Extension of Time to File SOU

CTOC

K FIVE FOUR, LLC

Request for Extension of Time to File a Statement of Use

Under the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless it displays a valid OMB control number.
PTO Form 1581 (Rev 09/2005)
OMB No. 0651-0054 (Exp 12/31/2020)

Request for Extension of Time to File a Statement of Use
(15 U.S.C. Section 1051(d))


The table below presents the data as entered.

Input Field
Entered
SERIAL NUMBER 88306944
LAW OFFICE ASSIGNED LAW OFFICE 104
MARK SECTION
MARK CTOC (see, http://uspto.report/TM/88306944/mark.png)
STANDARD CHARACTERS YES
USPTO-GENERATED IMAGE YES
LITERAL ELEMENT CTOC
OWNER SECTION (current)
NAME K FIVE FOUR, LLC
MAILING ADDRESS 1400 Crystal Drive, Suite 400
CITY Arlington
STATE Virginia
ZIP/POSTAL CODE 22202
STATE/COUNTRY/REGION/JURISDICTION/U.S. TERRITORY United States
EMAIL XXXX
OWNER SECTION (proposed)
NAME K FIVE FOUR, LLC
MAILING ADDRESS 1400 Crystal Drive, Suite 400
CITY Arlington
STATE Virginia
ZIP/POSTAL CODE 22202
STATE/COUNTRY/REGION/JURISDICTION/U.S. TERRITORY United States
EMAIL XXXX
CORRESPONDENCE INFORMATION (current)
NAME Melissa Cross
PRIMARY EMAIL ADDRESS FOR CORRESPONDENCE mcross@fhhfirm.com
SECONDARY EMAIL ADDRESS(ES) (COURTESY COPIES) jwhite@fhhfirm.com; trademark@fhhfirm.com
CORRESPONDENCE INFORMATION (proposed)
NAME Melissa Cross
PRIMARY EMAIL ADDRESS FOR CORRESPONDENCE mcross@fhhfirm.com
SECONDARY EMAIL ADDRESS(ES) (COURTESY COPIES) jwhite@fhhfirm.com; trademark@fhhfirm.com
GOODS AND/OR SERVICES SECTION
INTERNATIONAL CLASS 009
CURRENT IDENTIFICATION Downloadable computer software used to detect, monitor, simulate, analyze, evaluate, report, mitigate, and protect computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; downloadable computer software used to assess vulnerabilities by integrating and summarizing data relating to computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; scientific apparatus used to detect, monitor, simulate, analyze, evaluate, report, mitigate, and protect computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; scientific apparatus used to assess vulnerabilities by integrating and summarizing data relating to computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; downloadable electronic publications, namely, instruction manuals pertaining to computer security, intrusion, vulnerability, and forensics, application delivery, and data protection
GOODS OR SERVICES KEEP ALL LISTED
INTERNATIONAL CLASS 016
CURRENT IDENTIFICATION Printed manuals, slide decks, and instruction sets in the field of computer security, intrusion, vulnerability, and forensics, application delivery, and data protection
GOODS OR SERVICES KEEP ALL LISTED
INTERNATIONAL CLASS 041
CURRENT IDENTIFICATION Educational services, namely, providing in-person and online seminars and training in the field of computer security, intrusion, vulnerability, and forensics, application delivery, and data protection
GOODS OR SERVICES KEEP ALL LISTED
INTERNATIONAL CLASS 042
CURRENT IDENTIFICATION Research, development and engineering, installation, simulation, validation, maintenance and repair of computer software; research, development and engineering of computer network protection, security software, simulation, validation and reporting; consultation in the field of computer software and computer networks and other information technology infrastructure; consultation in the field of assessment, detection, protection and security of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against attack, intrusion, unauthorized activity, misuse and other anomalous events; technical support services, namely, troubleshooting of computer security network and other information technology infrastructure problems; analysis, evaluation, identification, reporting, and testing of computer networks, servers, applications, desktops and other information technology infrastructure for attack, intrusion, unauthorized activity, misuse and other anomalous events; remote monitoring, detection and protection of computer data and information, networks, servers, applications, desktops and other information technology infrastructure for attack, intrusion and misuse and other anomalous events, including deployment of countermeasures in response to detection of unauthorized access or use of computer data and information, networks, servers, applications, desktops and other information technology infrastructure; assessment of vulnerabilities of computer data and information, networks, servers, applications, desktops and other information technology infrastructure to attacks, intrusion, unauthorized activity, misuse and other anomalous events; providing information in the form of early warnings, advisory alerts, notifications, and reports of attacks, security events, unauthorized activity, misuse and other anomalous events, exploits and vulnerabilities for computer data and information, networks, servers, applications, desktops and other information technology infrastructure; conducting research in the field of assessment, detection, protection and security of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against attack, intrusion, unauthorized activity, misuse and other anomalous events; Computer security monitoring, simulation, validation, and reporting of computer network security and information risks; providing computer security monitoring, simulation, and validation of information in the field of vulnerability assessment and protection of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against vulnerabilities, attack, intrusion, unauthorized activity, misuse and other anomalous events
GOODS OR SERVICES KEEP ALL LISTED
EXTENSION SECTION
EXTENSION NUMBER 2
ONGOING EFFORT product or service research or development ; market research
ALLOWANCE MAIL DATE 08/20/2019
STATEMENT OF USE NO
PAYMENT SECTION
NUMBER OF CLASSES 4
SUBTOTAL AMOUNT [EXTENSION FEE] 500
TOTAL AMOUNT 500
SIGNATURE SECTION
SIGNATURE /Melissa Cross/
SIGNATORY'S NAME Melissa Cross
SIGNATORY'S POSITION Attorney of Record, VA Bar Member
DATE SIGNED 08/16/2020
SIGNATORY'S PHONE NUMBER 7035901234
FILING INFORMATION
SUBMIT DATE Sun Aug 16 22:54:59 ET 2020
TEAS STAMP USPTO/ESU-XXX.XX.XXX.XXX-
20200816225459536113-8830
6944-74055f799dd3035e132b
b32445a41a7857e9254684c64
ffdc4f0ef1117dedff-ET-545
89086-2020081622532496962
0



Under the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless it displays a valid OMB control number.
PTO Form 1581 (Rev 09/2005)
OMB No. 0651-0054 (Exp 12/31/2020)


SOU Extension Request
(15 U.S.C. Section 1051(d))


To the Commissioner for Trademarks:

MARK: CTOC (see, http://uspto.report/TM/88306944/mark.png)
SERIAL NUMBER: 88306944

OWNER AND/OR ENTITY INFORMATION
The owner proposes to amend the following:
Current: K FIVE FOUR, LLC, having an address of
      1400 Crystal Drive, Suite 400
      Arlington, Virginia 22202
      United States
      Email: XXXX
Proposed: K FIVE FOUR, LLC, having an address of
      1400 Crystal Drive, Suite 400
      Arlington, Virginia 22202
      United States
      Phone:
      Fax:
      Email: XXXX

The owner requests a six-month extension of time to file the Statement of Use under 37 C.F.R. Section 2.89 in this application.    The Notice of Allowance mailing date was 08/20/2019.

For International Class 009:
Current identification: Downloadable computer software used to detect, monitor, simulate, analyze, evaluate, report, mitigate, and protect computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; downloadable computer software used to assess vulnerabilities by integrating and summarizing data relating to computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; scientific apparatus used to detect, monitor, simulate, analyze, evaluate, report, mitigate, and protect computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; scientific apparatus used to assess vulnerabilities by integrating and summarizing data relating to computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; downloadable electronic publications, namely, instruction manuals pertaining to computer security, intrusion, vulnerability, and forensics, application delivery, and data protection

For a trademark/service mark: The applicant has a continued bona fide intention, and is entitled, to use the mark in commerce on or in connection with all of the goods/services listed in the Notice of Allowance or as subsequently modified for this specific class; for a collective/certification mark: the applicant has a continued bona fide intention, and is entitled, to exercise legitimate control over the use of the mark in commerce on or in connection with the goods/services/collective membership organization listed in the Notice of Allowance, or as subsequently modified for this specific class.


For International Class 016:
Current identification: Printed manuals, slide decks, and instruction sets in the field of computer security, intrusion, vulnerability, and forensics, application delivery, and data protection

For a trademark/service mark: The applicant has a continued bona fide intention, and is entitled, to use the mark in commerce on or in connection with all of the goods/services listed in the Notice of Allowance or as subsequently modified for this specific class; for a collective/certification mark: the applicant has a continued bona fide intention, and is entitled, to exercise legitimate control over the use of the mark in commerce on or in connection with the goods/services/collective membership organization listed in the Notice of Allowance, or as subsequently modified for this specific class.


For International Class 041:
Current identification: Educational services, namely, providing in-person and online seminars and training in the field of computer security, intrusion, vulnerability, and forensics, application delivery, and data protection

For a trademark/service mark: The applicant has a continued bona fide intention, and is entitled, to use the mark in commerce on or in connection with all of the goods/services listed in the Notice of Allowance or as subsequently modified for this specific class; for a collective/certification mark: the applicant has a continued bona fide intention, and is entitled, to exercise legitimate control over the use of the mark in commerce on or in connection with the goods/services/collective membership organization listed in the Notice of Allowance, or as subsequently modified for this specific class.


For International Class 042:
Current identification: Research, development and engineering, installation, simulation, validation, maintenance and repair of computer software; research, development and engineering of computer network protection, security software, simulation, validation and reporting; consultation in the field of computer software and computer networks and other information technology infrastructure; consultation in the field of assessment, detection, protection and security of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against attack, intrusion, unauthorized activity, misuse and other anomalous events; technical support services, namely, troubleshooting of computer security network and other information technology infrastructure problems; analysis, evaluation, identification, reporting, and testing of computer networks, servers, applications, desktops and other information technology infrastructure for attack, intrusion, unauthorized activity, misuse and other anomalous events; remote monitoring, detection and protection of computer data and information, networks, servers, applications, desktops and other information technology infrastructure for attack, intrusion and misuse and other anomalous events, including deployment of countermeasures in response to detection of unauthorized access or use of computer data and information, networks, servers, applications, desktops and other information technology infrastructure; assessment of vulnerabilities of computer data and information, networks, servers, applications, desktops and other information technology infrastructure to attacks, intrusion, unauthorized activity, misuse and other anomalous events; providing information in the form of early warnings, advisory alerts, notifications, and reports of attacks, security events, unauthorized activity, misuse and other anomalous events, exploits and vulnerabilities for computer data and information, networks, servers, applications, desktops and other information technology infrastructure; conducting research in the field of assessment, detection, protection and security of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against attack, intrusion, unauthorized activity, misuse and other anomalous events; Computer security monitoring, simulation, validation, and reporting of computer network security and information risks; providing computer security monitoring, simulation, and validation of information in the field of vulnerability assessment and protection of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against vulnerabilities, attack, intrusion, unauthorized activity, misuse and other anomalous events

For a trademark/service mark: The applicant has a continued bona fide intention, and is entitled, to use the mark in commerce on or in connection with all of the goods/services listed in the Notice of Allowance or as subsequently modified for this specific class; for a collective/certification mark: the applicant has a continued bona fide intention, and is entitled, to exercise legitimate control over the use of the mark in commerce on or in connection with the goods/services/collective membership organization listed in the Notice of Allowance, or as subsequently modified for this specific class.


This is the second extension request. The applicant has made the following ongoing efforts to use the mark in commerce on or in connection with each of those goods/services covered by the extension request: product or service research or development ; market research

Correspondence Information (current):
      Melissa Cross
      PRIMARY EMAIL FOR CORRESPONDENCE: mcross@fhhfirm.com
      SECONDARY EMAIL ADDRESS(ES) (COURTESY COPIES): jwhite@fhhfirm.com; trademark@fhhfirm.com

Correspondence Information (proposed):
      Melissa Cross
      PRIMARY EMAIL FOR CORRESPONDENCE: mcross@fhhfirm.com
      SECONDARY EMAIL ADDRESS(ES) (COURTESY COPIES): jwhite@fhhfirm.com; trademark@fhhfirm.com


Requirement for Email and Electronic Filing: I understand that a valid email address must be maintained by the owner/holder and the owner's/holder's attorney, if appointed, and that all official trademark correspondence must be submitted via the Trademark Electronic Application System (TEAS).





A fee payment in the amount of $500 will be submitted with the form, representing payment for 4 classes.


Declaration

STATEMENTS: The signatory believes that: the applicant has a continued bona fide intention, and is entitled, to use the mark in commerce on or in connection with all the goods/services under Section 1(b) in the notice of allowance or as subsequently modified, or, if applicable, the applicant has a continued bona fide intention, and is entitled, to exercise legitimate control over the use of the mark in commerce on or in connection with all the goods/services/collective membership organization under Section 1(b) in the notice of allowance or as subsequently modified; and that to the best of the signatory's knowledge and belief, no other persons, except, if applicable, members and concurrent users, have the right to use the mark in commerce, either in the identical form or in such near resemblance as to be likely, when used on or in connection with the goods/services/collective membership organization of such other persons, to cause confusion or mistake, or to deceive.

DECLARATION: The signatory being warned that willful false statements and the like are punishable by fine or imprisonment, or both, under 18 U.S.C. §1001, and that such willful false statements and the like may jeopardize the validity of the application or submission or any resulting registration, declares that all statements made of his/her own knowledge are true and that all statements made on information and belief are believed to be true.


Signature: /Melissa Cross/      Date Signed: 08/16/2020
Signatory's Name: Melissa Cross
Signatory's Position: Attorney of Record, VA Bar Member
Signatory's Phone: 7035901234

RAM Sale Number: 88306944
RAM Accounting Date: 08/17/2020

Serial Number: 88306944
Internet Transmission Date: Sun Aug 16 22:54:59 ET 2020
TEAS Stamp: USPTO/ESU-XXX.XX.XXX.XXX-202008162254595
36113-88306944-74055f799dd3035e132bb3244
5a41a7857e9254684c64ffdc4f0ef1117dedff-E
T-54589086-20200816225324969620




uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed