KEYW

The Keyw Corporation

Application Filed: 2017-10-26
Trademark Application Details
Trademark Logo KEYW
700
Live/Registered
REGISTERED
Research OneLook Acronym Finder
Serial Number87660471
Registration Number5664323
Mark Drawing Code4000: Illustration: Drawing with word(s)/letter(s)/number(s) in Block form
Attorney NameDonna M.D. Thomas
Attorney Docket Number21280.000
Law Office AssignedM90
Employee NameWELLS, KELLEY L

Timeline

2009-02-09Date of First Use
2017-10-26Application Filed
2018-11-13Published for Opposition
2019-01-29Location: PUBLICATION AND ISSUE SECTION
2019-01-29Status: Live/Registered
2019-01-29Trademark Registered
2019-06-20Transaction Date

Trademark Applicants & Owners

Owner: THE KEYW CORPORATION
Address7740 Milestone Parkway, Suite 300 Hanover MD 21076
Legal Entity TypeCorporation
Legal Entity StateMD

Documents

Click the blue "Refresh" button to load certificates, specimines, application, and other documents.

Attorney of Record

DONNA M.D. THOMAS
ASTRACHAN GUNST THOMAS, P.C.
217 E. REDWOOD STREET, 21ST FLOOR
BALTIMORE, MD 21202

Good, Services, and Codes

International Codes:9
U.S. Codes:021,023,026,036,038
International Codes:35
U.S. Codes:100,101,102
International Codes:38
U.S. Codes:100,101,104
International Codes:41
U.S. Codes:100,101,107
International Codes:42
U.S. Codes:100,101
International Codes:45
U.S. Codes:100,101
Type CodeType
GS0091computer software and computer hardware for testing and evaluating computers, computer networks and information technology systems for security vulnerability and risk relating to hacking, cyber-attacks, computer crimes and computer viruses; computer software and computer hardware for cyber-security, cyber-defense, information security and assurance, data security, computer security, network security and prevention of hacking, cyber-attacks, computer crimes and computer viruses; computer software and computer hardware for monitoring, detecting, inspecting, processing, analyzing, mitigating and remediating computers, computer networks and information technology systems for hacking, cyber-attacks, computer crimes and computer viruses; computer software and computer hardware for risk mitigation and remediation, integrity and threat analysis, cyber event data analysis, digital data intelligence gathering and analysis and dispatch of security countermeasures relating to hacking, cyber-attacks, computer crimes and computer viruses; computer software and computer hardware for data warehousing, data analysis, threat detection, measurement and evaluation of security process effectiveness and security management controls relating to computer security, network security and information technology systems security; computer software for security information and event management and defense against hacking, cyber-attacks, computer crimes and computer viruses, namely, monitoring computer, network and information technology system activity and identifying, investigating and responding to information security threats; computer programs for collecting, storing and managing network/enterprise log records and call detail record retention and retrieval relating to computer and network security; computer network security products, namely, computer and network hardware and software for use in computer network security, monitoring, analysis, assessment and intrusion detection; computer software and hardware for cyber attack prevention, network security threat management, intrusion detection and prevention; computer and network software and hardware for monitoring of network infrastructure and network activity, detecting, analyzing and providing assessment and countermeasures against computer viruses, cyber attacks, hacking, computer crimes and invasion of intruders into computer networks; computer programs for network management and security, network packet capture, network monitoring, network traffic characterization and network intrusion detection and tracing the origin of network traffic geolocation information, and using single or multiple processors; computer software and hardware for network management and security, network packet capture, network monitoring, network traffic characterization and network intrusion detection and tracing the origin of network traffic geolocation information, and using single or multiple processors; computer software for administration of computer networks; computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; telecommunications and data networking hardware, namely, devices for transporting and aggregating voice, data, and video communications across multiple network infrastructures and communications protocols; computer software for network monitoring and forensics analysis, data replication for multiple applications to simultaneously analyze a data stream, time stamping, and for acquiring, recording, analyzing, filtering, modifying, sending and storing data while sending real-time statistics to monitoring applications; software and hardware for use in improving operational system management by identifying cyber assets and configurations, and in monitoring, viewing and identifying cyber security events and system vulnerabilities, and in streamlining compliance data collection and analysis for report generation and system wide change management, and in creating custom dashboards of compliance related activities for system wide visibility, and in compliance document management; electrical and scientific apparatus, namely, high resolution electro-optical airborne digital cameras; airborne platforms, namely, mounting devices adapted for mounting cameras on aircraft and unmanned aerial vehicles; airborne platforms, namely, mounting devices adapted for mounting sensor systems comprised of electro-optic, laser, radar, radiometric, acoustic, thermal, multi-spectral and hyper-spectral sensors on aircraft and unmanned aerial vehicles; airborne sensor systems comprised primarily of electro-optic, laser, radar, radiometric, acoustic, thermal, multi-spectral and hyper-spectral sensors; and high-resolution aerial imaging systems comprised primarily of high resolution electro-optical cameras, synthetic aperture radar systems, laser radar, lidar, bolometric and thermal imaging systems, spectral imagers, geoprocessors and geoprocessing software; radar systems consisting of radar apparatus and computer hardware and software for the control and operation of radar systems and the processing of radar data; sensor systems consisting of sensors and computer hardware and software for the control and operation of sensor systems and the processing of sensor data; geographic imagery downloadable over a global computer network; signal processing systems and electro-optical, lidar, radio frequency, radar, sensor and other devices, apparatus and technologies for gathering intelligence and geospatial intelligence data and information; portable, automated electronic surveillance system comprised of hardware and software applications to extract, process, assess and analyze data, content and information from digital devices and media for evidence and intelligence purposes; hardware and software systems for tracking and communications; computer software for data and metadata management and risk management; software to collect, filter, organize and securely store data from a wide variety of sources, including internal networks, external networks and open-source data from the Internet, to provide a user with readily available data that is relevant to a particular topic, area of interest or project; computer software for big data analysis and management; computer software for use in data integration, data warehousing, data mining, data processing, data sharing, data collection, data interpretation, data queries, data visualization, data analytics and iterative development; computer software for cloud access, cloud storage and cloud computing; computer software development tools; computer software for computer system and application development, deployment and management; computer software that allows an operator, mission manager, or analysts to drive offensive or defensive cyber operations; end-to-end cyber mission platform comprised of hardware and software designed to deploy offensive and defensive cyberspace capabilities as a unified platform, including an immersive frontend for total cyberspace situational awareness for the operator, analyst and mission commander that unifies disparate cyberspace capabilities and provides a common interface to cyberspace data for analytics and data processing; software solution for local and distance learning environments on desktops, tablets and other mobile devices for training and education in the fields of information technology security, cyber-security, computer security, network security and data security; software and hardware solutions for collecting, processing, analyzing, filtering, indexing, searching, managing, storing, disseminating and providing reports on data and information from cyberspace and geospace for military, government and commercial purposes

Trademark Filing History

DescriptionDateEvent Coding
NEW APPLICATION ENTERED IN TRAM2017-10-301 NWAP I:Incoming Correspondence
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM2017-11-042 NWOS I:Incoming Correspondence
ASSIGNED TO EXAMINER2017-12-033 DOCK D:Assigned to Examiner
NON-FINAL ACTION WRITTEN2017-12-044 CNRT R:Renewal
NON-FINAL ACTION E-MAILED2017-12-045 GNRT F:First Action
NOTIFICATION OF NON-FINAL ACTION E-MAILED2017-12-046 GNRN O:Outgoing Correspondence
ASSIGNMENT OF OWNERSHIP NOT UPDATED AUTOMATICALLY2018-05-237 ASCK I:Incoming Correspondence
TEAS RESPONSE TO OFFICE ACTION RECEIVED2018-06-018 TROA I:Incoming Correspondence
CORRESPONDENCE RECEIVED IN LAW OFFICE2018-06-019 CRFA I:Incoming Correspondence
TEAS/EMAIL CORRESPONDENCE ENTERED2018-06-0110 TEME I:Incoming Correspondence
FINAL REFUSAL WRITTEN2018-06-2211 CNFR R:Renewal
FINAL REFUSAL E-MAILED2018-06-2212 GNFR O:Outgoing Correspondence
NOTIFICATION OF FINAL REFUSAL EMAILED2018-06-2213 GNFN O:Outgoing Correspondence
EXAMINERS AMENDMENT -WRITTEN2018-10-0414 CNEA R:Renewal
EXAMINERS AMENDMENT E-MAILED2018-10-0415 GNEA O:Outgoing Correspondence
NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED2018-10-0416 GNEN O:Outgoing Correspondence
EXAMINER'S AMENDMENT ENTERED2018-10-0417 XAEC I:Incoming Correspondence
APPROVED FOR PUB - PRINCIPAL REGISTER2018-10-0418 CNSA O:Outgoing Correspondence
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED2018-10-2419 NONP E:E-Mail
PUBLISHED FOR OPPOSITION2018-11-1320 PUBO A:Allowance for Publication
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED2018-11-1321 NPUB E:E-Mail
REGISTERED-PRINCIPAL REGISTER2019-01-2922 R.PR A:Allowance for Publication
ASSIGNMENT OF OWNERSHIP NOT UPDATED AUTOMATICALLY2019-06-1923 ASCK I:Incoming Correspondence
AUTOMATIC UPDATE OF ASSIGNMENT OF OWNERSHIP2023-01-2524 ASGN I:Incoming Correspondence
COURTESY REMINDER - SEC. 8 (6-YR) E-MAILED2024-01-2925 REM1 E:E-Mail

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed