RSA

Dell Inc.

Application Filed: 2018-10-10
Trademark Application Details
Trademark Logo RSA

Mark For: RSA® trademark registration is intended to cover the categories of identity and access management software for computer and mobile device user identity authentication and management, password authentication, sign-on control, intrusion prevention and for governing, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications and cloud, mobile and network resources; Software for automating authentication and governance of identity over the internet and other computer networks; Software for risk analytics in connection with management of user identity authentication and access privileges of users to data, software applications and cloud, mobile and network resources; Software for management of user identity authentication and access privileges to aid in compliance with regulatory and industry data protection requirements, user provisioning, role management, policy automation, access certification short message service (SMS), and voice one time password (OTP), biometric software and hardware for providing computer and mobile device user identity authentication; Electronic security token in the nature of a fob-like device used by an authorized user of a computer system to authenticate user identity; Computer and network security software for identifying, managing and resolving cyber security incidents, data breaches and malware; Software for monitoring and improving the security of, and detecting, reporting, analyzing and protecting against cyber-attacks and threats directed at computers, computer systems, networks, computer and network hardware, software applications, digital devices, digital data, and mobile devices; Software for providing operational intelligence, business analytics, security information, troubleshooting, and monitoring of network security; Software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; Integrated risk management software for risk, quality and compliance management, enterprise and operational risk management, internal audit management, automating business continuity, crisis management and disaster recovery planning and execution, managing technology and security related risks, cataloging third parties, contracts, engagements and related risks, and managing regulatory, governmental and corporate compliance; Software for producing reports, dashboards, metrics and alerts related to risk, quality and compliance management, enterprise and operational risk management, internal audit management, automating business continuity, crisis management and disaster recovery planning and execution, managing technology and security related risks, cataloging third parties, contracts, engagements and related risks, and managing regulatory, governmental and corporate compliance; Software for electronic fraud and identity theft detection and prevention; Software for detecting, monitoring, managing and preventing fraud, financial crime, cybercrime, cyber threats, cyber-attacks, security attacks and intrusions; software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Software for managing user identity authentication and access privileges to aid in compliance with regulatory requirements; non-predictable code calculators, namely, computer hardware and computer software that generate security access codes for accessing host data bank computers; and computer software programs that issue and manage digital user indentities and access privileges for electronic commerce and security. [all]

Status

2024-03-12 UTC
LIVE REGISTRATION Issued and Active
The trademark application has been registered with the Office.


Research OneLook Acronym Finder
Serial Number88149695
Registration Number5768047
Mark Literal ElementsRSA
Mark Drawing Type4 - STANDARD CHARACTER MARK
Mark TypeTRADEMARK. SERVICE MARK
RegisterPRINCIPAL
Current LocationPUBLICATION AND ISSUE SECTION 2019-06-04
Basis1(a)
Class StatusACTIVE
Primary US Classes
  • 021: Electrical Apparatus, Machines and Supplies
  • 023: Cutlery, Machinery, Tools and Parts Thereof
  • 026: Measuring and Scientific Appliances
  • 036: Musical Instruments and Supplies
  • 038: Prints and Publications
Primary International Class
  • 009 - Primary Class
  • (Electrical and scientific apparatus) Scientific, nautical, surveying, electric, photographic, cinematographic, optical, weighing, measuring, signaling, checking (supervision), lifesaving and teaching apparatus and instruments; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
Filed UseYes
Current UseYes
Intent To UseNo
Filed ITUNo
44D FiledNo
44E CurrentNo
66A CurrentNo
Current BasisNo
No BasisNo
Attorney NameMichael Metteauer
Attorney Docket Number1001041318
Law Office AssignedM80
Employee NameNUNLEY, CHRISTOPHER M

Timeline

1999-09-30Date of First Use
1999-09-30Date of Use In Commerce
2018-10-10Application Filed
2018-11-25Location: LAW OFFICE 117 - EXAMINING ATTORNEY ASSIGNED
2018-11-25Status: Live/Pending
2019-02-11Transaction Date
2019-03-19Published
2019-03-19Published for Opposition
2019-06-04Location: PUBLICATION AND ISSUE SECTION
2019-06-04Status: Registered. The registration date is used to determine when post-registration maintenance documents are due.
2019-06-04Trademark Registered
2024-06-04Maintenance Early File Date
2025-06-04Maintenance On Time Date
2025-12-04Maintenance Late Fee Date

Trademark Parties (Applicants & Owners)

Party: Dell Inc.
Address174 Middlesex Turnpike Bedford, MASSACHUSETTS UNITED STATES 01730
Legal Entity TypeCorporation
Legal Entity StateDELAWARE
Party: RSA Security LLC
Address174 Middlesex Turnpike Bedford, MASSACHUSETTS UNITED STATES 01730
Legal Entity TypeLimited Liability Company
Legal Entity StateDELAWARE

*multiple parties listed, check assignment documents for ownership information

Attorney of Record

MICHAEL METTEAUER
NORTON ROSE FULBRIGHT US LLP
98 SAN JACINTO BLVD., SUITE 1100
AUSTIN, TX 78701

Good, Services, and Codes


IC 009. US 021 023 026 036 038. G & S: Identity and access management software for computer and mobile device user identity authentication and management, password authentication, sign-on control, intrusion prevention and for governing, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications and cloud, mobile and network resources; Software for automating authentication and governance of identity over the internet and other computer networks; Software for risk analytics in connection with management of user identity authentication and access privileges of users to data, software applications and cloud, mobile and network resources; Software for management of user identity authentication and access privileges to aid in compliance with regulatory and industry data protection requirements, user provisioning, role management, policy automation, access certification short message service (SMS), and voice one time password (OTP), biometric software and hardware for providing computer and mobile device user identity authentication; Electronic security token in the nature of a fob-like device used by an authorized user of a computer system to authenticate user identity; Computer and network security software for identifying, managing and resolving cyber security incidents, data breaches and malware; Software for monitoring and improving the security of, and detecting, reporting, analyzing and protecting against cyber-attacks and threats directed at computers, computer systems, networks, computer and network hardware, software applications, digital devices, digital data, and mobile devices; Software for providing operational intelligence, business analytics, security information, troubleshooting, and monitoring of network security; Software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; Integrated risk management software for risk, quality and compliance management, enterprise and operational risk management, internal audit management, automating business continuity, crisis management and disaster recovery planning and execution, managing technology and security related risks, cataloging third parties, contracts, engagements and related risks, and managing regulatory, governmental and corporate compliance; Software for producing reports, dashboards, metrics and alerts related to risk, quality and compliance management, enterprise and operational risk management, internal audit management, automating business continuity, crisis management and disaster recovery planning and execution, managing technology and security related risks, cataloging third parties, contracts, engagements and related risks, and managing regulatory, governmental and corporate compliance; Software for electronic fraud and identity theft detection and prevention; Software for detecting, monitoring, managing and preventing fraud, financial crime, cybercrime, cyber threats, cyber-attacks, security attacks and intrusions; software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Software for managing user identity authentication and access privileges to aid in compliance with regulatory requirements; non-predictable code calculators, namely, computer hardware and computer software that generate security access codes for accessing host data bank computers; and computer software programs that issue and manage digital user indentities and access privileges for electronic commerce and security. FIRST USE: 19990930. FIRST USE IN COMMERCE: 19990930
IC 035. US 100 101 102. G & S: Arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, and data security; Providing on-line employment listings in the fields of computer networks, computer security, information security, electronic security, cyber security, and data security. FIRST USE: 19930114. FIRST USE IN COMMERCE: 19930114
IC 041. US 100 101 107. G & S: Educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, and data security; providing a website featuring blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, and data security. FIRST USE: 19930114. FIRST USE IN COMMERCE: 19930114
IC 042. US 100 101. G & S: Software as a service (SaaS) services and cloud computing featuring identity and access management software for computer and mobile device user identity authentication and management, password authentication, sign-on control, intrusion prevention and for governing, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications and cloud, mobile and network resources; Software as a service (SaaS) services and cloud computing featuring software for automating authentication and governance of identity over the internet and other computer networks; Software as a service (SaaS) services and cloud computing featuring software for risk analytics in connection with management of user identity authentication and access privileges of users to data, software applications and cloud, mobile and network resources; Software as a service (SaaS) services and cloud computing featuring software for management of user identity authentication and access privileges to aid in compliance with regulatory and industry data protection requirements, user provisioning, role management, policy automation, access certification short message service (SMS), and voice one time password (OTP), biometric software and hardware for providing computer and mobile device user identity authentication; Software as a service (SaaS) services and cloud computing featuring computer and network security software for identifying, managing and resolving cyber security incidents, data breaches and malware; Software as a service (SaaS) services and cloud computing featuring software for monitoring and improving the security of, and detecting, reporting, analyzing and protecting against cyber-attacks and threats directed at computers, computer systems, networks, computer and network hardware, software applications, digital devices, digital data, and mobile devices; Software as a service (SaaS) services and cloud computing featuring software for providing operational intelligence, business analytics, security information, troubleshooting, and monitoring of network security; Software as a service (SaaS) services and cloud computing featuring software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; Software as a service (SaaS) services and cloud computing featuring integrated risk management software for risk, quality and compliance management, enterprise and operational risk management, internal audit management, automating business continuity, crisis management and disaster recovery planning and execution, managing technology and security related risks, cataloging third parties, contracts, engagements and related risks, and managing regulatory, governmental and corporate compliance; Software as a service (SaaS) services and cloud computing featuring software for producing reports, dashboards, metrics and alerts related to risk, quality and compliance management, enterprise and operational risk management, internal audit management, automating business continuity, crisis management and disaster recovery planning and execution, managing technology and security related risks, cataloging third parties, contracts, engagements and related risks, and managing regulatory, governmental and corporate compliance; Software as a service (SaaS) services and cloud computing featuring software for electronic fraud and identity theft detection and prevention; Software as a service (SaaS) services and cloud computing featuring software for detecting, monitoring, managing and preventing fraud, financial crime, cybercrime, cyber threats, cyber-attacks, security attacks and intrusions; Software as a service (SaaS) services and cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Software as a service (SaaS) services and cloud computing featuring software for managing user identity authentication and access privileges to aid in compliance with regulatory requirements; Authentication, issuance and validation of digital certificates; Identification verification services, namely, electronic credential verification services using technology to authenticate user identity; Providing user authentication services using multi-factor authentication for e-commerce transactions; Providing fraud detection services in the nature of electronic monitoring of electronic funds transfer, credit and debit card and electronic check transactions activity to detect fraud via the internet and digital platforms; Consulting services in the field of maintaining the security and integrity of databases in the nature of protecting data and information from unauthorized access; Consultation in the field of computer security to prevent data theft and identity theft. FIRST USE: 19931231. FIRST USE IN COMMERCE: 19931231

International Codes:9
U.S. Codes:021,023,026,036,038
International Codes:35
U.S. Codes:100,101,102
International Codes:41
U.S. Codes:100,101,107
International Codes:42
U.S. Codes:100,101
Type CodeType
GS0421Software as a service (SaaS) services and cloud computing featuring identity and access management software for computer and mobile device user identity authentication and management, password authentication, sign-on control, intrusion prevention and for governing, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications and cloud, mobile and network resources; Software as a service (SaaS) services and cloud computing featuring software for automating authentication and governance of identity over the internet and other computer networks; Software as a service (SaaS) services and cloud computing featuring software for risk analytics in connection with management of user identity authentication and access privileges of users to data, software applications and cloud, mobile and network resources; Software as a service (SaaS) services and cloud computing featuring software for management of user identity authentication and access privileges to aid in compliance with regulatory and industry data protection requirements, user provisioning, role management, policy automation, access certification short message service (SMS), and voice one time password (OTP), biometric software and hardware for providing computer and mobile device user identity authentication; Software as a service (SaaS) services and cloud computing featuring computer and network security software for identifying, managing and resolving cyber security incidents, data breaches and malware; Software as a service (SaaS) services and cloud computing featuring software for monitoring and improving the security of, and detecting, reporting, analyzing and protecting against cyber-attacks and threats directed at computers, computer systems, networks, computer and network hardware, software applications, digital devices, digital data, and mobile devices; Software as a service (SaaS) services and cloud computing featuring software for providing operational intelligence, business analytics, security information, troubleshooting, and monitoring of network security; Software as a service (SaaS) services and cloud computing featuring software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; Software as a service (SaaS) services and cloud computing featuring integrated risk management software for risk, quality and compliance management, enterprise and operational risk management, internal audit management, automating business continuity, crisis management and disaster recovery planning and execution, managing technology and security related risks, cataloging third parties, contracts, engagements and related risks, and managing regulatory, governmental and corporate compliance; Software as a service (SaaS) services and cloud computing featuring software for producing reports, dashboards, metrics and alerts related to risk, quality and compliance management, enterprise and operational risk management, internal audit management, automating business continuity, crisis management and disaster recovery planning and execution, managing technology and security related risks, cataloging third parties, contracts, engagements and related risks, and managing regulatory, governmental and corporate compliance; Software as a service (SaaS) services and cloud computing featuring software for electronic fraud and identity theft detection and prevention; Software as a service (SaaS) services and cloud computing featuring software for detecting, monitoring, managing and preventing fraud, financial crime, cybercrime, cyber threats, cyber-attacks, security attacks and intrusions; Software as a service (SaaS) services and cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Software as a service (SaaS) services and cloud computing featuring software for managing user identity authentication and access privileges to aid in compliance with regulatory requirements; Authentication, issuance and validation of digital certificates; Identification verification services, namely, providing authentication of personal identification information; Providing user authentication services in e-commerce transactions; Providing fraud detection services for electronic funds transfer, credit and debit card and electronic check transactions via a global computer network; Consulting services in the field of maintaining the security and integrity of databases; Regulatory compliance consulting; Consultation in the field of data theft and identity theft
GS0091Identity and access management software for computer and mobile device user identity authentication and management, password authentication, sign-on control, intrusion prevention and for governing, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications and cloud, mobile and network resources; Software for automating authentication and governance of identity over the internet and other computer networks; Software for risk analytics in connection with management of user identity authentication and access privileges of users to data, software applications and cloud, mobile and network resources; Software for management of user identity authentication and access privileges to aid in compliance with regulatory and industry data protection requirements, user provisioning, role management, policy automation, access certification short message service (SMS), and voice one time password (OTP), biometric software and hardware for providing computer and mobile device user identity authentication; Electronic security token in the nature of a fob-like device used by an authorized user of a computer system to authenticate user identity; Computer and network security software for identifying, managing and resolving cyber security incidents, data breaches and malware; Software for monitoring and improving the security of, and detecting, reporting, analyzing and protecting against cyber-attacks and threats directed at computers, computer systems, networks, computer and network hardware, software applications, digital devices, digital data, and mobile devices; Software for providing operational intelligence, business analytics, security information, troubleshooting, and monitoring of network security; Software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; Integrated risk management software for risk, quality and compliance management, enterprise and operational risk management, internal audit management, automating business continuity, crisis management and disaster recovery planning and execution, managing technology and security related risks, cataloging third parties, contracts, engagements and related risks, and managing regulatory, governmental and corporate compliance; Software for producing reports, dashboards, metrics and alerts related to risk, quality and compliance management, enterprise and operational risk management, internal audit management, automating business continuity, crisis management and disaster recovery planning and execution, managing technology and security related risks, cataloging third parties, contracts, engagements and related risks, and managing regulatory, governmental and corporate compliance; Software for electronic fraud and identity theft detection and prevention; Software for detecting, monitoring, managing and preventing fraud, financial crime, cybercrime, cyber threats, cyber-attacks, security attacks and intrusions; software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Software for managing user identity authentication and access privileges to aid in compliance with regulatory requirements; non-predictable code calculators, namely, computer hardware and computer software that generate security access codes for accessing host data bank computers; and computer software programs that issue and manage digital user indentities and access privileges for electronic commerce and security

Trademark Filing History

DescriptionDateProceeding Number
ASSIGNMENT OF OWNERSHIP NOT UPDATED AUTOMATICALLY2022-06-23
ASSIGNMENT OF OWNERSHIP NOT UPDATED AUTOMATICALLY2022-05-04
ASSIGNMENT OF OWNERSHIP NOT UPDATED AUTOMATICALLY2021-05-12
TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED2020-11-18
TEAS CHANGE OF OWNER ADDRESS RECEIVED2020-11-18
TEAS CHANGE OF CORRESPONDENCE RECEIVED2020-11-18
ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED2020-11-18
ASSIGNMENT OF OWNERSHIP NOT UPDATED AUTOMATICALLY2020-11-18
APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED2020-11-18
TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED2020-11-10
TEAS CHANGE OF OWNER ADDRESS RECEIVED2020-11-10
TEAS CHANGE OF CORRESPONDENCE RECEIVED2020-11-10
ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED2020-11-10
APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED2020-11-10
ASSIGNMENT OF OWNERSHIP NOT UPDATED AUTOMATICALLY2020-10-07
ASSIGNMENT OF OWNERSHIP NOT UPDATED AUTOMATICALLY2020-09-30
ASSIGNMENT OF OWNERSHIP NOT UPDATED AUTOMATICALLY2020-09-24
TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED2020-06-29
TEAS CHANGE OF OWNER ADDRESS RECEIVED2020-06-29
TEAS CHANGE OF CORRESPONDENCE RECEIVED2020-06-29
ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED2020-06-29
APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED2020-06-29
ASSIGNMENT OF OWNERSHIP NOT UPDATED AUTOMATICALLY2020-04-29
ASSIGNMENT OF OWNERSHIP NOT UPDATED AUTOMATICALLY2019-09-25
ASSIGNMENT OF OWNERSHIP NOT UPDATED AUTOMATICALLY2019-07-10
REGISTERED-PRINCIPAL REGISTER2019-06-04
PUBLISHED FOR OPPOSITION2019-03-19
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED2019-03-19
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED2019-02-27
LAW OFFICE PUBLICATION REVIEW COMPLETED2019-02-13
TEAS/EMAIL CORRESPONDENCE ENTERED2019-02-12
CORRESPONDENCE RECEIVED IN LAW OFFICE2019-02-12
APPROVED FOR PUB - PRINCIPAL REGISTER2019-02-12
ASSIGNED TO LIE2019-02-11
TEAS RESPONSE TO OFFICE ACTION RECEIVED2019-02-07
NOTIFICATION OF NON-FINAL ACTION E-MAILED2018-11-25
NON-FINAL ACTION WRITTEN2018-11-25
NON-FINAL ACTION E-MAILED2018-11-25
ASSIGNED TO EXAMINER2018-11-16
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM2018-10-20
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED2018-10-20
NEW APPLICATION ENTERED IN TRAM2018-10-13
NEW APPLICATION ENTERED2018-10-13

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed