ICE

Ironclad Encryption Corporation

Application Filed: 2017-07-06
Trademark Application Details
Trademark Logo ICE

The mark consists of the stylized text "ICE" accompanied by a medieval helmet. The helmet is located to the left of the stylized text and provided in the color white with gray shading. To the right of the helmet is the bolded word "ICE" in blue. The stylized text and helmet are positioned on a black rectangle which serves as a carrier for the mark and is claimed as part of the mark.

Mark For: ICE® trademark registration is intended to cover the categories of identification verification services, namely, providing authentication of personal identification information; Identification verification services, namely, providing authentication of personal identification information via secure storage and transmitting such information via the Internet; Providing user authentication of electronic funds transfer, credit and debit card and electronic check transactions via a global computer network; Providing user authentication services in e-commerce transactions. [all]

>The color(s) Blue, white, black, and gray is/are claimed as a feature of the mark. The mark consists of the stylized text "ICE" accompanied by a medieval helmet. The helmet is located to the left of the stylized text and provided in the color white with gray shading. To the right of the helmet is the bolded word "ICE" in blue. The stylized text and helmet are positioned on a black rectangle which serves as a carrier for the mark and is claimed as part of the mark.

Status

2020-05-09 UTC
LIVE REGISTRATION Issued and Active
The trademark application has been registered with the Office.


Website www.ironcladencryption.com whois domain owner info
Research OneLook Acronym Finder
Serial Number87517622
Registration Number5770311
Mark Literal ElementsICE
Mark Drawing Type3 - AN ILLUSTRATION DRAWING WHICH INCLUDES WORD(S)/ LETTER(S)/NUMBER(S)
Mark TypeTRADEMARK. SERVICE MARK
Standard Character ClaimNo
RegisterPRINCIPAL
Current LocationPUBLICATION AND ISSUE SECTION 2019-05-02
Basis1(a)
Class StatusACTIVE
Primary US Classes
  • 100: Miscellaneous
  • 101: Advertising and Business
Primary International Class
  • 045 - Primary Class
  • (Personal) Personal and social services rendered by others to meet the needs of individuals; security services for the protection of property and individuals.
Filed UseNo
Current UseYes
Intent To UseNo
Filed ITUYes
44D FiledNo
44E CurrentNo
66A CurrentNo
Current BasisNo
No BasisNo
Attorney Docket NumberICE-TM-6L
Law Office AssignedN90
Employee NameMONDELL, DOUGLAS ALVAH

Timeline

2017-02-14Date of First Use
2017-02-14Date of Use In Commerce
2017-07-06Application Filed
2017-11-07Published
2017-11-07Published for Opposition
2019-03-12Status: Live/Pending
2019-04-08Location: TMO LAW OFFICE 127
2019-04-08Transaction Date
2019-05-02Location: PUBLICATION AND ISSUE SECTION
2019-06-04Status: Registered. The registration date is used to determine when post-registration maintenance documents are due.
2019-06-04Trademark Registered
2024-06-04Maintenance Early File Date
2025-06-04Maintenance On Time Date
2025-12-04Maintenance Late Fee Date

Trademark Parties (Applicants & Owners)

Party: Ironclad Encryption Corporation
Address777 Post Oak Lane, Suite 1700 Houston, TEXAS UNITED STATES 77056
Legal Entity TypeCorporation
Legal Entity StateNEVADA

Design Search Codes

26.11.21Rectangles that are completely or partially shaded
230501Helmets, armor
261121Rectangles that are completely or partially shaded

Attorney of Record

IRONCLAD ENCRYPTION CORPORATION
IRONCLAD ENCRYPTION CORPORATION
777 POST OAK LANE, SUITE 1700
HOUSTON, TX 77056

Good, Services, and Codes


IC 009. US 021 023 026 036 038. G & S: Access control and alarm monitoring systems; Biometric identification apparatus; Cards encoded with security features for identification purposes; Security devices, namely, mobile image projection device for displaying retinal images; Software for ensuring the security of electronic mail; Computer programs for the enabling of access or entrance control; Computer software and firmware for authenticating user identification, data encryption; Computer software for encryption; Computer software for authorising access to data bases; Computer software for authorising access to databases; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Downloadable middleware for authenticating user identification, data encryption; Dynamic random access memory (DRAM); Electronic access control systems for interlocking doors; Electronic coding units; Electronic encryption units; Electronic security and surveillance devices, namely, electronic security tags and labels, acoustic tags, magnetic tags; Electronic readers and controllers for controlling access to a premises; Electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication; Electronic text-messaging device for use in conjunction with personal digital assistants; Entry/exit security portal comprised of an electronic passageway equipped with biometric devices for identification verification and detection of impermissible items being carried through; External computer hard drives featuring software for data encryption; Magnetic coded card readers; Network access server hardware; Network access server operating software; USB computer security key; USB computer access control key; Wireless controllers to remotely monitor and control the function and status of other electrical, electronic, and mechanical devices or systems, namely, secure access entry devices, encrypted devices; Wireless digital electronic apparatus to secure and protect data and images on all forms of wireless equipment including mobile telecommunications equipment using an automatic synchronization process and alarm notification of the loss or theft of the wireless equipment including mobile telecommunications equipment. FIRST USE: 20170214. FIRST USE IN COMMERCE: 20170214
IC 038. US 100 101 104. G & S: Encrypted electronic transmission and delivery of recovered data; Computer transmission of information accessed via a code or a terminal; Electronic transmission of facsimile communications and data featuring encryption and decryption; Information transmission by telematic codes; Providing access to databases; Providing access to telecommunication networks; Providing private and secure real time electronic communication over a computer network; Providing user access to global computer networks; Providing virtual private network (VPN) services, namely, private and secure electronic communications over a private or public computer network; Telecommunication services, namely, providing electronic message alerts via the internet notifying individuals of a changed status or condition of a sensing device in a security system; Transmission, reception and processing of coded and emergency signals. FIRST USE: 20170214. FIRST USE IN COMMERCE: 20170214
IC 042. US 100 101. G & S: Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of computer security, data encryption; Computer security services in the nature of administering digital certificates; Computer security services in the nature of administering digital keys; Computer consultation in the field of computer security; Computer consultation in the field of computer security, data encryption; Data security consultancy; Authentication, issuance and validation of digital certificates; Computer code conversion for others; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computer security services, namely, restricting unauthorized access to secured access areas, encrypted data; Computer security services, namely, restricting unauthorized network access by users without credentials; Computer security threat analysis for protecting data; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer services, namely, encrypted data recovery services; Data encryption and decoding services; Data encryption services; Data encryption services for providing security and anonymity for electronically transmitted credit card transactions; Design and development of electronic data security systems; Design, development, and implementation of software for authenticating user identification, data encryption; Development of software for secure network operations; Electronic document and e-mail authentication services; Electronic signature verification services using technology to authenticate user identity; Installation and maintenance of data encryption software; Installation of data encryption software; Installation, maintenance and repair of data encryption software; Maintenance of computer software relating to computer security and prevention of computer risks; Maintenance of computer software used for data encryption; Providing a secure, web-based service featuring technology that enables individuals to remotely create and manage their own accounts so that whatever private content they upload now can be encrypted, then delivered to their intended recipients, at the time and in the manner requested; Providing electronic verification of on-line orders of digital content and generating electronic permission codes which then allow users to access said digital content; Updating of computer software relating to computer security and prevention of computer risks. FIRST USE: 20170214. FIRST USE IN COMMERCE: 20170214
IC 045. US 100 101. G & S: Identification verification services, namely, providing authentication of personal identification information; Identification verification services, namely, providing authentication of personal identification information via secure storage and transmitting such information via the Internet; Providing user authentication of electronic funds transfer, credit and debit card and electronic check transactions via a global computer network; Providing user authentication services in e-commerce transactions. FIRST USE: 20170214. FIRST USE IN COMMERCE: 20170214

International Codes:9
U.S. Codes:021,023,026,036,038
International Codes:38
U.S. Codes:100,101,104
International Codes:42
U.S. Codes:100,101
International Codes:45
U.S. Codes:100,101
Type CodeType
CC0000The color(s) Blue, white, black, and gray is/are claimed as a feature of the mark.
CC0000The color(s) Blue, white, black, and gray is/are claimed as a feature of the mark.

Trademark Filing History

DescriptionDateProceeding Number
REGISTERED-PRINCIPAL REGISTER2019-06-04
NOTICE OF ACCEPTANCE OF STATEMENT OF USE E-MAILED2019-05-03
ALLOWED PRINCIPAL REGISTER - SOU ACCEPTED2019-05-02
ASSIGNED TO EXAMINER2019-04-0894353
TEAS/EMAIL CORRESPONDENCE ENTERED2019-03-1288889
TEAS RESPONSE TO OFFICE ACTION RECEIVED2019-03-11
CORRESPONDENCE RECEIVED IN LAW OFFICE2019-03-1188889
SU - NON-FINAL ACTION - WRITTEN2018-09-1090329
NOTIFICATION OF NON-FINAL ACTION E-MAILED2018-09-10
NON-FINAL ACTION E-MAILED2018-09-10
STATEMENT OF USE PROCESSING COMPLETE2018-07-2665362
CASE ASSIGNED TO INTENT TO USE PARALEGAL2018-07-2665362
USE AMENDMENT FILED2018-07-0265362
TEAS STATEMENT OF USE RECEIVED2018-07-02
NOA E-MAILED - SOU REQUIRED FROM APPLICANT2018-01-02
PUBLISHED FOR OPPOSITION2017-11-07
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED2017-11-07
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED2017-10-18
APPROVED FOR PUB - PRINCIPAL REGISTER2017-10-03
ASSIGNED TO EXAMINER2017-09-2590329
NOTICE OF DESIGN SEARCH CODE E-MAILED2017-07-14
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM2017-07-13
NEW APPLICATION ENTERED IN TRAM2017-07-10

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed