|
NOTICE OF ALLOWANCE (NOA)
ISSUE DATE: Aug 20, 2019 |
U.S. Serial Number: 88306944
Mark: CTOC
Docket/Reference Number:
|
No opposition was filed for this published application. The issue date of this NOA establishes the due date for the filing of
a Statement of Use (SOU) or a Request for Extension of Time to file a Statement of Use (Extension Request). WARNING: An SOU that meets all legal requirements must be filed before a registration
certificate can issue. Please read below for important information regarding the applicant's pending six (6) month deadline. |
SIX (6)-MONTH DEADLINE: Applicant has six (6) MONTHS from the NOA issue date to file either: |
- |
An SOU, if the applicant is using the mark in commerce (required even if the applicant was using the mark at the time of filing the
application, if use basis was not specified originally); OR |
- |
An Extension Request, if the applicant is not yet using the mark in commerce. If an Extension Request is filed, a new request must
be filed every six (6) months until the SOU is filed. The applicant may file a total of five (5) extension requests. WARNING: An SOU may not be filed more than thirty-six
(36) months from when the NOA issued. The deadline for filing is always calculated from the issue date of the NOA. |
How to file SOU and/or Extension Request:
Use the Trademark Electronic Application System (TEAS). Do NOT reply to this e-mail, as e-mailed filings will NOT be processed. Both the SOU and Extension Request have many
legal requirements, including fees and verified statements; therefore, please use the USPTO forms available online at http://www.gov.uspto.report/trademarks-application-process/filing-online (under the "INTENT-TO-USE (ITU) FORMS" category) to avoid the possible omission of required information.
If you have questions about this notice, please contact the Trademark Assistance Center at 1-800-786-9199. |
FAILURE TO FILE A REQUIRED DOCUMENT OUTLINED ABOVE DURING THE APPROPRIATE TIME PERIOD WILL RESULT IN THE ABANDONMENT OF THIS
APPLICATION. |
REVIEW APPLICATION INFORMATION FOR ACCURACY |
Serial Number: |
88306944
|
Mark: |
CTOC
|
Docket/Reference Number: |
|
Owner: |
K FIVE FOUR, LLC
1400 Crystal Drive, Suite 400
Arlington , VIRGINIA 22202
|
Correspondence Address: |
MELISSA CROSS
FLUET, HUBER & HOANG
1751 PINNACLE DRIVE, SUITE 1000
TYSONS, VA 22102
|
This application has the following bases, but not necessarily for all listed goods/services: |
|
Section 1(a): NO |
Section 1(b): YES |
Section 44(e): NO |
GOODS/SERVICES BY INTERNATIONAL CLASS |
009 - |
Downloadable computer software used to detect, monitor, simulate, analyze, evaluate, report, mitigate, and protect computer data and information, networks,
servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; downloadable computer
software used to assess vulnerabilities by integrating and summarizing data relating to computer data and information, networks, servers, applications, desktops and other information technology
infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; scientific apparatus used to detect, monitor, simulate, analyze, evaluate, report, mitigate,
and protect computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and
other anomalous events; scientific apparatus used to assess vulnerabilities by integrating and summarizing data relating to computer data and information, networks, servers, applications, desktops
and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; downloadable electronic publications, namely, instruction
manuals pertaining to computer security, intrusion, vulnerability, and forensics, application delivery, and data protection -- FIRST USE DATE: NONE; -- USE IN COMMERCE DATE: NONE |
016 - |
Printed manuals, slide decks, and instruction sets in the field of computer security, intrusion, vulnerability, and forensics, application delivery, and data
protection -- FIRST USE DATE: NONE; -- USE IN COMMERCE DATE: NONE |
041 - |
Educational services, namely, providing in-person and online seminars and training in the field of computer security, intrusion, vulnerability, and forensics,
application delivery, and data protection -- FIRST USE DATE: NONE; -- USE IN COMMERCE DATE: NONE |
042 - |
Research, development and engineering, installation, simulation, validation, maintenance and repair of computer software; research, development and engineering of
computer network protection, security software, simulation, validation and reporting; consultation in the field of computer software and computer networks and other information technology
infrastructure; consultation in the field of assessment, detection, protection and security of computer data and information, networks, servers, applications, desktops and other information
technology infrastructure against attack, intrusion, unauthorized activity, misuse and other anomalous events; technical support services, namely, troubleshooting of computer security network and
other information technology infrastructure problems; analysis, evaluation, identification, reporting, and testing of computer networks, servers, applications, desktops and other information
technology infrastructure for attack, intrusion, unauthorized activity, misuse and other anomalous events; remote monitoring, detection and protection of computer data and information, networks,
servers, applications, desktops and other information technology infrastructure for attack, intrusion and misuse and other anomalous events, including deployment of countermeasures in response to
detection of unauthorized access or use of computer data and information, networks, servers, applications, desktops and other information technology infrastructure; assessment of vulnerabilities of
computer data and information , networks, servers, applications, desktops and other information technology infrastructure to attacks, intrusion, unauthorized activity, misuse and other anomalous
events; providing information in the form of early warnings, advisory alerts, notifications, and reports of attacks, security events, unauthorized activity, misuse and other anomalous events,
exploits and vulnerabilities for computer data and information, networks, servers, applications, desktops and other information technology infrastructure ; conducting research in the field of
assessment, detection, protection and security of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against attack, intrusion,
unauthorized activity, misuse and other anomalous events; Computer security monitoring, simulation, validation, and reporting of computer network security and information risks; providing computer
security monitoring, simulation, and validation of information in the field of vulnerability assessment and protection of computer data and information, networks, servers, applications, desktops and
other information technology infrastructure against vulnerabilities, attack, intrusion, unauthorized activity, misuse and other anomalous events -- FIRST USE DATE: NONE; -- USE IN COMMERCE DATE:
NONE |
ALL OF THE GOODS/SERVICES IN EACH CLASS ARE LISTED.
|
Appropriate Specimens for Goods and/or Services: A trademark specimen should be a label, tag, or container for the goods, or a
display associated with the goods. See TMEP §§904.03 et seq. A service mark specimen should be an advertisement, sign, brochure, website printout or other image that shows the mark used in the actual
sale or advertising of the services. See TMEP §§1301.04 et seq. For an instructional video on what is an appropriate trademark or service mark specimen for a good and/or service, click here. |
Fraudulent statements may result in registration being cancelled: Applicants must ensure that statements made in filings to the
USPTO are accurate, as inaccuracies may result in the cancellation of any issued trademark registration. The lack of a bona fide intention to use the mark with ALL goods and/or services listed
in an application or the lack of actual use on all goods and/or services for which use is claimed could jeopardize the validity of the registration, possibly resulting in its
cancellation. |
Additional information: For information on filing and maintenance requirements for U.S. trademark applications and registrations
and required fees, please consult the USPTO website at http://www.uspto.gov or call the Trademark Assistance Center at 1-800-786-9199. |
|