AWAKE

Awake Security Llc

Application Filed: 2019-03-20
Trademark Application Details
Trademark Logo AWAKE

Mark For: AWAKE® trademark registration is intended to cover the categories of technical support and consulting services related to customizing, installing, maintaining and repairing cyber-security computer hardware systems for others. [all]

Status

2020-07-09 UTC
LIVE APPLICATION Under Examination
The trademark application has been accepted by the Office (has met the minimum filing requirements) and that this application has been assigned to an examiner.


Research OneLook Acronym Finder
Serial Number88349521
Registration Number6504889
Mark Literal ElementsAWAKE
Mark Drawing Type4 - STANDARD CHARACTER MARK
Mark TypeSERVICE MARK
RegisterPRINCIPAL
Current LocationTMO LAW OFFICE 123 - EXAMINING ATTORNEY ASSIGNED 2019-12-12
Basis1(a)
Class StatusACTIVE
Primary US Classes
  • 100: Miscellaneous
  • 103: Construction and Repair
  • 106: Material Treatment
Primary International Class
  • 037 - Primary Class
  • (Building construction and repair) Building construction; repair; installation services.
Filed UseYes
Current UseYes
Intent To UseNo
Filed ITUNo
44D FiledNo
44E CurrentNo
66A CurrentNo
Current BasisNo
No BasisNo
Attorney NameAriana G. Hiscott
Attorney Docket Number334424-20000

Timeline

2017-05-00Date of First Use
2017-05-01Date of First Use
2017-05-01Date of Use In Commerce
2019-03-20Application Filed
2019-04-08Location: NEW APPLICATION PROCESSING
2019-04-08Status: Live/Pending
2019-04-08Transaction Date
2019-12-12Location: TMO LAW OFFICE 123 - EXAMINING ATTORNEY ASSIGNED
2019-12-12Status: An Office action suspending further action on the application has been sent (issued) to the applicant. To view all documents in
2021-10-05Trademark Registered

Trademark Parties (Applicants & Owners)

Party: AWAKE SECURITY LLC
Address5453 GREAT AMERICA PARKWAY SANTA CLARA, CALIFORNIA UNITED STATES 95054
Legal Entity TypeLimited Liability Company
Legal Entity StateDELAWARE
Party: Awake Security, Inc.
Address150 Mathilda Pl Suite 104 Sunnyvale, CALIFORNIA UNITED STATES 94086
Legal Entity TypeCorporation
Legal Entity StateDELAWARE

*multiple parties listed, check assignment documents for ownership information

Attorney of Record

ARIANA G. HISCOTT
COOLEY LLP
1299 PENNSYLVANIA AVENUE NW, SUITE 700
WASHINGTON, DC 20004

Good, Services, and Codes


IC 037. US 100 103 106. G & S: technical support and consulting services related to customizing, installing, maintaining and repairing cyber-security computer hardware systems for others. FIRST USE: 20170500. FIRST USE IN COMMERCE: 20170500
IC 042. US 100 101. G & S: information technology troubleshooting, namely, investigation, research and diagnosis of computer system and computer network threats; Computer consultation in the field of computer security to detect and assess information security vulnerability; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats, malware and unauthorized data and programs on computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer security services for protecting and managing enterprise networks; computer security services, namely, restricting and detecting unauthorized access to enterprise computer networks; technical support and consulting services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical support and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security systems for others; technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; cloud computing services featuring software and databases for use in computer security and prevention and mitigation of computer risks; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; application service provider (asp) featuring software for use for detection, blocking, and facilitating removal and remediation of viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; application service provider (asp) featuring software that provides secure virtual computer systems and virtual computing environments; providing temporary use of non-downloadable, artificial-intelligence based network security software that detects and prioritizes mal-intent and behavioral threats from internal and external sources and performs autonomous incident triage; providing temporary use of non-downloadable computer software for use in protecting and managing enterprise security; providing temporary use of non-downloadable computer software for digital security; providing temporary use of non-downloadable computer software and non-downloadable software platform, all for monitoring enterprise networks and computer systems to protect against malicious attacks; providing temporary use of non-downloadable computer software for monitoring data and communications for security purposes; providing temporary use of non-downloadable computer software for protecting private information on enterprise networks; providing temporary use of non-downloadable computer software for implementing computer, software and network security measures; providing temporary use of non-downloadable computer software for monitoring and detecting security breaches; providing temporary use of non-downloadable computer software that provides intrusion alert, threat protection and other security functions; providing temporary use of non-downloadable anti-malware software applications; providing temporary use of non-downloadable computer software for providing network, Internet, and computer security; providing temporary use of non-downloadable computer software for scanning, detecting, remediating and removing viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware; providing temporary use of non-downloadable Internet security software, including namely, computer software for use in the monitoring and control of computer and online activity; providing temporary use of non-downloadable computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; providing temporary use of non-downloadable computer software for providing secure networks; providing temporary use of non-downloadable computer software for security analytics; providing temporary use of non-downloadable computer software for network traffic analysis; providing temporary use of non-downloadable computer software for network detection and response; providing temporary use of non-downloadable computer software for threat investigations and incident response; providing temporary use of non-downloadable computer software for threat hunting. FIRST USE: 20170500. FIRST USE IN COMMERCE: 20170500

International Codes:37
U.S. Codes:100,103,106
International Codes:42
U.S. Codes:100,101
Type CodeType
GS0421Information technology troubleshooting, namely, investigation, research and diagnosis of computer system and computer network threats; Computer consultation in the field of computer security to detect and assess information security vulnerability; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats, malware and unauthorized data and programs on computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer security services for protecting and managing enterprise networks; computer security services, namely, restricting and detecting unauthorized access to enterprise computer networks; technical support and consulting services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security systems for others; technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; cloud computing services featuring software and databases for use in computer security and prevention and mitigation of computer risks; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; application service provider (asp) featuring software for use for detection, blocking, and facilitating removal and remediation of viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; application service provider (asp) featuring software that provides secure virtual computer systems and virtual computing environments
GS0371technical support and consulting services related to customizing, installing, maintaining and repairing cyber-security computer hardware systems for others

Assignments

Trademark Filing History

DescriptionDateProceeding Number
REGISTERED-PRINCIPAL REGISTER2021-10-05
AUTOMATIC UPDATE OF ASSIGNMENT OF OWNERSHIP2021-08-04
PUBLISHED FOR OPPOSITION2021-07-20
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED2021-07-20
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED2021-06-30
NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED2021-06-11
EXAMINERS AMENDMENT E-MAILED2021-06-11
EXAMINERS AMENDMENT -WRITTEN2021-06-11
EXAMINER'S AMENDMENT ENTERED2021-06-11
APPROVED FOR PUB - PRINCIPAL REGISTER2021-06-11
NOTIFICATION OF NON-FINAL ACTION E-MAILED2021-05-30
NON-FINAL ACTION WRITTEN2021-05-30
NON-FINAL ACTION E-MAILED2021-05-30
SUSPENSION CHECKED ? TO ATTORNEY FOR ACTION2021-04-13
TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED2021-01-20
TEAS CHANGE OF CORRESPONDENCE RECEIVED2021-01-20
ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED2021-01-20
REPORT COMPLETED SUSPENSION CHECK CASE STILL SUSPENDED2020-08-19
ASSIGNED TO LIE2020-08-14
ASSIGNED TO LIE2020-07-16
TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED2020-06-17
TEAS CHANGE OF CORRESPONDENCE RECEIVED2020-06-17
ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED2020-06-17
SUSPENSION LETTER WRITTEN2019-12-12
NOTIFICATION OF LETTER OF SUSPENSION E-MAILED2019-12-12
LETTER OF SUSPENSION E-MAILED2019-12-12
TEAS/EMAIL CORRESPONDENCE ENTERED2019-11-05
TEAS RESPONSE TO OFFICE ACTION RECEIVED2019-11-05
CORRESPONDENCE RECEIVED IN LAW OFFICE2019-11-05
NOTIFICATION OF NON-FINAL ACTION E-MAILED2019-06-04
NON-FINAL ACTION WRITTEN2019-06-04
NON-FINAL ACTION E-MAILED2019-06-04
ASSIGNED TO EXAMINER2019-05-30
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM2019-04-08
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED2019-04-08
NEW APPLICATION ENTERED IN TRAM2019-03-23
NEW APPLICATION ENTERED2019-03-23

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed