Response to Office Action

ATT&CK

The MITRE Corporation

Response to Office Action

Under the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless it displays a valid OMB control number.
PTO Form 1957 (Rev 10/2011)
OMB No. 0651-0050 (Exp 09/20/2020)

Response to Office Action


The table below presents the data as entered.

Input Field
Entered
SERIAL NUMBER 87645173
LAW OFFICE ASSIGNED LAW OFFICE 101
MARK SECTION
MARK http://uspto.report/TM/87645173/mark.png
LITERAL ELEMENT ATT&CK
STANDARD CHARACTERS YES
USPTO-GENERATED IMAGE YES
MARK STATEMENT The mark consists of standard characters, without claim to any particular font style, size or color.
GOODS AND/OR SERVICES SECTION (current)
INTERNATIONAL CLASS 042
DESCRIPTION
Providing information, reports, and other content on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise; providing information on the tactics and techniques employed by adversaries to exploit or compromise, operate within, and cause impacts to computer networks across all industries; providing a model and/or framework for describing the actions an adversary might take while operating within an enterprise network for the purpose of characterizing and describing post-compromise adversary behavior; providing information and knowledge to assist in developing detection defenses for compromise, pre-, and post-compromise; providing information and knowledge to assist in network defense and to assist in prioritizing network defense by detailing compromise, pre-, and post-compromise tactics, techniques, and procedures used by adversaries to execute their objectives; providing information and knowledge to assist in adversary emulation and red teaming to test and measure the effectiveness of network defenses; providing a collection of information on the tactics and techniques employed by cyber adversaries; providing a collection of information characterizing the post-compromise activities of cyber adversaries to describe what might occur during an intrusion after an adversary has acquired access to a network; providing information, reports, and other content on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in technologies and applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these systems; providing a suite of information, reports, and other content on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these systems
FILING BASIS Section 1(b)
GOODS AND/OR SERVICES SECTION (proposed)
INTERNATIONAL CLASS 042
TRACKED TEXT DESCRIPTION
Providing information, reports, and other content on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise; Providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise and preparing related reports and technical documentation; providing information on the tactics and techniques employed by adversaries to exploit or compromise, operate within, and cause impacts to computer networks across all industries; providing a model and/or framework for describing the actions an adversary might take while operating within an enterprise network for the purpose of characterizing and describing post-compromise adversary behavior; providing a website featuring technology that allows users to described the actions an adversary might take while operating within an enterprise network for the purpose of characterizing and describing post-compromise adversary behavior; providing information and knowledge to assist in developing detection defenses for compromise, pre-, and post-compromise; providing information and advice to assist in developing computer and network system detection defenses for compromise, pre-, and post-compromise; providing information and knowledge to assist in network defense and to assist in prioritizing network defense by detailing compromise, pre-, and post-compromise tactics, techniques, and procedures used by adversaries to execute their objectives; providing information and advice to assist in network defense and to assist in prioritizing computer network defense by detailing compromise, pre-, and post-compromise tactics, techniques, and procedures used by adversaries to execute their objectives; providing information and knowledge to assist in adversary emulation and red teaming to test and measure the effectiveness of network defenses; providing information and advice to assist in adversary emulation and red teaming to test and measure the effectiveness of computer network defenses; providing a collection of information on the tactics and techniques employed by cyber adversaries; computer security consultation, namely, providing a collection of information on the tactics and techniques employed by cyber adversaries; providing a collection of information characterizing the post-compromise activities of cyber adversaries to describe what might occur during an intrusion after an adversary has acquired access to a network; computer security consultation, namely, providing a collection of information characterizing the post-compromise activities of cyber adversaries to describe what might occur during an intrusion after an adversary has acquired access to a computer network; providing information, reports, and other content on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in technologies and applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these systems; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in technologies and applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these systems and preparing related reports and technical documentation; providing a suite of information, reports, and other content on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these systems; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in applications including mobile devices, enterprise networks, medical devices, embedded devices, network devices, cloud systems, control systems, and the connections between these systems and preparing related reports and technical documentation
FINAL DESCRIPTION
Providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise and preparing related reports and technical documentation; providing information on the tactics and techniques employed by adversaries to exploit or compromise, operate within, and cause impacts to computer networks across all industries; providing a website featuring technology that allows users to described the actions an adversary might take while operating within an enterprise network for the purpose of characterizing and describing post-compromise adversary behavior; providing information and advice to assist in developing computer and network system detection defenses for compromise, pre-, and post-compromise; providing information and advice to assist in network defense and to assist in prioritizing computer network defense by detailing compromise, pre-, and post-compromise tactics, techniques, and procedures used by adversaries to execute their objectives; providing information and advice to assist in adversary emulation and red teaming to test and measure the effectiveness of computer network defenses; computer security consultation, namely, providing a collection of information on the tactics and techniques employed by cyber adversaries; computer security consultation, namely, providing a collection of information characterizing the post-compromise activities of cyber adversaries to describe what might occur during an intrusion after an adversary has acquired access to a computer network; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in technologies and applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these systems and preparing related reports and technical documentation; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in applications including mobile devices, enterprise networks, medical devices, embedded devices, network devices, cloud systems, control systems, and the connections between these systems and preparing related reports and technical documentation
FILING BASIS Section 1(b)
CORRESPONDENCE SECTION
ORIGINAL ADDRESS TRACY-GENE G. DURKIN
STERNE, KESSLER, GOLDSTEIN & FOX P.L.L.C.
1100 NEW YORK AVENUE, NW
WASHINGTON
District of Columbia
US
20005
NEW CORRESPONDENCE SECTION
NAME TRACY-GENE G. DURKIN
FIRM NAME STERNE, KESSLER, GOLDSTEIN & FOX P.L.L.C.
DOCKET/REFERENCE NUMBER 2272.2070000
STREET 1100 NEW YORK AVENUE, NW
CITY WASHINGTON
STATE District of Columbia
ZIP/POSTAL CODE 20005
COUNTRY United States
PHONE 202-371-2600
FAX 202-371-2540
EMAIL tm@sternekessler.com;tdurkin@sternekessler.com; jshirk@sternekessler.com; sarnold@sternekessler.com
AUTHORIZED EMAIL COMMUNICATION Yes
SIGNATURE SECTION
RESPONSE SIGNATURE /Tracy Durkin/
SIGNATORY'S NAME Tracy-Gene G. Durkin
SIGNATORY'S POSITION Attorney of Record, Washington, DC Bar Member
SIGNATORY'S PHONE NUMBER (202) 371-2600
DATE SIGNED 07/22/2018
AUTHORIZED SIGNATORY YES
FILING INFORMATION SECTION
SUBMIT DATE Tue Jul 24 13:20:21 EDT 2018
TEAS STAMP USPTO/ROA-XXX.XXX.XXX.XXX
-20180724132021578849-876
45173-610c37b73af6c1ffc4a
8f1c8a17235f84f5ca74e1c3c
4edd8b3c162606a18fbf-N/A-
N/A-20180722143433399100



Under the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless it displays a valid OMB control number.
PTO Form 1957 (Rev 10/2011)
OMB No. 0651-0050 (Exp 09/20/2020)

Response to Office Action


To the Commissioner for Trademarks:

Application serial no. 87645173 ATT&CK(Standard Characters, see http://uspto.report/TM/87645173/mark.png) has been amended as follows:

CLASSIFICATION AND LISTING OF GOODS/SERVICES
Applicant proposes to amend the following class of goods/services in the application:
Current: Class 042 for Providing information, reports, and other content on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise; providing information on the tactics and techniques employed by adversaries to exploit or compromise, operate within, and cause impacts to computer networks across all industries; providing a model and/or framework for describing the actions an adversary might take while operating within an enterprise network for the purpose of characterizing and describing post-compromise adversary behavior; providing information and knowledge to assist in developing detection defenses for compromise, pre-, and post-compromise; providing information and knowledge to assist in network defense and to assist in prioritizing network defense by detailing compromise, pre-, and post-compromise tactics, techniques, and procedures used by adversaries to execute their objectives; providing information and knowledge to assist in adversary emulation and red teaming to test and measure the effectiveness of network defenses; providing a collection of information on the tactics and techniques employed by cyber adversaries; providing a collection of information characterizing the post-compromise activities of cyber adversaries to describe what might occur during an intrusion after an adversary has acquired access to a network; providing information, reports, and other content on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in technologies and applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these systems; providing a suite of information, reports, and other content on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these systems
Original Filing Basis:
Filing Basis: Section 1(b), Intent to Use: For a trademark or service mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to use the mark in commerce on or in connection with the identified goods/services in the application. For a collective trademark, collective service mark, or collective membership mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce by members on or in connection with the identified goods/services/collective membership organization. For a certification mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce by authorized users in connection with the identified goods/services, and the applicant will not engage in the production or marketing of the goods/services to which the mark is applied, except to advertise or promote recognition of the certification program or of the goods/services that meet the certification standards of the applicant.

Proposed:
Tracked Text Description: Providing information, reports, and other content on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise; Providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise and preparing related reports and technical documentation; providing information on the tactics and techniques employed by adversaries to exploit or compromise, operate within, and cause impacts to computer networks across all industries; providing a model and/or framework for describing the actions an adversary might take while operating within an enterprise network for the purpose of characterizing and describing post-compromise adversary behavior; providing a website featuring technology that allows users to described the actions an adversary might take while operating within an enterprise network for the purpose of characterizing and describing post-compromise adversary behavior; providing information and knowledge to assist in developing detection defenses for compromise, pre-, and post-compromise; providing information and advice to assist in developing computer and network system detection defenses for compromise, pre-, and post-compromise; providing information and knowledge to assist in network defense and to assist in prioritizing network defense by detailing compromise, pre-, and post-compromise tactics, techniques, and procedures used by adversaries to execute their objectives; providing information and advice to assist in network defense and to assist in prioritizing computer network defense by detailing compromise, pre-, and post-compromise tactics, techniques, and procedures used by adversaries to execute their objectives; providing information and knowledge to assist in adversary emulation and red teaming to test and measure the effectiveness of network defenses; providing information and advice to assist in adversary emulation and red teaming to test and measure the effectiveness of computer network defenses; providing a collection of information on the tactics and techniques employed by cyber adversaries; computer security consultation, namely, providing a collection of information on the tactics and techniques employed by cyber adversaries; providing a collection of information characterizing the post-compromise activities of cyber adversaries to describe what might occur during an intrusion after an adversary has acquired access to a network; computer security consultation, namely, providing a collection of information characterizing the post-compromise activities of cyber adversaries to describe what might occur during an intrusion after an adversary has acquired access to a computer network; providing information, reports, and other content on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in technologies and applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these systems; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in technologies and applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these systems and preparing related reports and technical documentation; providing a suite of information, reports, and other content on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these systems; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in applications including mobile devices, enterprise networks, medical devices, embedded devices, network devices, cloud systems, control systems, and the connections between these systems and preparing related reports and technical documentationClass 042 for Providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise and preparing related reports and technical documentation; providing information on the tactics and techniques employed by adversaries to exploit or compromise, operate within, and cause impacts to computer networks across all industries; providing a website featuring technology that allows users to described the actions an adversary might take while operating within an enterprise network for the purpose of characterizing and describing post-compromise adversary behavior; providing information and advice to assist in developing computer and network system detection defenses for compromise, pre-, and post-compromise; providing information and advice to assist in network defense and to assist in prioritizing computer network defense by detailing compromise, pre-, and post-compromise tactics, techniques, and procedures used by adversaries to execute their objectives; providing information and advice to assist in adversary emulation and red teaming to test and measure the effectiveness of computer network defenses; computer security consultation, namely, providing a collection of information on the tactics and techniques employed by cyber adversaries; computer security consultation, namely, providing a collection of information characterizing the post-compromise activities of cyber adversaries to describe what might occur during an intrusion after an adversary has acquired access to a computer network; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in technologies and applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these systems and preparing related reports and technical documentation; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in applications including mobile devices, enterprise networks, medical devices, embedded devices, network devices, cloud systems, control systems, and the connections between these systems and preparing related reports and technical documentation
Filing Basis: Section 1(b), Intent to Use: For a trademark or service mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to use the mark in commerce on or in connection with the identified goods/services in the application. For a collective trademark, collective service mark, or collective membership mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce by members on or in connection with the identified goods/services/collective membership organization. For a certification mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce by authorized users in connection with the identified goods/services, and the applicant will not engage in the production or marketing of the goods/services to which the mark is applied, except to advertise or promote recognition of the certification program or of the goods/services that meet the certification standards of the applicant.

CORRESPONDENCE ADDRESS CHANGE
Applicant proposes to amend the following:
Current:
TRACY-GENE G. DURKIN
STERNE, KESSLER, GOLDSTEIN & FOX P.L.L.C.
1100 NEW YORK AVENUE, NW
WASHINGTON
District of Columbia
US
20005

Proposed:
TRACY-GENE G. DURKIN of STERNE, KESSLER, GOLDSTEIN & FOX P.L.L.C., having an address of
1100 NEW YORK AVENUE, NW WASHINGTON, District of Columbia 20005
United States
tm@sternekessler.com;tdurkin@sternekessler.com; jshirk@sternekessler.com; sarnold@sternekessler.com
202-371-2600
202-371-2540
The docket/reference number is 2272.2070000 .



SIGNATURE(S)
Response Signature
Signature: /Tracy Durkin/     Date: 07/22/2018
Signatory's Name: Tracy-Gene G. Durkin
Signatory's Position: Attorney of Record, Washington, DC Bar Member

Signatory's Phone Number: (202) 371-2600

The signatory has confirmed that he/she is an attorney who is a member in good standing of the bar of the highest court of a U.S. state, which includes the District of Columbia, Puerto Rico, and other federal territories and possessions; and he/she is currently the owner's/holder's attorney or an associate thereof; and to the best of his/her knowledge, if prior to his/her appointment another U.S. attorney or a Canadian attorney/agent not currently associated with his/her company/firm previously represented the owner/holder in this matter: (1) the owner/holder has filed or is concurrently filing a signed revocation of or substitute power of attorney with the USPTO; (2) the USPTO has granted the request of the prior representative to withdraw; (3) the owner/holder has filed a power of attorney appointing him/her in this matter; or (4) the owner's/holder's appointed U.S. attorney or Canadian attorney/agent has filed a power of attorney appointing him/her as an associate attorney in this matter.

Mailing Address:    TRACY-GENE G. DURKIN
   STERNE, KESSLER, GOLDSTEIN & FOX P.L.L.C.
   1100 NEW YORK AVENUE, NW
   WASHINGTON, District of Columbia 20005
        
Serial Number: 87645173
Internet Transmission Date: Tue Jul 24 13:20:21 EDT 2018
TEAS Stamp: USPTO/ROA-XXX.XXX.XXX.XXX-20180724132021
578849-87645173-610c37b73af6c1ffc4a8f1c8
a17235f84f5ca74e1c3c4edd8b3c162606a18fbf
-N/A-N/A-20180722143433399100



uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed