Research | OneLook Acronym Finder |
Serial Number | 87708407 |
Registration Number | 5885989 |
Mark Drawing Code | 4000: Illustration: Drawing with word(s)/letter(s)/number(s) in Block form |
Attorney Name | Joe McKinney Muncy |
Attorney Docket Number | 5900/0550TUS |
Law Office Assigned | M60 |
Employee Name | NASSERGHODSI, SAHAR |
2017-07-21 | Date of First Use |
2017-12-05 | Application Filed |
2018-12-11 | Published for Opposition |
2019-09-11 | Location: PUBLICATION AND ISSUE SECTION |
2019-10-15 | Status: Live/Registered |
2019-10-15 | Trademark Registered |
2019-10-15 | Transaction Date |
Owner: | ForceShield, Inc. |
Address | 3790 El Camino Real, #1039 Palo Alto CA 94306 |
Legal Entity Type | Corporation |
Legal Entity State | CA |
Click the blue "Refresh" button to load certificates, specimines, application, and other documents.
International Codes: | 9 |
U.S. Codes: | 021,023,026,036,038 |
International Codes: | 42 |
U.S. Codes: | 100,101 |
Type Code | Type |
---|---|
GS0091 | Computer hardware; Computer hardware, namely, firewalls and networks security devices; Computer software for security and protection, namely, software for providing web security and protection, detecting suspicious or malicious user activity and cyber-related threats, monitoring of computer systems for detecting unauthorized access or data breach; Computer software, namely, software for protecting applications by concealing or reshaping the interfaces of a website; Computer software for providing security and protection of data, networks and communications; Downloadable computer software for providing security and protection of data, networks and communications; Computer software for identifying and preventing malicious attacks, unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; Computer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, boot kits, backdoors, cyber-attacks, malicious attacks and advanced persistent threats; Computer hardware, namely, network security appliances in the nature of network access server hardware, and network management stations in the nature of computer network server; Computer software, namely, network security software applications for controlling and managing access server applications; Computer software featuring self-protection mechanisms for detecting and removing computer viruses for vulnerable systems, effectively extending the defense perimeter of enterprises; Computer security and information technology products, namely, computer software for authorizing access to databases |
GS0091 | Computer hardware; Computer hardware, namely, firewalls and networks security devices; Computer software for security and protection, namely, software for providing web security and protection, detecting suspicious or malicious user activity and cyber-related threats, monitoring of computer systems for detecting unauthorized access or data breach; Computer software, namely, software for protecting applications by concealing or reshaping the interfaces of a website; Computer software for providing security and protection of data, networks and communications; Downloadable computer software for providing security and protection of data, networks and communications; Computer software for identifying and preventing malicious attacks, unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; Computer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, boot kits, backdoors, cyber-attacks, malicious attacks and advanced persistent threats; Computer hardware, namely, network security appliances in the nature of network access server hardware, and network management stations in the nature of computer network server; Computer software, namely, network security software applications for controlling and managing access server applications; Computer software featuring self-protection mechanisms for detecting and removing computer viruses for vulnerable systems, effectively extending the defense perimeter of enterprises; Computer security and information technology products, namely, computer software for authorizing access to databases |
Description | Date | Event Coding |
---|---|---|
NEW APPLICATION ENTERED IN TRAM | 2017-12-08 | 1 NWAP I:Incoming Correspondence |
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM | 2017-12-14 | 2 NWOS I:Incoming Correspondence |
ASSIGNED TO EXAMINER | 2018-03-17 | 3 DOCK D:Assigned to Examiner |
NON-FINAL ACTION WRITTEN | 2018-03-22 | 4 CNRT R:Renewal |
NON-FINAL ACTION E-MAILED | 2018-03-22 | 5 GNRT F:First Action |
NOTIFICATION OF NON-FINAL ACTION E-MAILED | 2018-03-22 | 6 GNRN O:Outgoing Correspondence |
TEAS RESPONSE TO OFFICE ACTION RECEIVED | 2018-08-30 | 7 TROA I:Incoming Correspondence |
ASSIGNED TO LIE | 2018-09-12 | 8 ALIE A:Allowance for Publication |
CORRESPONDENCE RECEIVED IN LAW OFFICE | 2018-09-13 | 9 CRFA I:Incoming Correspondence |
TEAS/EMAIL CORRESPONDENCE ENTERED | 2018-09-13 | 10 TEME I:Incoming Correspondence |
EXAMINERS AMENDMENT -WRITTEN | 2018-10-16 | 11 CNEA R:Renewal |
EXAMINERS AMENDMENT E-MAILED | 2018-10-16 | 12 GNEA O:Outgoing Correspondence |
NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED | 2018-10-16 | 13 GNEN O:Outgoing Correspondence |
EXAMINER'S AMENDMENT ENTERED | 2018-10-16 | 14 XAEC I:Incoming Correspondence |
EXAMINERS AMENDMENT -WRITTEN | 2018-10-31 | 15 CNEA R:Renewal |
EXAMINERS AMENDMENT E-MAILED | 2018-10-31 | 16 GNEA O:Outgoing Correspondence |
NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED | 2018-10-31 | 17 GNEN O:Outgoing Correspondence |
EXAMINER'S AMENDMENT ENTERED | 2018-10-31 | 18 XAEC I:Incoming Correspondence |
APPROVED FOR PUB - PRINCIPAL REGISTER | 2018-11-01 | 19 CNSA P: |
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | 2018-11-21 | 20 NONP E:E-Mail |
PUBLISHED FOR OPPOSITION | 2018-12-11 | 21 PUBO A:Allowance for Publication |
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | 2018-12-11 | 22 NPUB E:E-Mail |
NOA E-MAILED - SOU REQUIRED FROM APPLICANT | 2019-02-05 | 23 NOAM E:E-Mail |
TEAS STATEMENT OF USE RECEIVED | 2019-08-02 | 24 EISU I:Incoming Correspondence |
CASE ASSIGNED TO INTENT TO USE PARALEGAL | 2019-08-30 | 25 AITU A:Allowance for Publication |
USE AMENDMENT FILED | 2019-08-02 | 26 IUAF S: |
STATEMENT OF USE PROCESSING COMPLETE | 2019-09-04 | 27 SUPC I:Incoming Correspondence |
ALLOWED PRINCIPAL REGISTER - SOU ACCEPTED | 2019-09-11 | 28 CNPR P: |
NOTICE OF ACCEPTANCE OF STATEMENT OF USE E-MAILED | 2019-09-12 | 29 SUNA E:E-Mail |
REGISTERED-PRINCIPAL REGISTER | 2019-10-15 | 30 R.PR A:Allowance for Publication |
TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED | 2022-12-23 | 31 REAP I:Incoming Correspondence |
ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED | 2022-12-23 | 32 ARAA I:Incoming Correspondence |
TEAS CHANGE OF CORRESPONDENCE RECEIVED | 2022-12-23 | 33 TCCA I:Incoming Correspondence |
TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED | 2022-12-28 | 34 REAP I:Incoming Correspondence |
ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED | 2022-12-28 | 35 ARAA I:Incoming Correspondence |
TEAS CHANGE OF CORRESPONDENCE RECEIVED | 2022-12-28 | 36 TCCA I:Incoming Correspondence |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.