Brand Protection |
Sponsored by |
In CSC's recent insight paper, we address the trend that many business leaders today don't realize the extent to which their modern enterprise -- and its millions of digital assets -- rely on. It's a vast domain ecosystem that needs to be protected from online threats. Often, to better understand this need for domain security, we need to understand how critical and interconnected domains are within a business.
As with any high-stakes event, elections have become a prime target for cybercriminals seeking to exploit public trust through impersonation, misinformation, and scams. CSC's comprehensive research about the 2024 U.S. Election reveals the alarming role of dormant domains, which have the potential to be exploited for launching cyber attacks against political campaigns, organizations, and constituents.
In the final three articles in my series looking at algorithms for measuring the similarity of marks, I extend the ideas to provide a more sophisticated and adaptable framework. Article 4 introduces a similarity score based on color distance in RGB space, offering a quantitative approach to trademark similarity. Article 5 refines word mark similarity by using the International Phonetic Alphabet to improve phonetic analysis. The final article presents a method for sorting colors by dominant shade, aiding in trademark review and potential guidelines for color mark protection.
On October 10, all ISPs in the United States were supposed to have implemented and posted broadband labels. The labels were required as part of the Infrastructure Investment and Jobs Act. Large ISPs had to post labels six months ago, and now the requirement is for all ISPs. I looked at the ISPs in a few counties I'm very familiar with, and I found a few ISPs in each county that have not posted labels that I can find on their website.
Expanding on a framework for quantifying word mark similarity by examining algorithms and proposing enhancements. This article assesses consistency with UK trademark case decisions and a search tool, explores subsequence analysis for similarity, and suggests using IPA phonetics to measure aural likeness. The objective framework could improve consistency in trademark assessments, despite the inherent subjectivity of legal tests.
In today's interconnected world, your business's online identity is increasingly more vulnerable than ever. With the rapid advancement of AI and 6G technologies, cyber threats are evolving at an alarming rate, making it critical to protect your brand's digital presence. How can businesses proactively safeguard their online identity in this changing landscape?
In my recent article on mark similarity measurement, I discussed a possible framework for protecting colour marks. The framework involves the specification of each colour according to its RGB (red-green-blue) specification (in which each component is expressed as an integer value between 0 and 255), with the suggestion that the protection afforded by a colour trademark could incorporate not only this exact colour, but also all similar colours around it up to a certain 'distance'...
Central to many intellectual property disputes is an assessment of the degree of similarity of two contested marks. A determination of similarity is fundamentally a subjective decision involving a range of relevant tests, which include consideration of the perception of the relevant consumer and recognition of the existence of degrees of similarity within a spectrum (from high to low).
In the fourth in this series of articles exploring how the application of appropriate tools, algorithms and analysis techniques can identify the existence of attractive, unregistered brandable domain names, I consider the prevalence of a few additional styles of name.
The previous two articles in this series have outlined techniques for 'mining' brandable domain names -- that is, domain names of potential interest to entities looking to launch a new brand name and associated website -- from the enormous dataset of unregistered names (determined via zone file analysis). The key element of the identification process is the implementation of filtering techniques to identify...