CTOC

K Five Four, Llc

Application Filed: 2019-02-19
Trademark Application Details
Trademark Logo CTOC

Mark For: CTOC™ trademark registration is intended to cover the categories of downloadable computer software used to detect, monitor, simulate, analyze, evaluate, report, mitigate, and protect computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; downloadable computer software used to assess vulnerabilities by integrating and summarizing data relating to computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; scientific apparatus used to detect, monitor, simulate, analyze, evaluate, report, mitigate, and protect computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; scientific apparatus used to assess vulnerabilities by integrating and summarizing data relating to computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; downloadable electronic publications, namely, instruction manuals pertaining to computer security, intrusion, vulnerability, and forensics, application delivery, and data protection. [all]

Status

2020-08-29 UTC
LIVE APPLICATION Under Examination
The trademark application has been accepted by the Office (has met the minimum filing requirements) and that this application has been assigned to an examiner.


Research OneLook Acronym Finder
Serial Number88306944
Mark Literal ElementsCTOC
Mark Drawing Type4 - STANDARD CHARACTER MARK
Mark TypeTRADEMARK. SERVICE MARK
RegisterPRINCIPAL
Current LocationINTENT TO USE SECTION 2019-08-20
Basis1(b)
Class StatusACTIVE
Primary US Classes
  • 021: Electrical Apparatus, Machines and Supplies
  • 023: Cutlery, Machinery, Tools and Parts Thereof
  • 026: Measuring and Scientific Appliances
  • 036: Musical Instruments and Supplies
  • 038: Prints and Publications
Primary International Class
  • 009 - Primary Class
  • (Electrical and scientific apparatus) Scientific, nautical, surveying, electric, photographic, cinematographic, optical, weighing, measuring, signaling, checking (supervision), lifesaving and teaching apparatus and instruments; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
Filed UseNo
Current UseNo
Intent To UseYes
Filed ITUYes
44D FiledNo
44E CurrentNo
66A CurrentNo
Current BasisNo
No BasisNo
Attorney NameMelissa Cross
Law Office AssignedL40
Employee NamePARK, JENNY K

Timeline

2019-02-19Application Filed
2019-06-25Published
2019-06-25Published for Opposition
2019-08-20Location: INTENT TO USE SECTION
2019-08-20Status: Live/Pending
2019-08-20Transaction Date
2020-08-16Status: A second request for extension of time to file a Statement of Use has been granted.

Trademark Parties (Applicants & Owners)

Party: K FIVE FOUR, LLC
Address1400 Crystal Drive, Suite 400 Arlington, VIRGINIA UNITED STATES 22202
Legal Entity TypeLimited Liability Company
Legal Entity StateDELAWARE

Attorney of Record

MELISSA CROSS
FLUET, HUBER & HOANG
1751 PINNACLE DRIVE, SUITE 1000
TYSONS, VA 22102

Good, Services, and Codes


IC 009. US 021 023 026 036 038. G & S: Downloadable computer software used to detect, monitor, simulate, analyze, evaluate, report, mitigate, and protect computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; downloadable computer software used to assess vulnerabilities by integrating and summarizing data relating to computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; scientific apparatus used to detect, monitor, simulate, analyze, evaluate, report, mitigate, and protect computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; scientific apparatus used to assess vulnerabilities by integrating and summarizing data relating to computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; downloadable electronic publications, namely, instruction manuals pertaining to computer security, intrusion, vulnerability, and forensics, application delivery, and data protection
IC 016. US 002 005 022 023 029 037 038 050. G & S: Printed manuals, slide decks, and instruction sets in the field of computer security, intrusion, vulnerability, and forensics, application delivery, and data protection
IC 041. US 100 101 107. G & S: Educational services, namely, providing in-person and online seminars and training in the field of computer security, intrusion, vulnerability, and forensics, application delivery, and data protection
IC 042. US 100 101. G & S: Research, development and engineering, installation, simulation, validation, maintenance and repair of computer software; research, development and engineering of computer network protection, security software, simulation, validation and reporting; consultation in the field of computer software and computer networks and other information technology infrastructure; consultation in the field of assessment, detection, protection and security of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against attack, intrusion, unauthorized activity, misuse and other anomalous events; technical support services, namely, troubleshooting of computer security network and other information technology infrastructure problems; analysis, evaluation, identification, reporting, and testing of computer networks, servers, applications, desktops and other information technology infrastructure for attack, intrusion, unauthorized activity, misuse and other anomalous events; remote monitoring, detection and protection of computer data and information, networks, servers, applications, desktops and other information technology infrastructure for attack, intrusion and misuse and other anomalous events, including deployment of countermeasures in response to detection of unauthorized access or use of computer data and information, networks, servers, applications, desktops and other information technology infrastructure; assessment of vulnerabilities of computer data and information, networks, servers, applications, desktops and other information technology infrastructure to attacks, intrusion, unauthorized activity, misuse and other anomalous events; providing information in the form of early warnings, advisory alerts, notifications, and reports of attacks, security events, unauthorized activity, misuse and other anomalous events, exploits and vulnerabilities for computer data and information, networks, servers, applications, desktops and other information technology infrastructure; conducting research in the field of assessment, detection, protection and security of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against attack, intrusion, unauthorized activity, misuse and other anomalous events; Computer security monitoring, simulation, validation, and reporting of computer network security and information risks; providing computer security monitoring, simulation, and validation of information in the field of vulnerability assessment and protection of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against vulnerabilities, attack, intrusion, unauthorized activity, misuse and other anomalous events

International Codes:9
U.S. Codes:021,023,026,036,038
International Codes:16
U.S. Codes:002,005,022,023,029,037,038,050
International Codes:41
U.S. Codes:100,101,107
International Codes:42
U.S. Codes:100,101
International Codes:45
U.S. Codes:100,101
Type CodeType
GS0091Downloadable computer software used to detect, monitor, simulate, analyze, evaluate, report, mitigate, and protect computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; downloadable computer software used to assess vulnerabilities by integrating and summarizing data relating to computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; scientific apparatus used to detect, monitor, simulate, analyze, evaluate, report, mitigate, and protect computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; scientific apparatus used to assess vulnerabilities by integrating and summarizing data relating to computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; downloadable electronic publications, namely, instruction manuals pertaining to computer security, intrusion, vulnerability, and forensics, application delivery, and data protection

Trademark Filing History

DescriptionDateProceeding Number
NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED2020-08-18
TEAS EXTENSION RECEIVED2020-08-16
EXTENSION 2 GRANTED2020-08-1698765
EXTENSION 2 FILED2020-08-1698765
TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED2020-04-20
TEAS CHANGE OF OWNER ADDRESS RECEIVED2020-04-20
TEAS CHANGE OF CORRESPONDENCE RECEIVED2020-04-20
ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED2020-04-20
APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED2020-04-2088888
TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED2020-02-05
ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED2020-02-05
NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED2020-01-14
TEAS EXTENSION RECEIVED2020-01-10
EXTENSION 1 GRANTED2020-01-1098765
EXTENSION 1 FILED2020-01-1098765
NOA E-MAILED - SOU REQUIRED FROM APPLICANT2019-08-20
PUBLISHED FOR OPPOSITION2019-06-25
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED2019-06-25
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED2019-06-05
ASSIGNED TO LIE2019-05-2068552
NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED2019-05-076328
EXAMINERS AMENDMENT E-MAILED2019-05-076328
EXAMINERS AMENDMENT -WRITTEN2019-05-0781848
EXAMINER'S AMENDMENT ENTERED2019-05-0788888
APPROVED FOR PUB - PRINCIPAL REGISTER2019-05-07
ASSIGNED TO EXAMINER2019-04-3081848
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM2019-03-11
NEW APPLICATION ENTERED IN TRAM2019-02-22

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed