Mark For: BLACK LOTUS® trademark registration is intended to cover the categories of
Research |
![]() ![]() ![]() ![]() ![]() |
Serial Number | 88298397 |
Registration Number | 5930550 |
Mark Literal Elements | BLACK LOTUS |
Mark Drawing Type | 4 - STANDARD CHARACTER MARK |
Mark Type | SERVICE MARK |
Register | PRINCIPAL |
Current Location | PUBLICATION AND ISSUE SECTION 2019-12-10 |
Basis | 1(a) |
Class Status | ACTIVE |
Primary US Classes |
|
Primary International Class |
|
Filed Use | No |
Current Use | Yes |
Intent To Use | No |
Filed ITU | Yes |
44D Filed | No |
44E Current | No |
66A Current | No |
Current Basis | No |
No Basis | No |
Attorney Name | Gretchen L. Testerman |
Attorney Docket Number | 60-210090US |
Law Office Assigned | L60 |
Employee Name | HETZEL, DANNEAN |
1999-02-12 | Date of First Use |
1999-02-12 | Date of Use In Commerce |
2019-02-12 | Application Filed |
2019-09-24 | Published |
2019-09-24 | Published for Opposition |
2019-12-10 | Location: PUBLICATION AND ISSUE SECTION |
2019-12-10 | Status: Live/Registered |
2019-12-10 | Status: Registered. The registration date is used to determine when post-registration maintenance documents are due. |
2019-12-10 | Trademark Registered |
2019-12-10 | Transaction Date |
Party: | ![]() |
Address | 1025 ELDORADO BOULEVARD BROOMFIELD, COLORADO UNITED STATES 80021 |
Legal Entity Type | Limited Liability Company |
Legal Entity State | DELAWARE |
Party: | ![]() |
Address | 1025 ELDORADO BOULEVARD BROOMFIELD DE 80021 |
Legal Entity Type | |
Legal Entity State | DE |
![]() | JPEG | 2019-02-12 |
![]() | MULTI | 2019-02-12 |
![]() | XML | 2019-04-26 |
![]() | APPLICATION/XML | 2019-04-26 |
![]() | APPLICATION/XML | 2019-07-25 |
![]() | MULTI | 2019-07-27 |
![]() | MULTI | 2019-07-29 |
![]() | JPEG | 2019-07-29 |
![]() | MULTI | 2019-08-14 |
![]() | 2019-08-21 | |
![]() | XML | 2019-08-22 |
![]() | MULTI | 2019-08-22 |
![]() | XML | 2019-09-04 |
![]() | XML | 2019-09-04 |
![]() | APPLICATION/XML | 2019-09-24 |
![]() | 2019-12-10 |
IC 042. US 100 101. G & S: Internet security services, namely, globally monitoring and collecting cybersecurity intelligence in the nature of software threats from computer networks for the purpose of collecting and disseminating information about cyber threats and malware; Technical research in the field of cybersecurity for others; Providing temporary use of non-downloadable cloud-based software for detecting and analyzing malware and zero-day exploits; Providing temporary use of non-downloadable cloud-based software for data security and protection; Computer network protection and security consultation, namely, computer software consultation and computer software security consultation in the fields of assessment and protection of computer data/information, networks, servers, applications and desktops against attack, intrusion and misuse; Monitoring of network traffic for security purposes, for purposes of preventing distributed denial of service (ddos) attacks on computer servers connected to the internet; Security threat management systems, namely, monitoring and tracking of software security vulnerabilities and problems in computer software products, the Internet, and computer networks and protection of computer data/information, networks, servers, applications and desktops; Testing, analysis and evaluation of computer networks, servers, applications and desktops to assure compliance with cybersecurity industry standards; technical support services, namely, troubleshooting and monitoring of technical computer security network software problems. FIRST USE: 19990212. FIRST USE IN COMMERCE: 19990212
International Codes: | 42 |
U.S. Codes: | 100,101 |
Type Code | Type |
---|---|
GS0421 | Internet security services, namely, globally monitoring and collecting cybersecurity intelligence in the nature of software threats from computer networks for the purpose of collecting and disseminating information about cyber threats and malware; Technical research in the field of cybersecurity for others; Providing temporary use of non-downloadable cloud-based software for detecting and analyzing malware and zero-day exploits; Providing temporary use of non-downloadable cloud-based software for data security and protection; Computer network protection and security consultation, namely, computer software consultation and computer software security consultation in the fields of assessment and protection of computer data/information, networks, servers, applications and desktops against attack, intrusion and misuse; Monitoring of network traffic for security purposes, for purposes of preventing distributed denial of service (ddos) attacks on computer servers connected to the internet; Security threat management systems, namely, monitoring and tracking of software security vulnerabilities and problems in computer software products, the Internet, and computer networks and protection of computer data/information, networks, servers, applications and desktops; Testing, analysis and evaluation of computer networks, servers, applications and desktops to assure compliance with cybersecurity industry standards; technical support services, namely, troubleshooting and monitoring of technical computer security network software problems |
GS0421 | Internet security services, namely, globally monitoring and collecting cybersecurity intelligence in the nature of software threats from computer networks for the purpose of collecting and disseminating information about cyber threats and malware; Technical research in the field of cybersecurity for others; Providing temporary use of non-downloadable cloud-based software for detecting and analyzing malware and zero-day exploits; Providing temporary use of non-downloadable cloud-based software for data security and protection; Computer network protection and security consultation, namely, computer software consultation and computer software security consultation in the fields of assessment and protection of computer data/information, networks, servers, applications and desktops against attack, intrusion and misuse; Monitoring of network traffic for security purposes, for purposes of preventing distributed denial of service (ddos) attacks on computer servers connected to the internet; Security threat management systems, namely, monitoring and tracking of software security vulnerabilities and problems in computer software products, the Internet, and computer networks and protection of computer data/information, networks, servers, applications and desktops; Testing, analysis and evaluation of computer networks, servers, applications and desktops to assure compliance with cybersecurity industry standards; technical support services, namely, troubleshooting and monitoring of technical computer security network software problems |
Description | Date | Proceeding Number |
---|---|---|
AUTOMATIC UPDATE OF ASSIGNMENT OF OWNERSHIP | 2020-01-22 | |
REGISTERED-PRINCIPAL REGISTER | 2019-12-10 | |
PUBLISHED FOR OPPOSITION | 2019-09-24 | |
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | 2019-09-24 | |
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | 2019-09-04 | |
NOTICE OF ACCEPTANCE OF AMENDMENT TO ALLEGE USE E-MAILED | 2019-08-22 | |
USE AMENDMENT ACCEPTED | 2019-08-21 | 81840 |
APPROVED FOR PUB - PRINCIPAL REGISTER | 2019-08-21 | |
USE AMENDMENT FILED | 2019-08-13 | 66213 |
AMENDMENT TO USE PROCESSING COMPLETE | 2019-08-13 | 66213 |
AUTOMATIC UPDATE OF ASSIGNMENT OF OWNERSHIP | 2019-08-07 | |
ASSIGNED TO LIE | 2019-08-05 | 66213 |
TEAS AMENDMENT OF USE RECEIVED | 2019-07-29 | |
TEAS/EMAIL CORRESPONDENCE ENTERED | 2019-07-26 | 88889 |
TEAS RESPONSE TO OFFICE ACTION RECEIVED | 2019-07-25 | |
CORRESPONDENCE RECEIVED IN LAW OFFICE | 2019-07-25 | 88889 |
NOTIFICATION OF NON-FINAL ACTION E-MAILED | 2019-04-26 | 6325 |
NON-FINAL ACTION WRITTEN | 2019-04-26 | 81840 |
NON-FINAL ACTION E-MAILED | 2019-04-26 | 6325 |
ASSIGNED TO EXAMINER | 2019-04-19 | 81840 |
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM | 2019-03-06 | |
NEW APPLICATION ENTERED IN TRAM | 2019-02-15 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.