Offc Action Outgoing

RHIOT

GSFM, LLC

U.S. TRADEMARK APPLICATION NO. 88283304 - RHIOT - N/A


UNITED STATES PATENT AND TRADEMARK OFFICE (USPTO)

OFFICE ACTION (OFFICIAL LETTER) ABOUT APPLICANT’S TRADEMARK APPLICATION

 

U.S. APPLICATION SERIAL NO.  88283304

 

MARK: RHIOT

 

 

        

*88283304*

CORRESPONDENT ADDRESS:

       GSFM, LLC

       GSFM, LLC

       112 BERKSHIRE RD

       RALEIGH, NC 27608

       

 

CLICK HERE TO RESPOND TO THIS LETTER:

http://www.gov.uspto.report/trademarks/teas/response_forms.jsp

 

VIEW YOUR APPLICATION FILE

 

APPLICANT: GSFM, LLC

 

 

 

CORRESPONDENT’S REFERENCE/DOCKET NO:  

       N/A

CORRESPONDENT E-MAIL ADDRESS: 

       malassenet@gmail.com

 

 

 

OFFICE ACTION

 

STRICT DEADLINE TO RESPOND TO THIS LETTER

TO AVOID ABANDONMENT OF APPLICANT’S TRADEMARK APPLICATION, THE USPTO MUST RECEIVE APPLICANT’S COMPLETE RESPONSE TO THIS LETTER WITHIN 6 MONTHS OF THE ISSUE/MAILING DATE BELOW.  A RESPONSE TRANSMITTED THROUGH THE TRADEMARK ELECTRONIC APPLICATION SYSTEM (TEAS) MUST BE RECEIVED BEFORE MIDNIGHT EASTERN TIME OF THE LAST DAY OF THE RESPONSE PERIOD.

 

 

ISSUE/MAILING DATE: 4/11/2019

 

 

 

TEAS PLUS OR TEAS REDUCED FEE (TEAS RF) APPLICANTS – TO MAINTAIN LOWER FEE, ADDITIONAL REQUIREMENTS MUST BE MET, INCLUDING SUBMITTING DOCUMENTS ONLINE:  Applicants who filed their application online using the lower-fee TEAS Plus or TEAS RF application form must (1) file certain documents online using TEAS, including responses to Office actions (see TMEP §§819.02(b), 820.02(b) for a complete list of these documents); (2) maintain a valid e-mail correspondence address; and (3) agree to receive correspondence from the USPTO by e-mail throughout the prosecution of the application.  See 37 C.F.R. §§2.22(b), 2.23(b); TMEP §§819, 820.  TEAS Plus or TEAS RF applicants who do not meet these requirements must submit an additional processing fee of $125 per class of goods and/or services.  37 C.F.R. §§2.6(a)(1)(v), 2.22(c), 2.23(c); TMEP §§819.04, 820.04.  However, in certain situations, TEAS Plus or TEAS RF applicants may respond to an Office action by authorizing an examiner’s amendment by telephone or e-mail without incurring this additional fee.  

 

The referenced application has been reviewed by the assigned trademark examining attorney.  Applicant must respond timely and completely to the issue(s) below.  15 U.S.C. §1062(b); 37 C.F.R. §§2.62(a), 2.65(a); TMEP §§711, 718.03.

 

Summary of Refusals and/or Requirements

 

The following is a summary of the requirements and/or refusals outlined below to which the applicant must respond.

 

n  Likelihood of confusion refusal

n  Requirement to explain any industry meaning

n  Requirement to amend description of services

 

 

LIKELIHOOD OF CONFUSION

 

Registration of the applied-for mark is refused because of a likelihood of confusion with the mark in U.S. Registration No. 5620964.  Trademark Act Section 2(d), 15 U.S.C. §1052(d); see TMEP §§1207.01 et seq.  See the attached registration.

 

Trademark Act Section 2(d) bars registration of an applied-for mark that is so similar to a registered mark that it is likely consumers would be confused, mistaken, or deceived as to the commercial source of the goods and/or services of the parties.  See 15 U.S.C. §1052(d).  Likelihood of confusion is determined on a case-by-case basis by applying the factors set forth in In re E. I. du Pont de Nemours & Co., 476 F.2d 1357, 1361, 177 USPQ 563, 567 (C.C.P.A. 1973) (called the “du Pont factors”).  In re i.am.symbolic, llc, 866 F.3d 1315, 1322, 123 USPQ2d 1744, 1747 (Fed. Cir. 2017).  Only those factors that are “relevant and of record” need be considered.  M2 Software, Inc. v. M2 Commc’ns, Inc., 450 F.3d 1378, 1382, 78 USPQ2d 1944, 1947 (Fed. Cir. 2006) (citing Shen Mfg. Co. v. Ritz Hotel Ltd., 393 F.3d 1238, 1241, 73 USPQ2d 1350, 1353 (Fed. Cir. 2004)); see In re Inn at St. John’s, LLC, 126 USPQ2d 1742, 1744 (TTAB 2018). 

 

Although not all du Pont factors may be relevant, there are generally two key considerations in any likelihood of confusion analysis:  (1) the similarities between the compared marks and (2) the relatedness of the compared goods and/or services.  See In re i.am.symbolic, llc, 866 F.3d at 1322, 123 USPQ2d at 1747 (quoting Herbko Int’l, Inc. v. Kappa Books, Inc., 308 F.3d 1156, 1164-65, 64 USPQ2d 1375, 1380 (Fed. Cir. 2002)); Federated Foods, Inc. v. Fort Howard Paper Co.,544 F.2d 1098, 1103, 192 USPQ 24, 29 (C.C.P.A. 1976) (“The fundamental inquiry mandated by [Section] 2(d) goes to the cumulative effect of differences in the essential characteristics of the goods [or services] and differences in the marks.”); TMEP §1207.01.

 

The Marks at Issue

 

The applicant seeks to register RHIOT for:

 

Downloadable computer software and firmware for encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable computer software and firmware for encrypting and unencrypting programs, including compiled and source code; downloadable computer software and firmware for performing manipulations of encrypted data and programs; downloadable computer software and firmware for the private query of encrypted or unencrypted data; downloadable computer software and firmware for creating, transmitting, receiving, updating and storing encryption keys; downloadable computer software and firmware for creating, transmitting, receiving, updating and storing decryption keys, in Class 9

and

 

Computer software services, namely, software as a service (SaaS) services featuring software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; computer software services, namely, software as a service (SaaS) services featuring software for encrypting and unencrypting programs, including compiled, source code; computer software for performing manipulations of encrypted data and programs; computer software services, namely, software as a service (SaaS) services featuring software for the private query of encrypted or unencrypted data; computer software services, namely, software as a service (SaaS) services featuring software for creating, transmitting, receiving, updating and storing encryption keys; computer software services, namely, software as a service (SaaS) services featuring software for creating, transmitting, receiving, updating and storing decryption keys, in Class 42

 

The registered mark is RIOT LABS (with LABS disclaimed) for: Software as a service (SAAS) services featuring software for managed information security services, namely, software for providing comprehensive security incident monitoring, detection, correlation, analysis, and remediation, in Class 42.

 

The Marks are Highly Similar

 

Both marks share the common term, RIOT, or RHIOT.  Although marks are compared in their entireties, one feature of a mark may be more significant or dominant in creating a commercial impression.  See In re Detroit Athletic Co., 903 F.3d 1297, 1305, 128 USPQ2d 1047, 1050 (Fed. Cir. 2018) (citing In re Dixie Rests., 105 F.3d 1405, 1407, 41 USPQ2d 1531, 1533-34 (Fed. Cir. 1997)); TMEP §1207.01(b)(viii), (c)(ii).  Greater weight is often given to this dominant feature when determining whether marks are confusingly similar.  See In re Detroit Athletic Co., 903 F.3d at 1305, 128 USPQ2d at 1050 (citing In re Dixie Rests., 105 F.3d at 1407, 41 USPQ2d at 1533-34).

 

The terms are essentially phonetic equivalents and thus sound similar.  Similarity in sound alone may be sufficient to support a finding that the marks are confusingly similar.  In re White Swan Ltd., 8 USPQ2d 1534, 1535 (TTAB 1988); see In re 1st USA Realty Prof’ls, Inc., 84 USPQ2d 1581, 1586 (TTAB 2007); TMEP §1207.01(b)(iv).

 

 

The Goods/Services are Closely Related

 

The applicant’s downloadable software and web-based software services are used for encryption and decryption of files, programs and data. The registrant’s web-based software services are used to provide security incident monitoring, detection, correlation, analysis and remediation. The examining attorney has attached sample websites that show security services of the types mentioned above employ encryption and decryption to advance their objectives.  See, e.g.:

 

http://www.infosec.gov.hk/english/computer/encrypt.html - Encryption is a process for scrambling and transforming data from an easily readable and understandable format (such as Plain Text) into an unintelligible format that seems to be useless and not readily understandable (known as Cipher Text).

Encryption techniques are used to protect data and enforce confidentiality during transmission and storage. Encryption is also used for e-commerce, wireless network security and remote access to prevent spoofing and eavesdropping. Data, files, emails, even whole hard disks can be encrypted.

http://www.upwork.com/hiring/development/introduction-to-encryption-data-security/ There’s a time-tested science that is increasingly becoming a crucial link in the security chain: encryption. Encryption scrambles text to make it unreadable by anyone other than those with the keys to decode it, and it’s becoming less of an added option and more of a must-have element in any security strategy for its ability to slow down and even deter hackers from stealing sensitive information. If good encryption is capable of hindering investigations by FBI experts, consider what it could do for you and your company’s sensitive information.

If you’ve been putting off adopting encryption as a part of your security policy, delay no more. Here’s a guide to the science of encryption, and how you can begin implementing an encryption strategy today.

 

http://searchsecurity.techtarget.com/definition/encryption In computing, encryption is the method by which plaintext or any other type of data is converted from a readable form to an encoded version that can only be decoded by another entity if they have access to a decryption key. Encryption is one of the most important methods for providing data security, especially for end-to-end protection of data transmitted across networks. Encryption is widely used on the internet to protect user information being sent between a browser and a server, including passwords, payment information and other personal information that should be considered private. Organizations and individuals also commonly use encryption to protect sensitive data stored on computers, servers and mobile devices like phones or tablets.

 

The above evidence shows that the software and software services of the applicant and software services of the registrant are complementary to one another in performing data security and protection tasks.  Where evidence shows that the goods at issue have complementary uses, and thus are often used together or otherwise purchased by the same purchasers for the same or related purposes, such goods have generally been found to be sufficiently related such that confusion would be likely if they are marketed under the same or similar marks.  See In re Martin’s Famous Pastry Shoppe, Inc., 748 F.2d 1565, 1567, 223 USPQ 1289, 1290 (Fed. Cir. 1984) (holding bread and cheese to be related because they are often used in combination and noting that “[s]uch complementary use has long been recognized as a relevant consideration in determining a likelihood of confusion”); In re Toshiba Med. Sys. Corp., 91 USPQ2d 1266, 1272 (TTAB 2009) (holding medical MRI diagnostic apparatus and medical ultrasound devices to be related, based in part on the fact that such goods have complementary purposes because they may be used by the same medical personnel on the same patients to treat the same disease). 

 

Since the dominant elements of both marks create the same commercial impression and the goods/services are closely related, consumers are likely to believe that the goods/services of the parties emanate from the same source. Therefore, registration is refused under Section 2(d) of the Trademark Act.

 

Although applicant’s mark has been refused registration, applicant may respond to the refusal(s) by submitting evidence and arguments in support of registration.  However, if applicant responds to the refusal(s), applicant must also respond to the requirement(s) set forth below.

 

MEANING

 

To permit proper examination of the application, applicant must explain whether the wording in the mark “RHIOT” or “RIOT” has any significance in the applicant’s field and/or the data security and encryption/decryption trade or industry or as applied to applicant’s goods and/or services, or if such wording is a “term of art” within applicant’s industry, as a word, acronym, abbreviation or other form.  See 37 C.F.R. §2.61(b); TMEP §814.  Failure to comply with a request for information is grounds for refusing registration.  In re Harley, 119 USPQ2d 1755, 1757-58 (TTAB 2016); TMEP §814.

 

 

SERVICES

 

Class 9 is acceptable. The following pertains to Class 42.

 

The wording noted below in the identification of services is indefinite and must be clarified because its nature is not clear and it could be classified in either Class 9 or 42.  See 37 C.F.R. §2.32(a)(6); TMEP §1402.01.  Applicant must amend this wording to specify the common commercial or generic name of the services.  See TMEP §1402.01.  If the services have no common commercial or generic name, applicant must describe or explain the nature of the services using clear and succinct language.  See id.

 

In Class 42, the wording “computer software for performing manipulations of encrypted data and programs” is indefinite because the applicant must specify the nature of the software services, e.g., software as a service (SaaS) services, or the nature of the software as a good, e.g., recorded computer software for performing manipulations of encrypted data and programs.  The downloadable software with this function already appears in Class 9.

 

Software could identify goods and/or services in three international classes – as a product in International Class 9 or a service in International Class 41 or 42.  See 37 C.F.R. §2.32(a)(6); TMEP §§1402.03(d), 1402.11(a).  Applicant must specify the purpose or function of the software, and if content- or field-specific, the content or field of use of the software.  TMEP §1402.03(d).   

 

Computer software is a product classified in International Class 9 if it is (1) recorded on media (such as CDs) or (2) downloadable and thus can be transferred or copied from a remote computer system for use on a long-term basis.  TMEP §1402.03(d).  However, on-line non-downloadable software is considered a computer service in International Class 42, unless it is non-downloadable game software provided online or for temporary use, which is classified in International Class 41.  See TMEP §§1402.03(d), 1402.11(a)(xii).

 

Applicant may substitute the following wording, if accurate. Suggested changes and additions are in bold and items the applicant must clarify are in italics. Wording that is extraneous, and which should be deleted, has a line drawn through it.

 

Class 9:           Downloadable computer software and firmware for encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable computer software and firmware for encrypting and unencrypting programs, including compiled and source code; downloadable computer software and firmware for performing manipulations of encrypted data and programs; downloadable computer software and firmware for the private query of encrypted or unencrypted data; downloadable computer software and firmware for creating, transmitting, receiving, updating and storing encryption keys; downloadable computer software and firmware for creating, transmitting, receiving, updating and storing decryption keys; recorded computer software for performing manipulations of encrypted data and programs

 

 

Class 42:         Computer software services, namely, software as a service (SaaS) services featuring software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; computer software services, namely, software as a service (SaaS) services featuring software for encrypting and unencrypting programs, including compiled, source code; software as a service (SaaS) services featuring computer software for performing manipulations of encrypted data and programs; computer software services, namely, software as a service (SaaS) services featuring software for the private query of encrypted or unencrypted data; computer software services, namely, software as a service (SaaS) services featuring software for creating, transmitting, receiving, updating and storing encryption keys; computer software services, namely, software as a service (SaaS) services featuring software for creating, transmitting, receiving, updating and storing decryption keys.

 

 

Applicant may amend the identification to clarify or limit the goods and/or services, but not to broaden or expand the goods and/or services beyond those in the original application or as acceptably amended.  See 37 C.F.R. §2.71(a); TMEP §1402.06.  Generally, any deleted goods and/or services may not later be reinserted.  See TMEP §1402.07(e).

 

For assistance with identifying and classifying goods and services in trademark applications, please see the USPTO’s online searchable U.S. Acceptable Identification of Goods and Services Manual.  See TMEP §1402.04.

 

 

 

Response guidelines.  For this application to proceed, applicant must explicitly address each refusal and/or requirement in this Office action.  For a refusal, applicant may provide written arguments and evidence against the refusal, and may have other response options if specified above.  For a requirement, applicant should set forth the changes or statements.  Please see “Responding to Office Actions” and the informational video “Response to Office Action” for more information and tips on responding.

 

Beware of misleading notices sent by private companies about your application.  Private companies not associated with the USPTO often use public information provided in USPTO trademark applications to mail and email trademark-related offers and notices – most of which require fees.  These companies often have names similar to the USPTO.  All official USPTO correspondence will only be emailed from the domain “@uspto.gov.”  For a current list of companies the USPTO has received complaints about, information on how to identify these offers and notices, and what to do if you receive one, see the misleading notices webpage. 

 

Legal assistance. Because of the legal technicalities and strict deadlines involved in the USPTO application process, applicant may wish to hire a private attorney specializing in trademark matters to represent applicant in this process and provide legal advice.  Although the undersigned trademark examining attorney is permitted to help an applicant understand the contents of an Office action as well as the application process in general, no USPTO attorney or staff is permitted to give an applicant legal advice or statements about an applicant’s legal rights.  TMEP §§705.02, 709.06. 

 

For attorney referral information, applicant may consult the American Bar Association’s Consumers’ Guide to Legal Help; an online directory of legal professionals, such as FindLaw®; or a local telephone directory.  The USPTO, however, may not assist an applicant in the selection of a private attorney.  37 C.F.R. §2.11.

 

Please call or email the assigned trademark examining attorney with questions about this Office action.  Although the trademark examining attorney cannot provide legal advice or statements about applicant’s rights, the trademark examining attorney can provide applicant with additional explanation about the refusal(s) and/or requirement(s) in this Office action.  See TMEP §§705.02, 709.06.  Although the USPTO does not accept emails as responses to Office actions, emails can be used for informal communications and will be included in the application record.  See 37 C.F.R. §§2.62(c), 2.191; TMEP §§304.01-.02, 709.04-.05. 

 

 

 

/Elissa Garber Kon/

Examining Attorney, Law Office 106

phone:  571-272-9181

email:  elissagarber.kon@uspto.gov

 

 

TO RESPOND TO THIS LETTER:  Go to http://www.gov.uspto.report/trademarks/teas/response_forms.jsp.  Please wait 48-72 hours from the issue/mailing date before using the Trademark Electronic Application System (TEAS), to allow for necessary system updates of the application.  For technical assistance with online forms, e-mail TEAS@uspto.gov.  For questions about the Office action itself, please contact the assigned trademark examining attorney.  E-mail communications will not be accepted as responses to Office actions; therefore, do not respond to this Office action by e-mail.

 

All informal e-mail communications relevant to this application will be placed in the official application record.

 

WHO MUST SIGN THE RESPONSE:  It must be personally signed by an individual applicant or someone with legal authority to bind an applicant (i.e., a corporate officer, a general partner, all joint applicants).  If an applicant is represented by an attorney, the attorney must sign the response. 

 

PERIODICALLY CHECK THE STATUS OF THE APPLICATION:  To ensure that applicant does not miss crucial deadlines or official notices, check the status of the application every three to four months using the Trademark Status and Document Retrieval (TSDR) system at http://tsdr.gov.uspto.report/.  Please keep a copy of the TSDR status screen.  If the status shows no change for more than six months, contact the Trademark Assistance Center by e-mail at TrademarkAssistanceCenter@uspto.gov or call 1-800-786-9199.  For more information on checking status, see http://www.gov.uspto.report/trademarks/process/status/.

 

TO UPDATE CORRESPONDENCE/E-MAIL ADDRESS:  Use the TEAS form at http://www.gov.uspto.report/trademarks/teas/correspondence.jsp.

 

 

Offc Action Outgoing [image/jpeg]

Offc Action Outgoing [image/jpeg]

Offc Action Outgoing [image/jpeg]

Offc Action Outgoing [image/jpeg]

Offc Action Outgoing [image/jpeg]

Offc Action Outgoing [image/jpeg]

Offc Action Outgoing [image/jpeg]

Offc Action Outgoing [image/jpeg]

Offc Action Outgoing [image/jpeg]

Offc Action Outgoing [image/jpeg]

Offc Action Outgoing [image/jpeg]

Offc Action Outgoing [image/jpeg]

Offc Action Outgoing [image/jpeg]

Offc Action Outgoing [image/jpeg]

Offc Action Outgoing [image/jpeg]

Offc Action Outgoing [image/jpeg]

Offc Action Outgoing [image/jpeg]

U.S. TRADEMARK APPLICATION NO. 88283304 - RHIOT - N/A

To: GSFM, LLC (malassenet@gmail.com)
Subject: U.S. TRADEMARK APPLICATION NO. 88283304 - RHIOT - N/A
Sent: 4/11/2019 9:45:34 AM
Sent As: ECOM106@USPTO.GOV
Attachments:

UNITED STATES PATENT AND TRADEMARK OFFICE (USPTO)

 

 

IMPORTANT NOTICE REGARDING YOUR

U.S. TRADEMARK APPLICATION

 

USPTO OFFICE ACTION (OFFICIAL LETTER) HAS ISSUED

ON 4/11/2019 FOR U.S. APPLICATION SERIAL NO. 88283304

 

Your trademark application has been reviewed.  The trademark examining attorney assigned by the USPTO to your application has written an official letter to which you must respond.  Please follow these steps:

 

(1)  Read the LETTER by clicking on this link or going to http://tsdr.gov.uspto.report/, entering your U.S. application serial number, and clicking on “Documents.”

 

The Office action may not be immediately viewable, to allow for necessary system updates of the application, but will be available within 24 hours of this e-mail notification. 

 

(2)  Respond within 6 months (or sooner if specified in the Office action), calculated from 4/11/2019, using the Trademark Electronic Application System (TEAS) response form located at http://www.gov.uspto.report/trademarks/teas/response_forms.jsp.  A response transmitted through TEAS must be received before midnight Eastern Time of the last day of the response period.

 

Do NOT hit “Reply” to this e-mail notification, or otherwise e-mail your response because the USPTO does NOT accept e-mails as responses to Office actions. 

 

(3)  Questions about the contents of the Office action itself should be directed to the trademark examining attorney who reviewed your application, identified below. 

 

/Elissa Garber Kon/

Examining Attorney, Law Office 106

phone:  571-272-9181

email:  elissagarber.kon@uspto.gov

 

 

WARNING

 

Failure to file the required response by the applicable response deadline will result in the ABANDONMENT of your application.  For more information regarding abandonment, see http://www.gov.uspto.report/trademarks/basics/abandon.jsp. 

 

PRIVATE COMPANY SOLICITATIONS REGARDING YOUR APPLICATION:  Private companies not associated with the USPTO are using information provided in trademark applications to mail or e-mail trademark-related solicitations.  These companies often use names that closely resemble the USPTO and their solicitations may look like an official government document.  Many solicitations require that you pay “fees.” 

 

Please carefully review all correspondence you receive regarding this application to make sure that you are responding to an official document from the USPTO rather than a private company solicitation.  All official USPTO correspondence will be mailed only from the “United States Patent and Trademark Office” in Alexandria, VA; or sent by e-mail from the domain “@uspto.gov.”  For more information on how to handle private company solicitations, see http://www.gov.uspto.report/trademarks/solicitation_warnings.jsp.

 

 


uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed