TECHNOLOGY BEHIND THE TECHNOLOGY

Neustar, Inc.

Application Filed: 2016-08-05
Trademark Application Details
Trademark Logo TECHNOLOGY BEHIND THE TECHNOLOGY
602
Dead/Abandoned
ABANDONED-FAILURE TO RESPOND OR LATE RESPONSE
Research OneLook Acronym Finder
Serial Number87129522
Mark Drawing Code4000: Illustration: Drawing with word(s)/letter(s)/number(s) in Block form
Attorney NamePeter J. Riebling
Attorney Docket Number330952-00288
Law Office AssignedL40
Employee NameEISNACH, MICHAEL PATRI

Timeline

2016-08-05Application Filed
2017-05-10Abandon
2017-06-07Location: TMEG LAW OFFICE 104 - EXAMINING ATTORNEY ASSIGNED
2017-06-07Status: Dead/Abandoned
2018-07-08Transaction Date

Trademark Applicants & Owners

Owner: Neustar, Inc.
Address21575 Ridgetop Circle Sterling DE 20166
Legal Entity TypeCorporation
Legal Entity StateDE

Documents

Click the blue "Refresh" button to load certificates, specimines, application, and other documents.

Attorney of Record

PETER J. RIEBLING
Riebling IP, PLLC
Suite 1025
1717 Pennsylvania Ave, NW
WASHINGTON DC 20006-3951

Good, Services, and Codes

International Codes:9
U.S. Codes:021,023,026,036,038
International Codes:35
U.S. Codes:100,101,102
International Codes:38
U.S. Codes:100,101,104
International Codes:39
U.S. Codes:100,105
International Codes:42
U.S. Codes:100,101
International Codes:45
U.S. Codes:100,101
Type CodeType
GS0091Computer hardware devices for analyzing, monitoring, intercepting, capturing, logging, testing, troubleshooting, securing, and protecting computer networks, network systems, network data, network information, network performance, data packets, and internet protocol traffic, and for generating related reports and event notification alerts; computer hardware devices for on-line scanning, testing, intercepting, capturing, quarantining and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer networks, network systems, network data, network information, network performance, data packets, and internet protocol traffic, and for providing related reports and event notification alerts ; computer software for mobile telephones and handheld electronic devices, namely, computer software which enables the transmission and delivery of data over networks for use in connection with voice, messaging, instant messaging, status confirmation, chat, location, entertainment, video, gaming, file sharing, content distribution and information delivery services; computer software for interconnecting hardware and software platforms, namely, computer software which enables the transmission and delivery of data over networks for use in connection with voice, messaging, instant messaging, status confirmation, chat, location, entertainment, video, gaming, file sharing, content distribution and information delivery services; computer software for use in inventorying of telephone numbers; computer software for use in managing network infrastructure across multiple software platforms, also referred to as local area networks (LAN), wide area networks (WAM), global computer information network connections. computer software for use in telecommunications, namely, to deliver basic customer information from a carrier to a regional network for facilitating number portability, to route customer data from a regional network to carriers within the network, and to verify the customer data for facilitating number portability; computer software for use in the transfer of information and data electronically between remote and local organizations and systems, namely, for use by individuals associated with the establishment and maintenance of local area networks (LAN), wide area networks (WAN), global computer information network connections, and global computer information network sites applications; computer software for use in connecting to the internet which provides a wide range of functionality, including providing connectivity in the shortest time possible, determining the most direct route of connectivity, routing around inactive machines, and routing around inactive lines; computer software for mitigating distributed denial of service ("DDOS") attacks and for cleaning and filtering of malicious internet traffic

Trademark Filing History

DescriptionDateEvent Coding
NEW APPLICATION ENTERED IN TRAM2016-08-091 NWAP I:Incoming Correspondence
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM2016-08-102 NWOS I:Incoming Correspondence
ASSIGNED TO EXAMINER2016-11-023 DOCK D:Assigned to Examiner
NON-FINAL ACTION WRITTEN2016-11-094 CNRT R:Renewal
NON-FINAL ACTION E-MAILED2016-11-095 GNRT F:First Action
NOTIFICATION OF NON-FINAL ACTION E-MAILED2016-11-096 GNRN O:Outgoing Correspondence
TEAS CHANGE OF CORRESPONDENCE RECEIVED2016-11-157 TCCA I:Incoming Correspondence
ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE2017-06-078 ABN2 O:Outgoing Correspondence
ABANDONMENT NOTICE MAILED - FAILURE TO RESPOND2017-06-079 MAB2 O:Outgoing Correspondence

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed