Feeds

We're not making this up: Apple trademarks the SHOP

Rectangular tables protected, no word on rounded corners

Top 5 reasons to deploy VMware with Tegile

After trademarking the leaf and patenting the rectangle, Apple has outdone itself by trademarking the shop.

The US Patent and Trademark office last week granted Apple's application to trademark a retail store featuring computers. It is the "distinctive design and layout" that Apple now holds the unique design rights to, thanks to US Trademark 85036990. The application to exclusively own this particular store arrangement - specifically "rectangular tables arranged in a line" - was filed in December 2010 and granted on 22 January 2013.

A line drawing and a photo detailing the "distinctive layout" are included in the submitted paperwork:

Image from Apple's retail store trademark application, credit USPTO

A drawing Apple used to illustrate its retail store trademark

Apple hasn't trademarked having a floor, walls or lights, but details of the storefront, the shelves, the arrangement of the tables and the position of the products are now the iPhone maker's intellectual property. Apple described just what features are included in the mark:

Rectangular tables arranged in a line in the middle of the store parallel to the walls and extending from the storefront to the back of the store.

Shelves and stools set beneath a table are also included:

There is multi-tiered shelving along the side walls, and a oblong table with stools located at the back of the store, set below video screens flush mounted on the back wall.

The placement of various items is considered part of the overall mark too.

The emergence of copycat Apple Stores in China likely prompted Apple to file for protection, and the US trademark states that Apple filed an international application for the trademark in 19 other countries including China, Russia, Turkey and several Euro countries. ®

Intelligent flash storage arrays

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
'Internet Freedom Panel' to keep web overlord ICANN out of Russian hands – new proposal
Come back with our internet! cries Republican drawing up bill
What a Mesa: Apple vows to re-use titsup GT sapphire glass plant
Commits to American manufacturing ... of secret tech
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.