Research | OneLook Acronym Finder |
Serial Number | 87567293 |
Registration Number | 5723036 |
Mark Drawing Code | 4000: Illustration: Drawing with word(s)/letter(s)/number(s) in Block form |
Attorney Name | James F. Struthers |
Attorney Docket Number | TMKM12185 |
Law Office Assigned | L50 |
Employee Name | BUTTON, JENNIFER JO |
2017-08-14 | Application Filed |
2017-12-26 | Published for Opposition |
2018-06-05 | Status: Live/Pending |
2019-02-11 | Location: INTENT TO USE SECTION |
2019-02-11 | Transaction Date |
2019-04-09 | Trademark Registered |
Owner: | Amazon Technologies, Inc. |
Address | 410 Terry Ave N Seattle NV 98109 |
Legal Entity Type | Corporation |
Legal Entity State | NV |
Click the blue "Refresh" button to load certificates, specimines, application, and other documents.
International Codes: | 9 |
U.S. Codes: | 021,023,026,036,038 |
International Codes: | 42 |
U.S. Codes: | 100,101 |
Type Code | Type |
---|---|
GS0421 | Consultation in the field of cloud computing; research and development in the field of data security and data loss prevention; research and development in the field of software; research and development in the field of information technology; computer systems analysis; computer systems, software and hardware consulting; computer technology consulting; computer security consulting; IT consulting; data security consulting; computer network security consulting; consulting in the field of data loss prevention; software as a service (SaaS) featuring software for data processing; application service provider (ASP) services featuring software for data processing; platform as a service (PaaS) services featuring software for data processing; providing temporary use of non-downloadable software featuring software for data processing; software rental; software as a service (SaaS) featuring software for the collection, editing, organizing, modifying, transmission, storage and sharing of data and information; software as a service (SaaS) featuring software for IT security; software as a service (SaaS) featuring software for network security; software as a service (SaaS) featuring software for data protection; software as a service (SaaS) featuring software for data security; software as a service (SaaS) featuring software for data analytics; software as a service (SaaS) featuring software for preventing attacks on networks and data; software as a service (SaaS) featuring software for insider threat detection and prevention; software as a service (SaaS) featuring software for data loss prevention and remediation; software as a service (SaaS) featuring software for preventing theft of data and intellectual property; software as a service (SaaS) featuring software for tracking intellectual property across an organization's network; software as a service (SaaS) featuring software for identifying an organization's sensitive documents; software as a service (SaaS) featuring software for identifying an organization's intellectual property; software as a service (SaaS) featuring software for identifying business risk arising from data that is being exposed or shared outside the organization; software as a service (SaaS) featuring software for assessing the business importance of data and determining how said data is accessed; software as a service (SaaS) featuring software for protecting user accounts from compromise; software as a service (SaaS) featuring software for identifying which users are accessing certain documents; software as a service (SaaS) featuring software for detecting changes in groups of users; software as a service (SaaS) featuring software for detecting changes in users' behavior; software as a service (SaaS) featuring software for reading and analyzing computer event logs; software as a service (SaaS) featuring software for monitoring computer network access and activity; software as a service (SaaS) featuring software for setting data access and sharing policies; software installation, maintenance and update services; remote computer and network monitoring services |
GS0421 | Computer systems analysis; software as a service (SaaS) featuring software for data processing; application service provider (ASP) services featuring software for data processing; platform as a service (PaaS) services featuring software for data processing; providing temporary use of non-downloadable software featuring software for data processing; software rental; software as a service (SaaS) featuring software for the collection and organizing of data and information; software as a service (SaaS) featuring software for IT security; software as a service (SaaS) featuring software for network security; software as a service (SaaS) featuring software for data protection; software as a service (SaaS) featuring software for data security; software as a service (SaaS) featuring software for data analytics; software as a service (SaaS) featuring software for preventing attacks on networks and data; software as a service (SaaS) featuring software for insider threat detection and prevention; software as a service (SaaS) featuring software for data loss prevention and remediation; software as a service (SaaS) featuring software for preventing theft of data and intellectual property; software as a service (SaaS) featuring software for tracking intellectual property across an organization's network; software as a service (SaaS) featuring software for identifying an organization's sensitive documents; software as a service (SaaS) featuring software for identifying an organization's intellectual property; software as a service (SaaS) featuring software for identifying business risk arising from data that is being exposed or shared outside the organization; software as a service (SaaS) featuring software for assessing the business importance of data and determining how said data is accessed; software as a service (SaaS) featuring software for protecting user accounts from compromise; software as a service (SaaS) featuring software for identifying which users are accessing certain documents; software as a service (SaaS) featuring software for detecting changes in groups of users; software as a service (SaaS) featuring software for detecting changes in users' behavior; software as a service (SaaS) featuring software for reading and analyzing computer event logs; software as a service (SaaS) featuring software for monitoring computer network access and activity; software as a service (SaaS) featuring software for setting data access and sharing policies |
Description | Date | Event Coding |
---|---|---|
NEW APPLICATION ENTERED IN TRAM | 2017-08-17 | 1 NWAP I:Incoming Correspondence |
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM | 2017-08-18 | 2 NWOS I:Incoming Correspondence |
ASSIGNED TO EXAMINER | 2017-09-29 | 3 DOCK D:Assigned to Examiner |
NON-FINAL ACTION WRITTEN | 2017-10-13 | 4 CNRT R:Renewal |
NON-FINAL ACTION E-MAILED | 2017-10-13 | 5 GNRT F:First Action |
NOTIFICATION OF NON-FINAL ACTION E-MAILED | 2017-10-13 | 6 GNRN O:Outgoing Correspondence |
TEAS RESPONSE TO OFFICE ACTION RECEIVED | 2017-11-01 | 7 TROA I:Incoming Correspondence |
CORRESPONDENCE RECEIVED IN LAW OFFICE | 2017-11-01 | 8 CRFA I:Incoming Correspondence |
TEAS/EMAIL CORRESPONDENCE ENTERED | 2017-11-02 | 9 TEME I:Incoming Correspondence |
APPROVED FOR PUB - PRINCIPAL REGISTER | 2017-11-03 | 10 CNSA P: |
ASSIGNED TO LIE | 2017-11-15 | 11 ALIE A:Allowance for Publication |
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | 2017-12-06 | 12 NONP E:E-Mail |
PUBLISHED FOR OPPOSITION | 2017-12-26 | 13 PUBO A:Allowance for Publication |
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | 2017-12-26 | 14 NPUB E:E-Mail |
NOA E-MAILED - SOU REQUIRED FROM APPLICANT | 2018-02-20 | 15 NOAM E:E-Mail |
TEAS CHANGE OF CORRESPONDENCE RECEIVED | 2018-04-29 | 16 TCCA I:Incoming Correspondence |
TEAS EXTENSION RECEIVED | 2018-06-05 | 17 EEXT I:Incoming Correspondence |
EXTENSION 1 FILED | 2018-06-05 | 18 EXT1 S: |
EXTENSION 1 GRANTED | 2018-06-05 | 19 EX1G S: |
NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED | 2018-06-07 | 20 EXRA E:E-Mail |
TEAS STATEMENT OF USE RECEIVED | 2019-01-21 | 21 EISU I:Incoming Correspondence |
CASE ASSIGNED TO INTENT TO USE PARALEGAL | 2019-02-11 | 22 AITU A:Allowance for Publication |
USE AMENDMENT FILED | 2019-01-21 | 23 IUAF S: |
STATEMENT OF USE PROCESSING COMPLETE | 2019-02-12 | 24 SUPC I:Incoming Correspondence |
TEAS EXTENSION RECEIVED | 2019-02-18 | 25 EEXT I:Incoming Correspondence |
ALLOWED PRINCIPAL REGISTER - SOU ACCEPTED | 2019-03-05 | 26 CNPR P: |
NOTICE OF ACCEPTANCE OF STATEMENT OF USE E-MAILED | 2019-03-06 | 27 SUNA E:E-Mail |
REGISTERED-PRINCIPAL REGISTER | 2019-04-09 | 28 R.PR A:Allowance for Publication |
TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED | 2021-01-05 | 29 REAP I:Incoming Correspondence |
ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED | 2021-01-05 | 30 ARAA I:Incoming Correspondence |
TEAS CHANGE OF CORRESPONDENCE RECEIVED | 2021-01-05 | 31 TCCA I:Incoming Correspondence |
COURTESY REMINDER - SEC. 8 (6-YR) E-MAILED | 2024-04-09 | 32 REM1 E:E-Mail |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.