Under the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless it displays a valid OMB control number.
PTO Form 1957 (Rev 10/2011) |
OMB No. 0651-0050 (Exp 09/20/2020) |
Response to Office Action
The table below presents the data as entered.
Input Field
|
Entered
|
SERIAL NUMBER |
87645105 |
LAW OFFICE ASSIGNED |
LAW OFFICE 101 |
MARK SECTION |
MARK |
http://uspto.report/TM/87645105/mark.png |
LITERAL ELEMENT |
MITRE ATT&CK |
STANDARD CHARACTERS |
YES |
USPTO-GENERATED IMAGE |
YES |
MARK STATEMENT |
The mark consists of standard characters, without claim to any particular font style, size or color. |
GOODS AND/OR SERVICES SECTION (class deleted) |
GOODS AND/OR SERVICES SECTION (class added) Original Class (035) |
INTERNATIONAL CLASS |
042 |
DESCRIPTION |
Providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise,
and network compromise and preparing related reports and technical documentation; providing information on the tactics and techniques employed by adversaries to exploit or compromise, operate within,
and cause impacts to computer networks across all industries; providing a website featuring technology that allows users to described the actions an adversary might take while operating within an
enterprise network for the purpose of characterizing and describing post-compromise adversary behavior; providing information and advice to assist in developing computer and network system detection
defenses for compromise, pre-, and post-compromise; providing information and advice to assist in network defense and to assist in prioritizing computer network defense by detailing compromise, pre-,
and post-compromise tactics, techniques, and procedures used by adversaries to execute their objectives; providing information and advice to assist in adversary emulation and red teaming to test and
measure the effectiveness of computer network defenses; computer security consultation, namely, providing a collection of information on the tactics and techniques employed by cyber adversaries;
computer security consultation, namely, providing a collection of information characterizing the post-compromise activities of cyber adversaries to describe what might occur during an intrusion after
an adversary has acquired access to a computer network; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and
network compromise for use in technologies and applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these
systems and preparing related reports and technical documentation; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system
compromise, and network compromise for use in applications including mobile devices, enterprise networks, medical devices, embedded devices, network devices, cloud systems, control systems, and the
connections between these systems and preparing related reports and technical documentation |
FILING BASIS |
Section 1(b) |
CORRESPONDENCE SECTION |
ORIGINAL ADDRESS |
TRACY-GENE G. DURKIN
STERNE, KESSLER, GOLDSTEIN & FOX P.L.L.C.
1100 NEW YORK AVENUE, NW
WASHINGTON
District of Columbia
US
20005
|
NEW CORRESPONDENCE SECTION |
NAME |
TRACY-GENE G. DURKIN |
FIRM NAME |
STERNE, KESSLER, GOLDSTEIN & FOX P.L.L.C. |
DOCKET/REFERENCE NUMBER |
2272.2280000 |
STREET |
1100 NEW YORK AVENUE, NW |
CITY |
WASHINGTON |
STATE |
District of Columbia |
ZIP/POSTAL CODE |
20005 |
COUNTRY |
United States |
PHONE |
202-371-2600 |
FAX |
202-371-2540 |
EMAIL |
tm@sternekessler.com;tdurkin@sternekessler.com; jshirk@sternekessler.com; sarnold@sternekessler.com |
AUTHORIZED EMAIL COMMUNICATION |
Yes |
SIGNATURE SECTION |
RESPONSE SIGNATURE |
/Tracy Durkin/ |
SIGNATORY'S NAME |
Tracy-Gene G. Durkin |
SIGNATORY'S POSITION |
Attorney of Record, Washington, DC Bar Member |
SIGNATORY'S PHONE NUMBER |
(202) 371-2600 |
DATE SIGNED |
07/22/2018 |
AUTHORIZED SIGNATORY |
YES |
FILING INFORMATION SECTION |
SUBMIT DATE |
Tue Jul 24 13:18:41 EDT 2018 |
TEAS STAMP |
USPTO/ROA-XXX.XXX.XXX.XXX
-20180724131841079054-876
45105-61092cfe83f6da7527a
d9dc8a7879516213f55b95f5f
fa4ffe77d2a41da0dc58f-N/A
-N/A-20180722134649094361 |
Under the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless it displays a valid OMB control number.
PTO Form 1957 (Rev 10/2011) |
OMB No. 0651-0050 (Exp 09/20/2020) |
Response to Office Action
To the Commissioner for Trademarks:
Application serial no.
87645105 MITRE ATT&CK(Standard Characters, see http://uspto.report/TM/87645105/mark.png) has been amended as follows:
CLASSIFICATION AND LISTING OF GOODS/SERVICES
Applicant hereby deletes the following class of goods/services from the application.
Class 035 for Providing information, reports, and other content on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network
compromise; providing information on the tactics and techniques employed by adversaries to exploit or compromise, operate within, and cause impacts to computer networks across all industries;
providing a model and/or framework for describing the actions an adversary might take while operating within an enterprise network for the purpose of characterizing and describing post-compromise
adversary behavior; providing information and knowledge to assist in developing detection defenses for compromise, pre-, and post-compromise; providing information and knowledge to assist in network
defense and to assist in prioritizing network defense by detailing compromise, pre-, and post-compromise tactics, techniques, and procedures used by adversaries to execute their objectives; providing
information and knowledge to assist in adversary emulation and red teaming to test and measure the effectiveness of network defenses; providing a collection of information on the tactics and
techniques employed by cyber adversaries; providing a collection of information characterizing the post-compromise activities of cyber adversaries to describe what might occur during an intrusion
after an adversary has acquired access to a network; providing information, reports, and other content on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security,
system compromise, and network compromise for use in technologies and applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the
connections between these systems; providing a suite of information, reports, and other content on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system
compromise, and network compromise for use in applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these
systems
Applicant hereby adds the following class of goods/services to the application:
New: Class 042 (Original Class: 035 ) for Providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network
compromise and preparing related reports and technical documentation; providing information on the tactics and techniques employed by adversaries to exploit or compromise, operate within, and cause
impacts to computer networks across all industries; providing a website featuring technology that allows users to described the actions an adversary might take while operating within an enterprise
network for the purpose of characterizing and describing post-compromise adversary behavior; providing information and advice to assist in developing computer and network system detection defenses
for compromise, pre-, and post-compromise; providing information and advice to assist in network defense and to assist in prioritizing computer network defense by detailing compromise, pre-, and
post-compromise tactics, techniques, and procedures used by adversaries to execute their objectives; providing information and advice to assist in adversary emulation and red teaming to test and
measure the effectiveness of computer network defenses; computer security consultation, namely, providing a collection of information on the tactics and techniques employed by cyber adversaries;
computer security consultation, namely, providing a collection of information characterizing the post-compromise activities of cyber adversaries to describe what might occur during an intrusion after
an adversary has acquired access to a computer network; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and
network compromise for use in technologies and applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these
systems and preparing related reports and technical documentation; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system
compromise, and network compromise for use in applications including mobile devices, enterprise networks, medical devices, embedded devices, network devices, cloud systems, control systems, and the
connections between these systems and preparing related reports and technical documentation
Filing Basis: Section 1(b), Intent to Use: For a trademark or service mark application: As of the application filing date, the applicant had a bona fide intention, and was
entitled, to use the mark in commerce on or in connection with the identified goods/services in the application.
For a collective trademark, collective service mark, or collective membership
mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce by members
on or in connection with the identified goods/services/collective membership organization.
For a certification mark application: As of the application filing date, the applicant had a
bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce by authorized users in connection with the identified goods/services, and the applicant will
not engage in the production or marketing of the goods/services to which the mark is applied, except to advertise or promote recognition of the certification program or of the goods/services that
meet the certification standards of the applicant.
CORRESPONDENCE ADDRESS CHANGE
Applicant proposes to amend the following:
Current:
TRACY-GENE G. DURKIN
STERNE, KESSLER, GOLDSTEIN & FOX P.L.L.C.
1100 NEW YORK AVENUE, NW
WASHINGTON
District of Columbia
US
20005
Proposed:
TRACY-GENE G. DURKIN of STERNE, KESSLER, GOLDSTEIN & FOX P.L.L.C., having an address of
1100 NEW YORK AVENUE, NW WASHINGTON, District of Columbia 20005
United States
tm@sternekessler.com;tdurkin@sternekessler.com; jshirk@sternekessler.com; sarnold@sternekessler.com
202-371-2600
202-371-2540
The docket/reference number is 2272.2280000 .
SIGNATURE(S)
Response Signature
Signature: /Tracy Durkin/ Date: 07/22/2018
Signatory's Name: Tracy-Gene G. Durkin
Signatory's Position: Attorney of Record, Washington, DC Bar Member
Signatory's Phone Number: (202) 371-2600
The signatory has confirmed that he/she is an attorney who is a member in good standing of the bar of the highest court of a U.S. state, which includes the District of Columbia, Puerto Rico, and
other federal territories and possessions; and he/she is currently the owner's/holder's attorney or an associate thereof; and to the best of his/her knowledge, if prior to his/her appointment another
U.S. attorney or a Canadian attorney/agent not currently associated with his/her company/firm previously represented the owner/holder in this matter: (1) the owner/holder has filed or is concurrently
filing a signed revocation of or substitute power of attorney with the USPTO; (2) the USPTO has granted the request of the prior representative to withdraw; (3) the owner/holder has filed a power of
attorney appointing him/her in this matter; or (4) the owner's/holder's appointed U.S. attorney or Canadian attorney/agent has filed a power of attorney appointing him/her as an associate attorney in
this matter.
Mailing Address: TRACY-GENE G. DURKIN
STERNE, KESSLER, GOLDSTEIN & FOX P.L.L.C.
1100 NEW YORK AVENUE, NW
WASHINGTON, District of Columbia 20005
Serial Number: 87645105
Internet Transmission Date: Tue Jul 24 13:18:41 EDT 2018
TEAS Stamp: USPTO/ROA-XXX.XXX.XXX.XXX-20180724131841
079054-87645105-61092cfe83f6da7527ad9dc8
a7879516213f55b95f5ffa4ffe77d2a41da0dc58
f-N/A-N/A-20180722134649094361