Amendment and Mail Process Complete

AWAKE

AWAKE SECURITY LLC

Amendment and Mail Process Complete

Trademark Snap Shot Amendment & Mail Processing Stylesheet
(Table presents the data on Amendment & Mail Processing Complete)

OVERVIEW

SERIAL NUMBER 88349521 FILING DATE 03/20/2019
REG NUMBER 0000000 REG DATE N/A
REGISTER PRINCIPAL MARK TYPE SERVICE MARK
INTL REG # N/A INTL REG DATE N/A
TM ATTORNEY SHERMAN, SAMANTHA LEIG
L.O. ASSIGNED N50-NOT FOUND

PUB INFORMATION

RUN DATE 11/06/2019
PUB DATE N/A
STATUS 661-RESPONSE AFTER NON-FINAL-ACTION-ENTERED
STATUS DATE 11/05/2019
LITERAL MARK ELEMENT AWAKE

DATE ABANDONED N/A DATE CANCELLED N/A
SECTION 2F NO SECTION 2F IN PART NO
SECTION 8 NO SECTION 8 IN PART NO
SECTION 15 NO REPUB 12C N/A
RENEWAL FILED NO RENEWAL DATE N/A
DATE AMEND REG N/A


FILING BASIS

FILED BASIS CURRENT BASIS AMENDED BASIS
1 (a) YES 1 (a) YES 1 (a) NO
1 (b) NO 1 (b) NO 1 (b) NO
44D NO 44D NO 44D NO
44E NO 44E NO 44E NO
66A NO 66A NO

NO BASIS NO NO BASIS NO


MARK DATA

STANDARD CHARACTER MARK YES
LITERAL MARK ELEMENT AWAKE
MARK DRAWING CODE 4-STANDARD CHARACTER MARK
COLOR DRAWING FLAG NO

CURRENT OWNER INFORMATION

PARTY TYPE 10-ORIGINAL APPLICANT
NAME Awake Security, Inc.
ADDRESS 150 Mathilda Pl Suite 104
Sunnyvale, CA 94086
ENTITY 03-CORPORATION
CITIZENSHIP Delaware

GOODS AND SERVICES

INTERNATIONAL CLASS 037
          DESCRIPTION TEXT technical support and consulting services related to customizing, installing, maintaining and repairing cyber-security computer hardware systems for others
INTERNATIONAL CLASS 042
          DESCRIPTION TEXT information technology troubleshooting, namely, investigation, research and diagnosis of computer system and computer network threats; Computer consultation in the field of computer security to detect and assess information security vulnerability; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats, malware and unauthorized data and programs on computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer security services for protecting and managing enterprise networks; computer security services, namely, restricting and detecting unauthorized access to enterprise computer networks; technical support and consulting services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical support and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security systems for others; technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; cloud computing services featuring software and databases for use in computer security and prevention and mitigation of computer risks; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; application service provider (asp) featuring software for use for detection, blocking, and facilitating removal and remediation of viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; application service provider (asp) featuring software that provides secure virtual computer systems and virtual computing environments; providing temporary use of non-downloadable, artificial-intelligence based network security software that detects and prioritizes mal-intent and behavioral threats from internal and external sources and performs autonomous incident triage; providing temporary use of non-downloadable computer software for use in protecting and managing enterprise security; providing temporary use of non-downloadable computer software for digital security; providing temporary use of non-downloadable computer software and non-downloadable software platform, all for monitoring enterprise networks and computer systems to protect against malicious attacks; providing temporary use of non-downloadable computer software for monitoring data and communications for security purposes; providing temporary use of non-downloadable computer software for protecting private information on enterprise networks; providing temporary use of non-downloadable computer software for implementing computer, software and network security measures; providing temporary use of non-downloadable computer software for monitoring and detecting security breaches; providing temporary use of non-downloadable computer software that provides intrusion alert, threat protection and other security functions; providing temporary use of non-downloadable anti-malware software applications; providing temporary use of non-downloadable computer software for providing network, Internet, and computer security; providing temporary use of non-downloadable computer software for scanning, detecting, remediating and removing viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware; providing temporary use of non-downloadable Internet security software, including namely, computer software for use in the monitoring and control of computer and online activity; providing temporary use of non-downloadable computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; providing temporary use of non-downloadable computer software for providing secure networks; providing temporary use of non-downloadable computer software for security analytics; providing temporary use of non-downloadable computer software for network traffic analysis; providing temporary use of non-downloadable computer software for network detection and response; providing temporary use of non-downloadable computer software for threat investigations and incident response; providing temporary use of non-downloadable computer software for threat hunting

GOODS AND SERVICES CLASSIFICATION

INTERNATIONAL CLASS 037 FIRST USE DATE 05/00/2017 FIRST USE IN COMMERCE DATE 05/00/2017 CLASS STATUS 6-ACTIVE
INTERNATIONAL CLASS 042 FIRST USE DATE 05/00/2017 FIRST USE IN COMMERCE DATE 05/00/2017 CLASS STATUS 6-ACTIVE

MISCELLANEOUS INFORMATION/STATEMENTS

CHANGE IN REGISTRATION NO

PROSECUTION HISTORY

DATE ENT CD ENT TYPE DESCRIPTION ENT NUM
11/05/2019 TEME I TEAS/EMAIL CORRESPONDENCE ENTERED 009
11/05/2019 CRFA I CORRESPONDENCE RECEIVED IN LAW OFFICE 008
11/05/2019 TROA I TEAS RESPONSE TO OFFICE ACTION RECEIVED 007
06/04/2019 GNRN O NOTIFICATION OF NON-FINAL ACTION E-MAILED 006
06/04/2019 GNRT F NON-FINAL ACTION E-MAILED 005
06/04/2019 CNRT R NON-FINAL ACTION WRITTEN 004
05/30/2019 DOCK D ASSIGNED TO EXAMINER 003
04/08/2019 NWOS I NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM 002
03/23/2019 NWAP I NEW APPLICATION ENTERED IN TRAM 001

CURRENT CORRESPONDENCE INFORMATION

ATTORNEY Ariana G. Hiscott
CORRESPONDENCE ADDRESS Ariana G. Hiscott
COOLEY LLP
1299 PENNSYLVANIA AVENUE NW, SUITE 700
WASHINGTON DC 20004
DOMESTIC REPRESENTATIVE NONE

Amendment and Mail Process Complete [image/jpeg]


uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed