Mark For: CYBERTRUST™ trademark registration is intended to cover the categories of computer software used in compliance management and risk analysis in the fields of computer and network security, used in electronic security, electronic security management, electronic security applications, digital certificates, public key infrastuctures, electronic signatures, cryptography; computer encryption software for secure sales and controlled distribution of content over local area networks, wide area networks, and global computer information networks; computer operating systems; computer firmware for use in public key infrastructure, electronic security, electronic signatures, database management, and cryptography, and instruction manuals sold as a unit; security products, namely, computerhardware. [all]
Status
2022-05-13 UTC
DEAD APPLICATION Refused Dismissed or Invalidated
This trademark application was refused, dismissed, or invalidated by the Office and this application is no longer active.
3 - AN ILLUSTRATION DRAWING WHICH INCLUDES WORD(S)/ LETTER(S)/NUMBER(S)
Mark Type
TRADEMARK. SERVICE MARK
Standard Character Claim
No
Register
PRINCIPAL
Current Location
LAW OFFICE 117 - EXAMINING ATTORNEY ASSIGNED 2006-07-07
Basis
1(b)
Class Status
ACTIVE
Primary US Classes
021:
Electrical Apparatus, Machines and Supplies
023:
Cutlery, Machinery, Tools and Parts Thereof
026:
Measuring and Scientific Appliances
036:
Musical Instruments and Supplies
038:
Prints and Publications
Primary International Class
009 - Primary Class
(Electrical and scientific apparatus) Scientific, nautical, surveying, electric, photographic, cinematographic, optical, weighing, measuring, signaling, checking (supervision), lifesaving and teaching apparatus and instruments; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
Filed Use
No
Current Use
No
Intent To Use
Yes
Filed ITU
Yes
44D Filed
No
44E Current
No
66A Current
No
Current Basis
No
No Basis
No
Attorney Name
Susan Neuberger Weller
Attorney Docket Number
25782-663
Law Office Assigned
M80
Employee Name
BALDWIN, SCOTT
Timeline
2004-09-16
Application Filed
2006-06-06
Abandon
2006-07-07
Location: LAW OFFICE 117 - EXAMINING ATTORNEY ASSIGNED
2006-07-07
Status: Abandoned because the applicant failed to respond or filed a late response to an Office action. To view all documents in this fi
SUSAN NEUBERGER WELLER MINTZ, LEVIN, COHN, FERRIS GLOVSKY 12010 SUNSET HILLS RD STE 900 RESTON VA 20190-5861
Good, Services, and Codes
(ABANDONED) IC 009. US 021 023 026 036 038. G & S: COMPUTER SOFTWARE USED IN COMPLIANCE MANAGEMENT AND RISK ANALYSIS IN THE FIELDS OF COMPUTER AND NETWORK SECURITY, USED IN ELECTRON IC SECURITY, ELECTRON IC SECURITY MANAGEMENT, ELECTRON IC SECURITY APPLICATIONS, DIGITAL CERTIFICATES, PUBL IC KEY INFRASTUCTURES, ELECTRON IC SIGNATURES, CRYPTOGRAPHY; COMPUTER ENCRYPTION SOFTWARE FOR SECURE SALES AND CONTROLLED DISTRIBUTION OF CONTENT OVER LOCAL AREA NETWORKS, WIDE AREA NETWORKS, AND GLOBAL COMPUTER INFORMATION NETWORKS; COMPUTER OPERATING SYSTEMS; COMPUTER FIRMWARE FOR USE IN PUBL IC KEY INFRASTRUCTURE, ELECTRON IC SECURITY, ELECTRON IC SIGNATURES, DATABASE MANAGEMENT, AND CRYPTOGRAPHY, AND INSTRUCTION MANUALS SOLD AS A UNIT; SECURITY PRODUCTS, NAMELY, COMPUTERHARDWARE(ABANDONED) IC 042. US 100 101. G & S: COMPUTER SECURITY CONSULTATION AND TESTING SERVICES; PROVIDING INFORMATION IN THE FIELDS OF COMPUTERS AND COMPUTER NETWORKS(ABANDONED) IC 045. US 100 101. G & S: COMPUTER SECURITY SERVICES, NAMELY, THE PROVISION OF USER CERTIFICATION AUTHORITY SERVICES FOR OTHERS TO ENSURE THE SECURITY OF TRANSMITTED INFORMATION; SECURITY RISK MANAGEMENT PROGRAMS IN THE NATURE OF MONITORING COMPUTER SYSTEMS FOR SECURITY PURPOSES
International Codes:
9
U.S. Codes:
021,023,026,036,038
International Codes:
42
U.S. Codes:
100,101
International Codes:
45
U.S. Codes:
100,101
Type Code
Type
GS0091
COMPUTER SOFTWARE USED IN COMPLIANCE MANAGEMENT AND RISK ANALYSIS IN THE FIELDS OF COMPUTER AND NETWORK SECURITY, USED IN ELECTRONIC SECURITY, ELECTRONIC SECURITY MANAGEMENT, ELECTRONIC SECURITY APPLICATIONS, DIGITAL CERTIFICATES, PUBLIC KEY INFRASTUCTURES, ELECTRONIC SIGNATURES, CRYPTOGRAPHY; COMPUTER ENCRYPTION SOFTWARE FOR SECURE SALES AND CONTROLLED DISTRIBUTION OF CONTENT OVER LOCAL AREA NETWORKS, WIDE AREA NETWORKS, AND GLOBAL COMPUTER INFORMATION NETWORKS; COMPUTER OPERATING SYSTEMS; COMPUTER FIRMWARE FOR USE IN PUBLIC KEY INFRASTRUCTURE, ELECTRONIC SECURITY, ELECTRONIC SIGNATURES, DATABASE MANAGEMENT, AND CRYPTOGRAPHY, AND INSTRUCTION MANUALS SOLD AS A UNIT; SECURITY PRODUCTS, NAMELY, COMPUTERHARDWARE
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.