5

Red 5 Holdings, Inc.

Application Filed: 2019-03-13
Trademark Application Details
Trademark Logo 5

The mark consists of a shield with the number "five" in the center and a sword going over the top of the number "five" and then under the upper curve of the number "five" and then over the bottom curve of the number "five".

Mark For: 5® trademark registration is intended to cover the categories of arranging for others the repair and replacement of home security systems; business assistance, advisory and consulting services in the field of the Foreign Corrupt Practices Act (FCPA) industry, only for business and commercial purposes; business risk assessment services. [all]

>Color is not claimed as a feature of the mark. The mark consists of a shield with the number "five" in the center and a sword going over the top of the number "five" and then under the upper curve of the number "five" and then over the bottom curve of the number "five".

Status

2020-07-17 UTC
LIVE REGISTRATION Issued and Active
The trademark application has been registered with the Office.


Research OneLook Acronym Finder
Serial Number88337913
Registration Number5878711
Mark Literal Elements5
Mark Drawing Type3 - AN ILLUSTRATION DRAWING WHICH INCLUDES WORD(S)/ LETTER(S)/NUMBER(S)
Mark TypeSERVICE MARK
Standard Character ClaimNo
RegisterPRINCIPAL
Current LocationPUBLICATION AND ISSUE SECTION 2019-10-08
Basis1(a)
Class StatusACTIVE
Primary US Classes
  • 100: Miscellaneous
  • 101: Advertising and Business
  • 102: Insurance and Financial
Primary International Class
  • 035 - Primary Class
  • (Advertising and business) Advertising; business management; business administration; office functions.
Filed UseYes
Current UseYes
Intent To UseNo
Filed ITUNo
44D FiledNo
44E CurrentNo
66A CurrentNo
Current BasisNo
No BasisNo
Attorney NameStacey J. Watson
Attorney Docket NumberUS-RED5-002A
Law Office AssignedM30
Employee NamePREET, KAMAL

Timeline

2010-12-31Date of First Use
2015-04-01Date of Use In Commerce
2019-03-13Application Filed
2019-07-23Published
2019-07-23Published for Opposition
2019-10-08Location: PUBLICATION AND ISSUE SECTION
2019-10-08Status: Live/Registered
2019-10-08Status: Registered. The registration date is used to determine when post-registration maintenance documents are due.
2019-10-08Trademark Registered
2019-10-08Transaction Date

Trademark Parties (Applicants & Owners)

Party: Red 5 Holdings, Inc.
Address1420 Beverly Road, Suite 270 McLean, VIRGINIA UNITED STATES 22101
Legal Entity TypeCorporation
Legal Entity StateDELAWARE

Design Search Codes

24.01.04Shields or crests with numbers contained therein or superimposed thereon
230101Epees; Foils; Rapiers; Sabers; Swords
240104Shields or crests with numbers contained therein or superimposed thereon

Attorney of Record

STACEY J. WATSON
MARKERY LAW, LLC
P.O. BOX 84150
GAITHERSBURG, MD 20883-4150

Good, Services, and Codes


IC 035. US 100 101 102. G & S: arranging for others the repair and replacement of home security systems; business assistance, advisory and consulting services in the field of the Foreign Corrupt Practices Act (FCPA) industry, only for business and commercial purposes; business risk assessment services. FIRST USE: 20101231. FIRST USE IN COMMERCE: 20150401
IC 041. US 100 101 107. G & S: educational services, namely, conducting classes, seminars, conferences, and workshops in the field of security, and distributing course materials in connection therewith; educational services, namely, conducting online classes, seminars, conferences, and workshops in the field of security, and distributing course materials in connection therewith. FIRST USE: 20101231. FIRST USE IN COMMERCE: 20150401
IC 042. US 100 101. G & S: computer security consultancy; computer security consultancy in the field of cyber and physical protection; computer security threat analysis for protecting data; data security consultancy; design and development of electronic data security systems; design and development of home security systems; development of security systems and contingency planning for information systems; development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; engineering and system analysis in the field of home security systems; testing of security systems; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer network and data security services, namely, computer network vulnerability assessment; providing temporary use of non-downloadable computer software for internet security, security vulnerability assessment, and managed security solutions; computer systems and network management for others in the fields of Internet security, security vulnerability assessment, and managed security solutions in the nature of management of wireless computer networks for others; remote monitoring of computer systems and networks for others to ensure internet security and protection from vulnerability from viruses, malware and hackers; providing temporary use of on-line non-downloadable computer software for security awareness training, simulation of security attacks, and vulnerability assessments; conducting security audits of computer network systems in the nature of monitoring technological functions of computer network systems; providing cybersecurity consulting and threat assessment in the nature of computer security threat analysis for protecting data; computer security consultancy services, namely, providing assessment of crisis action planning comprised of cyber security audits to assess computer security vulnerability, vulnerability and threat detection analysis, monitoring of computer systems and computer networks for computer security purposes, computer network traffic monitoring and analysis, computer network identity monitoring and management, computer network access and authentication monitoring and management, and continuity of operations response, namely, conducting recovery operations for the recovery of computers; computer security consulting services in the field of computer security threat assessment for protecting data. FIRST USE: 20101231. FIRST USE IN COMMERCE: 20150401
IC 045. US 100 101. G & S: security guard services; security guarding for facilities; security services, namely, armed escorts and security personnel for protecting personal property of various individuals and businesses; security services, namely, providing executive protection; security threat analysis for protecting personal property; consultancy services in the field of home security; personal security consultation; physical security consultancy; providing security surveillance of premises for others; providing information in the field of personal physical security; physical security audits being a security threat analysis for protecting personal property and public safety; corporate security services namely, physical security audits, threat assessments, information technology security audits, executive protection programs, technical countermeasure security programs and security contingency planning all in the nature of being a security threat analysis for protecting personal property and public safety; Security due diligence services for individuals or businesses in the nature of detailed security briefings, vetting of local personnel, and providing information on sustainable security measures; threat assessments of Physical security; consulting services in the field of security threat assessment, and threat management for protecting public safety and personal property; remote monitoring of security alarm services for protecting personal property in the nature of providing real-time threat assessment, detection, and updates of unlawful activity, behavioral modelling of network systems for tracking network security threats, electronic data analytics, namely, analyzing data in computer databases for unlawful activity, and generating proactive incident responses in connection with all of the foregoing; providing information in the field of emergency response preparedness, personal safety, physical security, and threat assessment of physical security and personal safety; security guard services, namely, intrusion detection services, intrusion prevention services, vulnerability assessment services all for preventing the intrusion of burglars and protecting physical security and personal safety; security services for individuals and business persons traveling internationally and domestically, namely, providing foreign country security briefings, embassy information and security reports for security purposes. FIRST USE: 20101231. FIRST USE IN COMMERCE: 20150401

International Codes:35
U.S. Codes:100,101,102
International Codes:41
U.S. Codes:100,101,107
International Codes:42
U.S. Codes:100,101
International Codes:45
U.S. Codes:100,101
Type CodeType
CC0000Color is not claimed as a feature of the mark.
CC0000Color is not claimed as a feature of the mark.

Trademark Filing History

DescriptionDateProceeding Number
REGISTERED-PRINCIPAL REGISTER2019-10-08
PUBLISHED FOR OPPOSITION2019-07-23
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED2019-07-23
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED2019-07-03
ASSIGNED TO LIE2019-06-1473296
APPROVED FOR PUB - PRINCIPAL REGISTER2019-05-31
NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED2019-05-306328
EXAMINERS AMENDMENT E-MAILED2019-05-306328
EXAMINERS AMENDMENT -WRITTEN2019-05-3090291
EXAMINER'S AMENDMENT ENTERED2019-05-3088888
ASSIGNED TO EXAMINER2019-05-2290291
NOTICE OF DESIGN SEARCH CODE E-MAILED2019-04-02
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM2019-04-01
NEW APPLICATION ENTERED IN TRAM2019-03-16

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed