Under the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless it displays a valid OMB control number.
PTO Form 1957 (Rev 10/2011) |
OMB No. 0651-0050 (Exp 09/20/2020) |
Response to Office Action
The table below presents the data as entered.
Input Field
|
Entered
|
SERIAL NUMBER |
87645173 |
LAW OFFICE ASSIGNED |
LAW OFFICE 101 |
MARK SECTION |
MARK |
http://uspto.report/TM/87645173/mark.png |
LITERAL ELEMENT |
ATT&CK |
STANDARD CHARACTERS |
YES |
USPTO-GENERATED IMAGE |
YES |
MARK STATEMENT |
The mark consists of standard characters, without claim to any particular font style, size or color. |
GOODS AND/OR SERVICES SECTION (current) |
INTERNATIONAL CLASS |
042 |
DESCRIPTION |
Providing information, reports, and other content on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber
security, system compromise, and network compromise; providing information on the tactics and techniques employed by adversaries to exploit or compromise, operate within, and cause impacts to
computer networks across all industries; providing a model and/or framework for describing the actions an adversary might take while operating within an enterprise network for the purpose of
characterizing and describing post-compromise adversary behavior; providing information and knowledge to assist in developing detection defenses for compromise, pre-, and post-compromise; providing
information and knowledge to assist in network defense and to assist in prioritizing network defense by detailing compromise, pre-, and post-compromise tactics, techniques, and procedures used by
adversaries to execute their objectives; providing information and knowledge to assist in adversary emulation and red teaming to test and measure the effectiveness of network defenses; providing a
collection of information on the tactics and techniques employed by cyber adversaries; providing a collection of information characterizing the post-compromise activities of cyber adversaries to
describe what might occur during an intrusion after an adversary has acquired access to a network; providing information, reports, and other content on the topic of cyber intrusions, cyber
adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in technologies and applications including mobile devices, enterprise networks, medical
devices, embedded devices, control systems, and the connections between these systems; providing a suite of information, reports, and other content on the topic of cyber intrusions, cyber
adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in applications including mobile devices, enterprise networks, medical devices, embedded
devices, control systems, and the connections between these systems |
FILING BASIS |
Section 1(b) |
GOODS AND/OR SERVICES SECTION (proposed) |
INTERNATIONAL CLASS |
042 |
TRACKED TEXT DESCRIPTION |
Providing information, reports, and other content on the topic of cyber intrusions, cyber adversaries,
cyber threat intelligence, cyber security, system compromise, and network compromise; Providing information on the topic of cyber intrusions, cyber adversaries,
cyber threat intelligence, cyber security, system compromise, and network compromise and preparing related reports and technical documentation; providing information on the
tactics and techniques employed by adversaries to exploit or compromise, operate within, and cause impacts to computer networks across all industries; providing a model and/or framework for describing the actions an adversary might take while operating within an enterprise network for the purpose of characterizing and describing
post-compromise adversary behavior; providing a website featuring technology that allows users to described the actions an adversary might take while operating
within an enterprise network for the purpose of characterizing and describing post-compromise adversary behavior; providing information and knowledge to assist
in developing detection defenses for compromise, pre-, and post-compromise; providing information and advice to assist in developing computer and network system
detection defenses for compromise, pre-, and post-compromise; providing information and knowledge to assist in network defense and to assist in prioritizing
network defense by detailing compromise, pre-, and post-compromise tactics, techniques, and procedures used by adversaries to execute their objectives; providing information and advice to assist in network defense and to assist in prioritizing computer network defense by detailing compromise, pre-, and post-compromise tactics, techniques,
and procedures used by adversaries to execute their objectives; providing information and knowledge to assist in adversary emulation and red teaming to test
and measure the effectiveness of network defenses; providing information and advice to assist in adversary emulation and red teaming to test and measure the
effectiveness of computer network defenses; providing a collection of information on the tactics and techniques employed by cyber adversaries;
computer security consultation, namely, providing a collection of information on the tactics and techniques employed by cyber adversaries; providing a collection of information characterizing the post-compromise activities of cyber adversaries to describe what might occur during an intrusion after an adversary has
acquired access to a network; computer security consultation, namely, providing a collection of information characterizing the post-compromise activities of
cyber adversaries to describe what might occur during an intrusion after an adversary has acquired access to a computer network; providing information,
reports, and other content on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in technologies and
applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these systems; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in technologies and
applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these systems and preparing related reports and technical
documentation; providing a suite of information, reports, and other content on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence,
cyber security, system compromise, and network compromise for use in applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the
connections between these systems; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system
compromise, and network compromise for use in applications including mobile devices, enterprise networks, medical devices, embedded devices, network devices, cloud systems, control systems, and the
connections between these systems and preparing related reports and technical documentation |
FINAL DESCRIPTION |
Providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system
compromise, and network compromise and preparing related reports and technical documentation; providing information on the tactics and techniques employed by adversaries to exploit or compromise,
operate within, and cause impacts to computer networks across all industries; providing a website featuring technology that allows users to described the actions an adversary might take while
operating within an enterprise network for the purpose of characterizing and describing post-compromise adversary behavior; providing information and advice to assist in developing computer and
network system detection defenses for compromise, pre-, and post-compromise; providing information and advice to assist in network defense and to assist in prioritizing computer network defense by
detailing compromise, pre-, and post-compromise tactics, techniques, and procedures used by adversaries to execute their objectives; providing information and advice to assist in adversary emulation
and red teaming to test and measure the effectiveness of computer network defenses; computer security consultation, namely, providing a collection of information on the tactics and techniques
employed by cyber adversaries; computer security consultation, namely, providing a collection of information characterizing the post-compromise activities of cyber adversaries to describe what might
occur during an intrusion after an adversary has acquired access to a computer network; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber
security, system compromise, and network compromise for use in technologies and applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the
connections between these systems and preparing related reports and technical documentation; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence,
cyber security, system compromise, and network compromise for use in applications including mobile devices, enterprise networks, medical devices, embedded devices, network devices, cloud systems,
control systems, and the connections between these systems and preparing related reports and technical documentation |
FILING BASIS |
Section 1(b) |
CORRESPONDENCE SECTION |
ORIGINAL ADDRESS |
TRACY-GENE G. DURKIN
STERNE, KESSLER, GOLDSTEIN & FOX P.L.L.C.
1100 NEW YORK AVENUE, NW
WASHINGTON
District of Columbia
US
20005
|
NEW CORRESPONDENCE SECTION |
NAME |
TRACY-GENE G. DURKIN |
FIRM NAME |
STERNE, KESSLER, GOLDSTEIN & FOX P.L.L.C. |
DOCKET/REFERENCE NUMBER |
2272.2070000 |
STREET |
1100 NEW YORK AVENUE, NW |
CITY |
WASHINGTON |
STATE |
District of Columbia |
ZIP/POSTAL CODE |
20005 |
COUNTRY |
United States |
PHONE |
202-371-2600 |
FAX |
202-371-2540 |
EMAIL |
tm@sternekessler.com;tdurkin@sternekessler.com; jshirk@sternekessler.com; sarnold@sternekessler.com |
AUTHORIZED EMAIL COMMUNICATION |
Yes |
SIGNATURE SECTION |
RESPONSE SIGNATURE |
/Tracy Durkin/ |
SIGNATORY'S NAME |
Tracy-Gene G. Durkin |
SIGNATORY'S POSITION |
Attorney of Record, Washington, DC Bar Member |
SIGNATORY'S PHONE NUMBER |
(202) 371-2600 |
DATE SIGNED |
07/22/2018 |
AUTHORIZED SIGNATORY |
YES |
FILING INFORMATION SECTION |
SUBMIT DATE |
Tue Jul 24 13:20:21 EDT 2018 |
TEAS STAMP |
USPTO/ROA-XXX.XXX.XXX.XXX
-20180724132021578849-876
45173-610c37b73af6c1ffc4a
8f1c8a17235f84f5ca74e1c3c
4edd8b3c162606a18fbf-N/A-
N/A-20180722143433399100 |
Under the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless it displays a valid OMB control number.
PTO Form 1957 (Rev 10/2011) |
OMB No. 0651-0050 (Exp 09/20/2020) |
Response to Office Action
To the Commissioner for Trademarks:
Application serial no.
87645173 ATT&CK(Standard Characters, see http://uspto.report/TM/87645173/mark.png) has been amended as follows:
CLASSIFICATION AND LISTING OF GOODS/SERVICES
Applicant proposes to amend the following class of goods/services in the application:
Current: Class 042 for Providing information, reports, and other content on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and
network compromise; providing information on the tactics and techniques employed by adversaries to exploit or compromise, operate within, and cause impacts to computer networks across all industries;
providing a model and/or framework for describing the actions an adversary might take while operating within an enterprise network for the purpose of characterizing and describing post-compromise
adversary behavior; providing information and knowledge to assist in developing detection defenses for compromise, pre-, and post-compromise; providing information and knowledge to assist in network
defense and to assist in prioritizing network defense by detailing compromise, pre-, and post-compromise tactics, techniques, and procedures used by adversaries to execute their objectives; providing
information and knowledge to assist in adversary emulation and red teaming to test and measure the effectiveness of network defenses; providing a collection of information on the tactics and
techniques employed by cyber adversaries; providing a collection of information characterizing the post-compromise activities of cyber adversaries to describe what might occur during an intrusion
after an adversary has acquired access to a network; providing information, reports, and other content on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security,
system compromise, and network compromise for use in technologies and applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the
connections between these systems; providing a suite of information, reports, and other content on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system
compromise, and network compromise for use in applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these
systems
Original Filing Basis:
Filing Basis: Section 1(b), Intent to Use: For a trademark or service mark application: As of the application filing date, the applicant had a bona fide intention, and was
entitled, to use the mark in commerce on or in connection with the identified goods/services in the application.
For a collective trademark, collective service mark, or collective membership
mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce by members
on or in connection with the identified goods/services/collective membership organization.
For a certification mark application: As of the application filing date, the applicant had a
bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce by authorized users in connection with the identified goods/services, and the applicant will
not engage in the production or marketing of the goods/services to which the mark is applied, except to advertise or promote recognition of the certification program or of the goods/services that
meet the certification standards of the applicant.
Proposed:
Tracked Text Description: Providing information, reports, and other content on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber
security, system compromise, and network compromise;
Providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber
security, system compromise, and network compromise and preparing related reports and technical documentation;
providing information on the tactics and techniques employed
by adversaries to exploit or compromise, operate within, and cause impacts to computer networks across all industries;
providing a model and/or framework for
describing the actions an adversary might take while operating within an enterprise network for the purpose of characterizing and describing post-compromise adversary behavior;
providing a website featuring technology that allows users to described the actions an adversary might take while operating within an enterprise network for the purpose of
characterizing and describing post-compromise adversary behavior;
providing information and knowledge to assist in developing detection defenses for compromise,
pre-, and post-compromise;
providing information and advice to assist in developing computer and network system detection defenses for compromise, pre-, and
post-compromise;
providing information and knowledge to assist in network defense and to assist in prioritizing network defense by detailing compromise, pre-,
and post-compromise tactics, techniques, and procedures used by adversaries to execute their objectives;
providing information and advice to assist in network
defense and to assist in prioritizing computer network defense by detailing compromise, pre-, and post-compromise tactics, techniques, and procedures used by adversaries to execute their
objectives;
providing information and knowledge to assist in adversary emulation and red teaming to test and measure the effectiveness of network
defenses;
providing information and advice to assist in adversary emulation and red teaming to test and measure the effectiveness of computer network
defenses;
providing a collection of information on the tactics and techniques employed by cyber adversaries;
computer
security consultation, namely, providing a collection of information on the tactics and techniques employed by cyber adversaries;
providing a collection of
information characterizing the post-compromise activities of cyber adversaries to describe what might occur during an intrusion after an adversary has acquired access to a network;
computer security consultation, namely, providing a collection of information characterizing the post-compromise activities of cyber adversaries to describe what might occur
during an intrusion after an adversary has acquired access to a computer network;
providing information, reports, and other content on the topic of cyber
intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in technologies and applications including mobile devices, enterprise
networks, medical devices, embedded devices, control systems, and the connections between these systems;
providing information on the topic of cyber
intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in technologies and applications including mobile devices, enterprise
networks, medical devices, embedded devices, control systems, and the connections between these systems and preparing related reports and technical documentation;
providing a suite of information, reports, and other content on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network
compromise for use in applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these systems;
providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in
applications including mobile devices, enterprise networks, medical devices, embedded devices, network devices, cloud systems, control systems, and the connections between these systems and preparing
related reports and technical documentationClass 042 for Providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise,
and network compromise and preparing related reports and technical documentation; providing information on the tactics and techniques employed by adversaries to exploit or compromise, operate within,
and cause impacts to computer networks across all industries; providing a website featuring technology that allows users to described the actions an adversary might take while operating within an
enterprise network for the purpose of characterizing and describing post-compromise adversary behavior; providing information and advice to assist in developing computer and network system detection
defenses for compromise, pre-, and post-compromise; providing information and advice to assist in network defense and to assist in prioritizing computer network defense by detailing compromise, pre-,
and post-compromise tactics, techniques, and procedures used by adversaries to execute their objectives; providing information and advice to assist in adversary emulation and red teaming to test and
measure the effectiveness of computer network defenses; computer security consultation, namely, providing a collection of information on the tactics and techniques employed by cyber adversaries;
computer security consultation, namely, providing a collection of information characterizing the post-compromise activities of cyber adversaries to describe what might occur during an intrusion after
an adversary has acquired access to a computer network; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and
network compromise for use in technologies and applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these
systems and preparing related reports and technical documentation; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system
compromise, and network compromise for use in applications including mobile devices, enterprise networks, medical devices, embedded devices, network devices, cloud systems, control systems, and the
connections between these systems and preparing related reports and technical documentation
Filing Basis: Section 1(b), Intent to Use: For a trademark or service mark application: As of the application filing date, the applicant had a bona fide intention, and was
entitled, to use the mark in commerce on or in connection with the identified goods/services in the application.
For a collective trademark, collective service mark, or collective membership
mark application: As of the application filing date, the applicant had a bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce by members
on or in connection with the identified goods/services/collective membership organization.
For a certification mark application: As of the application filing date, the applicant had a
bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce by authorized users in connection with the identified goods/services, and the applicant will
not engage in the production or marketing of the goods/services to which the mark is applied, except to advertise or promote recognition of the certification program or of the goods/services that
meet the certification standards of the applicant.
CORRESPONDENCE ADDRESS CHANGE
Applicant proposes to amend the following:
Current:
TRACY-GENE G. DURKIN
STERNE, KESSLER, GOLDSTEIN & FOX P.L.L.C.
1100 NEW YORK AVENUE, NW
WASHINGTON
District of Columbia
US
20005
Proposed:
TRACY-GENE G. DURKIN of STERNE, KESSLER, GOLDSTEIN & FOX P.L.L.C., having an address of
1100 NEW YORK AVENUE, NW WASHINGTON, District of Columbia 20005
United States
tm@sternekessler.com;tdurkin@sternekessler.com; jshirk@sternekessler.com; sarnold@sternekessler.com
202-371-2600
202-371-2540
The docket/reference number is 2272.2070000 .
SIGNATURE(S)
Response Signature
Signature: /Tracy Durkin/ Date: 07/22/2018
Signatory's Name: Tracy-Gene G. Durkin
Signatory's Position: Attorney of Record, Washington, DC Bar Member
Signatory's Phone Number: (202) 371-2600
The signatory has confirmed that he/she is an attorney who is a member in good standing of the bar of the highest court of a U.S. state, which includes the District of Columbia, Puerto Rico, and
other federal territories and possessions; and he/she is currently the owner's/holder's attorney or an associate thereof; and to the best of his/her knowledge, if prior to his/her appointment another
U.S. attorney or a Canadian attorney/agent not currently associated with his/her company/firm previously represented the owner/holder in this matter: (1) the owner/holder has filed or is concurrently
filing a signed revocation of or substitute power of attorney with the USPTO; (2) the USPTO has granted the request of the prior representative to withdraw; (3) the owner/holder has filed a power of
attorney appointing him/her in this matter; or (4) the owner's/holder's appointed U.S. attorney or Canadian attorney/agent has filed a power of attorney appointing him/her as an associate attorney in
this matter.
Mailing Address: TRACY-GENE G. DURKIN
STERNE, KESSLER, GOLDSTEIN & FOX P.L.L.C.
1100 NEW YORK AVENUE, NW
WASHINGTON, District of Columbia 20005
Serial Number: 87645173
Internet Transmission Date: Tue Jul 24 13:20:21 EDT 2018
TEAS Stamp: USPTO/ROA-XXX.XXX.XXX.XXX-20180724132021
578849-87645173-610c37b73af6c1ffc4a8f1c8
a17235f84f5ca74e1c3c4edd8b3c162606a18fbf
-N/A-N/A-20180722143433399100