Under the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless it displays a valid OMB control number.
PTO Form 1581 (Rev 09/2005) |
OMB No. 0651-0054 (Exp 12/31/2020) |
Request for Extension of Time to File a Statement of Use
(15 U.S.C. Section 1051(d))
The table below presents the data as entered.
Input Field
|
Entered
|
SERIAL NUMBER |
88289816 |
LAW OFFICE ASSIGNED |
LAW OFFICE 127 |
MARK SECTION |
MARK |
http://uspto.report/TM/88289816/mark.png (stylized and/or with design) |
STANDARD CHARACTERS |
NO |
USPTO-GENERATED IMAGE |
NO |
OWNER SECTION (current) |
NAME |
NortonLifeLock Inc. |
MAILING ADDRESS |
60 E Rio Salado Parkway, Suite 1000 |
CITY |
Tempe |
STATE |
Arizona |
ZIP/POSTAL CODE |
85281 |
STATE/COUNTRY/REGION/JURISDICTION/U.S. TERRITORY |
United States |
EMAIL |
XXXX |
OWNER SECTION (proposed) |
NAME |
NortonLifeLock Inc. |
MAILING ADDRESS |
60 E Rio Salado Parkway, Suite 1000 |
CITY |
Tempe |
STATE |
Arizona |
ZIP/POSTAL CODE |
85281 |
STATE/COUNTRY/REGION/JURISDICTION/U.S. TERRITORY |
United States |
EMAIL |
XXXX |
CORRESPONDENCE INFORMATION (current) |
NAME |
Sally M. Abel, Esq. |
PRIMARY EMAIL ADDRESS FOR CORRESPONDENCE |
trademarks@fenwick.com |
SECONDARY EMAIL ADDRESS(ES) (COURTESY COPIES) |
driggio@fenwick.com |
DOCKET/REFERENCE NUMBER |
25389-70404 |
CORRESPONDENCE INFORMATION (proposed) |
NAME |
Sally M. Abel, Esq. |
PRIMARY EMAIL ADDRESS FOR CORRESPONDENCE |
trademarks@fenwick.com |
SECONDARY EMAIL ADDRESS(ES) (COURTESY COPIES) |
driggio@fenwick.com |
DOCKET/REFERENCE NUMBER |
25389-70404 |
GOODS AND/OR SERVICES SECTION |
INTERNATIONAL CLASS |
009 |
CURRENT IDENTIFICATION |
Downloadable computer antivirus software; recorded computer antivirus software; downloadable computer software for database management in the
field of cryptographic network security and data security functions; recorded computer software for database management in the field of cryptographic network security and data security functions;
downloadable computer software for providing network, Internet, and computer security; recorded computer software for providing network, Internet, and computer security; downloadable computer
software for providing online identity protection and parental control; recorded computer software for providing online identity protection and parental control; downloadable computer software for
providing intrusion detection and prevention; recorded computer software for providing intrusion detection and prevention; downloadable computer software for scanning, detecting, and removing
viruses, worms, Trojan horses, adware, spyware, and other malware; recorded computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware;
downloadable Internet security software, including computer software for use in the monitoring and control of computer and online activity; recorded Internet security software, including computer
software for use in the monitoring and control of computer and online activity; downloadable computer software for providing online transaction security; recorded computer software for providing
online transaction security; downloadable fraud protection software; recorded fraud protection software; downloadable computer optimization software; recorded computer optimization software;
downloadable computer software to prevent, diagnose, and repair computer problems; recorded computer software to prevent, diagnose, and repair computer problems; downloadable computer maintenance
software; recorded computer maintenance software; downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; recorded computer software for the
back-up, storage, restoration and recovery of data, folders, and files; downloadable enterprise security software; recorded enterprise security software; downloadable firewall software; recorded
firewall software; downloadable privacy control software; recorded privacy control software; downloadable content filtering software; recorded content filtering software; computer hardware; computer
peripherals; computer hardware appliances that provide fire wall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions; downloadable computer
software for providing cryptographic network security and data security functions; recorded computer software for providing cryptographic network security and data security functions; downloadable
computer software for integration of information logic and data between computer networks; recorded computer software for integration of information logic and data between computer networks;
downloadable computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for
authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; recorded
computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or
encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; downloadable computer
software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes
of communication between computing devices; recorded computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit
card information over the Internet, as well as over other modes of communication between computing devices; downloadable computer software to integrate managed security services, namely, public key
infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; recorded
computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration,
with existing communications networks, software and services; downloadable computer software for use in analysis and reporting of firewall log data; recorded computer software for use in analysis and
reporting of firewall log data; downloadable computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; recorded computer software for
detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable computer software for encrypting and authenticating data; recorded computer software
for encrypting and authenticating data; downloadable computer software for encryption; recorded computer software for encryption; downloadable computer software for use in the encryption and
decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; recorded computer software for use in the encryption and decryption of digital files,
including audio, video, text, binary, still images, graphics and multimedia files; downloadable computer software platform for bridging Internet and telephony services and enabling users to
communicate and transact business faster across multiple networks via wire line phones, mobile phones, personal computers, PDAs and other personal electronic devices; recorded computer software
platform for bridging Internet and telephony services and enabling users to communicate and transact business faster across multiple networks via wire line phones, mobile phones, personal computers,
PDAs and other personal electronic devices; downloadable computer software platform for providing faster Internet connections, website resolution and e-mail deliveries; recorded computer software
platform for providing faster Internet connections, website resolution and e-mail deliveries; downloadable cloning software, namely, software for cloning computer hard drives, software for cloning
computer operating systems, software for cloning data files, software reconfiguring personal computers; recorded cloning software, namely, software for cloning computer hard drives, software for
cloning computer operating systems, software for cloning data files, software reconfiguring personal computers; downloadable computer software for the creation of virtual private network; recorded
computer software for the creation of virtual private network; downloadable computer software, namely, utility software; recorded computer software, namely, utility software; downloadable computer
utility software for removal of computer applications and software; recorded computer utility software for removal of computer applications and software; downloadable utility software for
facilitating computer use at remote locations and for facilitating communications among mobile users over networks; recorded utility software for facilitating computer use at remote locations and for
facilitating communications among mobile users over networks; downloadable computer software, namely, middleware for interfacing client applications and networked or host based databases; recorded
computer software, namely, middleware for interfacing client applications and networked or host based databases; downloadable computer software for use in updating other computer software; recorded
computer software for use in updating other computer software; downloadable computer software for use in networking applications; recorded computer software for use in networking applications;
downloadable computer software for sending and receiving facsimile transmissions from computers and notebook computers; recorded computer software for sending and receiving facsimile transmissions
from computers and notebook computers; downloadable computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote
computer users, for implementing computer, software and network security measures for remote computer users; recorded computer software for connecting and managing remote computers, for
synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; downloadable
computer software for file management and transfer; recorded computer software for file management and transfer; downloadable computer software for telecommuting, namely, for connecting to and use of
a remote computer network, a remote computer and mobile devices; recorded computer software for telecommuting, namely, for connecting to and use of a remote computer network, a remote computer and
mobile devices; downloadable computer communications software for use with a home or remote office for connecting computer network users to global networks; recorded computer communications software
for use with a home or remote office for connecting computer network users to global networks; downloadable computer software and databases for use in diagnosis, repair and configuration of
computers, computer software and computer peripherals; recorded computer software and databases for use in diagnosis, repair and configuration of computers, computer software and computer
peripherals; downloadable computer programs for data communications applications, and for the encryption and authentication of electronic information; recorded computer programs for data
communications applications, and for the encryption and authentication of electronic information; downloadable computer software for identity security; recorded computer software for identity
security; downloadable computer software for authentication and identity management information security; recorded computer software for authentication and identity management information security;
downloadable computer software for digital information and data access; recorded computer software for digital information and data access; downloadable computer software for detecting identity
fraud; recorded computer software for detecting identity fraud; downloadable computer software and firmware for the management, transmission, and storage of data and information; recorded computer
software and firmware for the management, transmission, and storage of data and information; downloadable computer software for use in networking computers; recorded computer software for use in
networking computers; downloadable computer software for use in operating electronic mail; recorded computer software for use in operating electronic mail; downloadable computer software for use in
monitoring computers for security purposes; recorded computer software for use in monitoring computers for security purposes; downloadable computer software for use in vulnerability scanning of
networks and websites; recorded computer software for use in vulnerability scanning of networks and websites; downloadable computer software for use in detecting malware computer software for use
with computer servers for controlling and managing server applications; recorded computer software for use in detecting malware computer software for use with computer servers for controlling and
managing server applications; downloadable computer software for use in accessing databases; recorded computer software for use in accessing databases; downloadable user manuals and instructional
guides supplied with all of the foregoing; downloadable electronic publications in the nature of manuals, blogs, instructional materials, teaching materials, newsletters, magazines, newspapers, books
and pamphlets in the field of computer software and computer and on-line security |
GOODS OR SERVICES DELETED FROM THE APPLICATION |
recorded computer antivirus software; recorded computer software for database management in the field of cryptographic network security
and data security functions; recorded computer software for providing network, Internet, and computer security; recorded computer software for providing online identity protection and parental
control; recorded computer software for providing intrusion detection and prevention; recorded computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware,
and other malware; recorded Internet security software, including computer software for use in the monitoring and control of computer and online activity; recorded computer software for providing
online transaction security; recorded fraud protection software; recorded computer optimization software; recorded computer software to prevent, diagnose, and repair computer problems; recorded
computer maintenance software; recorded computer software for the back-up, storage, restoration and recovery of data, folders, and files; recorded enterprise security software; recorded firewall
software; recorded privacy control software; recorded content filtering software; computer hardware; computer peripherals; computer hardware appliances that provide fire wall, content filtering,
intrusion alert, virus protection, virtual private networking and other security functions; recorded computer software for providing cryptographic network security and data security functions;
recorded computer software for integration of information logic and data between computer networks; recorded computer software for automating a process for authentication of identity using existing
databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an
electronic transaction or communication, over the Internet and other computer networks; recorded computer software, namely, encryption software to enable secure transmission of digital information,
namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; recorded computer software to integrate managed
security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks,
software and services; recorded computer software for use in analysis and reporting of firewall log data; recorded computer software for detecting, blocking, and intercepting malware and other
threats to computer hardware and software; recorded computer software for encrypting and authenticating data; recorded computer software for encryption; recorded computer software for use in the
encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable computer software platform for bridging Internet and
telephony services and enabling users to communicate and transact business faster across multiple networks via wire line phones, mobile phones, personal computers, PDAs and other personal electronic
devices; recorded computer software platform for bridging Internet and telephony services and enabling users to communicate and transact business faster across multiple networks via wire line phones,
mobile phones, personal computers, PDAs and other personal electronic devices; downloadable computer software platform for providing faster Internet connections, website resolution and e-mail
deliveries; recorded computer software platform for providing faster Internet connections, website resolution and e-mail deliveries; downloadable cloning software, namely, software for cloning
computer hard drives, software for cloning computer operating systems, software for cloning data files, software reconfiguring personal computers; recorded cloning software, namely, software for
cloning computer hard drives, software for cloning computer operating systems, software for cloning data files, software reconfiguring personal computers; recorded computer software for the creation
of virtual private network; recorded computer software, namely, utility software; recorded computer utility software for removal of computer applications and software; downloadable utility software
for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; recorded utility software for facilitating computer use at remote locations and
for facilitating communications among mobile users over networks; downloadable computer software, namely, middleware for interfacing client applications and networked or host based databases;
recorded computer software, namely, middleware for interfacing client applications and networked or host based databases; recorded computer software for use in updating other computer software;
downloadable computer software for use in networking applications; recorded computer software for use in networking applications; downloadable computer software for sending and receiving facsimile
transmissions from computers and notebook computers; recorded computer software for sending and receiving facsimile transmissions from computers and notebook computers; downloadable computer software
for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security
measures for remote computer users; recorded computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer
users, for implementing computer, software and network security measures for remote computer users; recorded computer software for file management and transfer; downloadable computer software for
telecommuting, namely, for connecting to and use of a remote computer network, a remote computer and mobile devices; recorded computer software for telecommuting, namely, for connecting to and use of
a remote computer network, a remote computer and mobile devices; downloadable computer communications software for use with a home or remote office for connecting computer network users to global
networks; recorded computer communications software for use with a home or remote office for connecting computer network users to global networks; recorded computer software and databases for use in
diagnosis, repair and configuration of computers, computer software and computer peripherals; recorded computer programs for data communications applications, and for the encryption and
authentication of electronic information; recorded computer software for identity security; recorded computer software for authentication and identity management information security; recorded
computer software for digital information and data access; recorded computer software for detecting identity fraud; downloadable computer software and firmware for the management, transmission, and
storage of data and information; recorded computer software and firmware for the management, transmission, and storage of data and information; recorded computer software for use in networking
computers; downloadable computer software for use in operating electronic mail; recorded computer software for use in operating electronic mail; recorded computer software for use in monitoring
computers for security purposes; recorded computer software for use in vulnerability scanning of networks and websites; downloadable computer software for use with computer servers for controlling
and managing server applications; recorded computer software for use in detecting malware computer software for use with computer servers for controlling and managing server applications;
downloadable computer software for use in accessing databases; recorded computer software for use in accessing databases; downloadable electronic publications in the nature of magazines, newspapers,
books and pamphlets in the field of computer software and computer and on-line security |
GOODS OR SERVICES FOR WHICH APPLICANT HAS A CONTINUED BONA FIDE INTENTION, AND IS ENTITLED, TO USE |
Downloadable computer antivirus software; downloadable computer software for database management in the field of cryptographic network
security and data security functions; downloadable computer software for providing network, Internet, and computer security; downloadable computer software for providing online identity protection
and parental control; downloadable computer software for providing intrusion detection and prevention; downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan
horses, adware, spyware, and other malware; downloadable Internet security software, including computer software for use in the monitoring and control of computer and online activity; downloadable
computer software for providing online transaction security; downloadable fraud protection software; downloadable computer optimization software; downloadable computer software to prevent, diagnose,
and repair computer problems; downloadable computer maintenance software; downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable
enterprise security software; downloadable firewall software; downloadable privacy control software; downloadable content filtering software; downloadable computer software for providing
cryptographic network security and data security functions; downloadable computer software for integration of information logic and data between computer networks; downloadable computer software for
automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital
communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; downloadable computer software, namely,
encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication
between computing devices; downloadable computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification,
management and enterprise software integration, with existing communications networks, software and services; downloadable computer software for use in analysis and reporting of firewall log data;
downloadable computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable computer software for encrypting and authenticating
data; downloadable computer software for encryption; downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images,
graphics and multimedia files; downloadable computer software for the creation of virtual private network; downloadable computer software, namely, utility software; downloadable computer utility
software for removal of computer applications and software; downloadable computer software for use in updating other computer software; downloadable computer software for file management and
transfer; downloadable computer software and databases for use in diagnosis, repair and configuration of computers, computer software and computer peripherals; downloadable computer programs for data
communications applications, and for the encryption and authentication of electronic information; downloadable computer software for identity security; downloadable computer software for
authentication and identity management information security; downloadable computer software for digital information and data access; downloadable computer software for detecting identity fraud;
downloadable computer software for use in networking computers; downloadable computer software for use in monitoring computers for security purposes; downloadable computer software for use in
vulnerability scanning of networks and websites; downloadable computer software for use in detecting malware; downloadable user manuals and instructional guides supplied with all of the foregoing;
downloadable electronic publications in the nature of manuals, blogs, instructional materials, teaching materials, and newsletters in the field of computer software and computer and on-line
security |
INTERNATIONAL CLASS |
042 |
CURRENT IDENTIFICATION |
Development of software for network and Internet security and data encryption; electronic storage of data; computer software consultation;
Internet security consultancy, namely, computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks,
namely, installation, design and customization of software; on-line technical support services, namely, troubleshooting in the nature of diagnosing of computer hardware and software problems;
technical and customer support services, namely, troubleshooting of computer software problems; computer services, namely, detection of viruses and threats; design and implementation of software and
technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; technical support services, namely, providing
back-up computer programs and facilities; updating of computer software for others; computer virus protection services; computer consultation in the field of computer security; computer diagnostic
services; computer services, namely, data recovery services; computer software installation services; computer programming; electronic notification and delivery of software updates; research services
relating to computer hardware and computer software; technical consultation in the field of computer software installation and maintenance; development, updating, publishing and maintenance of
software for networks and standalone computers in the fields of security, databases management, and anti-virus protection and monitoring security systems; providing information in the field of
network and Internet security; providing technical information in the field of computer software applications; computer services, namely, providing information concerning the encryption and
authentication of electronic data; providing information concerning authentication of user identification data for e-commerce transaction security; consultancy services in the fields of digital
media, data encryption, computer security, communication security and computer software; encryption and decryption of data and communications; computer support services, namely, technical support and
software update services; computer software and hardware technological consulting services related to computer products and services; application service provider services, namely, providing on-line,
non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service featuring software for use in scanning networks and websites to detect
and identify vulnerabilities and malware; providing consultants to help deploy, supervise and manage information technology projects; providing information in the field of information technology
relating to communications devices, computers, computer hardware, computer software, computer peripherals, and computer networks; computer services, namely, providing search engines for obtaining
data on a global computer network; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security
verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network
vulnerability; website hosting; computer services, namely, providing temporary use of non-downloadable software applications for creating and operating ecommerce websites; providing authentication of
website operator identity; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic
transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing,
analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks;
computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; development, integration and
operation of computer systems to support issuance and management of digital certificates; creation and implementation of procedures and practices for issuance and management of digital certificates;
computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital
certificate issuance, verification and management, and enterprise software integration; providing computerized and electronic user authentication services in e-commerce transactions; electronic
monitoring of computer systems for security purposes; electronic monitoring of computer networks for security purposes; providing security threat management systems, namely, electronic monitoring and
tracking of security vulnerabilities and problems in computer software products, the Internet, and computer networks; providing information in the fields of global computer network and local area
network Internet security, preventing computer viruses, preventing computer threats, computer hardware and software applications in security; identity theft protection services, namely, fraud
prevention in the form of computerized and electronic monitoring of personal and financial information; authentication, issuance and validation of digital certificates; computerized and electronic
identification verification services, namely, providing computerized and electronic authentication of business identification information; computer security services, namely, using technology to
provide user identity authentication services in ecommerce transactions; computer security services, namely, using technology to provide authentication of identity; computer security services in the
nature of administering digital keys; computer security services in the nature of administering digital certificates; computer security services, namely, electronic signature verification services
using technology to authenticate identity |
GOODS OR SERVICES DELETED FROM THE APPLICATION |
computer programming; providing consultants to help deploy, supervise and manage information technology projects; computer services,
namely, providing temporary use of non-downloadable software applications for creating and operating ecommerce websites |
GOODS OR SERVICES FOR WHICH APPLICANT HAS A CONTINUED BONA FIDE INTENTION, AND IS ENTITLED, TO USE |
Development of software for network and Internet security and data encryption; electronic storage of data; computer software consultation;
Internet security consultancy, namely, computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks,
namely, installation, design and customization of software; on-line technical support services, namely, troubleshooting in the nature of diagnosing of computer hardware and software problems;
technical and customer support services, namely, troubleshooting of computer software problems; computer services, namely, detection of viruses and threats; design and implementation of software and
technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; technical support services, namely, providing
back-up computer programs and facilities; updating of computer software for others; computer virus protection services; computer consultation in the field of computer security; computer diagnostic
services; computer services, namely, data recovery services; computer software installation services; electronic notification and delivery of software updates; research services relating to computer
hardware and computer software; technical consultation in the field of computer software installation and maintenance; development, updating, publishing and maintenance of software for networks and
standalone computers in the fields of security, databases management, and anti-virus protection and monitoring security systems; providing information in the field of network and Internet security;
providing technical information in the field of computer software applications; computer services, namely, providing information concerning the encryption and authentication of electronic data;
providing information concerning authentication of user identification data for e-commerce transaction security; consultancy services in the fields of digital media, data encryption, computer
security, communication security and computer software; encryption and decryption of data and communications; computer support services, namely, technical support and software update services;
computer software and hardware technological consulting services related to computer products and services; application service provider services, namely, providing on-line, non-downloadable software
for computer security testing in the fields of computer and Internet security; software as a service featuring software for use in scanning networks and websites to detect and identify
vulnerabilities and malware; providing information in the field of information technology relating to communications devices, computers, computer hardware, computer software, computer peripherals,
and computer networks; computer services, namely, providing search engines for obtaining data on a global computer network; computer consulting services in the field of security integration, network
security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely,
analyzing global computer information network and internal computer network vulnerability; website hosting; providing authentication of website operator identity; issuance and management of digital
certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer
network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access,
authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; computer systems analysis in the field of security, access, authorization,
authentication encryption, and identification systems for computers and computer networks; development, integration and operation of computer systems to support issuance and management of digital
certificates; creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet
security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise
software integration; providing computerized and electronic user authentication services in e-commerce transactions; electronic monitoring of computer systems for security purposes; electronic
monitoring of computer networks for security purposes; providing security threat management systems, namely, electronic monitoring and tracking of security vulnerabilities and problems in computer
software products, the Internet, and computer networks; providing information in the fields of global computer network and local area network Internet security, preventing computer viruses,
preventing computer threats, computer hardware and software applications in security; identity theft protection services, namely, fraud prevention in the form of computerized and electronic
monitoring of personal and financial information; authentication, issuance and validation of digital certificates; computerized and electronic identification verification services, namely, providing
computerized and electronic authentication of business identification information; computer security services, namely, using technology to provide user identity authentication services in ecommerce
transactions; computer security services, namely, using technology to provide authentication of identity; computer security services in the nature of administering digital keys; computer security
services in the nature of administering digital certificates; computer security services, namely, electronic signature verification services using technology to authenticate identity |
INTERNATIONAL CLASS |
045 |
CURRENT IDENTIFICATION |
Personal background investigation services in order to authenticate identity |
GOODS OR SERVICES |
KEEP ALL LISTED |
EXTENSION SECTION |
EXTENSION NUMBER |
2 |
ONGOING EFFORT |
product or service research or development |
ALLOWANCE MAIL DATE |
09/17/2019 |
STATEMENT OF USE |
NO |
PAYMENT SECTION |
NUMBER OF CLASSES |
3 |
SUBTOTAL AMOUNT [EXTENSION FEE] |
375 |
TOTAL AMOUNT |
375 |
SIGNATURE SECTION |
SIGNATURE |
/jane c christie/ |
SIGNATORY'S NAME |
Jane C. Christie |
SIGNATORY'S POSITION |
Corporate Counsel, legal |
DATE SIGNED |
09/17/2020 |
FILING INFORMATION |
SUBMIT DATE |
Thu Sep 17 22:27:17 ET 2020 |
TEAS STAMP |
USPTO/ESU-X.XX.XXX.XXX-20
200917222717899897-882898
16-75068612a885656efa3588
4c72c8e21f62876edfecf508b
405a186903cd44f43-DA-2717
6153-20200917222027847636 |
Under the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless it displays a valid OMB control number.
PTO Form 1581 (Rev 09/2005) |
OMB No. 0651-0054 (Exp 12/31/2020) |
SOU Extension Request
(15 U.S.C. Section 1051(d))
To the Commissioner for Trademarks:
MARK: NORTON (stylized and/or with design, see http://uspto.report/TM/88289816/mark.png)
SERIAL NUMBER: 88289816
OWNER AND/OR ENTITY INFORMATION
The owner proposes to amend the following:
Current: NortonLifeLock Inc., having an address of
60 E Rio Salado Parkway, Suite 1000
Tempe, Arizona 85281
United States
Email: XXXX
Proposed: NortonLifeLock Inc., having an address of
60 E Rio Salado Parkway, Suite 1000
Tempe, Arizona 85281
United States
Phone:
Fax:
Email: XXXX
The owner requests a six-month extension of time to file the Statement of Use under 37 C.F.R. Section 2.89 in this application. The Notice of Allowance mailing date was 09/17/2019.
For International Class 009:
Current identification: Downloadable computer antivirus software; recorded computer antivirus software; downloadable computer software for database management in the field of cryptographic network
security and data security functions; recorded computer software for database management in the field of cryptographic network security and data security functions; downloadable computer software for
providing network, Internet, and computer security; recorded computer software for providing network, Internet, and computer security; downloadable computer software for providing online identity
protection and parental control; recorded computer software for providing online identity protection and parental control; downloadable computer software for providing intrusion detection and
prevention; recorded computer software for providing intrusion detection and prevention; downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware,
spyware, and other malware; recorded computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; downloadable Internet security
software, including computer software for use in the monitoring and control of computer and online activity; recorded Internet security software, including computer software for use in the monitoring
and control of computer and online activity; downloadable computer software for providing online transaction security; recorded computer software for providing online transaction security;
downloadable fraud protection software; recorded fraud protection software; downloadable computer optimization software; recorded computer optimization software; downloadable computer software to
prevent, diagnose, and repair computer problems; recorded computer software to prevent, diagnose, and repair computer problems; downloadable computer maintenance software; recorded computer
maintenance software; downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; recorded computer software for the back-up, storage, restoration
and recovery of data, folders, and files; downloadable enterprise security software; recorded enterprise security software; downloadable firewall software; recorded firewall software; downloadable
privacy control software; recorded privacy control software; downloadable content filtering software; recorded content filtering software; computer hardware; computer peripherals; computer hardware
appliances that provide fire wall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions; downloadable computer software for providing
cryptographic network security and data security functions; recorded computer software for providing cryptographic network security and data security functions; downloadable computer software for
integration of information logic and data between computer networks; recorded computer software for integration of information logic and data between computer networks; downloadable computer software
for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of
digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; recorded computer software for
automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital
communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; downloadable computer software, namely,
encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication
between computing devices; recorded computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information
over the Internet, as well as over other modes of communication between computing devices; downloadable computer software to integrate managed security services, namely, public key infrastructure
(PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; recorded computer software to
integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing
communications networks, software and services; downloadable computer software for use in analysis and reporting of firewall log data; recorded computer software for use in analysis and reporting of
firewall log data; downloadable computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; recorded computer software for detecting,
blocking, and intercepting malware and other threats to computer hardware and software; downloadable computer software for encrypting and authenticating data; recorded computer software for
encrypting and authenticating data; downloadable computer software for encryption; recorded computer software for encryption; downloadable computer software for use in the encryption and decryption
of digital files, including audio, video, text, binary, still images, graphics and multimedia files; recorded computer software for use in the encryption and decryption of digital files, including
audio, video, text, binary, still images, graphics and multimedia files; downloadable computer software platform for bridging Internet and telephony services and enabling users to communicate and
transact business faster across multiple networks via wire line phones, mobile phones, personal computers, PDAs and other personal electronic devices; recorded computer software platform for bridging
Internet and telephony services and enabling users to communicate and transact business faster across multiple networks via wire line phones, mobile phones, personal computers, PDAs and other
personal electronic devices; downloadable computer software platform for providing faster Internet connections, website resolution and e-mail deliveries; recorded computer software platform for
providing faster Internet connections, website resolution and e-mail deliveries; downloadable cloning software, namely, software for cloning computer hard drives, software for cloning computer
operating systems, software for cloning data files, software reconfiguring personal computers; recorded cloning software, namely, software for cloning computer hard drives, software for cloning
computer operating systems, software for cloning data files, software reconfiguring personal computers; downloadable computer software for the creation of virtual private network; recorded computer
software for the creation of virtual private network; downloadable computer software, namely, utility software; recorded computer software, namely, utility software; downloadable computer utility
software for removal of computer applications and software; recorded computer utility software for removal of computer applications and software; downloadable utility software for facilitating
computer use at remote locations and for facilitating communications among mobile users over networks; recorded utility software for facilitating computer use at remote locations and for facilitating
communications among mobile users over networks; downloadable computer software, namely, middleware for interfacing client applications and networked or host based databases; recorded computer
software, namely, middleware for interfacing client applications and networked or host based databases; downloadable computer software for use in updating other computer software; recorded computer
software for use in updating other computer software; downloadable computer software for use in networking applications; recorded computer software for use in networking applications; downloadable
computer software for sending and receiving facsimile transmissions from computers and notebook computers; recorded computer software for sending and receiving facsimile transmissions from computers
and notebook computers; downloadable computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for
implementing computer, software and network security measures for remote computer users; recorded computer software for connecting and managing remote computers, for synchronization of files through
e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; downloadable computer software for file
management and transfer; recorded computer software for file management and transfer; downloadable computer software for telecommuting, namely, for connecting to and use of a remote computer network,
a remote computer and mobile devices; recorded computer software for telecommuting, namely, for connecting to and use of a remote computer network, a remote computer and mobile devices; downloadable
computer communications software for use with a home or remote office for connecting computer network users to global networks; recorded computer communications software for use with a home or remote
office for connecting computer network users to global networks; downloadable computer software and databases for use in diagnosis, repair and configuration of computers, computer software and
computer peripherals; recorded computer software and databases for use in diagnosis, repair and configuration of computers, computer software and computer peripherals; downloadable computer programs
for data communications applications, and for the encryption and authentication of electronic information; recorded computer programs for data communications applications, and for the encryption and
authentication of electronic information; downloadable computer software for identity security; recorded computer software for identity security; downloadable computer software for authentication and
identity management information security; recorded computer software for authentication and identity management information security; downloadable computer software for digital information and data
access; recorded computer software for digital information and data access; downloadable computer software for detecting identity fraud; recorded computer software for detecting identity fraud;
downloadable computer software and firmware for the management, transmission, and storage of data and information; recorded computer software and firmware for the management, transmission, and
storage of data and information; downloadable computer software for use in networking computers; recorded computer software for use in networking computers; downloadable computer software for use in
operating electronic mail; recorded computer software for use in operating electronic mail; downloadable computer software for use in monitoring computers for security purposes; recorded computer
software for use in monitoring computers for security purposes; downloadable computer software for use in vulnerability scanning of networks and websites; recorded computer software for use in
vulnerability scanning of networks and websites; downloadable computer software for use in detecting malware computer software for use with computer servers for controlling and managing server
applications; recorded computer software for use in detecting malware computer software for use with computer servers for controlling and managing server applications; downloadable computer software
for use in accessing databases; recorded computer software for use in accessing databases; downloadable user manuals and instructional guides supplied with all of the foregoing; downloadable
electronic publications in the nature of manuals, blogs, instructional materials, teaching materials, newsletters, magazines, newspapers, books and pamphlets in the field of computer software and
computer and on-line security
This filing does
NOT cover the following goods/services listed in either the application or Notice of Allowance or as subsequently modified for this specific class; these goods/services are
permanently deleted from this application: recorded computer antivirus software; recorded computer software for database management in the field of cryptographic network security and data security
functions; recorded computer software for providing network, Internet, and computer security; recorded computer software for providing online identity protection and parental control; recorded
computer software for providing intrusion detection and prevention; recorded computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware;
recorded Internet security software, including computer software for use in the monitoring and control of computer and online activity; recorded computer software for providing online transaction
security; recorded fraud protection software; recorded computer optimization software; recorded computer software to prevent, diagnose, and repair computer problems; recorded computer maintenance
software; recorded computer software for the back-up, storage, restoration and recovery of data, folders, and files; recorded enterprise security software; recorded firewall software; recorded
privacy control software; recorded content filtering software; computer hardware; computer peripherals; computer hardware appliances that provide fire wall, content filtering, intrusion alert, virus
protection, virtual private networking and other security functions; recorded computer software for providing cryptographic network security and data security functions; recorded computer software
for integration of information logic and data between computer networks; recorded computer software for automating a process for authentication of identity using existing databases in connection with
the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or
communication, over the Internet and other computer networks; recorded computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential,
financial and credit card information over the Internet, as well as over other modes of communication between computing devices; recorded computer software to integrate managed security services,
namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and
services; recorded computer software for use in analysis and reporting of firewall log data; recorded computer software for detecting, blocking, and intercepting malware and other threats to computer
hardware and software; recorded computer software for encrypting and authenticating data; recorded computer software for encryption; recorded computer software for use in the encryption and
decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable computer software platform for bridging Internet and telephony services
and enabling users to communicate and transact business faster across multiple networks via wire line phones, mobile phones, personal computers, PDAs and other personal electronic devices; recorded
computer software platform for bridging Internet and telephony services and enabling users to communicate and transact business faster across multiple networks via wire line phones, mobile phones,
personal computers, PDAs and other personal electronic devices; downloadable computer software platform for providing faster Internet connections, website resolution and e-mail deliveries; recorded
computer software platform for providing faster Internet connections, website resolution and e-mail deliveries; downloadable cloning software, namely, software for cloning computer hard drives,
software for cloning computer operating systems, software for cloning data files, software reconfiguring personal computers; recorded cloning software, namely, software for cloning computer hard
drives, software for cloning computer operating systems, software for cloning data files, software reconfiguring personal computers; recorded computer software for the creation of virtual private
network; recorded computer software, namely, utility software; recorded computer utility software for removal of computer applications and software; downloadable utility software for facilitating
computer use at remote locations and for facilitating communications among mobile users over networks; recorded utility software for facilitating computer use at remote locations and for facilitating
communications among mobile users over networks; downloadable computer software, namely, middleware for interfacing client applications and networked or host based databases; recorded computer
software, namely, middleware for interfacing client applications and networked or host based databases; recorded computer software for use in updating other computer software; downloadable computer
software for use in networking applications; recorded computer software for use in networking applications; downloadable computer software for sending and receiving facsimile transmissions from
computers and notebook computers; recorded computer software for sending and receiving facsimile transmissions from computers and notebook computers; downloadable computer software for connecting and
managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote
computer users; recorded computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing
computer, software and network security measures for remote computer users; recorded computer software for file management and transfer; downloadable computer software for telecommuting, namely, for
connecting to and use of a remote computer network, a remote computer and mobile devices; recorded computer software for telecommuting, namely, for connecting to and use of a remote computer network,
a remote computer and mobile devices; downloadable computer communications software for use with a home or remote office for connecting computer network users to global networks; recorded computer
communications software for use with a home or remote office for connecting computer network users to global networks; recorded computer software and databases for use in diagnosis, repair and
configuration of computers, computer software and computer peripherals; recorded computer programs for data communications applications, and for the encryption and authentication of electronic
information; recorded computer software for identity security; recorded computer software for authentication and identity management information security; recorded computer software for digital
information and data access; recorded computer software for detecting identity fraud; downloadable computer software and firmware for the management, transmission, and storage of data and
information; recorded computer software and firmware for the management, transmission, and storage of data and information; recorded computer software for use in networking computers; downloadable
computer software for use in operating electronic mail; recorded computer software for use in operating electronic mail; recorded computer software for use in monitoring computers for security
purposes; recorded computer software for use in vulnerability scanning of networks and websites; downloadable computer software for use with computer servers for controlling and managing server
applications; recorded computer software for use in detecting malware computer software for use with computer servers for controlling and managing server applications; downloadable computer software
for use in accessing databases; recorded computer software for use in accessing databases; downloadable electronic publications in the nature of magazines, newspapers, books and pamphlets in the
field of computer software and computer and on-line security
For a trademark/service mark: The applicant has a continued bona fide intention, and is entitled, to use the mark in commerce on or in connection with all of the goods/services listed in the Notice
of Allowance or as subsequently modified for this specific class; for a collective/certification mark: the applicant has a continued bona fide intention, and is entitled, to exercise legitimate
control over the use of the mark in commerce on or in connection with the goods/services/collective membership organization listed in the Notice of Allowance, or as subsequently modified for this
specific class: Downloadable computer antivirus software; downloadable computer software for database management in the field of cryptographic network security and data security functions;
downloadable computer software for providing network, Internet, and computer security; downloadable computer software for providing online identity protection and parental control; downloadable
computer software for providing intrusion detection and prevention; downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other
malware; downloadable Internet security software, including computer software for use in the monitoring and control of computer and online activity; downloadable computer software for providing
online transaction security; downloadable fraud protection software; downloadable computer optimization software; downloadable computer software to prevent, diagnose, and repair computer problems;
downloadable computer maintenance software; downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable enterprise security software;
downloadable firewall software; downloadable privacy control software; downloadable content filtering software; downloadable computer software for providing cryptographic network security and data
security functions; downloadable computer software for integration of information logic and data between computer networks; downloadable computer software for automating a process for authentication
of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a
digital signature in an electronic transaction or communication, over the Internet and other computer networks; downloadable computer software, namely, encryption software to enable secure
transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices;
downloadable computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software
integration, with existing communications networks, software and services; downloadable computer software for use in analysis and reporting of firewall log data; downloadable computer software for
detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable computer software for encrypting and authenticating data; downloadable computer
software for encryption; downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files;
downloadable computer software for the creation of virtual private network; downloadable computer software, namely, utility software; downloadable computer utility software for removal of computer
applications and software; downloadable computer software for use in updating other computer software; downloadable computer software for file management and transfer; downloadable computer software
and databases for use in diagnosis, repair and configuration of computers, computer software and computer peripherals; downloadable computer programs for data communications applications, and for the
encryption and authentication of electronic information; downloadable computer software for identity security; downloadable computer software for authentication and identity management information
security; downloadable computer software for digital information and data access; downloadable computer software for detecting identity fraud; downloadable computer software for use in networking
computers; downloadable computer software for use in monitoring computers for security purposes; downloadable computer software for use in vulnerability scanning of networks and websites;
downloadable computer software for use in detecting malware; downloadable user manuals and instructional guides supplied with all of the foregoing; downloadable electronic publications in the nature
of manuals, blogs, instructional materials, teaching materials, and newsletters in the field of computer software and computer and on-line security
For International Class 042:
Current identification: Development of software for network and Internet security and data encryption; electronic storage of data; computer software consultation; Internet security consultancy,
namely, computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and
customization of software; on-line technical support services, namely, troubleshooting in the nature of diagnosing of computer hardware and software problems; technical and customer support services,
namely, troubleshooting of computer software problems; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of
protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; technical support services, namely, providing back-up computer programs and facilities;
updating of computer software for others; computer virus protection services; computer consultation in the field of computer security; computer diagnostic services; computer services, namely, data
recovery services; computer software installation services; computer programming; electronic notification and delivery of software updates; research services relating to computer hardware and
computer software; technical consultation in the field of computer software installation and maintenance; development, updating, publishing and maintenance of software for networks and standalone
computers in the fields of security, databases management, and anti-virus protection and monitoring security systems; providing information in the field of network and Internet security; providing
technical information in the field of computer software applications; computer services, namely, providing information concerning the encryption and authentication of electronic data; providing
information concerning authentication of user identification data for e-commerce transaction security; consultancy services in the fields of digital media, data encryption, computer security,
communication security and computer software; encryption and decryption of data and communications; computer support services, namely, technical support and software update services; computer
software and hardware technological consulting services related to computer products and services; application service provider services, namely, providing on-line, non-downloadable software for
computer security testing in the fields of computer and Internet security; software as a service featuring software for use in scanning networks and websites to detect and identify vulnerabilities
and malware; providing consultants to help deploy, supervise and manage information technology projects; providing information in the field of information technology relating to communications
devices, computers, computer hardware, computer software, computer peripherals, and computer networks; computer services, namely, providing search engines for obtaining data on a global computer
network; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer
network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; website hosting;
computer services, namely, providing temporary use of non-downloadable software applications for creating and operating ecommerce websites; providing authentication of website operator identity;
issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication,
over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in
the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; computer systems analysis in the field of
security, access, authorization, authentication encryption, and identification systems for computers and computer networks; development, integration and operation of computer systems to support
issuance and management of digital certificates; creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely,
managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification
and management, and enterprise software integration; providing computerized and electronic user authentication services in e-commerce transactions; electronic monitoring of computer systems for
security purposes; electronic monitoring of computer networks for security purposes; providing security threat management systems, namely, electronic monitoring and tracking of security
vulnerabilities and problems in computer software products, the Internet, and computer networks; providing information in the fields of global computer network and local area network Internet
security, preventing computer viruses, preventing computer threats, computer hardware and software applications in security; identity theft protection services, namely, fraud prevention in the form
of computerized and electronic monitoring of personal and financial information; authentication, issuance and validation of digital certificates; computerized and electronic identification
verification services, namely, providing computerized and electronic authentication of business identification information; computer security services, namely, using technology to provide user
identity authentication services in ecommerce transactions; computer security services, namely, using technology to provide authentication of identity; computer security services in the nature of
administering digital keys; computer security services in the nature of administering digital certificates; computer security services, namely, electronic signature verification services using
technology to authenticate identity
This filing does
NOT cover the following goods/services listed in either the application or Notice of Allowance or as subsequently modified for this specific class; these goods/services are
permanently deleted from this application: computer programming; providing consultants to help deploy, supervise and manage information technology projects; computer services, namely, providing
temporary use of non-downloadable software applications for creating and operating ecommerce websites
For a trademark/service mark: The applicant has a continued bona fide intention, and is entitled, to use the mark in commerce on or in connection with all of the goods/services listed in the Notice
of Allowance or as subsequently modified for this specific class; for a collective/certification mark: the applicant has a continued bona fide intention, and is entitled, to exercise legitimate
control over the use of the mark in commerce on or in connection with the goods/services/collective membership organization listed in the Notice of Allowance, or as subsequently modified for this
specific class: Development of software for network and Internet security and data encryption; electronic storage of data; computer software consultation; Internet security consultancy, namely,
computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and
customization of software; on-line technical support services, namely, troubleshooting in the nature of diagnosing of computer hardware and software problems; technical and customer support services,
namely, troubleshooting of computer software problems; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of
protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; technical support services, namely, providing back-up computer programs and facilities;
updating of computer software for others; computer virus protection services; computer consultation in the field of computer security; computer diagnostic services; computer services, namely, data
recovery services; computer software installation services; electronic notification and delivery of software updates; research services relating to computer hardware and computer software; technical
consultation in the field of computer software installation and maintenance; development, updating, publishing and maintenance of software for networks and standalone computers in the fields of
security, databases management, and anti-virus protection and monitoring security systems; providing information in the field of network and Internet security; providing technical information in the
field of computer software applications; computer services, namely, providing information concerning the encryption and authentication of electronic data; providing information concerning
authentication of user identification data for e-commerce transaction security; consultancy services in the fields of digital media, data encryption, computer security, communication security and
computer software; encryption and decryption of data and communications; computer support services, namely, technical support and software update services; computer software and hardware
technological consulting services related to computer products and services; application service provider services, namely, providing on-line, non-downloadable software for computer security testing
in the fields of computer and Internet security; software as a service featuring software for use in scanning networks and websites to detect and identify vulnerabilities and malware; providing
information in the field of information technology relating to communications devices, computers, computer hardware, computer software, computer peripherals, and computer networks; computer services,
namely, providing search engines for obtaining data on a global computer network; computer consulting services in the field of security integration, network security, network architecture, encryption
technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information
network and internal computer network vulnerability; website hosting; providing authentication of website operator identity; issuance and management of digital certificates for authentication or
encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and
customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption,
and identification systems for computers, computer hardware and computer networks; computer systems analysis in the field of security, access, authorization, authentication encryption, and
identification systems for computers and computer networks; development, integration and operation of computer systems to support issuance and management of digital certificates; creation and
implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely,
public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; providing
computerized and electronic user authentication services in e-commerce transactions; electronic monitoring of computer systems for security purposes; electronic monitoring of computer networks for
security purposes; providing security threat management systems, namely, electronic monitoring and tracking of security vulnerabilities and problems in computer software products, the Internet, and
computer networks; providing information in the fields of global computer network and local area network Internet security, preventing computer viruses, preventing computer threats, computer hardware
and software applications in security; identity theft protection services, namely, fraud prevention in the form of computerized and electronic monitoring of personal and financial information;
authentication, issuance and validation of digital certificates; computerized and electronic identification verification services, namely, providing computerized and electronic authentication of
business identification information; computer security services, namely, using technology to provide user identity authentication services in ecommerce transactions; computer security services,
namely, using technology to provide authentication of identity; computer security services in the nature of administering digital keys; computer security services in the nature of administering
digital certificates; computer security services, namely, electronic signature verification services using technology to authenticate identity
For International Class 045:
Current identification: Personal background investigation services in order to authenticate identity
For a trademark/service mark: The applicant has a continued bona fide intention, and is entitled, to use the mark in commerce on or in connection with all of the goods/services listed in the Notice
of Allowance or as subsequently modified for this specific class; for a collective/certification mark: the applicant has a continued bona fide intention, and is entitled, to exercise legitimate
control over the use of the mark in commerce on or in connection with the goods/services/collective membership organization listed in the Notice of Allowance, or as subsequently modified for this
specific class.
This is the second extension request. The applicant has made the following ongoing efforts to use the mark in commerce on or in connection with each of those goods/services covered by the extension
request: product or service research or development
Correspondence Information (current):
Sally M. Abel, Esq.
PRIMARY EMAIL FOR CORRESPONDENCE: trademarks@fenwick.com
SECONDARY EMAIL ADDRESS(ES) (COURTESY COPIES): driggio@fenwick.com
Correspondence Information (proposed):
Sally M. Abel, Esq.
PRIMARY EMAIL FOR CORRESPONDENCE: trademarks@fenwick.com
SECONDARY EMAIL ADDRESS(ES) (COURTESY COPIES): driggio@fenwick.com
Requirement for Email and Electronic Filing: I understand that a valid email address must be maintained by the owner/holder and the owner's/holder's attorney, if appointed, and that all
official trademark correspondence must be submitted via the Trademark Electronic Application System (TEAS).
A fee payment in the amount of $375 will be submitted with the form, representing payment for 3 classes.
Declaration
STATEMENTS: The signatory believes that: the applicant has a continued bona fide intention, and is entitled, to use the mark in commerce on or in connection with all the goods/services under Section
1(b) in the notice of allowance or as subsequently modified, or, if applicable, the applicant has a continued bona fide intention, and is entitled, to exercise legitimate control over the use of the
mark in commerce on or in connection with all the goods/services/collective membership organization under Section 1(b) in the notice of allowance or as subsequently modified; and that to the best of
the signatory's knowledge and belief, no other persons, except, if applicable, members and concurrent users, have the right to use the mark in commerce, either in the identical form or in such near
resemblance as to be likely, when used on or in connection with the goods/services/collective membership organization of such other persons, to cause confusion or mistake, or to deceive.
DECLARATION: The signatory being warned that willful false statements and the like are punishable by fine or imprisonment, or both, under 18 U.S.C. §1001, and that such willful false statements and
the like may jeopardize the validity of the application or submission or any resulting registration, declares that all statements made of his/her own knowledge are true and that all statements made
on information and belief are believed to be true.
Signature: /jane c christie/ Date Signed: 09/17/2020
Signatory's Name: Jane C. Christie
Signatory's Position: Corporate Counsel, legal
RAM Sale Number: 88289816
RAM Accounting Date: 09/17/2020
Serial Number: 88289816
Internet Transmission Date: Thu Sep 17 22:27:17 ET 2020
TEAS Stamp: USPTO/ESU-X.XX.XXX.XXX-20200917222717899
897-88289816-75068612a885656efa35884c72c
8e21f62876edfecf508b405a186903cd44f43-DA
-27176153-20200917222027847636