BLACK LOTUS

Level 3 Communications, Llc

Application Filed: 2019-02-12
Trademark Application Details
Trademark Logo BLACK LOTUS

Mark For: BLACK LOTUS® trademark registration is intended to cover the categories of internet security services, namely, globally monitoring and collecting cybersecurity intelligence in the nature of software threats from computer networks for the purpose of collecting and disseminating information about cyber threats and malware; Technical research in the field of cybersecurity for others; Providing temporary use of non-downloadable cloud-based software for detecting and analyzing malware and zero-day exploits; Providing temporary use of non-downloadable cloud-based software for data security and protection; Computer network protection and security consultation, namely, computer software consultation and computer software security consultation in the fields of assessment and protection of computer data/information, networks, servers, applications and desktops against attack, intrusion and misuse; Monitoring of network traffic for security purposes, for purposes of preventing distributed denial of service (ddos) attacks on computer servers connected to the internet; Security threat management systems, namely, monitoring and tracking of software security vulnerabilities and problems in computer software products, the Internet, and computer networks and protection of computer data/information, networks, servers, applications and desktops; Testing, analysis and evaluation of computer networks, servers, applications and desktops to assure compliance with cybersecurity industry standards; technical support services, namely, troubleshooting and monitoring of technical computer security network software problems. [all]

Status

2020-09-14 UTC
LIVE REGISTRATION Issued and Active
The trademark application has been registered with the Office.


Research OneLook Acronym Finder
Serial Number88298397
Registration Number5930550
Mark Literal ElementsBLACK LOTUS
Mark Drawing Type4 - STANDARD CHARACTER MARK
Mark TypeSERVICE MARK
RegisterPRINCIPAL
Current LocationPUBLICATION AND ISSUE SECTION 2019-12-10
Basis1(a)
Class StatusACTIVE
Primary US Classes
  • 100: Miscellaneous
  • 101: Advertising and Business
Primary International Class
  • 042 - Primary Class
  • (Computer, scientific & legal) Scientific and technological services and research and design relating thereto: industrial analysis and research services; design and development of computer hardware and software; legal services.
Filed UseNo
Current UseYes
Intent To UseNo
Filed ITUYes
44D FiledNo
44E CurrentNo
66A CurrentNo
Current BasisNo
No BasisNo
Attorney NameGretchen L. Testerman
Attorney Docket Number60-210090US
Law Office AssignedL60
Employee NameHETZEL, DANNEAN

Timeline

1999-02-12Date of First Use
1999-02-12Date of Use In Commerce
2019-02-12Application Filed
2019-09-24Published
2019-09-24Published for Opposition
2019-12-10Location: PUBLICATION AND ISSUE SECTION
2019-12-10Status: Live/Registered
2019-12-10Status: Registered. The registration date is used to determine when post-registration maintenance documents are due.
2019-12-10Trademark Registered
2019-12-10Transaction Date

Trademark Parties (Applicants & Owners)

Party: LEVEL 3 COMMUNICATIONS, LLC
Address1025 ELDORADO BOULEVARD BROOMFIELD, COLORADO UNITED STATES 80021
Legal Entity TypeLimited Liability Company
Legal Entity StateDELAWARE
Party: THE IRC COMPANY, INC.
Address1025 ELDORADO BOULEVARD BROOMFIELD DE 80021
Legal Entity Type
Legal Entity StateDE

*multiple parties listed, check assignment documents for ownership information

Documents

Attorney of Record

GRETCHEN L. TESTERMAN
CENTURYLINK, INC.
1025 ELDORADO BOULEVARD
INTELLECTUAL PROPERTY GROUP
BROOMFIELD, CO 80021

Good, Services, and Codes


IC 042. US 100 101. G & S: Internet security services, namely, globally monitoring and collecting cybersecurity intelligence in the nature of software threats from computer networks for the purpose of collecting and disseminating information about cyber threats and malware; Technical research in the field of cybersecurity for others; Providing temporary use of non-downloadable cloud-based software for detecting and analyzing malware and zero-day exploits; Providing temporary use of non-downloadable cloud-based software for data security and protection; Computer network protection and security consultation, namely, computer software consultation and computer software security consultation in the fields of assessment and protection of computer data/information, networks, servers, applications and desktops against attack, intrusion and misuse; Monitoring of network traffic for security purposes, for purposes of preventing distributed denial of service (ddos) attacks on computer servers connected to the internet; Security threat management systems, namely, monitoring and tracking of software security vulnerabilities and problems in computer software products, the Internet, and computer networks and protection of computer data/information, networks, servers, applications and desktops; Testing, analysis and evaluation of computer networks, servers, applications and desktops to assure compliance with cybersecurity industry standards; technical support services, namely, troubleshooting and monitoring of technical computer security network software problems. FIRST USE: 19990212. FIRST USE IN COMMERCE: 19990212

International Codes:42
U.S. Codes:100,101
Type CodeType
GS0421Internet security services, namely, globally monitoring and collecting cybersecurity intelligence in the nature of software threats from computer networks for the purpose of collecting and disseminating information about cyber threats and malware; Technical research in the field of cybersecurity for others; Providing temporary use of non-downloadable cloud-based software for detecting and analyzing malware and zero-day exploits; Providing temporary use of non-downloadable cloud-based software for data security and protection; Computer network protection and security consultation, namely, computer software consultation and computer software security consultation in the fields of assessment and protection of computer data/information, networks, servers, applications and desktops against attack, intrusion and misuse; Monitoring of network traffic for security purposes, for purposes of preventing distributed denial of service (ddos) attacks on computer servers connected to the internet; Security threat management systems, namely, monitoring and tracking of software security vulnerabilities and problems in computer software products, the Internet, and computer networks and protection of computer data/information, networks, servers, applications and desktops; Testing, analysis and evaluation of computer networks, servers, applications and desktops to assure compliance with cybersecurity industry standards; technical support services, namely, troubleshooting and monitoring of technical computer security network software problems
GS0421Internet security services, namely, globally monitoring and collecting cybersecurity intelligence in the nature of software threats from computer networks for the purpose of collecting and disseminating information about cyber threats and malware; Technical research in the field of cybersecurity for others; Providing temporary use of non-downloadable cloud-based software for detecting and analyzing malware and zero-day exploits; Providing temporary use of non-downloadable cloud-based software for data security and protection; Computer network protection and security consultation, namely, computer software consultation and computer software security consultation in the fields of assessment and protection of computer data/information, networks, servers, applications and desktops against attack, intrusion and misuse; Monitoring of network traffic for security purposes, for purposes of preventing distributed denial of service (ddos) attacks on computer servers connected to the internet; Security threat management systems, namely, monitoring and tracking of software security vulnerabilities and problems in computer software products, the Internet, and computer networks and protection of computer data/information, networks, servers, applications and desktops; Testing, analysis and evaluation of computer networks, servers, applications and desktops to assure compliance with cybersecurity industry standards; technical support services, namely, troubleshooting and monitoring of technical computer security network software problems

Trademark Filing History

DescriptionDateProceeding Number
AUTOMATIC UPDATE OF ASSIGNMENT OF OWNERSHIP2020-01-22
REGISTERED-PRINCIPAL REGISTER2019-12-10
PUBLISHED FOR OPPOSITION2019-09-24
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED2019-09-24
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED2019-09-04
NOTICE OF ACCEPTANCE OF AMENDMENT TO ALLEGE USE E-MAILED2019-08-22
USE AMENDMENT ACCEPTED2019-08-2181840
APPROVED FOR PUB - PRINCIPAL REGISTER2019-08-21
USE AMENDMENT FILED2019-08-1366213
AMENDMENT TO USE PROCESSING COMPLETE2019-08-1366213
AUTOMATIC UPDATE OF ASSIGNMENT OF OWNERSHIP2019-08-07
ASSIGNED TO LIE2019-08-0566213
TEAS AMENDMENT OF USE RECEIVED2019-07-29
TEAS/EMAIL CORRESPONDENCE ENTERED2019-07-2688889
TEAS RESPONSE TO OFFICE ACTION RECEIVED2019-07-25
CORRESPONDENCE RECEIVED IN LAW OFFICE2019-07-2588889
NOTIFICATION OF NON-FINAL ACTION E-MAILED2019-04-266325
NON-FINAL ACTION WRITTEN2019-04-2681840
NON-FINAL ACTION E-MAILED2019-04-266325
ASSIGNED TO EXAMINER2019-04-1981840
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM2019-03-06
NEW APPLICATION ENTERED IN TRAM2019-02-15

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed