NORTON

NortonLifeLock Inc.

Application Filed: 2019-02-05
Trademark Application Details
Trademark Logo NORTON

The mark consists of a circle with a checkmark in the center of the circle appearing next to the word "NORTON".

Mark For: NORTON® trademark registration is intended to cover the categories of downloadable computer antivirus software; downloadable computer software for database management in the field of cryptographic network security and data security functions; downloadable computer software for providing network, Internet, and computer security; downloadable computer software for providing online identity protection and parental control; downloadable computer software for providing intrusion detection and prevention; downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; downloadable Internet security software, including computer software for use in the monitoring and control of computer and online activity; downloadable computer software for providing online transaction security; downloadable fraud protection software; downloadable computer optimization software; downloadable computer software to prevent, diagnose, and repair computer problems; downloadable computer maintenance software; downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable enterprise security software; downloadable firewall software; downloadable privacy control software; downloadable content filtering software; downloadable computer software for providing cryptographic network security and data security functions; downloadable computer software for integration of information logic and data between computer networks; downloadable computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; downloadable computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; downloadable computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; downloadable computer software for use in analysis and reporting of firewall log data; downloadable computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable computer software for encrypting and authenticating data; downloadable computer software for encryption; downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable computer software for the creation of virtual private network; downloadable computer software, namely, utility software; downloadable computer utility software for removal of computer applications and software; downloadable computer software for use in updating other computer software; downloadable computer software for file management and transfer; downloadable computer software and databases for use in diagnosis, repair and configuration of computers, computer software and computer peripherals; downloadable computer programs for data communications applications, and for the encryption and authentication of electronic information; downloadable computer software for identity security; downloadable computer software for authentication and identity management information security; downloadable computer software for digital information and data access; downloadable computer software for detecting identity fraud; downloadable computer software for use in networking computers; downloadable computer software for use in monitoring computers for security purposes; downloadable computer software for use in vulnerability scanning of networks and websites; downloadable computer software for use in detecting malware; downloadable user manuals and instructional guides supplied with all of the foregoing; downloadable electronic publications in the nature of manuals, blogs, instructional materials, teaching materials, and newsletters in the field of computer software and computer and on-line security. [all]

>Color is not claimed as a feature of the mark. The mark consists of a circle with a checkmark in the center of the circle appearing next to the word "NORTON".

Status

2020-10-09 UTC
LIVE APPLICATION Under Examination
The trademark application has been accepted by the Office (has met the minimum filing requirements) and that this application has been assigned to an examiner.


Research OneLook Acronym Finder
Serial Number88289816
Registration Number6329332
Mark Literal ElementsNORTON
Mark Drawing Type3 - AN ILLUSTRATION DRAWING WHICH INCLUDES WORD(S)/ LETTER(S)/NUMBER(S)
Mark TypeTRADEMARK. SERVICE MARK
Standard Character ClaimNo
RegisterPRINCIPAL
Current LocationINTENT TO USE SECTION 2020-03-04
Basis1(b)
Class StatusACTIVE
Primary US Classes
  • 021: Electrical Apparatus, Machines and Supplies
  • 023: Cutlery, Machinery, Tools and Parts Thereof
  • 026: Measuring and Scientific Appliances
  • 036: Musical Instruments and Supplies
  • 038: Prints and Publications
Primary International Class
  • 009 - Primary Class
  • (Electrical and scientific apparatus) Scientific, nautical, surveying, electric, photographic, cinematographic, optical, weighing, measuring, signaling, checking (supervision), lifesaving and teaching apparatus and instruments; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
Filed UseNo
Current UseNo
Intent To UseYes
Filed ITUYes
44D FiledNo
44E CurrentNo
66A CurrentNo
Current BasisNo
No BasisNo
Attorney NameSally M. Abel, Esq.
Attorney Docket Number25389-70404
Law Office AssignedN90
Employee NameBROWNING, LUKE CASH

Timeline

2019-02-05Application Filed
2019-07-23Published
2019-07-23Published for Opposition
2019-09-17Location: INTENT TO USE SECTION
2019-09-17Status: Live/Pending
2019-11-14Transaction Date
2020-03-04Location: INTENT TO USE SECTION
2020-09-21Status: A second request for extension of time to file a Statement of Use has been granted.
2021-04-20Trademark Registered

Trademark Parties (Applicants & Owners)

Party: NortonLifeLock Inc.
Address60 E Rio Salado Parkway, Suite 1000 Tempe, ARIZONA UNITED STATES 85281
Legal Entity TypeCorporation
Legal Entity StateDELAWARE
Party: Symantec Corporation
Address350 Ellis Street Mountain View DE 94043
Legal Entity Type
Legal Entity StateDE

*multiple parties listed, check assignment documents for ownership information

Documents

DrawingJPEG2019-02-05
TEAS RF New ApplicationMULTI2019-02-05
Design Search Code Corr ProjectAPPLICATION/XML2019-03-21
XSearch Search SummaryXML2019-04-17
Offc Action OutgoingXML2019-04-29
Response to Office ActionAPPLICATION/XML2019-05-16
Amendment and Mail Process CompleteMULTI2019-05-18
Examiners AmendmentXML2019-05-23
Notation to FileXML2019-05-23
Amendment and Mail Process CompleteMULTI2019-05-24
Examiners AmendmentXML2019-05-29
Notation to FileXML2019-05-29
Amendment and Mail Process CompleteMULTI2019-05-30
Examiners AmendmentXML2019-06-04
Notation to FileXML2019-06-04
Amendment and Mail Process CompleteMULTI2019-06-05
TRAM Snapshot of App at Pub for OppostnMULTI2019-06-05
Notice of PublicationXML2019-07-03
Notification Of Notice of PublicationXML2019-07-03
OG Publication ConfirmationXML2019-07-23
Post Publication AmendmentXML2019-08-02
Amendment and Mail Process CompleteMULTI2019-08-22
Notice of AllowanceAPPLICATION/XML2019-09-17
Change Address or Representation FormXML2020-02-20
Extension of Time to File SOUMULTI2020-02-20
ITU Extension ApprovalXML2020-03-05
ITU Unit ActionAPPLICATION/XML,IMAGE/JPEG2020-03-05
Extension of Time to File SOUAPPLICATION/XML,IMAGE/TIFF2020-09-17
ITU Extension ApprovalAPPLICATION/XML2020-09-22
ITU Unit ActionAPPLICATION/XML,IMAGE/JPEG2020-09-22

Design Search Codes

26.01.02Circles, plain single line; Plain single line circles
241715Check marks
260102Circles, plain single line; Plain single line circles

Attorney of Record

SALLY M. ABEL, ESQ.
FENWICK & WEST LLP
801 CALIFORNIA STREET
SILICON VALLEY CENTER
MOUNTAIN VIEW, CA 94041

Good, Services, and Codes


IC 009. US 021 023 026 036 038. G & S: Downloadable computer antivirus software; downloadable computer software for database management in the field of cryptographic network security and data security functions; downloadable computer software for providing network, Internet, and computer security; downloadable computer software for providing online identity protection and parental control; downloadable computer software for providing intrusion detection and prevention; downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; downloadable Internet security software, including computer software for use in the monitoring and control of computer and online activity; downloadable computer software for providing online transaction security; downloadable fraud protection software; downloadable computer optimization software; downloadable computer software to prevent, diagnose, and repair computer problems; downloadable computer maintenance software; downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable enterprise security software; downloadable firewall software; downloadable privacy control software; downloadable content filtering software; downloadable computer software for providing cryptographic network security and data security functions; downloadable computer software for integration of information logic and data between computer networks; downloadable computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; downloadable computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; downloadable computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; downloadable computer software for use in analysis and reporting of firewall log data; downloadable computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable computer software for encrypting and authenticating data; downloadable computer software for encryption; downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable computer software for the creation of virtual private network; downloadable computer software, namely, utility software; downloadable computer utility software for removal of computer applications and software; downloadable computer software for use in updating other computer software; downloadable computer software for file management and transfer; downloadable computer software and databases for use in diagnosis, repair and configuration of computers, computer software and computer peripherals; downloadable computer programs for data communications applications, and for the encryption and authentication of electronic information; downloadable computer software for identity security; downloadable computer software for authentication and identity management information security; downloadable computer software for digital information and data access; downloadable computer software for detecting identity fraud; downloadable computer software for use in networking computers; downloadable computer software for use in monitoring computers for security purposes; downloadable computer software for use in vulnerability scanning of networks and websites; downloadable computer software for use in detecting malware; downloadable user manuals and instructional guides supplied with all of the foregoing; downloadable electronic publications in the nature of manuals, blogs, instructional materials, teaching materials, and newsletters in the field of computer software and computer and on-line security
IC 042. US 100 101. G & S: Development of software for network and Internet security and data encryption; electronic storage of data; computer software consultation; Internet security consultancy, namely, computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization of software; on-line technical support services, namely, troubleshooting in the nature of diagnosing of computer hardware and software problems; technical and customer support services, namely, troubleshooting of computer software problems; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; technical support services, namely, providing back-up computer programs and facilities; updating of computer software for others; computer virus protection services; computer consultation in the field of computer security; computer diagnostic services; computer services, namely, data recovery services; computer software installation services; electronic notification and delivery of software updates; research services relating to computer hardware and computer software; technical consultation in the field of computer software installation and maintenance; development, updating, publishing and maintenance of software for networks and standalone computers in the fields of security, databases management, and anti-virus protection and monitoring security systems; providing information in the field of network and Internet security; providing technical information in the field of computer software applications; computer services, namely, providing information concerning the encryption and authentication of electronic data; providing information concerning authentication of user identification data for e-commerce transaction security; consultancy services in the fields of digital media, data encryption, computer security, communication security and computer software; encryption and decryption of data and communications; computer support services, namely, technical support and software update services; computer software and hardware technological consulting services related to computer products and services; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service featuring software for use in scanning networks and websites to detect and identify vulnerabilities and malware; providing information in the field of information technology relating to communications devices, computers, computer hardware, computer software, computer peripherals, and computer networks; computer services, namely, providing search engines for obtaining data on a global computer network; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; website hosting; providing authentication of website operator identity; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; development, integration and operation of computer systems to support issuance and management of digital certificates; creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; providing computerized and electronic user authentication services in e-commerce transactions; electronic monitoring of computer systems for security purposes; electronic monitoring of computer networks for security purposes; providing security threat management systems, namely, electronic monitoring and tracking of security vulnerabilities and problems in computer software products, the Internet, and computer networks; providing information in the fields of global computer network and local area network Internet security, preventing computer viruses, preventing computer threats, computer hardware and software applications in security; identity theft protection services, namely, fraud prevention in the form of computerized and electronic monitoring of personal and financial information; authentication, issuance and validation of digital certificates; computerized and electronic identification verification services, namely, providing computerized and electronic authentication of business identification information; computer security services, namely, using technology to provide user identity authentication services in ecommerce transactions; computer security services, namely, using technology to provide authentication of identity; computer security services in the nature of administering digital keys; computer security services in the nature of administering digital certificates; computer security services, namely, electronic signature verification services using technology to authenticate identity
IC 045. US 100 101. G & S: Personal background investigation services in order to authenticate identity

International Codes:9
U.S. Codes:021,023,026,036,038
International Codes:42
U.S. Codes:100,101
International Codes:45
U.S. Codes:100,101
Type CodeType
CC0000Color is not claimed as a feature of the mark.
CC0000Color is not claimed as a feature of the mark.

Trademark Filing History

DescriptionDateProceeding Number
NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED2020-09-22
EXTENSION 2 GRANTED2020-09-2171034
TEAS EXTENSION RECEIVED2020-09-17
EXTENSION 2 FILED2020-09-1771034
NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED2020-03-05
EXTENSION 1 GRANTED2020-03-0471034
CASE ASSIGNED TO INTENT TO USE PARALEGAL2020-03-0471034
TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED2020-02-20
TEAS EXTENSION RECEIVED2020-02-20
TEAS CHANGE OF CORRESPONDENCE RECEIVED2020-02-20
EXTENSION 1 FILED2020-02-2071034
ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED2020-02-20
ASSIGNMENT OF OWNERSHIP NOT UPDATED AUTOMATICALLY2019-11-13
NOA E-MAILED - SOU REQUIRED FROM APPLICANT2019-09-17
CHANGES/CORRECTIONS AFTER PUB APPROVAL ENTERED2019-08-2186882
ASSIGNED TO PETITION STAFF2019-08-2186882
TEAS POST PUBLICATION AMENDMENT RECEIVED2019-08-021111
PUBLISHED FOR OPPOSITION2019-07-23
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED2019-07-23
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED2019-07-03
ASSIGNED TO LIE2019-06-1770997
NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED2019-06-046328
EXAMINERS AMENDMENT E-MAILED2019-06-046328
EXAMINERS AMENDMENT -WRITTEN2019-06-0494346
EXAMINER'S AMENDMENT ENTERED2019-06-0488888
APPROVED FOR PUB - PRINCIPAL REGISTER2019-06-04
NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED2019-05-296328
EXAMINERS AMENDMENT E-MAILED2019-05-296328
EXAMINERS AMENDMENT -WRITTEN2019-05-2994346
EXAMINER'S AMENDMENT ENTERED2019-05-2988888
NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED2019-05-236328
EXAMINERS AMENDMENT E-MAILED2019-05-236328
EXAMINERS AMENDMENT -WRITTEN2019-05-2394346
EXAMINER'S AMENDMENT ENTERED2019-05-2388888
TEAS/EMAIL CORRESPONDENCE ENTERED2019-05-1788889
TEAS RESPONSE TO OFFICE ACTION RECEIVED2019-05-16
CORRESPONDENCE RECEIVED IN LAW OFFICE2019-05-1688889
NOTIFICATION OF NON-FINAL ACTION E-MAILED2019-04-296325
NON-FINAL ACTION WRITTEN2019-04-2994346
NON-FINAL ACTION E-MAILED2019-04-296325
ASSIGNED TO EXAMINER2019-04-1794346
NOTICE OF DESIGN SEARCH CODE E-MAILED2019-03-21
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM2019-02-27
NEW APPLICATION ENTERED IN TRAM2019-02-08

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed