Research | OneLook Acronym Finder |
Serial Number | 86260484 |
Mark Drawing Code | 4000: Illustration: Drawing with word(s)/letter(s)/number(s) in Block form |
Attorney Name | David B. Dort |
Attorney Docket Number | BEET.T001.9 |
Law Office Assigned | L60 |
Employee Name | KON, ELISSA GARBER |
2014-04-23 | Application Filed |
2014-09-09 | Published for Opposition |
2014-11-04 | Location: INTENT TO USE SECTION |
2015-06-08 | Abandon |
2015-06-08 | Status: Dead/Abandoned |
2018-07-08 | Transaction Date |
Owner: | McDonald, Robert D. |
Address | 201 North Union Street Suite 101 Alexandria VA US 22314 |
Legal Entity Type | Individual |
Legal Entity State | US |
Click the blue "Refresh" button to load certificates, specimines, application, and other documents.
International Codes: | 9 |
U.S. Codes: | 021,023,026,036,038 |
Type Code | Type |
---|---|
GS0091 | Communications software for connecting secure social networks via secure connections.; Computer application software for mobile phones, namely, software for providing a secure connection to a social networking site, for correcting an errant post to social networking site, for blocking out unwanted viewers in a social network setting; for providing cryptology and key management in a social network connection; for preventing an unwanted post from becoming viral; for limiting and organizing contacts on a social network.; Computer software development tools; Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software for providing a secure connection to a social networking site, for correcting an errant post to social networking site, for blocking out unwanted viewers in a social network setting; for providing cryptology and key management in a social network connection; for preventing an unwanted post from becoming viral; for limiting and organizing contacts on a social network.; Computer software for providing a secure connection to a social networking site, for correcting an errant post to social networking site, for blocking out unwanted viewers in a social network setting; for providing cryptology and key management in a social network connection; for preventing an unwanted post from becoming viral; for limiting and organizing contacts on a social network. that may be downloaded from a global computer network; Downloadable computer software for providing a secure connection to a social networking site, for correcting an errant post to social networking site, for blocking out unwanted viewers in a social network setting; for providing cryptology and key management in a social network connection; for preventing an unwanted post from becoming viral; for limiting and organizing contacts on a social network.; Downloadable mobile applications for providing a secure connection to a social networking site, for correcting an errant post to social networking site, for blocking out unwanted viewers in a social network setting; for providing cryptology and key management in a social network connection; for preventing an unwanted post from becoming viral; for limiting and organizing contacts on a social network.; Downloadable software for providing a secure connection to a social networking site, for correcting an errant post to social networking site, for blocking out unwanted viewers in a social network setting; for providing cryptology and key management in a social network connection; for preventing an unwanted post from becoming viral; for limiting and organizing contacts on a social network.; Software for providing a secure connection to a social networking site, software for correcting an errant post to social networking site, software for blocking out unwanted viewers in a social network setting; software for providing cryptology and key management in a social network connection; software for preventing an unwanted post from becoming viral; software for limiting and organizing contacts on a social network |
Description | Date | Event Coding |
---|---|---|
NEW APPLICATION ENTERED IN TRAM | 2014-04-26 | 1 NWAP I:Incoming Correspondence |
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM | 2014-05-07 | 2 NWOS I:Incoming Correspondence |
ASSIGNED TO EXAMINER | 2014-08-05 | 3 DOCK D:Assigned to Examiner |
APPROVED FOR PUB - PRINCIPAL REGISTER | 2014-08-05 | 4 CNSA P: |
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | 2014-08-20 | 5 NONP E:E-Mail |
PUBLISHED FOR OPPOSITION | 2014-09-09 | 6 PUBO A:Allowance for Publication |
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | 2014-09-09 | 7 NPUB E:E-Mail |
NOA E-MAILED - SOU REQUIRED FROM APPLICANT | 2014-11-04 | 8 NOAM E:E-Mail |
ABANDONMENT - NO USE STATEMENT FILED | 2015-06-08 | 9 ABN6 S: |
ABANDONMENT NOTICE MAILED - NO USE STATEMENT FILED | 2015-06-08 | 10 MAB6 O:Outgoing Correspondence |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.