Mark For: X8® trademark registration is intended to cover the categories of
Research | OneLook Acronym Finder |
Serial Number | 88184410 |
Registration Number | 5958769 |
Mark Literal Elements | X8 |
Mark Drawing Type | 4 - STANDARD CHARACTER MARK |
Mark Type | SERVICE MARK |
Register | PRINCIPAL |
Current Location | PUBLICATION AND ISSUE SECTION 2020-01-14 |
Basis | 1(a) |
Class Status | ACTIVE |
Primary US Classes |
|
Primary International Class |
|
Filed Use | Yes |
Current Use | Yes |
Intent To Use | No |
Filed ITU | No |
44D Filed | No |
44E Current | No |
66A Current | No |
Current Basis | No |
No Basis | No |
Attorney Name | Roger H. Bora |
Attorney Docket Number | 100507.00001 |
Law Office Assigned | N50 |
Employee Name | RADCLIFF, BRENT MARCUS |
2014-03-00 | Date of First Use |
2014-03-01 | Date of First Use |
2014-03-01 | Date of Use In Commerce |
2018-11-07 | Application Filed |
2019-09-23 | Location: PUBLICATION AND ISSUE SECTION |
2019-10-29 | Published |
2019-10-29 | Published for Opposition |
2019-10-29 | Status: Live/Pending |
2019-10-29 | Transaction Date |
2020-01-14 | Location: PUBLICATION AND ISSUE SECTION |
2020-01-14 | Status: Registered. The registration date is used to determine when post-registration maintenance documents are due. |
2020-01-14 | Trademark Registered |
Party: | X8 LLC |
Address | 5520 Research Park Drive, Suite 100 Baltimore, MARYLAND UNITED STATES 21228 |
Legal Entity Type | Limited Liability Company |
Legal Entity State | MARYLAND |
Drawing | JPEG | 2018-11-07 |
Specimen | JPEG | 2018-11-07 |
TEAS RF New Application | MULTI | 2018-11-07 |
XSearch Search Summary | XML | 2019-02-15 |
Offc Action Outgoing | MULTI | 2019-02-16 |
Response to Office Action | XML | 2019-08-15 |
Amendment and Mail Process Complete | MULTI | 2019-08-27 |
Examiners Amendment | XML | 2019-09-17 |
Amendment and Mail Process Complete | MULTI | 2019-09-18 |
TRAM Snapshot of App at Pub for Oppostn | MULTI | 2019-09-18 |
Examiners Amendment | XML | 2019-09-19 |
Amendment and Mail Process Complete | MULTI | 2019-09-20 |
TRAM Snapshot of App at Pub for Oppostn | MULTI | 2019-09-20 |
Notice of Publication | XML | 2019-10-09 |
Notification Of Notice of Publication | XML | 2019-10-09 |
OG Publication Confirmation | XML | 2019-10-29 |
Registration Certificate | 2020-01-14 |
IC 042. US 100 101. G & S: Information technology consultancy services in the fields of cyber security and computer network security; information technology consulting services in the fields of computer science, data encryption, data management, cyber security, fraud, terrorism, intelligence analysis, threat analytics, analyzing computer networks to identify malicious threats, identifying computer network and computer system vulnerabilities, identifying suspicious behavior with potential to compromise computer systems, and computer threat detection; providing computer security consultancy in the nature of security compliance reporting, security intelligence and log management for cyber security and computer network security; providing information in the fields of cyber security and computer network threats; computer security consultancy; computer security threat analysis for protecting data; computer network and information technology services in the nature of computer security consultancy and data security consultancy namely, cyber security engineering, creating policies and strategies to defend against cyber security and computer network threats; maintenance of computer software and computer systems relating to computer security and prevention of security risks; computer system design services, computer software design in the nature of computer system and computer network architectural design services in the fields of cyber security and computer network security; testing of computer software and testing of computer hardware in the nature of computer system and computer network test and evaluation services for cyber security and computer network threat analysis; updating of computer software relating to computer security and preventions of computer risks; research, design, development of computer software, computer firmware, computer hardware, computer systems and computer architectures and customization of computer software, computer firmware, computer systems and computer architectures for cyber security and computer network threats and defense; technology consulting services in the fields of computer software and consultancy in the design and development of computer hardware, namely, systems development, engineering, integration, data engineering, data processing and data analytics for cyber security and computer network security; providing information, advice and consultancy in the nature of cyber security and computer network security relating to computer security, computer network security and communications network security; cyber security, computer network security and internet security consultancy in the nature of technical support and consulting services in the fields of cyber security and computer network security and computer network vulnerability of computers, computer systems, computer networks, computer hardware, computer software applications, digital devices, digital data, and mobile devices; information technology security consulting services in the nature of information integration and risk assessment relating to cyber security; Computer-aided engineering services for others in the field of cyber security and computer network security; software as a service (SaaS) services featuring software for cyber security for the detection of evidence of malware, computer viruses, network irregularities, security breaches, and persistent threats from third party sources. FIRST USE: 20140300. FIRST USE IN COMMERCE: 20140300
International Codes: | 35 |
U.S. Codes: | 100,101,102 |
International Codes: | 42 |
U.S. Codes: | 100,101 |
Type Code | Type |
---|---|
GS0421 | Information technology consultancy services in the fields of cyber security and computer network security; information technology consulting services in the fields of computer science, data encryption, data management, cyber security, fraud, terrorism, intelligence analysis, threat analytics, analyzing computer networks to identify malicious threats, identifying computer network and computer system vulnerabilities, identifying suspicious behavior with potential to compromise computer systems, and computer threat detection; providing computer security consultancy in the nature of security compliance reporting, security intelligence and log management for cyber security and computer network security; providing information in the fields of cyber security and computer network threats; computer security consultancy; computer security threat analysis for protecting data; computer network and information technology services in the nature of computer security consultancy and data security consultancy namely, cyber security engineering, creating policies and strategies to defend against cyber security and computer network threats; maintenance of computer software and computer systems relating to computer security and prevention of security risks; computer system design services, computer software design in the nature of computer system and computer network architectural design services in the fields of cyber security and computer network security; testing of computer software and testing of computer hardware in the nature of computer system and computer network test and evaluation services for cyber security and computer network threat analysis; updating of computer software relating to computer security and preventions of computer risks; research, design, development of computer software, computer firmware, computer hardware, computer systems and computer architectures and customization of computer software, computer firmware, computer systems and computer architectures for cyber security and computer network threats and defense; technology consulting services in the fields of computer software and consultancy in the design and development of computer hardware, namely, systems development, engineering, integration, data engineering, data processing and data analytics for cyber security and computer network security; providing information, advice and consultancy in the nature of cyber security and computer network security relating to computer security, computer network security and communications network security; cyber security, computer network security and internet security consultancy in the nature of technical support and consulting services in the fields of cyber security and computer network security and computer network vulnerability of computers, computer systems, computer networks, computer hardware, computer software applications, digital devices, digital data, and mobile devices; information technology security consulting services in the nature of information integration and risk assessment relating to cyber security; Computer-aided engineering services for others in the field of cyber security and computer network security; software as a service (SaaS) services featuring software for cyber security for the detection of evidence of malware, computer viruses, network irregularities, security breaches, and persistent threats from third party sources |
GS0421 | Information technology consultancy services in the fields of cyber security and computer network security; information technology consulting services in the fields of computer science, data encryption, data management, cyber security, fraud, terrorism, intelligence analysis, threat analytics, analyzing computer networks to identify malicious threats, identifying computer network and computer system vulnerabilities, identifying suspicious behavior with potential to compromise computer systems, and computer threat detection; providing computer security consultancy in the nature of security compliance reporting, security intelligence and log management for cyber security and computer network security; providing information in the fields of cyber security and computer network threats; computer security consultancy; computer security threat analysis for protecting data; computer network and information technology services in the nature of computer security consultancy and data security consultancy namely, cyber security engineering, creating policies and strategies to defend against cyber security and computer network threats; maintenance of computer software and computer systems relating to computer security and prevention of security risks; computer system design services, computer software design in the nature of computer system and computer network architectural design services in the fields of cyber security and computer network security; testing of computer software and testing of computer hardware in the nature of computer system and computer network test and evaluation services for cyber security and computer network threat analysis; updating of computer software relating to computer security and preventions of computer risks; research, design, development of computer software, computer firmware, computer hardware, computer systems and computer architectures and customization of computer software, computer firmware, computer systems and computer architectures for cyber security and computer network threats and defense; technology consulting services in the fields of computer software and consultancy in the design and development of computer hardware, namely, systems development, engineering, integration, data engineering, data processing and data analytics for cyber security and computer network security; providing information, advice and consultancy in the nature of cyber security and computer network security relating to computer security, computer network security and communications network security; cyber security, computer network security and internet security consultancy in the nature of technical support and consulting services in the fields of cyber security and computer network security and computer network vulnerability of computers, computer systems, computer networks, computer hardware, computer software applications, digital devices, digital data, and mobile devices; information technology security consulting services in the nature of information integration and risk assessment relating to cyber security; Computer-aided engineering services for others in the field of cyber security and computer network security; software as a service (SaaS) services featuring software for cyber security for the detection of evidence of malware, computer viruses, network irregularities, security breaches, and persistent threats from third party sources |
Description | Date | Proceeding Number |
---|---|---|
REGISTERED-PRINCIPAL REGISTER | 2020-01-14 | |
PUBLISHED FOR OPPOSITION | 2019-10-29 | |
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | 2019-10-29 | |
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | 2019-10-09 | |
WITHDRAWN FROM PUB - SENIOR ATTORNEY REQUEST | 2019-09-19 | 82103 |
PREVIOUS ALLOWANCE COUNT WITHDRAWN | 2019-09-19 | |
NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED | 2019-09-19 | 6328 |
EXAMINERS AMENDMENT E-MAILED | 2019-09-19 | 6328 |
EXAMINERS AMENDMENT -WRITTEN | 2019-09-19 | 93417 |
EXAMINER'S AMENDMENT ENTERED | 2019-09-19 | 88888 |
APPROVED FOR PUB - PRINCIPAL REGISTER | 2019-09-19 | |
NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED | 2019-09-17 | 6328 |
EXAMINERS AMENDMENT E-MAILED | 2019-09-17 | 6328 |
EXAMINERS AMENDMENT -WRITTEN | 2019-09-17 | 93417 |
EXAMINER'S AMENDMENT ENTERED | 2019-09-17 | 88888 |
APPROVED FOR PUB - PRINCIPAL REGISTER | 2019-09-17 | |
TEAS/EMAIL CORRESPONDENCE ENTERED | 2019-08-24 | 66121 |
CORRESPONDENCE RECEIVED IN LAW OFFICE | 2019-08-24 | 66121 |
ASSIGNED TO LIE | 2019-08-24 | 66121 |
TEAS RESPONSE TO OFFICE ACTION RECEIVED | 2019-08-15 | |
NOTIFICATION OF NON-FINAL ACTION E-MAILED | 2019-02-16 | 6325 |
NON-FINAL ACTION WRITTEN | 2019-02-16 | 93417 |
NON-FINAL ACTION E-MAILED | 2019-02-16 | 6325 |
ASSIGNED TO EXAMINER | 2019-02-12 | 93417 |
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM | 2018-11-24 | |
NEW APPLICATION ENTERED IN TRAM | 2018-11-10 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.