronic file security to allow users to encrypt, electronically watermark, provide restricted access to, and provide secure transmission and tracking of electronic documents and other electronic and digital files; platform as a services (PAAS) featuring computer software platforms for creating, managing, and deploying cloud computing infrastructure services; design and development of on-line computer software systems, computer hardware and computer software; technical support services, namely, installation, administration, and troubleshooting of web and database applications; providing machine-to-machine (M2M) and Internet of Things (IoT) communication integration services, namely, the integration of disparate computer systems, networks, hardware and software through the application of wireless communication, artificial intelligence, machine learning and/or deep learning technology to facilitate M2M and IoT communication via web based browsers, personal digital assistants, mobile phones, embedded microprocessors, sensors and other electronic devices; providing temporary use of online non-downloadable software applications, software developer kits (SDKs) and software development tools, and platform as a service (PAAS) featuring computer development platforms that enable software developers to design, test, deploy, manage, and monitor internet of things (IoT) and machine-to-machine (m2m) devices; computer software services, namely, development, maintenance, repair, installation, and troubleshooting of computer software problems, support in the nature of diagnosing computer software problems, upgrade and updating computer software, authoring computer software, and consultation, design and customization of computer software and middleware, and provision of information thereof; computer security consultancy; technical consulting and assistance with computers and software for machine-to-machine (M2M) computer software services, namely, development, maintenance, repair, installation, and troubleshooting of computer software problems, support in the nature of diagnosing computer software problems, upgrade and updating computer software, authoring computer software, provision of computer software information, and consultation, design and customization of computer software and middleware; computer security consultancy; technical consulting and assistance with computer-based information systems and components, namely, Information technology [IT] consulting services in the fields of Mobile Device Management (MDM), Mobile Applications Management (MAM), Mobile Security Management (MSM), Mobile Information Management (MIM), mobile Identity and Access Management (IAM), datacenter architecture, public and private cloud computing solutions and cybersecurity including evaluation and implementation of internet technology and services; Software-as-a-service (SAAS) in the nature of a secure web hosting platform for allowing users and enterprise software applications to interface with remote devices and to allow connectivity, memory storage, device management, device monitoring, device tracking, and device auditing via a computer network and providing temporary use of on-line non-downloadable software related thereto; providing temporary use of online non-downloadable software featuring software for Enterprise Mobility Management (EMM), Unified Endpoint Management (UEM), Mobile Device Management (MDM), Mobile Applications Management (MAM), Mobile Security Management (MSM), Mobile Information Management (MIM), and mobile Identity and Access Management (IAM); providing temporary use of online non-downloadable software for the operation, management, security and maintenance of enterprise networks, data center management, resource management and performance optimization.」
 
 
(この書面において著作物の複製をしている場合のご注意)        特許庁は、著作権法第42条第2項第1号(裁判手続等における複製)の規定により著作物の複製をしています。取扱いにあたっては、著作権侵害とならないよう十分にご注意ください。


〔審決分類〕T18  .91 -WY (W093842)

上記はファイルに記録されている事項と相違ないことを認証する。
認証日 令和 5年 5月22日  審判書記官  村守 芙沙子