AGILESEC

InfoSec Global Inc.

Application Filed: 2017-11-14
Trademark Application Details
Trademark Logo AGILESEC
654
Live/Pending
REPORT COMPLETED SUSPENSION CHECK - CASE STILL SUSPENDED
Research OneLook Acronym Finder
Serial Number87683481
Registration Number6669174
Mark Drawing Code4000: Illustration: Drawing with word(s)/letter(s)/number(s) in Block form
Attorney NameAndrea Shannon
Attorney Docket Number56020701-8US
Law Office AssignedN50
Employee NameCERDA, VICTOR

Timeline

2017-11-14Application Filed
2019-10-29Location: TMO LAW OFFICE 123
2019-11-20Status: Live/Pending
2019-11-20Transaction Date
2022-03-15Trademark Registered

Trademark Applicants & Owners

Owner: InfoSec Global Inc.
Address2225 Sheppard Avenue East, Suite 1015 Toronto, Ontario CA M2J5C2
Legal Entity TypeCorporation
Legal Entity State CA

Documents

Click the blue "Refresh" button to load certificates, specimines, application, and other documents.

Attorney of Record

Andrea Shannon
Norton Rose Fulbright US LLP
Fulbright Tower
1301 McKinney, Suite 5100
Houston TX 77010-3095

Good, Services, and Codes

International Codes:9
U.S. Codes:021,023,026,036,038
International Codes:16
U.S. Codes:002,005,022,023,029,037,038,050
International Codes:42
U.S. Codes:100,101
International Codes:45
U.S. Codes:100,101
Type CodeType
GS0091Computer software development tools for use in the creation of public key encryption, symmetric key encryption and cyber security vulnerability testing software; Computer software used for public key encryption, symmetric key encryption, certification of resilience to cyber security vulnerabilities, access control and digital rights management, communication verification, communication privacy, confidentiality and integrity of voice communication, e-mail, network data packets and text messages, wired and wireless transmission of voice communication, e-mail, network data packets, web services, namely, online collaboration services and virtual private networks, network data packets of encrypted information in the field of communications and authentication of encrypted information in the field of communications; computer firmware and hardware, namely, for use in encryption, authentication and wired and wireless transmission of voice communication, e-mail, network data packets, web services, namely, online collaboration services and virtual private networks, and text messages; computer hardware and software for virtual private networks, public key infrastructure and data link encryptors and network data packets of encrypted information in the field of communications and authentication of encrypted information in the field of communications, device to device communication, cryptography, digital signatures and public and private key generation, security functions, namely, encryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity; Computer security software and communication software for the synchronization, transmission and sharing of voice communication, e-mail, network data packets, text messaging, video conferencing, calendar and music files between one or more electronic handheld units, namely, personal digital assistants (PDAs), wireless phones, mobile phones, cellular phones, smart phones, video phones and mobile, slate and tablet computers, wearable computing devices, namely, smart watches and smart glasses, smart home devices, namely, smart meters and home appliances with built-in capability to connect to the internet and home automation electronic security devices, home automation systems comprising wireless and wired controllers, controlled electronic home security devices and software for light, HVAC, security, safety and home monitoring, and computers that are embedded into vehicles and stored on or associated with a computer; integrated circuits; computer software storage media, namely, pre-recorded CD-ROMS and digital media featuring computer software and documentation for providing encryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity, computer networking, cryptography, digital signatures and private and public key generation, and security functions, namely, encryption, certification, authentication, verification, data privacy confidentiality and data integrity; cellular telephones; telecommunications equipment, namely, radio transmitters, telephone transmitters, satellite transmitters, receivers, namely, telephone receivers, audio receivers, video receivers and data receivers, namely, network switches, network routers, firewalls, network connected storage devices, network connected application servers, computer networks, namely, local area networks, wide area networks, virtual private networks, cloud networks, the internet, telephones, wireless computer networks, namely, networks comprised of client and server devices, wireless communication processors, namely, satellite processors, cellular telephony base stations, signal processors, radio and satellite telephones, wireless handheld computers, smartphones, network link encryption devices, namely, layer 2 link encryptors, virtual private network gateways, smart cards and hardware security modules with an embedded integrated circuit containing account and user identity information and protected with private encryption keys for purpose of authentication and secure transmission of information stored on the device; computer terminals for use with credit cards, debit cards and plastic smart cards with an embedded integrated circuit, namely, magnetic coded card readers and readers of plastic smart cards with an embedded integrated circuit; Computer software for ensuring the security of electronic mail; Computer software for encryption and cryptography; Computer software and hardware for identifying or preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; Cryptographic software featuring cryptographic algorithms; computer hardware incorporating cryptographic algorithms
GS0091Computer software development tools for use in the creation of public key encryption, symmetric key encryption and cyber security vulnerability testing software; Computer software used for public key encryption, symmetric key encryption, certification of resilience to cyber security vulnerabilities, access control and digital rights management, communication verification, communication privacy, confidentiality and integrity of voice communication, e-mail, network data packets and text messages, wired and wireless transmission of voice communication, e-mail, network data packets, web services, namely, online collaboration services and virtual private networks, network data packets of encrypted information in the field of communications and authentication of encrypted information in the field of communications; computer firmware and hardware, namely, for use in encryption, authentication and wired and wireless transmission of voice communication, e-mail, network data packets, web services, namely, online collaboration services and virtual private networks, and text messages; computer hardware and software for virtual private networks, public key infrastructure and data link encryptors and network data packets of encrypted information in the field of communications and authentication of encrypted information in the field of communications, device to device communication, cryptography, digital signatures and public and private key generation, security functions, namely, encryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity; Computer security software and communication software for the synchronization, transmission and sharing of voice communication, e-mail, network data packets, text messaging, video conferencing, calendar and music files between one or more electronic handheld units, namely, personal digital assistants (PDAs), wireless phones, mobile phones, cellular phones, smart phones, video phones and mobile, slate and tablet computers, wearable computing devices, namely, smart watches and smart glasses, smart home devices, namely, smart meters and home appliances with built-in capability to connect to the internet and home automation electronic security devices, home automation systems comprising wireless and wired controllers, controlled electronic home security devices and software for light, HVAC, security, safety and home monitoring, and computers that are embedded into vehicles and stored on or associated with a computer; integrated circuits; computer software storage media, namely, pre-recorded CD-ROMS and digital media featuring computer software and documentation for providing encryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity, computer networking, cryptography, digital signatures and private and public key generation, and security functions, namely, encryption, certification, authentication, verification, data privacy confidentiality and data integrity; cellular telephones; telecommunications equipment, namely, radio transmitters, telephone transmitters, satellite transmitters, receivers, namely, telephone receivers, audio receivers, video receivers and data receivers, namely, network switches, network routers, firewalls, network connected storage devices, network connected application servers, computer networks, namely, local area networks, wide area networks, virtual private networks, cloud networks, the internet, telephones, wireless computer networks, namely, networks comprised of client and server devices, wireless communication processors, namely, satellite processors, cellular telephony base stations, signal processors, radio and satellite telephones, wireless handheld computers, smartphones, network link encryption devices, namely, layer 2 link encryptors, virtual private network gateways, smart cards and hardware security modules with an embedded integrated circuit containing account and user identity information and protected with private encryption keys for purpose of authentication and secure transmission of information stored on the device; computer terminals for use with credit cards, debit cards and plastic smart cards with an embedded integrated circuit, namely, magnetic coded card readers and readers of plastic smart cards with an embedded integrated circuit; Computer software for ensuring the security of electronic mail; Computer software for encryption and cryptography; Computer software and hardware for identifying or preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; Cryptographic software featuring cryptographic algorithms; computer hardware incorporating cryptographic algorithms

Trademark Filing History

DescriptionDateEvent Coding
NEW APPLICATION ENTERED IN TRAM2017-11-171 NWAP I:Incoming Correspondence
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM2017-11-252 NWOS I:Incoming Correspondence
ASSIGNED TO EXAMINER2018-02-263 DOCK D:Assigned to Examiner
SUSPENSION LETTER WRITTEN2018-03-024 CNSL R:Renewal
LETTER OF SUSPENSION E-MAILED2018-03-025 GNSL F:First Action
NOTIFICATION OF LETTER OF SUSPENSION E-MAILED2018-03-026 GNS3 O:Outgoing Correspondence
ASSIGNED TO LIE2018-09-267 ALIE A:Allowance for Publication
LIE CHECKED SUSP - TO ATTY FOR ACTION2018-09-278 RCCK S:
SUSPENSION INQUIRY WRITTEN2018-10-119 CNSI R:Renewal
INQUIRY TO SUSPENSION E-MAILED2018-10-1110 GNSI S:
NOTIFICATION OF INQUIRY AS TO SUSPENSION E-MAILED2018-10-1111 GNS2 O:Outgoing Correspondence
TEAS RESPONSE TO SUSPENSION INQUIRY RECEIVED2019-04-1112 ERSI I:Incoming Correspondence
CORRESPONDENCE RECEIVED IN LAW OFFICE2019-04-2213 CRFA I:Incoming Correspondence
TEAS/EMAIL CORRESPONDENCE ENTERED2019-04-2214 TEME I:Incoming Correspondence
SUSPENSION LETTER WRITTEN2019-04-2215 CNSL R:Renewal
LETTER OF SUSPENSION E-MAILED2019-04-2216 GNSL S:
NOTIFICATION OF LETTER OF SUSPENSION E-MAILED2019-04-2217 GNS3 O:Outgoing Correspondence
TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED2019-07-0418 REAP I:Incoming Correspondence
ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED2019-07-0419 ARAA I:Incoming Correspondence
TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED2019-08-2620 REAP I:Incoming Correspondence
ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED2019-08-2621 ARAA I:Incoming Correspondence
LIE CHECKED SUSP - TO ATTY FOR ACTION2019-10-2922 RCCK S:
REPORT COMPLETED SUSPENSION CHECK CASE STILL SUSPENDED2019-11-2023 RCSC S:
SUSPENSION INQUIRY WRITTEN2020-06-0924 CNSI R:Renewal
INQUIRY TO SUSPENSION E-MAILED2020-06-0925 GNSI S:
NOTIFICATION OF INQUIRY AS TO SUSPENSION E-MAILED2020-06-0926 GNS2 O:Outgoing Correspondence
TEAS RESPONSE TO SUSPENSION INQUIRY RECEIVED2020-12-0927 ERSI I:Incoming Correspondence
CORRESPONDENCE RECEIVED IN LAW OFFICE2020-12-1028 CRFA I:Incoming Correspondence
TEAS/EMAIL CORRESPONDENCE ENTERED2020-12-1029 TEME I:Incoming Correspondence
SUSPENSION LETTER WRITTEN2021-01-0230 CNSL R:Renewal
LETTER OF SUSPENSION E-MAILED2021-01-0231 GNSL S:
NOTIFICATION OF LETTER OF SUSPENSION E-MAILED2021-01-0232 GNS3 O:Outgoing Correspondence
LIE CHECKED SUSP - TO ATTY FOR ACTION2021-08-3033 RCCK S:
TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED2021-09-2234 REAP I:Incoming Correspondence
ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED2021-09-2235 ARAA I:Incoming Correspondence
TEAS WITHDRAWAL OF ATTORNEY RECEIVED-FIRM RETAINS2021-09-2236 EWAF I:Incoming Correspondence
TEAS CHANGE OF CORRESPONDENCE RECEIVED2021-09-2237 TCCA I:Incoming Correspondence
SUSPENSION CHECKED ¿ TO ATTORNEY FOR ACTION2021-09-2438 RCCK S:
TEAS RESPONSE TO SUSPENSION INQUIRY RECEIVED2021-10-2239 ERSI I:Incoming Correspondence
SUSPENSION CHECKED ¿ TO ATTORNEY FOR ACTION2021-10-2540 RCCK S:
APPROVED FOR PUB - PRINCIPAL REGISTER2021-11-1941 CNSA O:Outgoing Correspondence
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED2021-12-0842 NONP E:E-Mail
PUBLISHED FOR OPPOSITION2021-12-2843 PUBO A:Allowance for Publication
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED2021-12-2844 NPUB E:E-Mail
REGISTERED-PRINCIPAL REGISTER2022-03-1545 R.PR A:Allowance for Publication

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed