PROVIEW PLUS

ProSOC, Inc.

Application Filed: 2018-06-18
Trademark Application Details
Trademark Logo PROVIEW PLUS

Mark For: PROVIEW PLUS® trademark registration is intended to cover the categories of computer hardware and software for analyzing and preventing cyber threats in the fields of computer security; computer software for provide real-time information security intelligence in the fields of computer, data, internet website, and network security; computer software for protecting and securing computer networks and applications; computer software for providing real-time security audits of an online application, network, and host. [all]

Status

2021-07-24 UTC
LIVE REGISTRATION Issued and Active
The trademark application has been registered with the Office.


Research OneLook Acronym Finder
Serial Number88005171
Registration Number6169903
Mark Literal ElementsPROVIEW PLUS
Mark Drawing Type4 - STANDARD CHARACTER MARK
Mark TypeTRADEMARK. SERVICE MARK
RegisterPRINCIPAL
Current LocationPUBLICATION AND ISSUE SECTION 2020-09-02
Basis1(a)
Class StatusACTIVE
Primary US Classes
  • 021: Electrical Apparatus, Machines and Supplies
  • 023: Cutlery, Machinery, Tools and Parts Thereof
  • 026: Measuring and Scientific Appliances
  • 036: Musical Instruments and Supplies
  • 038: Prints and Publications
Primary International Class
  • 009 - Primary Class
  • (Electrical and scientific apparatus) Scientific, nautical, surveying, electric, photographic, cinematographic, optical, weighing, measuring, signaling, checking (supervision), lifesaving and teaching apparatus and instruments; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
Filed UseNo
Current UseYes
Intent To UseNo
Filed ITUYes
44D FiledNo
44E CurrentNo
66A CurrentNo
Current BasisNo
No BasisNo
Attorney NameGlenn E. Von Tersch
Attorney Docket NumberPROFI014USTM
Law Office AssignedL90
Employee NameSOBRAL, CHRISTINA

Timeline

2018-06-18Application Filed
2019-04-08Location: TMEG LAW OFFICE 109 - EXAMINING ATTORNEY ASSIGNED
2019-04-08Status: Live/Pending
2019-04-08Transaction Date
2019-05-28Published
2019-05-28Published for Opposition
2019-06-27Date of First Use
2019-06-27Date of Use In Commerce
2020-09-02Location: PUBLICATION AND ISSUE SECTION
2020-10-06Status: Registered. The registration date is used to determine when post-registration maintenance documents are due.
2020-10-06Trademark Registered

Trademark Parties (Applicants & Owners)

Party: ProSOC, Inc.
Address1555 Faraday Avenue Carlsbad, CALIFORNIA UNITED STATES 92008
Legal Entity TypeCorporation
Legal Entity StateDELAWARE

Attorney of Record

GLENN E. VON TERSCH
MU P.C.
12702 VIA CORTINA, SUITE 101
DEL MAR, CA 92014

Good, Services, and Codes


IC 009. US 021 023 026 036 038. G & S: Computer hardware and software for analyzing and preventing cyber threats in the fields of computer security; computer software for provide real-time information security intelligence in the fields of computer, data, internet website, and network security; computer software for protecting and securing computer networks and applications; computer software for providing real-time security audits of an online application, network, and host. FIRST USE: 20190627. FIRST USE IN COMMERCE: 20190627
IC 041. US 100 101 107. G & S: Education, namely, providing classes, seminars, workshops, webinars and training in the fields of computer security. FIRST USE: 20190627. FIRST USE IN COMMERCE: 20190627
IC 042. US 100 101. G & S: Providing online non-downloadable software for analyzing and preventing cyber threats in the fields of computer security; providing online non-downloadable computer software for provide real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; computer security consultancy; computer security consultancy in the nature of providing technical recommendations and advice in the fields of internet website, network, and computer data security; computer security policy assessment; providing online non-downloadable computer software for providing real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; computer support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring vulnerability of networks, monitoring intrusions in networks; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; cybersecurity diagnostic services, namely, computer security threat analysis for protecting data and network access; cybersecurity computer hardware and software maintenance services; cybersecurity, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, detecting threats and intrusions, preventing intrusions; computer security, namely, cybersecurity policy assessment; cybersecurity support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; data security computer hardware and software maintenance services; data security, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; computer security, namely, data security policy assessment; data security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; computer services, namely, endpoint detection and response of software and hardware threats; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; firewall security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; firewall computer hardware and software security maintenance services; firewall security, namely, security threat analysis for protecting data; computer security, namely, firewall security policy assessment; firewall security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer hardware diagnostic services; computer hardware maintenance services; hardware security, namely, maintenance of computer hardware security systems; computer security, namely, hardware security policy assessment; hardware support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; hardware vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; information technology diagnostic services, namely, computer security threat analysis for protecting data; information technology maintenance services, namely, computer hardware and software maintenance services; information technology security, namely, security threat analysis for protecting data; computer security, namely, information technology security policy assessment; information technology support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance of computer software relating to computer security and prevention of computer risks; computer services, namely, managed detection and response of cyber intrusions and threats; managed security service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software, and web sites, of others in the fields of cybersecurity; computer network diagnostic services; computer network maintenance services for others; computer network security, namely, analysis for protecting data, administering digital credentials, enforcing network policies; computer network security policy assessment; computer network support services, namely, installation, administration, and troubleshooting of cybersecurity applications; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; password diagnostic services; computer software and hardware password maintenance services; password security, namely, providing authentication, issuance, validation and revocation of digital credentials; password support services, namely, providing help desk services to retrieve computer software and hardware passwords; password vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer security consultancy; security policy assessment, namely, data security consultancy; support services, namely, troubleshooting of computer software problems, troubleshooting of security problems; testing of computer software and hardware security systems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; penetration testing for computer security threats for computer hardware and software; providing temporary use of non- downloadable software for security operations center management; software diagnostic services, namely, computer security threat analysis for protecting data; computer software maintenance services; software security policy assessments, namely, computer security threat analysis for protecting data; software support services, namely, troubleshooting of computer software problems, troubleshooting of computer hardware and software security problems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability. FIRST USE: 20190627. FIRST USE IN COMMERCE: 20190627

International Codes:9
U.S. Codes:021,023,026,036,038
International Codes:41
U.S. Codes:100,101,107
International Codes:42
U.S. Codes:100,101
Type CodeType
GS0091computer hardware and software for analyzing and preventing cyber threats in the fields of computer security; computer software for provide real-time information security intelligence in the fields of computer, data, internet website, and network security; computer software for protecting and securing computer networks and applications; computer software for providing real-time security audits of an online application, network, and host
GS0091Computer hardware and software for analyzing and preventing cyber threats in the fields of computer security; computer software for provide real-time information security intelligence in the fields of computer, data, internet website, and network security; computer software for protecting and securing computer networks and applications; computer software for providing real-time security audits of an online application, network, and host

Trademark Filing History

DescriptionDateProceeding Number
REGISTERED-PRINCIPAL REGISTER2020-10-06
NOTICE OF ACCEPTANCE OF STATEMENT OF USE E-MAILED2020-09-03
ALLOWED PRINCIPAL REGISTER - SOU ACCEPTED2020-09-02
TEAS/EMAIL CORRESPONDENCE ENTERED2020-09-0166121
CORRESPONDENCE RECEIVED IN LAW OFFICE2020-09-0166121
TEAS RESPONSE TO OFFICE ACTION RECEIVED2020-08-27
SU - NON-FINAL ACTION - WRITTEN2020-02-2783185
NOTIFICATION OF NON-FINAL ACTION E-MAILED2020-02-27
NON-FINAL ACTION E-MAILED2020-02-27
STATEMENT OF USE PROCESSING COMPLETE2020-02-1065362
CASE ASSIGNED TO INTENT TO USE PARALEGAL2020-02-1065362
USE AMENDMENT FILED2020-01-2365362
TEAS STATEMENT OF USE RECEIVED2020-01-23
NOA E-MAILED - SOU REQUIRED FROM APPLICANT2019-07-23
PUBLISHED FOR OPPOSITION2019-05-28
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED2019-05-28
TEAS CHANGE OF CORRESPONDENCE RECEIVED2019-05-08
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED2019-05-08
LAW OFFICE PUBLICATION REVIEW COMPLETED2019-04-2466121
ASSIGNED TO LIE2019-04-2266121
APPROVED FOR PUB - PRINCIPAL REGISTER2019-04-08
TEAS/EMAIL CORRESPONDENCE ENTERED2019-04-0588889
TEAS RESPONSE TO OFFICE ACTION RECEIVED2019-04-04
CORRESPONDENCE RECEIVED IN LAW OFFICE2019-04-0488889
NOTIFICATION OF NON-FINAL ACTION E-MAILED2018-10-046325
NON-FINAL ACTION WRITTEN2018-10-0483185
NON-FINAL ACTION E-MAILED2018-10-046325
ASSIGNED TO EXAMINER2018-10-0483185
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM2018-06-23

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed