Extension of Time to File SOU

NORTON

NortonLifeLock Inc.

Request for Extension of Time to File a Statement of Use

Under the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless it displays a valid OMB control number.
PTO Form 1581 (Rev 09/2005)
OMB No. 0651-0054 (Exp 12/31/2020)

Request for Extension of Time to File a Statement of Use
(15 U.S.C. Section 1051(d))


The table below presents the data as entered.

Input Field
Entered
SERIAL NUMBER 88289816
LAW OFFICE ASSIGNED LAW OFFICE 127
MARK SECTION
MARK http://uspto.report/TM/88289816/mark.png (stylized and/or with design)
STANDARD CHARACTERS NO
USPTO-GENERATED IMAGE NO
OWNER SECTION (current)
NAME NortonLifeLock Inc.
MAILING ADDRESS 60 E Rio Salado Parkway, Suite 1000
CITY Tempe
STATE Arizona
ZIP/POSTAL CODE 85281
STATE/COUNTRY/REGION/JURISDICTION/U.S. TERRITORY United States
EMAIL XXXX
OWNER SECTION (proposed)
NAME NortonLifeLock Inc.
MAILING ADDRESS 60 E Rio Salado Parkway, Suite 1000
CITY Tempe
STATE Arizona
ZIP/POSTAL CODE 85281
STATE/COUNTRY/REGION/JURISDICTION/U.S. TERRITORY United States
EMAIL XXXX
CORRESPONDENCE INFORMATION (current)
NAME Sally M. Abel, Esq.
PRIMARY EMAIL ADDRESS FOR CORRESPONDENCE trademarks@fenwick.com
SECONDARY EMAIL ADDRESS(ES) (COURTESY COPIES) driggio@fenwick.com
DOCKET/REFERENCE NUMBER 25389-70404
CORRESPONDENCE INFORMATION (proposed)
NAME Sally M. Abel, Esq.
PRIMARY EMAIL ADDRESS FOR CORRESPONDENCE trademarks@fenwick.com
SECONDARY EMAIL ADDRESS(ES) (COURTESY COPIES) driggio@fenwick.com
DOCKET/REFERENCE NUMBER 25389-70404
GOODS AND/OR SERVICES SECTION
INTERNATIONAL CLASS 009
CURRENT IDENTIFICATION Downloadable computer antivirus software; recorded computer antivirus software; downloadable computer software for database management in the field of cryptographic network security and data security functions; recorded computer software for database management in the field of cryptographic network security and data security functions; downloadable computer software for providing network, Internet, and computer security; recorded computer software for providing network, Internet, and computer security; downloadable computer software for providing online identity protection and parental control; recorded computer software for providing online identity protection and parental control; downloadable computer software for providing intrusion detection and prevention; recorded computer software for providing intrusion detection and prevention; downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; recorded computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; downloadable Internet security software, including computer software for use in the monitoring and control of computer and online activity; recorded Internet security software, including computer software for use in the monitoring and control of computer and online activity; downloadable computer software for providing online transaction security; recorded computer software for providing online transaction security; downloadable fraud protection software; recorded fraud protection software; downloadable computer optimization software; recorded computer optimization software; downloadable computer software to prevent, diagnose, and repair computer problems; recorded computer software to prevent, diagnose, and repair computer problems; downloadable computer maintenance software; recorded computer maintenance software; downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; recorded computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable enterprise security software; recorded enterprise security software; downloadable firewall software; recorded firewall software; downloadable privacy control software; recorded privacy control software; downloadable content filtering software; recorded content filtering software; computer hardware; computer peripherals; computer hardware appliances that provide fire wall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions; downloadable computer software for providing cryptographic network security and data security functions; recorded computer software for providing cryptographic network security and data security functions; downloadable computer software for integration of information logic and data between computer networks; recorded computer software for integration of information logic and data between computer networks; downloadable computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; recorded computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; downloadable computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; recorded computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; downloadable computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; recorded computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; downloadable computer software for use in analysis and reporting of firewall log data; recorded computer software for use in analysis and reporting of firewall log data; downloadable computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; recorded computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable computer software for encrypting and authenticating data; recorded computer software for encrypting and authenticating data; downloadable computer software for encryption; recorded computer software for encryption; downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; recorded computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable computer software platform for bridging Internet and telephony services and enabling users to communicate and transact business faster across multiple networks via wire line phones, mobile phones, personal computers, PDAs and other personal electronic devices; recorded computer software platform for bridging Internet and telephony services and enabling users to communicate and transact business faster across multiple networks via wire line phones, mobile phones, personal computers, PDAs and other personal electronic devices; downloadable computer software platform for providing faster Internet connections, website resolution and e-mail deliveries; recorded computer software platform for providing faster Internet connections, website resolution and e-mail deliveries; downloadable cloning software, namely, software for cloning computer hard drives, software for cloning computer operating systems, software for cloning data files, software reconfiguring personal computers; recorded cloning software, namely, software for cloning computer hard drives, software for cloning computer operating systems, software for cloning data files, software reconfiguring personal computers; downloadable computer software for the creation of virtual private network; recorded computer software for the creation of virtual private network; downloadable computer software, namely, utility software; recorded computer software, namely, utility software; downloadable computer utility software for removal of computer applications and software; recorded computer utility software for removal of computer applications and software; downloadable utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; recorded utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable computer software, namely, middleware for interfacing client applications and networked or host based databases; recorded computer software, namely, middleware for interfacing client applications and networked or host based databases; downloadable computer software for use in updating other computer software; recorded computer software for use in updating other computer software; downloadable computer software for use in networking applications; recorded computer software for use in networking applications; downloadable computer software for sending and receiving facsimile transmissions from computers and notebook computers; recorded computer software for sending and receiving facsimile transmissions from computers and notebook computers; downloadable computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; recorded computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; downloadable computer software for file management and transfer; recorded computer software for file management and transfer; downloadable computer software for telecommuting, namely, for connecting to and use of a remote computer network, a remote computer and mobile devices; recorded computer software for telecommuting, namely, for connecting to and use of a remote computer network, a remote computer and mobile devices; downloadable computer communications software for use with a home or remote office for connecting computer network users to global networks; recorded computer communications software for use with a home or remote office for connecting computer network users to global networks; downloadable computer software and databases for use in diagnosis, repair and configuration of computers, computer software and computer peripherals; recorded computer software and databases for use in diagnosis, repair and configuration of computers, computer software and computer peripherals; downloadable computer programs for data communications applications, and for the encryption and authentication of electronic information; recorded computer programs for data communications applications, and for the encryption and authentication of electronic information; downloadable computer software for identity security; recorded computer software for identity security; downloadable computer software for authentication and identity management information security; recorded computer software for authentication and identity management information security; downloadable computer software for digital information and data access; recorded computer software for digital information and data access; downloadable computer software for detecting identity fraud; recorded computer software for detecting identity fraud; downloadable computer software and firmware for the management, transmission, and storage of data and information; recorded computer software and firmware for the management, transmission, and storage of data and information; downloadable computer software for use in networking computers; recorded computer software for use in networking computers; downloadable computer software for use in operating electronic mail; recorded computer software for use in operating electronic mail; downloadable computer software for use in monitoring computers for security purposes; recorded computer software for use in monitoring computers for security purposes; downloadable computer software for use in vulnerability scanning of networks and websites; recorded computer software for use in vulnerability scanning of networks and websites; downloadable computer software for use in detecting malware computer software for use with computer servers for controlling and managing server applications; recorded computer software for use in detecting malware computer software for use with computer servers for controlling and managing server applications; downloadable computer software for use in accessing databases; recorded computer software for use in accessing databases; downloadable user manuals and instructional guides supplied with all of the foregoing; downloadable electronic publications in the nature of manuals, blogs, instructional materials, teaching materials, newsletters, magazines, newspapers, books and pamphlets in the field of computer software and computer and on-line security
GOODS OR SERVICES DELETED FROM THE APPLICATION recorded computer antivirus software; recorded computer software for database management in the field of cryptographic network security and data security functions; recorded computer software for providing network, Internet, and computer security; recorded computer software for providing online identity protection and parental control; recorded computer software for providing intrusion detection and prevention; recorded computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; recorded Internet security software, including computer software for use in the monitoring and control of computer and online activity; recorded computer software for providing online transaction security; recorded fraud protection software; recorded computer optimization software; recorded computer software to prevent, diagnose, and repair computer problems; recorded computer maintenance software; recorded computer software for the back-up, storage, restoration and recovery of data, folders, and files; recorded enterprise security software; recorded firewall software; recorded privacy control software; recorded content filtering software; computer hardware; computer peripherals; computer hardware appliances that provide fire wall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions; recorded computer software for providing cryptographic network security and data security functions; recorded computer software for integration of information logic and data between computer networks; recorded computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; recorded computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; recorded computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; recorded computer software for use in analysis and reporting of firewall log data; recorded computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; recorded computer software for encrypting and authenticating data; recorded computer software for encryption; recorded computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable computer software platform for bridging Internet and telephony services and enabling users to communicate and transact business faster across multiple networks via wire line phones, mobile phones, personal computers, PDAs and other personal electronic devices; recorded computer software platform for bridging Internet and telephony services and enabling users to communicate and transact business faster across multiple networks via wire line phones, mobile phones, personal computers, PDAs and other personal electronic devices; downloadable computer software platform for providing faster Internet connections, website resolution and e-mail deliveries; recorded computer software platform for providing faster Internet connections, website resolution and e-mail deliveries; downloadable cloning software, namely, software for cloning computer hard drives, software for cloning computer operating systems, software for cloning data files, software reconfiguring personal computers; recorded cloning software, namely, software for cloning computer hard drives, software for cloning computer operating systems, software for cloning data files, software reconfiguring personal computers; recorded computer software for the creation of virtual private network; recorded computer software, namely, utility software; recorded computer utility software for removal of computer applications and software; downloadable utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; recorded utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable computer software, namely, middleware for interfacing client applications and networked or host based databases; recorded computer software, namely, middleware for interfacing client applications and networked or host based databases; recorded computer software for use in updating other computer software; downloadable computer software for use in networking applications; recorded computer software for use in networking applications; downloadable computer software for sending and receiving facsimile transmissions from computers and notebook computers; recorded computer software for sending and receiving facsimile transmissions from computers and notebook computers; downloadable computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; recorded computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; recorded computer software for file management and transfer; downloadable computer software for telecommuting, namely, for connecting to and use of a remote computer network, a remote computer and mobile devices; recorded computer software for telecommuting, namely, for connecting to and use of a remote computer network, a remote computer and mobile devices; downloadable computer communications software for use with a home or remote office for connecting computer network users to global networks; recorded computer communications software for use with a home or remote office for connecting computer network users to global networks; recorded computer software and databases for use in diagnosis, repair and configuration of computers, computer software and computer peripherals; recorded computer programs for data communications applications, and for the encryption and authentication of electronic information; recorded computer software for identity security; recorded computer software for authentication and identity management information security; recorded computer software for digital information and data access; recorded computer software for detecting identity fraud; downloadable computer software and firmware for the management, transmission, and storage of data and information; recorded computer software and firmware for the management, transmission, and storage of data and information; recorded computer software for use in networking computers; downloadable computer software for use in operating electronic mail; recorded computer software for use in operating electronic mail; recorded computer software for use in monitoring computers for security purposes; recorded computer software for use in vulnerability scanning of networks and websites; downloadable computer software for use with computer servers for controlling and managing server applications; recorded computer software for use in detecting malware computer software for use with computer servers for controlling and managing server applications; downloadable computer software for use in accessing databases; recorded computer software for use in accessing databases; downloadable electronic publications in the nature of magazines, newspapers, books and pamphlets in the field of computer software and computer and on-line security
GOODS OR SERVICES FOR WHICH APPLICANT HAS A CONTINUED BONA FIDE INTENTION, AND IS ENTITLED, TO USE Downloadable computer antivirus software; downloadable computer software for database management in the field of cryptographic network security and data security functions; downloadable computer software for providing network, Internet, and computer security; downloadable computer software for providing online identity protection and parental control; downloadable computer software for providing intrusion detection and prevention; downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; downloadable Internet security software, including computer software for use in the monitoring and control of computer and online activity; downloadable computer software for providing online transaction security; downloadable fraud protection software; downloadable computer optimization software; downloadable computer software to prevent, diagnose, and repair computer problems; downloadable computer maintenance software; downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable enterprise security software; downloadable firewall software; downloadable privacy control software; downloadable content filtering software; downloadable computer software for providing cryptographic network security and data security functions; downloadable computer software for integration of information logic and data between computer networks; downloadable computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; downloadable computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; downloadable computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; downloadable computer software for use in analysis and reporting of firewall log data; downloadable computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable computer software for encrypting and authenticating data; downloadable computer software for encryption; downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable computer software for the creation of virtual private network; downloadable computer software, namely, utility software; downloadable computer utility software for removal of computer applications and software; downloadable computer software for use in updating other computer software; downloadable computer software for file management and transfer; downloadable computer software and databases for use in diagnosis, repair and configuration of computers, computer software and computer peripherals; downloadable computer programs for data communications applications, and for the encryption and authentication of electronic information; downloadable computer software for identity security; downloadable computer software for authentication and identity management information security; downloadable computer software for digital information and data access; downloadable computer software for detecting identity fraud; downloadable computer software for use in networking computers; downloadable computer software for use in monitoring computers for security purposes; downloadable computer software for use in vulnerability scanning of networks and websites; downloadable computer software for use in detecting malware; downloadable user manuals and instructional guides supplied with all of the foregoing; downloadable electronic publications in the nature of manuals, blogs, instructional materials, teaching materials, and newsletters in the field of computer software and computer and on-line security
INTERNATIONAL CLASS 042
CURRENT IDENTIFICATION Development of software for network and Internet security and data encryption; electronic storage of data; computer software consultation; Internet security consultancy, namely, computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization of software; on-line technical support services, namely, troubleshooting in the nature of diagnosing of computer hardware and software problems; technical and customer support services, namely, troubleshooting of computer software problems; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; technical support services, namely, providing back-up computer programs and facilities; updating of computer software for others; computer virus protection services; computer consultation in the field of computer security; computer diagnostic services; computer services, namely, data recovery services; computer software installation services; computer programming; electronic notification and delivery of software updates; research services relating to computer hardware and computer software; technical consultation in the field of computer software installation and maintenance; development, updating, publishing and maintenance of software for networks and standalone computers in the fields of security, databases management, and anti-virus protection and monitoring security systems; providing information in the field of network and Internet security; providing technical information in the field of computer software applications; computer services, namely, providing information concerning the encryption and authentication of electronic data; providing information concerning authentication of user identification data for e-commerce transaction security; consultancy services in the fields of digital media, data encryption, computer security, communication security and computer software; encryption and decryption of data and communications; computer support services, namely, technical support and software update services; computer software and hardware technological consulting services related to computer products and services; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service featuring software for use in scanning networks and websites to detect and identify vulnerabilities and malware; providing consultants to help deploy, supervise and manage information technology projects; providing information in the field of information technology relating to communications devices, computers, computer hardware, computer software, computer peripherals, and computer networks; computer services, namely, providing search engines for obtaining data on a global computer network; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; website hosting; computer services, namely, providing temporary use of non-downloadable software applications for creating and operating ecommerce websites; providing authentication of website operator identity; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; development, integration and operation of computer systems to support issuance and management of digital certificates; creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; providing computerized and electronic user authentication services in e-commerce transactions; electronic monitoring of computer systems for security purposes; electronic monitoring of computer networks for security purposes; providing security threat management systems, namely, electronic monitoring and tracking of security vulnerabilities and problems in computer software products, the Internet, and computer networks; providing information in the fields of global computer network and local area network Internet security, preventing computer viruses, preventing computer threats, computer hardware and software applications in security; identity theft protection services, namely, fraud prevention in the form of computerized and electronic monitoring of personal and financial information; authentication, issuance and validation of digital certificates; computerized and electronic identification verification services, namely, providing computerized and electronic authentication of business identification information; computer security services, namely, using technology to provide user identity authentication services in ecommerce transactions; computer security services, namely, using technology to provide authentication of identity; computer security services in the nature of administering digital keys; computer security services in the nature of administering digital certificates; computer security services, namely, electronic signature verification services using technology to authenticate identity
GOODS OR SERVICES DELETED FROM THE APPLICATION computer programming; providing consultants to help deploy, supervise and manage information technology projects; computer services, namely, providing temporary use of non-downloadable software applications for creating and operating ecommerce websites
GOODS OR SERVICES FOR WHICH APPLICANT HAS A CONTINUED BONA FIDE INTENTION, AND IS ENTITLED, TO USE Development of software for network and Internet security and data encryption; electronic storage of data; computer software consultation; Internet security consultancy, namely, computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization of software; on-line technical support services, namely, troubleshooting in the nature of diagnosing of computer hardware and software problems; technical and customer support services, namely, troubleshooting of computer software problems; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; technical support services, namely, providing back-up computer programs and facilities; updating of computer software for others; computer virus protection services; computer consultation in the field of computer security; computer diagnostic services; computer services, namely, data recovery services; computer software installation services; electronic notification and delivery of software updates; research services relating to computer hardware and computer software; technical consultation in the field of computer software installation and maintenance; development, updating, publishing and maintenance of software for networks and standalone computers in the fields of security, databases management, and anti-virus protection and monitoring security systems; providing information in the field of network and Internet security; providing technical information in the field of computer software applications; computer services, namely, providing information concerning the encryption and authentication of electronic data; providing information concerning authentication of user identification data for e-commerce transaction security; consultancy services in the fields of digital media, data encryption, computer security, communication security and computer software; encryption and decryption of data and communications; computer support services, namely, technical support and software update services; computer software and hardware technological consulting services related to computer products and services; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service featuring software for use in scanning networks and websites to detect and identify vulnerabilities and malware; providing information in the field of information technology relating to communications devices, computers, computer hardware, computer software, computer peripherals, and computer networks; computer services, namely, providing search engines for obtaining data on a global computer network; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; website hosting; providing authentication of website operator identity; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; development, integration and operation of computer systems to support issuance and management of digital certificates; creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; providing computerized and electronic user authentication services in e-commerce transactions; electronic monitoring of computer systems for security purposes; electronic monitoring of computer networks for security purposes; providing security threat management systems, namely, electronic monitoring and tracking of security vulnerabilities and problems in computer software products, the Internet, and computer networks; providing information in the fields of global computer network and local area network Internet security, preventing computer viruses, preventing computer threats, computer hardware and software applications in security; identity theft protection services, namely, fraud prevention in the form of computerized and electronic monitoring of personal and financial information; authentication, issuance and validation of digital certificates; computerized and electronic identification verification services, namely, providing computerized and electronic authentication of business identification information; computer security services, namely, using technology to provide user identity authentication services in ecommerce transactions; computer security services, namely, using technology to provide authentication of identity; computer security services in the nature of administering digital keys; computer security services in the nature of administering digital certificates; computer security services, namely, electronic signature verification services using technology to authenticate identity
INTERNATIONAL CLASS 045
CURRENT IDENTIFICATION Personal background investigation services in order to authenticate identity
GOODS OR SERVICES KEEP ALL LISTED
EXTENSION SECTION
EXTENSION NUMBER 2
ONGOING EFFORT product or service research or development
ALLOWANCE MAIL DATE 09/17/2019
STATEMENT OF USE NO
PAYMENT SECTION
NUMBER OF CLASSES 3
SUBTOTAL AMOUNT [EXTENSION FEE] 375
TOTAL AMOUNT 375
SIGNATURE SECTION
SIGNATURE /jane c christie/
SIGNATORY'S NAME Jane C. Christie
SIGNATORY'S POSITION Corporate Counsel, legal
DATE SIGNED 09/17/2020
FILING INFORMATION
SUBMIT DATE Thu Sep 17 22:27:17 ET 2020
TEAS STAMP USPTO/ESU-X.XX.XXX.XXX-20
200917222717899897-882898
16-75068612a885656efa3588
4c72c8e21f62876edfecf508b
405a186903cd44f43-DA-2717
6153-20200917222027847636



Under the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless it displays a valid OMB control number.
PTO Form 1581 (Rev 09/2005)
OMB No. 0651-0054 (Exp 12/31/2020)


SOU Extension Request
(15 U.S.C. Section 1051(d))


To the Commissioner for Trademarks:

MARK: NORTON (stylized and/or with design, see http://uspto.report/TM/88289816/mark.png)
SERIAL NUMBER: 88289816

OWNER AND/OR ENTITY INFORMATION
The owner proposes to amend the following:
Current: NortonLifeLock Inc., having an address of
      60 E Rio Salado Parkway, Suite 1000
      Tempe, Arizona 85281
      United States
      Email: XXXX
Proposed: NortonLifeLock Inc., having an address of
      60 E Rio Salado Parkway, Suite 1000
      Tempe, Arizona 85281
      United States
      Phone:
      Fax:
      Email: XXXX

The owner requests a six-month extension of time to file the Statement of Use under 37 C.F.R. Section 2.89 in this application.    The Notice of Allowance mailing date was 09/17/2019.

For International Class 009:
Current identification: Downloadable computer antivirus software; recorded computer antivirus software; downloadable computer software for database management in the field of cryptographic network security and data security functions; recorded computer software for database management in the field of cryptographic network security and data security functions; downloadable computer software for providing network, Internet, and computer security; recorded computer software for providing network, Internet, and computer security; downloadable computer software for providing online identity protection and parental control; recorded computer software for providing online identity protection and parental control; downloadable computer software for providing intrusion detection and prevention; recorded computer software for providing intrusion detection and prevention; downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; recorded computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; downloadable Internet security software, including computer software for use in the monitoring and control of computer and online activity; recorded Internet security software, including computer software for use in the monitoring and control of computer and online activity; downloadable computer software for providing online transaction security; recorded computer software for providing online transaction security; downloadable fraud protection software; recorded fraud protection software; downloadable computer optimization software; recorded computer optimization software; downloadable computer software to prevent, diagnose, and repair computer problems; recorded computer software to prevent, diagnose, and repair computer problems; downloadable computer maintenance software; recorded computer maintenance software; downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; recorded computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable enterprise security software; recorded enterprise security software; downloadable firewall software; recorded firewall software; downloadable privacy control software; recorded privacy control software; downloadable content filtering software; recorded content filtering software; computer hardware; computer peripherals; computer hardware appliances that provide fire wall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions; downloadable computer software for providing cryptographic network security and data security functions; recorded computer software for providing cryptographic network security and data security functions; downloadable computer software for integration of information logic and data between computer networks; recorded computer software for integration of information logic and data between computer networks; downloadable computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; recorded computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; downloadable computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; recorded computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; downloadable computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; recorded computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; downloadable computer software for use in analysis and reporting of firewall log data; recorded computer software for use in analysis and reporting of firewall log data; downloadable computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; recorded computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable computer software for encrypting and authenticating data; recorded computer software for encrypting and authenticating data; downloadable computer software for encryption; recorded computer software for encryption; downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; recorded computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable computer software platform for bridging Internet and telephony services and enabling users to communicate and transact business faster across multiple networks via wire line phones, mobile phones, personal computers, PDAs and other personal electronic devices; recorded computer software platform for bridging Internet and telephony services and enabling users to communicate and transact business faster across multiple networks via wire line phones, mobile phones, personal computers, PDAs and other personal electronic devices; downloadable computer software platform for providing faster Internet connections, website resolution and e-mail deliveries; recorded computer software platform for providing faster Internet connections, website resolution and e-mail deliveries; downloadable cloning software, namely, software for cloning computer hard drives, software for cloning computer operating systems, software for cloning data files, software reconfiguring personal computers; recorded cloning software, namely, software for cloning computer hard drives, software for cloning computer operating systems, software for cloning data files, software reconfiguring personal computers; downloadable computer software for the creation of virtual private network; recorded computer software for the creation of virtual private network; downloadable computer software, namely, utility software; recorded computer software, namely, utility software; downloadable computer utility software for removal of computer applications and software; recorded computer utility software for removal of computer applications and software; downloadable utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; recorded utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable computer software, namely, middleware for interfacing client applications and networked or host based databases; recorded computer software, namely, middleware for interfacing client applications and networked or host based databases; downloadable computer software for use in updating other computer software; recorded computer software for use in updating other computer software; downloadable computer software for use in networking applications; recorded computer software for use in networking applications; downloadable computer software for sending and receiving facsimile transmissions from computers and notebook computers; recorded computer software for sending and receiving facsimile transmissions from computers and notebook computers; downloadable computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; recorded computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; downloadable computer software for file management and transfer; recorded computer software for file management and transfer; downloadable computer software for telecommuting, namely, for connecting to and use of a remote computer network, a remote computer and mobile devices; recorded computer software for telecommuting, namely, for connecting to and use of a remote computer network, a remote computer and mobile devices; downloadable computer communications software for use with a home or remote office for connecting computer network users to global networks; recorded computer communications software for use with a home or remote office for connecting computer network users to global networks; downloadable computer software and databases for use in diagnosis, repair and configuration of computers, computer software and computer peripherals; recorded computer software and databases for use in diagnosis, repair and configuration of computers, computer software and computer peripherals; downloadable computer programs for data communications applications, and for the encryption and authentication of electronic information; recorded computer programs for data communications applications, and for the encryption and authentication of electronic information; downloadable computer software for identity security; recorded computer software for identity security; downloadable computer software for authentication and identity management information security; recorded computer software for authentication and identity management information security; downloadable computer software for digital information and data access; recorded computer software for digital information and data access; downloadable computer software for detecting identity fraud; recorded computer software for detecting identity fraud; downloadable computer software and firmware for the management, transmission, and storage of data and information; recorded computer software and firmware for the management, transmission, and storage of data and information; downloadable computer software for use in networking computers; recorded computer software for use in networking computers; downloadable computer software for use in operating electronic mail; recorded computer software for use in operating electronic mail; downloadable computer software for use in monitoring computers for security purposes; recorded computer software for use in monitoring computers for security purposes; downloadable computer software for use in vulnerability scanning of networks and websites; recorded computer software for use in vulnerability scanning of networks and websites; downloadable computer software for use in detecting malware computer software for use with computer servers for controlling and managing server applications; recorded computer software for use in detecting malware computer software for use with computer servers for controlling and managing server applications; downloadable computer software for use in accessing databases; recorded computer software for use in accessing databases; downloadable user manuals and instructional guides supplied with all of the foregoing; downloadable electronic publications in the nature of manuals, blogs, instructional materials, teaching materials, newsletters, magazines, newspapers, books and pamphlets in the field of computer software and computer and on-line security

This filing does NOT cover the following goods/services listed in either the application or Notice of Allowance or as subsequently modified for this specific class; these goods/services are permanently deleted from this application: recorded computer antivirus software; recorded computer software for database management in the field of cryptographic network security and data security functions; recorded computer software for providing network, Internet, and computer security; recorded computer software for providing online identity protection and parental control; recorded computer software for providing intrusion detection and prevention; recorded computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; recorded Internet security software, including computer software for use in the monitoring and control of computer and online activity; recorded computer software for providing online transaction security; recorded fraud protection software; recorded computer optimization software; recorded computer software to prevent, diagnose, and repair computer problems; recorded computer maintenance software; recorded computer software for the back-up, storage, restoration and recovery of data, folders, and files; recorded enterprise security software; recorded firewall software; recorded privacy control software; recorded content filtering software; computer hardware; computer peripherals; computer hardware appliances that provide fire wall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions; recorded computer software for providing cryptographic network security and data security functions; recorded computer software for integration of information logic and data between computer networks; recorded computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; recorded computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; recorded computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; recorded computer software for use in analysis and reporting of firewall log data; recorded computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; recorded computer software for encrypting and authenticating data; recorded computer software for encryption; recorded computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable computer software platform for bridging Internet and telephony services and enabling users to communicate and transact business faster across multiple networks via wire line phones, mobile phones, personal computers, PDAs and other personal electronic devices; recorded computer software platform for bridging Internet and telephony services and enabling users to communicate and transact business faster across multiple networks via wire line phones, mobile phones, personal computers, PDAs and other personal electronic devices; downloadable computer software platform for providing faster Internet connections, website resolution and e-mail deliveries; recorded computer software platform for providing faster Internet connections, website resolution and e-mail deliveries; downloadable cloning software, namely, software for cloning computer hard drives, software for cloning computer operating systems, software for cloning data files, software reconfiguring personal computers; recorded cloning software, namely, software for cloning computer hard drives, software for cloning computer operating systems, software for cloning data files, software reconfiguring personal computers; recorded computer software for the creation of virtual private network; recorded computer software, namely, utility software; recorded computer utility software for removal of computer applications and software; downloadable utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; recorded utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable computer software, namely, middleware for interfacing client applications and networked or host based databases; recorded computer software, namely, middleware for interfacing client applications and networked or host based databases; recorded computer software for use in updating other computer software; downloadable computer software for use in networking applications; recorded computer software for use in networking applications; downloadable computer software for sending and receiving facsimile transmissions from computers and notebook computers; recorded computer software for sending and receiving facsimile transmissions from computers and notebook computers; downloadable computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; recorded computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; recorded computer software for file management and transfer; downloadable computer software for telecommuting, namely, for connecting to and use of a remote computer network, a remote computer and mobile devices; recorded computer software for telecommuting, namely, for connecting to and use of a remote computer network, a remote computer and mobile devices; downloadable computer communications software for use with a home or remote office for connecting computer network users to global networks; recorded computer communications software for use with a home or remote office for connecting computer network users to global networks; recorded computer software and databases for use in diagnosis, repair and configuration of computers, computer software and computer peripherals; recorded computer programs for data communications applications, and for the encryption and authentication of electronic information; recorded computer software for identity security; recorded computer software for authentication and identity management information security; recorded computer software for digital information and data access; recorded computer software for detecting identity fraud; downloadable computer software and firmware for the management, transmission, and storage of data and information; recorded computer software and firmware for the management, transmission, and storage of data and information; recorded computer software for use in networking computers; downloadable computer software for use in operating electronic mail; recorded computer software for use in operating electronic mail; recorded computer software for use in monitoring computers for security purposes; recorded computer software for use in vulnerability scanning of networks and websites; downloadable computer software for use with computer servers for controlling and managing server applications; recorded computer software for use in detecting malware computer software for use with computer servers for controlling and managing server applications; downloadable computer software for use in accessing databases; recorded computer software for use in accessing databases; downloadable electronic publications in the nature of magazines, newspapers, books and pamphlets in the field of computer software and computer and on-line security

For a trademark/service mark: The applicant has a continued bona fide intention, and is entitled, to use the mark in commerce on or in connection with all of the goods/services listed in the Notice of Allowance or as subsequently modified for this specific class; for a collective/certification mark: the applicant has a continued bona fide intention, and is entitled, to exercise legitimate control over the use of the mark in commerce on or in connection with the goods/services/collective membership organization listed in the Notice of Allowance, or as subsequently modified for this specific class: Downloadable computer antivirus software; downloadable computer software for database management in the field of cryptographic network security and data security functions; downloadable computer software for providing network, Internet, and computer security; downloadable computer software for providing online identity protection and parental control; downloadable computer software for providing intrusion detection and prevention; downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; downloadable Internet security software, including computer software for use in the monitoring and control of computer and online activity; downloadable computer software for providing online transaction security; downloadable fraud protection software; downloadable computer optimization software; downloadable computer software to prevent, diagnose, and repair computer problems; downloadable computer maintenance software; downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable enterprise security software; downloadable firewall software; downloadable privacy control software; downloadable content filtering software; downloadable computer software for providing cryptographic network security and data security functions; downloadable computer software for integration of information logic and data between computer networks; downloadable computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; downloadable computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; downloadable computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; downloadable computer software for use in analysis and reporting of firewall log data; downloadable computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable computer software for encrypting and authenticating data; downloadable computer software for encryption; downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable computer software for the creation of virtual private network; downloadable computer software, namely, utility software; downloadable computer utility software for removal of computer applications and software; downloadable computer software for use in updating other computer software; downloadable computer software for file management and transfer; downloadable computer software and databases for use in diagnosis, repair and configuration of computers, computer software and computer peripherals; downloadable computer programs for data communications applications, and for the encryption and authentication of electronic information; downloadable computer software for identity security; downloadable computer software for authentication and identity management information security; downloadable computer software for digital information and data access; downloadable computer software for detecting identity fraud; downloadable computer software for use in networking computers; downloadable computer software for use in monitoring computers for security purposes; downloadable computer software for use in vulnerability scanning of networks and websites; downloadable computer software for use in detecting malware; downloadable user manuals and instructional guides supplied with all of the foregoing; downloadable electronic publications in the nature of manuals, blogs, instructional materials, teaching materials, and newsletters in the field of computer software and computer and on-line security

For International Class 042:
Current identification: Development of software for network and Internet security and data encryption; electronic storage of data; computer software consultation; Internet security consultancy, namely, computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization of software; on-line technical support services, namely, troubleshooting in the nature of diagnosing of computer hardware and software problems; technical and customer support services, namely, troubleshooting of computer software problems; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; technical support services, namely, providing back-up computer programs and facilities; updating of computer software for others; computer virus protection services; computer consultation in the field of computer security; computer diagnostic services; computer services, namely, data recovery services; computer software installation services; computer programming; electronic notification and delivery of software updates; research services relating to computer hardware and computer software; technical consultation in the field of computer software installation and maintenance; development, updating, publishing and maintenance of software for networks and standalone computers in the fields of security, databases management, and anti-virus protection and monitoring security systems; providing information in the field of network and Internet security; providing technical information in the field of computer software applications; computer services, namely, providing information concerning the encryption and authentication of electronic data; providing information concerning authentication of user identification data for e-commerce transaction security; consultancy services in the fields of digital media, data encryption, computer security, communication security and computer software; encryption and decryption of data and communications; computer support services, namely, technical support and software update services; computer software and hardware technological consulting services related to computer products and services; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service featuring software for use in scanning networks and websites to detect and identify vulnerabilities and malware; providing consultants to help deploy, supervise and manage information technology projects; providing information in the field of information technology relating to communications devices, computers, computer hardware, computer software, computer peripherals, and computer networks; computer services, namely, providing search engines for obtaining data on a global computer network; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; website hosting; computer services, namely, providing temporary use of non-downloadable software applications for creating and operating ecommerce websites; providing authentication of website operator identity; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; development, integration and operation of computer systems to support issuance and management of digital certificates; creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; providing computerized and electronic user authentication services in e-commerce transactions; electronic monitoring of computer systems for security purposes; electronic monitoring of computer networks for security purposes; providing security threat management systems, namely, electronic monitoring and tracking of security vulnerabilities and problems in computer software products, the Internet, and computer networks; providing information in the fields of global computer network and local area network Internet security, preventing computer viruses, preventing computer threats, computer hardware and software applications in security; identity theft protection services, namely, fraud prevention in the form of computerized and electronic monitoring of personal and financial information; authentication, issuance and validation of digital certificates; computerized and electronic identification verification services, namely, providing computerized and electronic authentication of business identification information; computer security services, namely, using technology to provide user identity authentication services in ecommerce transactions; computer security services, namely, using technology to provide authentication of identity; computer security services in the nature of administering digital keys; computer security services in the nature of administering digital certificates; computer security services, namely, electronic signature verification services using technology to authenticate identity

This filing does NOT cover the following goods/services listed in either the application or Notice of Allowance or as subsequently modified for this specific class; these goods/services are permanently deleted from this application: computer programming; providing consultants to help deploy, supervise and manage information technology projects; computer services, namely, providing temporary use of non-downloadable software applications for creating and operating ecommerce websites

For a trademark/service mark: The applicant has a continued bona fide intention, and is entitled, to use the mark in commerce on or in connection with all of the goods/services listed in the Notice of Allowance or as subsequently modified for this specific class; for a collective/certification mark: the applicant has a continued bona fide intention, and is entitled, to exercise legitimate control over the use of the mark in commerce on or in connection with the goods/services/collective membership organization listed in the Notice of Allowance, or as subsequently modified for this specific class: Development of software for network and Internet security and data encryption; electronic storage of data; computer software consultation; Internet security consultancy, namely, computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization of software; on-line technical support services, namely, troubleshooting in the nature of diagnosing of computer hardware and software problems; technical and customer support services, namely, troubleshooting of computer software problems; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; technical support services, namely, providing back-up computer programs and facilities; updating of computer software for others; computer virus protection services; computer consultation in the field of computer security; computer diagnostic services; computer services, namely, data recovery services; computer software installation services; electronic notification and delivery of software updates; research services relating to computer hardware and computer software; technical consultation in the field of computer software installation and maintenance; development, updating, publishing and maintenance of software for networks and standalone computers in the fields of security, databases management, and anti-virus protection and monitoring security systems; providing information in the field of network and Internet security; providing technical information in the field of computer software applications; computer services, namely, providing information concerning the encryption and authentication of electronic data; providing information concerning authentication of user identification data for e-commerce transaction security; consultancy services in the fields of digital media, data encryption, computer security, communication security and computer software; encryption and decryption of data and communications; computer support services, namely, technical support and software update services; computer software and hardware technological consulting services related to computer products and services; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service featuring software for use in scanning networks and websites to detect and identify vulnerabilities and malware; providing information in the field of information technology relating to communications devices, computers, computer hardware, computer software, computer peripherals, and computer networks; computer services, namely, providing search engines for obtaining data on a global computer network; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; website hosting; providing authentication of website operator identity; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; development, integration and operation of computer systems to support issuance and management of digital certificates; creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; providing computerized and electronic user authentication services in e-commerce transactions; electronic monitoring of computer systems for security purposes; electronic monitoring of computer networks for security purposes; providing security threat management systems, namely, electronic monitoring and tracking of security vulnerabilities and problems in computer software products, the Internet, and computer networks; providing information in the fields of global computer network and local area network Internet security, preventing computer viruses, preventing computer threats, computer hardware and software applications in security; identity theft protection services, namely, fraud prevention in the form of computerized and electronic monitoring of personal and financial information; authentication, issuance and validation of digital certificates; computerized and electronic identification verification services, namely, providing computerized and electronic authentication of business identification information; computer security services, namely, using technology to provide user identity authentication services in ecommerce transactions; computer security services, namely, using technology to provide authentication of identity; computer security services in the nature of administering digital keys; computer security services in the nature of administering digital certificates; computer security services, namely, electronic signature verification services using technology to authenticate identity

For International Class 045:
Current identification: Personal background investigation services in order to authenticate identity

For a trademark/service mark: The applicant has a continued bona fide intention, and is entitled, to use the mark in commerce on or in connection with all of the goods/services listed in the Notice of Allowance or as subsequently modified for this specific class; for a collective/certification mark: the applicant has a continued bona fide intention, and is entitled, to exercise legitimate control over the use of the mark in commerce on or in connection with the goods/services/collective membership organization listed in the Notice of Allowance, or as subsequently modified for this specific class.


This is the second extension request. The applicant has made the following ongoing efforts to use the mark in commerce on or in connection with each of those goods/services covered by the extension request: product or service research or development

Correspondence Information (current):
      Sally M. Abel, Esq.
      PRIMARY EMAIL FOR CORRESPONDENCE: trademarks@fenwick.com
      SECONDARY EMAIL ADDRESS(ES) (COURTESY COPIES): driggio@fenwick.com

Correspondence Information (proposed):
      Sally M. Abel, Esq.
      PRIMARY EMAIL FOR CORRESPONDENCE: trademarks@fenwick.com
      SECONDARY EMAIL ADDRESS(ES) (COURTESY COPIES): driggio@fenwick.com


Requirement for Email and Electronic Filing: I understand that a valid email address must be maintained by the owner/holder and the owner's/holder's attorney, if appointed, and that all official trademark correspondence must be submitted via the Trademark Electronic Application System (TEAS).





A fee payment in the amount of $375 will be submitted with the form, representing payment for 3 classes.


Declaration

STATEMENTS: The signatory believes that: the applicant has a continued bona fide intention, and is entitled, to use the mark in commerce on or in connection with all the goods/services under Section 1(b) in the notice of allowance or as subsequently modified, or, if applicable, the applicant has a continued bona fide intention, and is entitled, to exercise legitimate control over the use of the mark in commerce on or in connection with all the goods/services/collective membership organization under Section 1(b) in the notice of allowance or as subsequently modified; and that to the best of the signatory's knowledge and belief, no other persons, except, if applicable, members and concurrent users, have the right to use the mark in commerce, either in the identical form or in such near resemblance as to be likely, when used on or in connection with the goods/services/collective membership organization of such other persons, to cause confusion or mistake, or to deceive.

DECLARATION: The signatory being warned that willful false statements and the like are punishable by fine or imprisonment, or both, under 18 U.S.C. §1001, and that such willful false statements and the like may jeopardize the validity of the application or submission or any resulting registration, declares that all statements made of his/her own knowledge are true and that all statements made on information and belief are believed to be true.


Signature: /jane c christie/      Date Signed: 09/17/2020
Signatory's Name: Jane C. Christie
Signatory's Position: Corporate Counsel, legal

RAM Sale Number: 88289816
RAM Accounting Date: 09/17/2020

Serial Number: 88289816
Internet Transmission Date: Thu Sep 17 22:27:17 ET 2020
TEAS Stamp: USPTO/ESU-X.XX.XXX.XXX-20200917222717899
897-88289816-75068612a885656efa35884c72c
8e21f62876edfecf508b405a186903cd44f43-DA
-27176153-20200917222027847636



Extension of Time to File SOU [image/jpeg]


uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed