Trademark Snap Shot Publication Stylesheet (Table presents the data on Publication Approval) |
|||
OVERVIEW |
|||
SERIAL NUMBER | 88306944 | FILING DATE | 02/19/2019 |
REG NUMBER | 0000000 | REG DATE | N/A |
REGISTER | PRINCIPAL | MARK TYPE | TRADEMARK |
INTL REG # | N/A | INTL REG DATE | N/A |
TM ATTORNEY | PARK, JENNY K |
L.O. ASSIGNED | 104 |
PUB INFORMATION |
|||
RUN DATE | 05/08/2019 | ||
PUB DATE | N/A | ||
STATUS | 680-APPROVED FOR PUBLICATION | ||
STATUS DATE | 05/07/2019 | ||
LITERAL MARK ELEMENT | CTOC | ||
DATE ABANDONED | N/A | DATE CANCELLED | N/A |
SECTION 2F | NO | SECTION 2F IN PART | NO |
SECTION 8 | NO | SECTION 8 IN PART | NO |
SECTION 15 | NO | REPUB 12C | N/A |
RENEWAL FILED | NO | RENEWAL DATE | N/A |
DATE AMEND REG | N/A |
FILING BASIS |
|||||
FILED BASIS | CURRENT BASIS | AMENDED BASIS | |||
1 (a) | NO | 1 (a) | NO | 1 (a) | NO |
1 (b) | YES | 1 (b) | YES | 1 (b) | NO |
44D | NO | 44D | NO | 44D | NO |
44E | NO | 44E | NO | 44E | NO |
66A | NO | 66A | NO | ||
NO BASIS | NO | NO BASIS | NO |
MARK DATA |
|
STANDARD CHARACTER MARK | YES |
LITERAL MARK ELEMENT | CTOC |
MARK DRAWING CODE | 4-STANDARD CHARACTER MARK |
COLOR DRAWING FLAG | NO |
CURRENT OWNER INFORMATION |
|
PARTY TYPE | 10-ORIGINAL APPLICANT |
NAME | K FIVE FOUR, LLC |
ADDRESS | 1400 Crystal Drive, Suite 400 Arlington, VA 22202 |
ENTITY | 16-LTD LIAB CO |
CITIZENSHIP | Delaware |
GOODS AND SERVICES |
|
INTERNATIONAL CLASS | 009 |
DESCRIPTION TEXT | Downloadable computer software used to detect, monitor, simulate, analyze, evaluate, report, mitigate, and protect computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; downloadable computer software used to assess vulnerabilities by integrating and summarizing data relating to computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; scientific apparatus used to detect, monitor, simulate, analyze, evaluate, report, mitigate, and protect computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; scientific apparatus used to assess vulnerabilities by integrating and summarizing data relating to computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; downloadable electronic publications, namely, instruction manuals pertaining to computer security, intrusion, vulnerability, and forensics, application delivery, and data protection |
INTERNATIONAL CLASS | 016 |
DESCRIPTION TEXT | Printed manuals, slide decks, and instruction sets in the field of computer security, intrusion, vulnerability, and forensics, application delivery, and data protection |
INTERNATIONAL CLASS | 041 |
DESCRIPTION TEXT | Educational services, namely, providing in-person and online seminars and training in the field of computer security, intrusion, vulnerability, and forensics, application delivery, and data protection |
INTERNATIONAL CLASS | 042 |
DESCRIPTION TEXT | Research, development and engineering, installation, simulation, validation, maintenance and repair of computer software; research, development and engineering of computer network protection, security software, simulation, validation and reporting; consultation in the field of computer software and computer networks and other information technology infrastructure; consultation in the field of assessment, detection, protection and security of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against attack, intrusion, unauthorized activity, misuse and other anomalous events; technical support services, namely, troubleshooting of computer security network and other information technology infrastructure problems; analysis, evaluation, identification, reporting, and testing of computer networks, servers, applications, desktops and other information technology infrastructure for attack, intrusion, unauthorized activity, misuse and other anomalous events; remote monitoring, detection and protection of computer data and information, networks, servers, applications, desktops and other information technology infrastructure for attack, intrusion and misuse and other anomalous events, including deployment of countermeasures in response to detection of unauthorized access or use of computer data and information, networks, servers, applications, desktops and other information technology infrastructure; assessment of vulnerabilities of computer data and information, networks, servers, applications, desktops and other information technology infrastructure to attacks, intrusion, unauthorized activity, misuse and other anomalous events; providing information in the form of early warnings, advisory alerts, notifications, and reports of attacks, security events, unauthorized activity, misuse and other anomalous events, exploits and vulnerabilities for computer data and information, networks, servers, applications, desktops and other information technology infrastructure; conducting research in the field of assessment, detection, protection and security of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against attack, intrusion, unauthorized activity, misuse and other anomalous events; Computer security monitoring, simulation, validation, and reporting of computer network security and information risks; providing computer security monitoring, simulation, and validation of information in the field of vulnerability assessment and protection of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against vulnerabilities, attack, intrusion, unauthorized activity, misuse and other anomalous events |
GOODS AND SERVICES CLASSIFICATION |
|||||||
INTERNATIONAL CLASS | 009 | FIRST USE DATE | NONE | FIRST USE IN COMMERCE DATE | NONE | CLASS STATUS | 6-ACTIVE |
INTERNATIONAL CLASS | 016 | FIRST USE DATE | NONE | FIRST USE IN COMMERCE DATE | NONE | CLASS STATUS | 6-ACTIVE |
INTERNATIONAL CLASS | 041 | FIRST USE DATE | NONE | FIRST USE IN COMMERCE DATE | NONE | CLASS STATUS | 6-ACTIVE |
INTERNATIONAL CLASS | 042 | FIRST USE DATE | NONE | FIRST USE IN COMMERCE DATE | NONE | CLASS STATUS | 6-ACTIVE |
MISCELLANEOUS INFORMATION/STATEMENTS |
|
CHANGE IN REGISTRATION | NO |
PROSECUTION HISTORY |
||||
DATE | ENT CD | ENT TYPE | DESCRIPTION | ENT NUM |
05/07/2019 | CNSA | P | APPROVED FOR PUB - PRINCIPAL REGISTER | 008 |
05/07/2019 | XAEC | I | EXAMINER'S AMENDMENT ENTERED | 007 |
05/07/2019 | GNEN | O | NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED | 006 |
05/07/2019 | GNEA | F | EXAMINERS AMENDMENT E-MAILED | 005 |
05/07/2019 | CNEA | R | EXAMINERS AMENDMENT -WRITTEN | 004 |
04/30/2019 | DOCK | D | ASSIGNED TO EXAMINER | 003 |
03/11/2019 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM | 002 |
02/22/2019 | NWAP | I | NEW APPLICATION ENTERED IN TRAM | 001 |
CURRENT CORRESPONDENCE INFORMATION |
|
ATTORNEY | Melissa Cross |
CORRESPONDENCE ADDRESS | MELISSA CROSS FLUET, HUBER & HOANG 1751 PINNACLE DRIVE, SUITE 1000 TYSONS, VA 22102 |
DOMESTIC REPRESENTATIVE | NONE |