ITU Unit Action

NORTON

NortonLifeLock Inc.

ITU Unit Action

Trademark Snap Shot ITU Unit Action
(Table presents the data on ITU Unit Action)

OVERVIEW

SERIAL NUMBER 88289816 FILING DATE 02/05/2019
REG NUMBER 0000000 REG DATE N/A
REGISTER PRINCIPAL MARK TYPE TRADEMARK
INTL REG # N/A INTL REG DATE N/A
TM ATTORNEY BROWNING, LUKE CASH
L.O. ASSIGNED N90-NOT FOUND

PUB INFORMATION

RUN DATE 03/05/2020
PUB DATE 07/23/2019
STATUS 730-FIRST EXTENSION - GRANTED
STATUS DATE 03/04/2020
LITERAL MARK ELEMENT NORTON

DATE ABANDONED N/A DATE CANCELLED N/A
SECTION 2F NO SECTION 2F IN PART NO
SECTION 8 NO SECTION 8 IN PART NO
SECTION 15 NO REPUB 12C N/A
RENEWAL FILED NO RENEWAL DATE N/A
DATE AMEND REG N/A


FILING BASIS

FILED BASIS CURRENT BASIS AMENDED BASIS
1 (a) NO 1 (a) NO 1 (a) NO
1 (b) YES 1 (b) YES 1 (b) NO
44D NO 44D NO 44D NO
44E NO 44E NO 44E NO
66A NO 66A NO

NO BASIS NO NO BASIS NO


MARK DATA

STANDARD CHARACTER MARK NO
LITERAL MARK ELEMENT NORTON
MARK DRAWING CODE 3-AN ILLUSTRATION DRAWING WHICH INCLUDES WORD(S)/LETTER(S)/NUMBER(S)
COLOR DRAWING FLAG NO

CURRENT OWNER INFORMATION

PARTY TYPE 21-SUBSEQUENT OWNER AFTER PUBLICATION
NAME NortonLifeLock Inc.
ADDRESS 60 E Rio Salado Parkway, Suite 1000
Tempe, AZ 85281
ENTITY 03-CORPORATION
CITIZENSHIP Delaware

GOODS AND SERVICES

INTERNATIONAL CLASS 009
          DESCRIPTION TEXT Downloadable computer antivirus software; recorded computer antivirus software; downloadable computer software for database management in the field of cryptographic network security and data security functions; recorded computer software for database management in the field of cryptographic network security and data security functions; downloadable computer software for providing network, Internet, and computer security; recorded computer software for providing network, Internet, and computer security; downloadable computer software for providing online identity protection and parental control; recorded computer software for providing online identity protection and parental control; downloadable computer software for providing intrusion detection and prevention; recorded computer software for providing intrusion detection and prevention; downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; recorded computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; downloadable Internet security software, including computer software for use in the monitoring and control of computer and online activity; recorded Internet security software, including computer software for use in the monitoring and control of computer and online activity; downloadable computer software for providing online transaction security; recorded computer software for providing online transaction security; downloadable fraud protection software; recorded fraud protection software; downloadable computer optimization software; recorded computer optimization software; downloadable computer software to prevent, diagnose, and repair computer problems; recorded computer software to prevent, diagnose, and repair computer problems; downloadable computer maintenance software; recorded computer maintenance software; downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; recorded computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable enterprise security software; recorded enterprise security software; downloadable firewall software; recorded firewall software; downloadable privacy control software; recorded privacy control software; downloadable content filtering software; recorded content filtering software; computer hardware; computer peripherals; computer hardware appliances that provide fire wall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions; downloadable computer software for providing cryptographic network security and data security functions; recorded computer software for providing cryptographic network security and data security functions; downloadable computer software for integration of information logic and data between computer networks; recorded computer software for integration of information logic and data between computer networks; downloadable computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; recorded computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; downloadable computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; recorded computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; downloadable computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; recorded computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; downloadable computer software for use in analysis and reporting of firewall log data; recorded computer software for use in analysis and reporting of firewall log data; downloadable computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; recorded computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable computer software for encrypting and authenticating data; recorded computer software for encrypting and authenticating data; downloadable computer software for encryption; recorded computer software for encryption; downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; recorded computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable computer software platform for bridging Internet and telephony services and enabling users to communicate and transact business faster across multiple networks via wire line phones, mobile phones, personal computers, PDAs and other personal electronic devices; recorded computer software platform for bridging Internet and telephony services and enabling users to communicate and transact business faster across multiple networks via wire line phones, mobile phones, personal computers, PDAs and other personal electronic devices; downloadable computer software platform for providing faster Internet connections, website resolution and e-mail deliveries; recorded computer software platform for providing faster Internet connections, website resolution and e-mail deliveries; downloadable cloning software, namely, software for cloning computer hard drives, software for cloning computer operating systems, software for cloning data files, software reconfiguring personal computers; recorded cloning software, namely, software for cloning computer hard drives, software for cloning computer operating systems, software for cloning data files, software reconfiguring personal computers; downloadable computer software for the creation of virtual private network; recorded computer software for the creation of virtual private network; downloadable computer software, namely, utility software; recorded computer software, namely, utility software; downloadable computer utility software for removal of computer applications and software; recorded computer utility software for removal of computer applications and software; downloadable utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; recorded utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable computer software, namely, middleware for interfacing client applications and networked or host based databases; recorded computer software, namely, middleware for interfacing client applications and networked or host based databases; downloadable computer software for use in updating other computer software; recorded computer software for use in updating other computer software; downloadable computer software for use in networking applications; recorded computer software for use in networking applications; downloadable computer software for sending and receiving facsimile transmissions from computers and notebook computers; recorded computer software for sending and receiving facsimile transmissions from computers and notebook computers; downloadable computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; recorded computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; downloadable computer software for file management and transfer; recorded computer software for file management and transfer; downloadable computer software for telecommuting, namely, for connecting to and use of a remote computer network, a remote computer and mobile devices; recorded computer software for telecommuting, namely, for connecting to and use of a remote computer network, a remote computer and mobile devices; downloadable computer communications software for use with a home or remote office for connecting computer network users to global networks; recorded computer communications software for use with a home or remote office for connecting computer network users to global networks; downloadable computer software and databases for use in diagnosis, repair and configuration of computers, computer software and computer peripherals; recorded computer software and databases for use in diagnosis, repair and configuration of computers, computer software and computer peripherals; downloadable computer programs for data communications applications, and for the encryption and authentication of electronic information; recorded computer programs for data communications applications, and for the encryption and authentication of electronic information; downloadable computer software for identity security; recorded computer software for identity security; downloadable computer software for authentication and identity management information security; recorded computer software for authentication and identity management information security; downloadable computer software for digital information and data access; recorded computer software for digital information and data access; downloadable computer software for detecting identity fraud; recorded computer software for detecting identity fraud; downloadable computer software and firmware for the management, transmission, and storage of data and information; recorded computer software and firmware for the management, transmission, and storage of data and information; downloadable computer software for use in networking computers; recorded computer software for use in networking computers; downloadable computer software for use in operating electronic mail; recorded computer software for use in operating electronic mail; downloadable computer software for use in monitoring computers for security purposes; recorded computer software for use in monitoring computers for security purposes; downloadable computer software for use in vulnerability scanning of networks and websites; recorded computer software for use in vulnerability scanning of networks and websites; downloadable computer software for use in detecting malware computer software for use with computer servers for controlling and managing server applications; recorded computer software for use in detecting malware computer software for use with computer servers for controlling and managing server applications; downloadable computer software for use in accessing databases; recorded computer software for use in accessing databases; downloadable user manuals and instructional guides supplied with all of the foregoing; downloadable electronic publications in the nature of manuals, blogs, instructional materials, teaching materials, newsletters, magazines, newspapers, books and pamphlets in the field of computer software and computer and on-line security
INTERNATIONAL CLASS 042
          DESCRIPTION TEXT Development of software for network and Internet security and data encryption; electronic storage of data; computer software consultation; Internet security consultancy, namely, computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization of software; on-line technical support services, namely, troubleshooting in the nature of diagnosing of computer hardware and software problems; technical and customer support services, namely, troubleshooting of computer software problems; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; technical support services, namely, providing back-up computer programs and facilities; updating of computer software for others; computer virus protection services; computer consultation in the field of computer security; computer diagnostic services; computer services, namely, data recovery services; computer software installation services; computer programming; electronic notification and delivery of software updates; research services relating to computer hardware and computer software; technical consultation in the field of computer software installation and maintenance; development, updating, publishing and maintenance of software for networks and standalone computers in the fields of security, databases management, and anti-virus protection and monitoring security systems; providing information in the field of network and Internet security; providing technical information in the field of computer software applications; computer services, namely, providing information concerning the encryption and authentication of electronic data; providing information concerning authentication of user identification data for e-commerce transaction security; consultancy services in the fields of digital media, data encryption, computer security, communication security and computer software; encryption and decryption of data and communications; computer support services, namely, technical support and software update services; computer software and hardware technological consulting services related to computer products and services; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service featuring software for use in scanning networks and websites to detect and identify vulnerabilities and malware; providing consultants to help deploy, supervise and manage information technology projects; providing information in the field of information technology relating to communications devices, computers, computer hardware, computer software, computer peripherals, and computer networks; computer services, namely, providing search engines for obtaining data on a global computer network; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; website hosting; computer services, namely, providing temporary use of non-downloadable software applications for creating and operating ecommerce websites; providing authentication of website operator identity; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; development, integration and operation of computer systems to support issuance and management of digital certificates; creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; providing computerized and electronic user authentication services in e-commerce transactions; electronic monitoring of computer systems for security purposes; electronic monitoring of computer networks for security purposes; providing security threat management systems, namely, electronic monitoring and tracking of security vulnerabilities and problems in computer software products, the Internet, and computer networks; providing information in the fields of global computer network and local area network Internet security, preventing computer viruses, preventing computer threats, computer hardware and software applications in security; identity theft protection services, namely, fraud prevention in the form of computerized and electronic monitoring of personal and financial information; authentication, issuance and validation of digital certificates; computerized and electronic identification verification services, namely, providing computerized and electronic authentication of business identification information; computer security services, namely, using technology to provide user identity authentication services in ecommerce transactions; computer security services, namely, using technology to provide authentication of identity; computer security services in the nature of administering digital keys; computer security services in the nature of administering digital certificates; computer security services, namely, electronic signature verification services using technology to authenticate identity
INTERNATIONAL CLASS 045
          DESCRIPTION TEXT Personal background investigation services in order to authenticate identity

GOODS AND SERVICES CLASSIFICATION

INTERNATIONAL CLASS 009 FIRST USE DATE NONE FIRST USE IN COMMERCE DATE NONE CLASS STATUS 6-ACTIVE
INTERNATIONAL CLASS 042 FIRST USE DATE NONE FIRST USE IN COMMERCE DATE NONE CLASS STATUS 6-ACTIVE
INTERNATIONAL CLASS 045 FIRST USE DATE NONE FIRST USE IN COMMERCE DATE NONE CLASS STATUS 6-ACTIVE

MISCELLANEOUS INFORMATION/STATEMENTS

CHANGE IN REGISTRATION NO
COLORS CLAIMED STATEMENT Color is not claimed as a feature of the mark.
DESCRIPTION OF MARK The mark consists of a circle with a checkmark in the center of the circle appearing next to the word "NORTON".
OWNER OF US REG NOS 3700317    4368939    5420041   

PROSECUTION HISTORY

DATE ENT CD ENT TYPE DESCRIPTION ENT NUM
03/05/2020 EXRA E NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED 040
03/04/2020 EX1G S EXTENSION 1 GRANTED 039
02/20/2020 EXT1 S EXTENSION 1 FILED 038
03/04/2020 AITU A CASE ASSIGNED TO INTENT TO USE PARALEGAL 037
02/20/2020 EEXT I TEAS EXTENSION RECEIVED 036
02/20/2020 TCCA I TEAS CHANGE OF CORRESPONDENCE RECEIVED 035
02/20/2020 ARAA I ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED 034
02/20/2020 REAP I TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED 033
11/13/2019 ASCK I ASSIGNMENT OF OWNERSHIP NOT UPDATED AUTOMATICALLY 032
09/17/2019 NOAM E NOA E-MAILED - SOU REQUIRED FROM APPLICANT 031
08/21/2019 CHPB I CHANGES/CORRECTIONS AFTER PUB APPROVAL ENTERED 030
08/21/2019 APET A ASSIGNED TO PETITION STAFF 029
08/02/2019 EPPA I TEAS POST PUBLICATION AMENDMENT RECEIVED 028
07/23/2019 NPUB E OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED 027
07/23/2019 PUBO A PUBLISHED FOR OPPOSITION 026
07/03/2019 NONP E NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED 025
06/17/2019 ALIE A ASSIGNED TO LIE 024
06/04/2019 CNSA P APPROVED FOR PUB - PRINCIPAL REGISTER 023
06/04/2019 XAEC I EXAMINER'S AMENDMENT ENTERED 022
06/04/2019 GNEN O NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED 021
06/04/2019 GNEA O EXAMINERS AMENDMENT E-MAILED 020
06/04/2019 CNEA R EXAMINERS AMENDMENT -WRITTEN 019
05/29/2019 XAEC I EXAMINER'S AMENDMENT ENTERED 018
05/29/2019 GNEN O NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED 017
05/29/2019 GNEA O EXAMINERS AMENDMENT E-MAILED 016
05/29/2019 CNEA R EXAMINERS AMENDMENT -WRITTEN 015
05/23/2019 XAEC I EXAMINER'S AMENDMENT ENTERED 014
05/23/2019 GNEN O NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED 013
05/23/2019 GNEA O EXAMINERS AMENDMENT E-MAILED 012
05/23/2019 CNEA R EXAMINERS AMENDMENT -WRITTEN 011
05/17/2019 TEME I TEAS/EMAIL CORRESPONDENCE ENTERED 010
05/16/2019 CRFA I CORRESPONDENCE RECEIVED IN LAW OFFICE 009
05/16/2019 TROA I TEAS RESPONSE TO OFFICE ACTION RECEIVED 008
04/29/2019 GNRN O NOTIFICATION OF NON-FINAL ACTION E-MAILED 007
04/29/2019 GNRT F NON-FINAL ACTION E-MAILED 006
04/29/2019 CNRT R NON-FINAL ACTION WRITTEN 005
04/17/2019 DOCK D ASSIGNED TO EXAMINER 004
03/21/2019 MDSC E NOTICE OF DESIGN SEARCH CODE E-MAILED 003
02/27/2019 NWOS I NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM 002
02/08/2019 NWAP I NEW APPLICATION ENTERED IN TRAM 001

CURRENT CORRESPONDENCE INFORMATION

ATTORNEY Sally M. Abel, Esq.
CORRESPONDENCE ADDRESS Sally M. Abel, Esq.
FENWICK & WEST LLP
SILICON VALLEY CENTER
801 CALIFORNIA STREET
MOUNTAIN VIEW CA 94041
DOMESTIC REPRESENTATIVE NONE

PRIOR OWNER INFORMATION

PARTY TYPE 20-OWNER AT PUBLICATION
NAME Symantec Corporation
ADDRESS 350 Ellis Street
Mountain View, CA 94043
ENTITY 03-CORPORATION
CITIZENSHIP Delaware
PARTY TYPE 10-ORIGINAL APPLICANT
NAME Symantec Corporation
ADDRESS 350 Ellis Street
Mountain View, CA 94043
ENTITY 03-CORPORATION
CITIZENSHIP Delaware

ITU Unit Action [image/jpeg]


uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed