Under the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless it displays a valid OMB control number.
PTO Form 1581 (Rev 09/2005) |
OMB No. 0651-0054 (Exp 12/31/2020) |
Request for Extension of Time to File a Statement of Use
(15 U.S.C. Section 1051(d))
The table below presents the data as entered.
Input Field
|
Entered
|
SERIAL NUMBER |
88306944 |
LAW OFFICE ASSIGNED |
LAW OFFICE 104 |
MARK SECTION |
MARK |
CTOC (see, http://uspto.report/TM/88306944/mark.png) |
STANDARD CHARACTERS |
YES |
USPTO-GENERATED IMAGE |
YES |
LITERAL ELEMENT |
CTOC |
OWNER SECTION (current) |
NAME |
K FIVE FOUR, LLC |
MAILING ADDRESS |
1400 Crystal Drive, Suite 400 |
CITY |
Arlington |
STATE |
Virginia |
ZIP/POSTAL CODE |
22202 |
STATE/COUNTRY/REGION/JURISDICTION/U.S. TERRITORY |
United States |
EMAIL |
XXXX |
OWNER SECTION (proposed) |
NAME |
K FIVE FOUR, LLC |
MAILING ADDRESS |
1400 Crystal Drive, Suite 400 |
CITY |
Arlington |
STATE |
Virginia |
ZIP/POSTAL CODE |
22202 |
STATE/COUNTRY/REGION/JURISDICTION/U.S. TERRITORY |
United States |
EMAIL |
XXXX |
CORRESPONDENCE INFORMATION (current) |
NAME |
Melissa Cross |
PRIMARY EMAIL ADDRESS FOR CORRESPONDENCE |
mcross@fhhfirm.com |
SECONDARY EMAIL ADDRESS(ES) (COURTESY COPIES) |
jwhite@fhhfirm.com; trademark@fhhfirm.com |
CORRESPONDENCE INFORMATION (proposed) |
NAME |
Melissa Cross |
PRIMARY EMAIL ADDRESS FOR CORRESPONDENCE |
mcross@fhhfirm.com |
SECONDARY EMAIL ADDRESS(ES) (COURTESY COPIES) |
jwhite@fhhfirm.com; trademark@fhhfirm.com |
GOODS AND/OR SERVICES SECTION |
INTERNATIONAL CLASS |
009 |
CURRENT IDENTIFICATION |
Downloadable computer software used to detect, monitor, simulate, analyze, evaluate, report, mitigate, and protect computer data and
information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events;
downloadable computer software used to assess vulnerabilities by integrating and summarizing data relating to computer data and information, networks, servers, applications, desktops and other
information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; scientific apparatus used to detect, monitor, simulate, analyze,
evaluate, report, mitigate, and protect computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion,
unauthorized activity, misuse and other anomalous events; scientific apparatus used to assess vulnerabilities by integrating and summarizing data relating to computer data and information, networks,
servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; downloadable electronic
publications, namely, instruction manuals pertaining to computer security, intrusion, vulnerability, and forensics, application delivery, and data protection |
GOODS OR SERVICES |
KEEP ALL LISTED |
INTERNATIONAL CLASS |
016 |
CURRENT IDENTIFICATION |
Printed manuals, slide decks, and instruction sets in the field of computer security, intrusion, vulnerability, and forensics, application
delivery, and data protection |
GOODS OR SERVICES |
KEEP ALL LISTED |
INTERNATIONAL CLASS |
041 |
CURRENT IDENTIFICATION |
Educational services, namely, providing in-person and online seminars and training in the field of computer security, intrusion, vulnerability,
and forensics, application delivery, and data protection |
GOODS OR SERVICES |
KEEP ALL LISTED |
INTERNATIONAL CLASS |
042 |
CURRENT IDENTIFICATION |
Research, development and engineering, installation, simulation, validation, maintenance and repair of computer software; research, development
and engineering of computer network protection, security software, simulation, validation and reporting; consultation in the field of computer software and computer networks and other information
technology infrastructure; consultation in the field of assessment, detection, protection and security of computer data and information, networks, servers, applications, desktops and other
information technology infrastructure against attack, intrusion, unauthorized activity, misuse and other anomalous events; technical support services, namely, troubleshooting of computer security
network and other information technology infrastructure problems; analysis, evaluation, identification, reporting, and testing of computer networks, servers, applications, desktops and other
information technology infrastructure for attack, intrusion, unauthorized activity, misuse and other anomalous events; remote monitoring, detection and protection of computer data and information,
networks, servers, applications, desktops and other information technology infrastructure for attack, intrusion and misuse and other anomalous events, including deployment of countermeasures in
response to detection of unauthorized access or use of computer data and information, networks, servers, applications, desktops and other information technology infrastructure; assessment of
vulnerabilities of computer data and information, networks, servers, applications, desktops and other information technology infrastructure to attacks, intrusion, unauthorized activity, misuse and
other anomalous events; providing information in the form of early warnings, advisory alerts, notifications, and reports of attacks, security events, unauthorized activity, misuse and other anomalous
events, exploits and vulnerabilities for computer data and information, networks, servers, applications, desktops and other information technology infrastructure; conducting research in the field of
assessment, detection, protection and security of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against attack, intrusion,
unauthorized activity, misuse and other anomalous events; Computer security monitoring, simulation, validation, and reporting of computer network security and information risks; providing computer
security monitoring, simulation, and validation of information in the field of vulnerability assessment and protection of computer data and information, networks, servers, applications, desktops and
other information technology infrastructure against vulnerabilities, attack, intrusion, unauthorized activity, misuse and other anomalous events |
GOODS OR SERVICES |
KEEP ALL LISTED |
EXTENSION SECTION |
EXTENSION NUMBER |
2 |
ONGOING EFFORT |
product or service research or development ; market research |
ALLOWANCE MAIL DATE |
08/20/2019 |
STATEMENT OF USE |
NO |
PAYMENT SECTION |
NUMBER OF CLASSES |
4 |
SUBTOTAL AMOUNT [EXTENSION FEE] |
500 |
TOTAL AMOUNT |
500 |
SIGNATURE SECTION |
SIGNATURE |
/Melissa Cross/ |
SIGNATORY'S NAME |
Melissa Cross |
SIGNATORY'S POSITION |
Attorney of Record, VA Bar Member |
DATE SIGNED |
08/16/2020 |
SIGNATORY'S PHONE NUMBER |
7035901234 |
FILING INFORMATION |
SUBMIT DATE |
Sun Aug 16 22:54:59 ET 2020 |
TEAS STAMP |
USPTO/ESU-XXX.XX.XXX.XXX-
20200816225459536113-8830
6944-74055f799dd3035e132b
b32445a41a7857e9254684c64
ffdc4f0ef1117dedff-ET-545
89086-2020081622532496962
0 |
Under the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless it displays a valid OMB control number.
PTO Form 1581 (Rev 09/2005) |
OMB No. 0651-0054 (Exp 12/31/2020) |
SOU Extension Request
(15 U.S.C. Section 1051(d))
To the Commissioner for Trademarks:
MARK: CTOC (see, http://uspto.report/TM/88306944/mark.png)
SERIAL NUMBER: 88306944
OWNER AND/OR ENTITY INFORMATION
The owner proposes to amend the following:
Current: K FIVE FOUR, LLC, having an address of
1400 Crystal Drive, Suite 400
Arlington, Virginia 22202
United States
Email: XXXX
Proposed: K FIVE FOUR, LLC, having an address of
1400 Crystal Drive, Suite 400
Arlington, Virginia 22202
United States
Phone:
Fax:
Email: XXXX
The owner requests a six-month extension of time to file the Statement of Use under 37 C.F.R. Section 2.89 in this application. The Notice of Allowance mailing date was 08/20/2019.
For International Class 009:
Current identification: Downloadable computer software used to detect, monitor, simulate, analyze, evaluate, report, mitigate, and protect computer data and information, networks, servers,
applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; downloadable computer software used to
assess vulnerabilities by integrating and summarizing data relating to computer data and information, networks, servers, applications, desktops and other information technology infrastructure against
cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; scientific apparatus used to detect, monitor, simulate, analyze, evaluate, report, mitigate, and protect computer
data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous
events; scientific apparatus used to assess vulnerabilities by integrating and summarizing data relating to computer data and information, networks, servers, applications, desktops and other
information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; downloadable electronic publications, namely, instruction manuals
pertaining to computer security, intrusion, vulnerability, and forensics, application delivery, and data protection
For a trademark/service mark: The applicant has a continued bona fide intention, and is entitled, to use the mark in commerce on or in connection with all of the goods/services listed in the Notice
of Allowance or as subsequently modified for this specific class; for a collective/certification mark: the applicant has a continued bona fide intention, and is entitled, to exercise legitimate
control over the use of the mark in commerce on or in connection with the goods/services/collective membership organization listed in the Notice of Allowance, or as subsequently modified for this
specific class.
For International Class 016:
Current identification: Printed manuals, slide decks, and instruction sets in the field of computer security, intrusion, vulnerability, and forensics, application delivery, and data protection
For a trademark/service mark: The applicant has a continued bona fide intention, and is entitled, to use the mark in commerce on or in connection with all of the goods/services listed in the Notice
of Allowance or as subsequently modified for this specific class; for a collective/certification mark: the applicant has a continued bona fide intention, and is entitled, to exercise legitimate
control over the use of the mark in commerce on or in connection with the goods/services/collective membership organization listed in the Notice of Allowance, or as subsequently modified for this
specific class.
For International Class 041:
Current identification: Educational services, namely, providing in-person and online seminars and training in the field of computer security, intrusion, vulnerability, and forensics, application
delivery, and data protection
For a trademark/service mark: The applicant has a continued bona fide intention, and is entitled, to use the mark in commerce on or in connection with all of the goods/services listed in the Notice
of Allowance or as subsequently modified for this specific class; for a collective/certification mark: the applicant has a continued bona fide intention, and is entitled, to exercise legitimate
control over the use of the mark in commerce on or in connection with the goods/services/collective membership organization listed in the Notice of Allowance, or as subsequently modified for this
specific class.
For International Class 042:
Current identification: Research, development and engineering, installation, simulation, validation, maintenance and repair of computer software; research, development and engineering of computer
network protection, security software, simulation, validation and reporting; consultation in the field of computer software and computer networks and other information technology infrastructure;
consultation in the field of assessment, detection, protection and security of computer data and information, networks, servers, applications, desktops and other information technology infrastructure
against attack, intrusion, unauthorized activity, misuse and other anomalous events; technical support services, namely, troubleshooting of computer security network and other information technology
infrastructure problems; analysis, evaluation, identification, reporting, and testing of computer networks, servers, applications, desktops and other information technology infrastructure for attack,
intrusion, unauthorized activity, misuse and other anomalous events; remote monitoring, detection and protection of computer data and information, networks, servers, applications, desktops and other
information technology infrastructure for attack, intrusion and misuse and other anomalous events, including deployment of countermeasures in response to detection of unauthorized access or use of
computer data and information, networks, servers, applications, desktops and other information technology infrastructure; assessment of vulnerabilities of computer data and information, networks,
servers, applications, desktops and other information technology infrastructure to attacks, intrusion, unauthorized activity, misuse and other anomalous events; providing information in the form of
early warnings, advisory alerts, notifications, and reports of attacks, security events, unauthorized activity, misuse and other anomalous events, exploits and vulnerabilities for computer data and
information, networks, servers, applications, desktops and other information technology infrastructure; conducting research in the field of assessment, detection, protection and security of computer
data and information, networks, servers, applications, desktops and other information technology infrastructure against attack, intrusion, unauthorized activity, misuse and other anomalous events;
Computer security monitoring, simulation, validation, and reporting of computer network security and information risks; providing computer security monitoring, simulation, and validation of
information in the field of vulnerability assessment and protection of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against
vulnerabilities, attack, intrusion, unauthorized activity, misuse and other anomalous events
For a trademark/service mark: The applicant has a continued bona fide intention, and is entitled, to use the mark in commerce on or in connection with all of the goods/services listed in the Notice
of Allowance or as subsequently modified for this specific class; for a collective/certification mark: the applicant has a continued bona fide intention, and is entitled, to exercise legitimate
control over the use of the mark in commerce on or in connection with the goods/services/collective membership organization listed in the Notice of Allowance, or as subsequently modified for this
specific class.
This is the second extension request. The applicant has made the following ongoing efforts to use the mark in commerce on or in connection with each of those goods/services covered by the extension
request: product or service research or development ; market research
Correspondence Information (current):
Melissa Cross
PRIMARY EMAIL FOR CORRESPONDENCE: mcross@fhhfirm.com
SECONDARY EMAIL ADDRESS(ES) (COURTESY COPIES): jwhite@fhhfirm.com; trademark@fhhfirm.com
Correspondence Information (proposed):
Melissa Cross
PRIMARY EMAIL FOR CORRESPONDENCE: mcross@fhhfirm.com
SECONDARY EMAIL ADDRESS(ES) (COURTESY COPIES): jwhite@fhhfirm.com; trademark@fhhfirm.com
Requirement for Email and Electronic Filing: I understand that a valid email address must be maintained by the owner/holder and the owner's/holder's attorney, if appointed, and that all
official trademark correspondence must be submitted via the Trademark Electronic Application System (TEAS).
A fee payment in the amount of $500 will be submitted with the form, representing payment for 4 classes.
Declaration
STATEMENTS: The signatory believes that: the applicant has a continued bona fide intention, and is entitled, to use the mark in commerce on or in connection with all the goods/services under Section
1(b) in the notice of allowance or as subsequently modified, or, if applicable, the applicant has a continued bona fide intention, and is entitled, to exercise legitimate control over the use of the
mark in commerce on or in connection with all the goods/services/collective membership organization under Section 1(b) in the notice of allowance or as subsequently modified; and that to the best of
the signatory's knowledge and belief, no other persons, except, if applicable, members and concurrent users, have the right to use the mark in commerce, either in the identical form or in such near
resemblance as to be likely, when used on or in connection with the goods/services/collective membership organization of such other persons, to cause confusion or mistake, or to deceive.
DECLARATION: The signatory being warned that willful false statements and the like are punishable by fine or imprisonment, or both, under 18 U.S.C. §1001, and that such willful false statements and
the like may jeopardize the validity of the application or submission or any resulting registration, declares that all statements made of his/her own knowledge are true and that all statements made
on information and belief are believed to be true.
Signature: /Melissa Cross/ Date Signed: 08/16/2020
Signatory's Name: Melissa Cross
Signatory's Position: Attorney of Record, VA Bar Member
Signatory's Phone: 7035901234
RAM Sale Number: 88306944
RAM Accounting Date: 08/17/2020
Serial Number: 88306944
Internet Transmission Date: Sun Aug 16 22:54:59 ET 2020
TEAS Stamp: USPTO/ESU-XXX.XX.XXX.XXX-202008162254595
36113-88306944-74055f799dd3035e132bb3244
5a41a7857e9254684c64ffdc4f0ef1117dedff-E
T-54589086-20200816225324969620