X8

X8 Llc

Application Filed: 2018-11-07
Trademark Application Details
Trademark Logo X8

Mark For: X8® trademark registration is intended to cover the categories of information technology consultancy services in the fields of cyber security and computer network security; information technology consulting services in the fields of computer science, data encryption, data management, cyber security, fraud, terrorism, intelligence analysis, threat analytics, analyzing computer networks to identify malicious threats, identifying computer network and computer system vulnerabilities, identifying suspicious behavior with potential to compromise computer systems, and computer threat detection; providing computer security consultancy in the nature of security compliance reporting, security intelligence and log management for cyber security and computer network security; providing information in the fields of cyber security and computer network threats; computer security consultancy; computer security threat analysis for protecting data; computer network and information technology services in the nature of computer security consultancy and data security consultancy namely, cyber security engineering, creating policies and strategies to defend against cyber security and computer network threats; maintenance of computer software and computer systems relating to computer security and prevention of security risks; computer system design services, computer software design in the nature of computer system and computer network architectural design services in the fields of cyber security and computer network security; testing of computer software and testing of computer hardware in the nature of computer system and computer network test and evaluation services for cyber security and computer network threat analysis; updating of computer software relating to computer security and preventions of computer risks; research, design, development of computer software, computer firmware, computer hardware, computer systems and computer architectures and customization of computer software, computer firmware, computer systems and computer architectures for cyber security and computer network threats and defense; technology consulting services in the fields of computer software and consultancy in the design and development of computer hardware, namely, systems development, engineering, integration, data engineering, data processing and data analytics for cyber security and computer network security; providing information, advice and consultancy in the nature of cyber security and computer network security relating to computer security, computer network security and communications network security; cyber security, computer network security and internet security consultancy in the nature of technical support and consulting services in the fields of cyber security and computer network security and computer network vulnerability of computers, computer systems, computer networks, computer hardware, computer software applications, digital devices, digital data, and mobile devices; information technology security consulting services in the nature of information integration and risk assessment relating to cyber security; Computer-aided engineering services for others in the field of cyber security and computer network security; software as a service (SaaS) services featuring software for cyber security for the detection of evidence of malware, computer viruses, network irregularities, security breaches, and persistent threats from third party sources. [all]

Status

2021-04-08 UTC
LIVE REGISTRATION Issued and Active
The trademark application has been registered with the Office.


Research OneLook Acronym Finder
Serial Number88184410
Registration Number5958769
Mark Literal ElementsX8
Mark Drawing Type4 - STANDARD CHARACTER MARK
Mark TypeSERVICE MARK
RegisterPRINCIPAL
Current LocationPUBLICATION AND ISSUE SECTION 2020-01-14
Basis1(a)
Class StatusACTIVE
Primary US Classes
  • 100: Miscellaneous
  • 101: Advertising and Business
Primary International Class
  • 042 - Primary Class
  • (Computer, scientific & legal) Scientific and technological services and research and design relating thereto: industrial analysis and research services; design and development of computer hardware and software; legal services.
Filed UseYes
Current UseYes
Intent To UseNo
Filed ITUNo
44D FiledNo
44E CurrentNo
66A CurrentNo
Current BasisNo
No BasisNo
Attorney NameRoger H. Bora
Attorney Docket Number100507.00001
Law Office AssignedN50
Employee NameRADCLIFF, BRENT MARCUS

Timeline

2014-03-00Date of First Use
2014-03-01Date of First Use
2014-03-01Date of Use In Commerce
2018-11-07Application Filed
2019-09-23Location: PUBLICATION AND ISSUE SECTION
2019-10-29Published
2019-10-29Published for Opposition
2019-10-29Status: Live/Pending
2019-10-29Transaction Date
2020-01-14Location: PUBLICATION AND ISSUE SECTION
2020-01-14Status: Registered. The registration date is used to determine when post-registration maintenance documents are due.
2020-01-14Trademark Registered

Trademark Parties (Applicants & Owners)

Party: X8 LLC
Address5520 Research Park Drive, Suite 100 Baltimore, MARYLAND UNITED STATES 21228
Legal Entity TypeLimited Liability Company
Legal Entity StateMARYLAND

Attorney of Record

Roger H. Bora
THOMPSON HINE LLP
10050 INNOVATION DRIVE, SUITE 400
DAYTON, OH, 45342

Good, Services, and Codes


IC 042. US 100 101. G & S: Information technology consultancy services in the fields of cyber security and computer network security; information technology consulting services in the fields of computer science, data encryption, data management, cyber security, fraud, terrorism, intelligence analysis, threat analytics, analyzing computer networks to identify malicious threats, identifying computer network and computer system vulnerabilities, identifying suspicious behavior with potential to compromise computer systems, and computer threat detection; providing computer security consultancy in the nature of security compliance reporting, security intelligence and log management for cyber security and computer network security; providing information in the fields of cyber security and computer network threats; computer security consultancy; computer security threat analysis for protecting data; computer network and information technology services in the nature of computer security consultancy and data security consultancy namely, cyber security engineering, creating policies and strategies to defend against cyber security and computer network threats; maintenance of computer software and computer systems relating to computer security and prevention of security risks; computer system design services, computer software design in the nature of computer system and computer network architectural design services in the fields of cyber security and computer network security; testing of computer software and testing of computer hardware in the nature of computer system and computer network test and evaluation services for cyber security and computer network threat analysis; updating of computer software relating to computer security and preventions of computer risks; research, design, development of computer software, computer firmware, computer hardware, computer systems and computer architectures and customization of computer software, computer firmware, computer systems and computer architectures for cyber security and computer network threats and defense; technology consulting services in the fields of computer software and consultancy in the design and development of computer hardware, namely, systems development, engineering, integration, data engineering, data processing and data analytics for cyber security and computer network security; providing information, advice and consultancy in the nature of cyber security and computer network security relating to computer security, computer network security and communications network security; cyber security, computer network security and internet security consultancy in the nature of technical support and consulting services in the fields of cyber security and computer network security and computer network vulnerability of computers, computer systems, computer networks, computer hardware, computer software applications, digital devices, digital data, and mobile devices; information technology security consulting services in the nature of information integration and risk assessment relating to cyber security; Computer-aided engineering services for others in the field of cyber security and computer network security; software as a service (SaaS) services featuring software for cyber security for the detection of evidence of malware, computer viruses, network irregularities, security breaches, and persistent threats from third party sources. FIRST USE: 20140300. FIRST USE IN COMMERCE: 20140300

International Codes:35
U.S. Codes:100,101,102
International Codes:42
U.S. Codes:100,101
Type CodeType
GS0421Information technology consultancy services in the fields of cyber security and computer network security; information technology consulting services in the fields of computer science, data encryption, data management, cyber security, fraud, terrorism, intelligence analysis, threat analytics, analyzing computer networks to identify malicious threats, identifying computer network and computer system vulnerabilities, identifying suspicious behavior with potential to compromise computer systems, and computer threat detection; providing computer security consultancy in the nature of security compliance reporting, security intelligence and log management for cyber security and computer network security; providing information in the fields of cyber security and computer network threats; computer security consultancy; computer security threat analysis for protecting data; computer network and information technology services in the nature of computer security consultancy and data security consultancy namely, cyber security engineering, creating policies and strategies to defend against cyber security and computer network threats; maintenance of computer software and computer systems relating to computer security and prevention of security risks; computer system design services, computer software design in the nature of computer system and computer network architectural design services in the fields of cyber security and computer network security; testing of computer software and testing of computer hardware in the nature of computer system and computer network test and evaluation services for cyber security and computer network threat analysis; updating of computer software relating to computer security and preventions of computer risks; research, design, development of computer software, computer firmware, computer hardware, computer systems and computer architectures and customization of computer software, computer firmware, computer systems and computer architectures for cyber security and computer network threats and defense; technology consulting services in the fields of computer software and consultancy in the design and development of computer hardware, namely, systems development, engineering, integration, data engineering, data processing and data analytics for cyber security and computer network security; providing information, advice and consultancy in the nature of cyber security and computer network security relating to computer security, computer network security and communications network security; cyber security, computer network security and internet security consultancy in the nature of technical support and consulting services in the fields of cyber security and computer network security and computer network vulnerability of computers, computer systems, computer networks, computer hardware, computer software applications, digital devices, digital data, and mobile devices; information technology security consulting services in the nature of information integration and risk assessment relating to cyber security; Computer-aided engineering services for others in the field of cyber security and computer network security; software as a service (SaaS) services featuring software for cyber security for the detection of evidence of malware, computer viruses, network irregularities, security breaches, and persistent threats from third party sources
GS0421Information technology consultancy services in the fields of cyber security and computer network security; information technology consulting services in the fields of computer science, data encryption, data management, cyber security, fraud, terrorism, intelligence analysis, threat analytics, analyzing computer networks to identify malicious threats, identifying computer network and computer system vulnerabilities, identifying suspicious behavior with potential to compromise computer systems, and computer threat detection; providing computer security consultancy in the nature of security compliance reporting, security intelligence and log management for cyber security and computer network security; providing information in the fields of cyber security and computer network threats; computer security consultancy; computer security threat analysis for protecting data; computer network and information technology services in the nature of computer security consultancy and data security consultancy namely, cyber security engineering, creating policies and strategies to defend against cyber security and computer network threats; maintenance of computer software and computer systems relating to computer security and prevention of security risks; computer system design services, computer software design in the nature of computer system and computer network architectural design services in the fields of cyber security and computer network security; testing of computer software and testing of computer hardware in the nature of computer system and computer network test and evaluation services for cyber security and computer network threat analysis; updating of computer software relating to computer security and preventions of computer risks; research, design, development of computer software, computer firmware, computer hardware, computer systems and computer architectures and customization of computer software, computer firmware, computer systems and computer architectures for cyber security and computer network threats and defense; technology consulting services in the fields of computer software and consultancy in the design and development of computer hardware, namely, systems development, engineering, integration, data engineering, data processing and data analytics for cyber security and computer network security; providing information, advice and consultancy in the nature of cyber security and computer network security relating to computer security, computer network security and communications network security; cyber security, computer network security and internet security consultancy in the nature of technical support and consulting services in the fields of cyber security and computer network security and computer network vulnerability of computers, computer systems, computer networks, computer hardware, computer software applications, digital devices, digital data, and mobile devices; information technology security consulting services in the nature of information integration and risk assessment relating to cyber security; Computer-aided engineering services for others in the field of cyber security and computer network security; software as a service (SaaS) services featuring software for cyber security for the detection of evidence of malware, computer viruses, network irregularities, security breaches, and persistent threats from third party sources

Trademark Filing History

DescriptionDateProceeding Number
REGISTERED-PRINCIPAL REGISTER2020-01-14
PUBLISHED FOR OPPOSITION2019-10-29
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED2019-10-29
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED2019-10-09
WITHDRAWN FROM PUB - SENIOR ATTORNEY REQUEST2019-09-1982103
PREVIOUS ALLOWANCE COUNT WITHDRAWN2019-09-19
NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED2019-09-196328
EXAMINERS AMENDMENT E-MAILED2019-09-196328
EXAMINERS AMENDMENT -WRITTEN2019-09-1993417
EXAMINER'S AMENDMENT ENTERED2019-09-1988888
APPROVED FOR PUB - PRINCIPAL REGISTER2019-09-19
NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED2019-09-176328
EXAMINERS AMENDMENT E-MAILED2019-09-176328
EXAMINERS AMENDMENT -WRITTEN2019-09-1793417
EXAMINER'S AMENDMENT ENTERED2019-09-1788888
APPROVED FOR PUB - PRINCIPAL REGISTER2019-09-17
TEAS/EMAIL CORRESPONDENCE ENTERED2019-08-2466121
CORRESPONDENCE RECEIVED IN LAW OFFICE2019-08-2466121
ASSIGNED TO LIE2019-08-2466121
TEAS RESPONSE TO OFFICE ACTION RECEIVED2019-08-15
NOTIFICATION OF NON-FINAL ACTION E-MAILED2019-02-166325
NON-FINAL ACTION WRITTEN2019-02-1693417
NON-FINAL ACTION E-MAILED2019-02-166325
ASSIGNED TO EXAMINER2019-02-1293417
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM2018-11-24
NEW APPLICATION ENTERED IN TRAM2018-11-10

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed