Mark For: MITRE ATT&CK® trademark registration is intended to cover the categories of
Research | OneLook Acronym Finder |
Serial Number | 87645105 |
Registration Number | 5938593 |
Mark Literal Elements | MITRE ATT&CK |
Mark Drawing Type | 4 - STANDARD CHARACTER MARK |
Mark Type | SERVICE MARK |
Register | PRINCIPAL |
Current Location | PUBLICATION AND ISSUE SECTION 2019-11-12 |
Basis | 1(a) |
Class Status | ACTIVE |
Primary US Classes |
|
Primary International Class |
|
Filed Use | No |
Current Use | Yes |
Intent To Use | No |
Filed ITU | Yes |
44D Filed | No |
44E Current | No |
66A Current | No |
Current Basis | No |
No Basis | No |
Attorney Name | Tracy-Gene G. Durkin |
Attorney Docket Number | 2272.2280000 |
Law Office Assigned | L10 |
Employee Name | KEATING, MICHAEL P |
2015-05-00 | Date of First Use |
2015-05-01 | Date of First Use |
2015-05-01 | Date of Use In Commerce |
2017-10-13 | Application Filed |
2018-09-04 | Published |
2018-09-04 | Published for Opposition |
2019-11-12 | Location: PUBLICATION AND ISSUE SECTION |
2019-12-17 | Status: Live/Registered |
2019-12-17 | Status: Registered. The registration date is used to determine when post-registration maintenance documents are due. |
2019-12-17 | Trademark Registered |
2019-12-17 | Transaction Date |
2024-12-17 | Maintenance Early File Date |
2025-12-17 | Maintenance On Time Date |
2026-06-17 | Maintenance Late Fee Date |
Party: | The MITRE Corporation |
Address | 7515 Colshire Drive McLean, VIRGINIA UNITED STATES 221027508 |
Legal Entity Type | Corporation |
Legal Entity State | DELAWARE |
Drawing | 2017-10-13 | |
TEAS RF New Application | 2017-10-13 | |
Offc Action Outgoing | 2018-01-24 | |
Change of Address | 2018-07-24 | |
Response to Office Action | 2018-07-24 | |
Amendment and Mail Process Complete | 2018-07-25 | |
Examiners Amendment | 2018-07-25 | |
Amendment and Mail Process Complete | 2018-07-26 | |
TRAM Snapshot of App at Pub for Oppostn | 2018-07-26 | |
Notice of Publication | 2018-08-15 | |
Notification Of Notice of Publication | 2018-08-15 | |
OG Publication Confirmation | 2018-09-04 | |
Notice of Allowance | 2018-10-30 | |
Extension of Time to File SOU | 2019-04-30 | |
ITU Extension Approval | 2019-05-02 | |
ITU Unit Action | 2019-05-02 | |
Specimen | 2019-10-27 | |
Statement of Use | 2019-10-27 | |
ITU Unit Action | 2019-11-09 | |
Notice of Acceptance of Statement of Use | 2019-11-13 | |
TRAM Snapshot of App at Pub for Oppostn | 2019-11-13 | |
Registration Certificate | 2019-12-17 |
IC 042. US 100 101. G & S: Providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise and preparing related reports and technical documentation; providing information on the tactics and techniques employed by adversaries to exploit or compromise, operate within, and cause impacts to computer networks across all industries; providing a website featuring technology that allows users to describe the actions an adversary might take while operating within an enterprise network for the purpose of characterizing and describing post-compromise adversary behavior; providing information and advice to assist in developing computer and network system detection defenses for compromise, pre-, and post-compromise; providing information and advice to assist in network defense and to assist in prioritizing computer network defense by detailing compromise, pre-, and post-compromise tactics, techniques, and procedures used by adversaries to execute their objectives; providing information and advice to assist in adversary emulation and red teaming to test and measure the effectiveness of computer network defenses; computer security consultation, namely, providing a collection of information on the tactics and techniques employed by cyber adversaries; computer security consultation, namely, providing a collection of information characterizing the post-compromise activities of cyber adversaries to describe what might occur during an intrusion after an adversary has acquired access to a computer network; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in technologies and applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these systems and preparing related reports and technical documentation; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in applications including mobile devices, enterprise networks, medical devices, embedded devices, network devices, cloud systems, control systems, and the connections between these systems and preparing related reports and technical documentation. FIRST USE: 20150500. FIRST USE IN COMMERCE: 20150500
International Codes: | 42 |
U.S. Codes: | 100,101 |
Type Code | Type |
---|---|
GS0421 | Providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise and preparing related reports and technical documentation; providing information on the tactics and techniques employed by adversaries to exploit or compromise, operate within, and cause impacts to computer networks across all industries; providing a website featuring technology that allows users to describe the actions an adversary might take while operating within an enterprise network for the purpose of characterizing and describing post-compromise adversary behavior; providing information and advice to assist in developing computer and network system detection defenses for compromise, pre-, and post-compromise; providing information and advice to assist in network defense and to assist in prioritizing computer network defense by detailing compromise, pre-, and post-compromise tactics, techniques, and procedures used by adversaries to execute their objectives; providing information and advice to assist in adversary emulation and red teaming to test and measure the effectiveness of computer network defenses; computer security consultation, namely, providing a collection of information on the tactics and techniques employed by cyber adversaries; computer security consultation, namely, providing a collection of information characterizing the post-compromise activities of cyber adversaries to describe what might occur during an intrusion after an adversary has acquired access to a computer network; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in technologies and applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these systems and preparing related reports and technical documentation; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in applications including mobile devices, enterprise networks, medical devices, embedded devices, network devices, cloud systems, control systems, and the connections between these systems and preparing related reports and technical documentation |
GS0421 | Providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise and preparing related reports and technical documentation; providing information on the tactics and techniques employed by adversaries to exploit or compromise, operate within, and cause impacts to computer networks across all industries; providing a website featuring technology that allows users to describe the actions an adversary might take while operating within an enterprise network for the purpose of characterizing and describing post-compromise adversary behavior; providing information and advice to assist in developing computer and network system detection defenses for compromise, pre-, and post-compromise; providing information and advice to assist in network defense and to assist in prioritizing computer network defense by detailing compromise, pre-, and post-compromise tactics, techniques, and procedures used by adversaries to execute their objectives; providing information and advice to assist in adversary emulation and red teaming to test and measure the effectiveness of computer network defenses; computer security consultation, namely, providing a collection of information on the tactics and techniques employed by cyber adversaries; computer security consultation, namely, providing a collection of information characterizing the post-compromise activities of cyber adversaries to describe what might occur during an intrusion after an adversary has acquired access to a computer network; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in technologies and applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these systems and preparing related reports and technical documentation; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in applications including mobile devices, enterprise networks, medical devices, embedded devices, network devices, cloud systems, control systems, and the connections between these systems and preparing related reports and technical documentation |
Description | Date | Proceeding Number |
---|---|---|
REGISTERED-PRINCIPAL REGISTER | 2019-12-17 | |
NOTICE OF ACCEPTANCE OF STATEMENT OF USE E-MAILED | 2019-11-13 | |
ALLOWED PRINCIPAL REGISTER - SOU ACCEPTED | 2019-11-12 | |
STATEMENT OF USE PROCESSING COMPLETE | 2019-11-08 | 76538 |
CASE ASSIGNED TO INTENT TO USE PARALEGAL | 2019-11-08 | 76538 |
USE AMENDMENT FILED | 2019-10-27 | 76538 |
TEAS STATEMENT OF USE RECEIVED | 2019-10-27 | |
NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED | 2019-05-02 | |
TEAS EXTENSION RECEIVED | 2019-04-30 | |
SOU EXTENSION 1 GRANTED | 2019-04-30 | 98765 |
SOU EXTENSION 1 FILED | 2019-04-30 | 98765 |
EXTENSION 1 GRANTED | 2019-04-30 | 98765 |
EXTENSION 1 FILED | 2019-04-30 | 98765 |
NOA E-MAILED - SOU REQUIRED FROM APPLICANT | 2018-10-30 | |
PUBLISHED FOR OPPOSITION | 2018-09-04 | |
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | 2018-09-04 | |
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | 2018-08-15 | |
NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED | 2018-07-25 | 6328 |
EXAMINERS AMENDMENT E-MAILED | 2018-07-25 | 6328 |
EXAMINERS AMENDMENT -WRITTEN | 2018-07-25 | 76505 |
EXAMINER'S AMENDMENT ENTERED | 2018-07-25 | 88888 |
APPROVED FOR PUB - PRINCIPAL REGISTER | 2018-07-25 | |
TEAS/EMAIL CORRESPONDENCE ENTERED | 2018-07-24 | 88889 |
TEAS RESPONSE TO OFFICE ACTION RECEIVED | 2018-07-24 | |
TEAS CHANGE OF CORRESPONDENCE RECEIVED | 2018-07-24 | |
CORRESPONDENCE RECEIVED IN LAW OFFICE | 2018-07-24 | 88889 |
NOTIFICATION OF NON-FINAL ACTION E-MAILED | 2018-01-24 | 6325 |
NON-FINAL ACTION WRITTEN | 2018-01-24 | 76505 |
NON-FINAL ACTION E-MAILED | 2018-01-24 | 6325 |
ASSIGNED TO EXAMINER | 2018-01-23 | 76505 |
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM | 2017-10-25 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.