Response to Office Action

AWAKE

AWAKE SECURITY LLC

Response to Office Action

Under the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless it displays a valid OMB control number.
PTO Form 1957 (Rev 10/2011)
OMB No. 0651-0050 (Exp 09/20/2020)

Response to Office Action


The table below presents the data as entered.

Input Field
Entered
SERIAL NUMBER 88349521
LAW OFFICE ASSIGNED LAW OFFICE 123
MARK SECTION
MARK http://uspto.report/TM/88349521/mark.png
LITERAL ELEMENT AWAKE
STANDARD CHARACTERS YES
USPTO-GENERATED IMAGE YES
MARK STATEMENT The mark consists of standard characters, without claim to any particular font style, size or color.
GOODS AND/OR SERVICES SECTION (042)(current)
INTERNATIONAL CLASS 042
DESCRIPTION
Information technology troubleshooting, namely, investigation, research and diagnosis of computer system and computer network threats; Computer consultation in the field of computer security to detect and assess information security vulnerability; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats, malware and unauthorized data and programs on computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer security services for protecting and managing enterprise networks; computer security services, namely, restricting and detecting unauthorized access to enterprise computer networks; technical support and consulting services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security systems for others; technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; cloud computing services featuring software and databases for use in computer security and prevention and mitigation of computer risks; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; application service provider (asp) featuring software for use for detection, blocking, and facilitating removal and remediation of viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; application service provider (asp) featuring software that provides secure virtual computer systems and virtual computing environments
FILING BASIS Section 1(a)
        FIRST USE ANYWHERE DATE At least as early as 05/00/2017
        FIRST USE IN COMMERCE DATE At least as early as 05/00/2017
GOODS AND/OR SERVICES SECTION (042)(proposed)
INTERNATIONAL CLASS 042
TRACKED TEXT DESCRIPTION
information technology troubleshooting, namely, investigation, research and diagnosis of computer system and computer network threats; Computer consultation in the field of computer security to detect and assess information security vulnerability; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats, malware and unauthorized data and programs on computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer security services for protecting and managing enterprise networks; computer security services, namely, restricting and detecting unauthorized access to enterprise computer networks; technical support and consulting services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security systems for others; technical support and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security systems for others; technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; cloud computing services featuring software and databases for use in computer security and prevention and mitigation of computer risks; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; application service provider (asp) featuring software for use for detection, blocking, and facilitating removal and remediation of viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; application service provider (asp) featuring software that provides secure virtual computer systems and virtual computing environments; providing temporary use of non-downloadable, artificial-intelligence based network security software that detects and prioritizes mal-intent and behavioral threats from internal and external sources and performs autonomous incident triage; providing temporary use of non-downloadable computer software for use in protecting and managing enterprise security; providing temporary use of non-downloadable computer software for digital security; providing temporary use of non-downloadable computer software and non-downloadable software platform, all for monitoring enterprise networks and computer systems to protect against malicious attacks; providing temporary use of non-downloadable computer software for monitoring data and communications for security purposes; providing temporary use of non-downloadable computer software for protecting private information on enterprise networks; providing temporary use of non-downloadable computer software for implementing computer, software and network security measures; providing temporary use of non-downloadable computer software for monitoring and detecting security breaches; providing temporary use of non-downloadable computer software that provides intrusion alert, threat protection and other security functions; providing temporary use of non-downloadable anti-malware software applications; providing temporary use of non-downloadable computer software for providing network, Internet, and computer security; providing temporary use of non-downloadable computer software for scanning, detecting, remediating and removing viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware; providing temporary use of non-downloadable Internet security software, including namely, computer software for use in the monitoring and control of computer and online activity; providing temporary use of non-downloadable computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; providing temporary use of non-downloadable computer software for providing secure networks; providing temporary use of non-downloadable computer software for security analytics; providing temporary use of non-downloadable computer software for network traffic analysis; providing temporary use of non-downloadable computer software for network detection and response; providing temporary use of non-downloadable computer software for threat investigations and incident response; providing temporary use of non-downloadable computer software for threat hunting
FINAL DESCRIPTION
information technology troubleshooting, namely, investigation, research and diagnosis of computer system and computer network threats; Computer consultation in the field of computer security to detect and assess information security vulnerability; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats, malware and unauthorized data and programs on computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer security services for protecting and managing enterprise networks; computer security services, namely, restricting and detecting unauthorized access to enterprise computer networks; technical support and consulting services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical support and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security systems for others; technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; cloud computing services featuring software and databases for use in computer security and prevention and mitigation of computer risks; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; application service provider (asp) featuring software for use for detection, blocking, and facilitating removal and remediation of viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; application service provider (asp) featuring software that provides secure virtual computer systems and virtual computing environments; providing temporary use of non-downloadable, artificial-intelligence based network security software that detects and prioritizes mal-intent and behavioral threats from internal and external sources and performs autonomous incident triage; providing temporary use of non-downloadable computer software for use in protecting and managing enterprise security; providing temporary use of non-downloadable computer software for digital security; providing temporary use of non-downloadable computer software and non-downloadable software platform, all for monitoring enterprise networks and computer systems to protect against malicious attacks; providing temporary use of non-downloadable computer software for monitoring data and communications for security purposes; providing temporary use of non-downloadable computer software for protecting private information on enterprise networks; providing temporary use of non-downloadable computer software for implementing computer, software and network security measures; providing temporary use of non-downloadable computer software for monitoring and detecting security breaches; providing temporary use of non-downloadable computer software that provides intrusion alert, threat protection and other security functions; providing temporary use of non-downloadable anti-malware software applications; providing temporary use of non-downloadable computer software for providing network, Internet, and computer security; providing temporary use of non-downloadable computer software for scanning, detecting, remediating and removing viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware; providing temporary use of non-downloadable Internet security software, including namely, computer software for use in the monitoring and control of computer and online activity; providing temporary use of non-downloadable computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; providing temporary use of non-downloadable computer software for providing secure networks; providing temporary use of non-downloadable computer software for security analytics; providing temporary use of non-downloadable computer software for network traffic analysis; providing temporary use of non-downloadable computer software for network detection and response; providing temporary use of non-downloadable computer software for threat investigations and incident response; providing temporary use of non-downloadable computer software for threat hunting
FILING BASIS Section 1(a)
       FIRST USE ANYWHERE DATE At least as early as 05/00/2017
       FIRST USE IN COMMERCE DATE At least as early as 05/00/2017
GOODS AND/OR SERVICES SECTION (037)(class added)
INTERNATIONAL CLASS 037
DESCRIPTION
technical support and consulting services related to customizing, installing, maintaining and repairing cyber-security computer hardware systems for others
FILING BASIS Section 1(a)
        FIRST USE ANYWHERE DATE At least as early as 05/00/2017
        FIRST USE IN COMMERCE DATE At least as early as 05/00/2017
       STATEMENT TYPE "The substitute (or new, or originally submitted, if appropriate) specimen(s) was/were in use in commerce at least as early as the filing date of the application"[for an application based on Section 1(a), Use in Commerce] OR "The substitute (or new, or originally submitted, if appropriate) specimen(s) was/were in use in commerce prior either to the filing of the Amendment to Allege Use or expiration of the filing deadline for filing a Statement of Use" [for an application based on Section 1(b) Intent-to-Use]. OR "The attached specimen is a true copy of the specimen that was originally submitted with the application, amendment to allege use, or statement of use" [for an illegible specimen].
       SPECIMEN FILE NAME(S)
       ORIGINAL PDF FILE SPN0-1045820710-20191101124347767218_._AWAKE_class_37.pdf
       CONVERTED PDF FILE(S)
       (1 page)
\\TICRS\EXPORT17\IMAGEOUT17\883\495\88349521\xml4\ROA0002.JPG
       SPECIMEN DESCRIPTION a datasheet listing the technical support services available to the user
ATTORNEY SECTION (current)
NAME Ariana G. Hiscott
ATTORNEY BAR MEMBERSHIP NUMBER NOT SPECIFIED
YEAR OF ADMISSION NOT SPECIFIED
U.S. STATE/ COMMONWEALTH/ TERRITORY NOT SPECIFIED
FIRM NAME COOLEY LLP
STREET 1299 PENNSYLVANIA AVENUE NW, SUITE 700
CITY WASHINGTON
STATE District of Columbia
POSTAL CODE 20004
COUNTRY US
EMAIL trademarks@cooley.com
AUTHORIZED TO COMMUNICATE VIA EMAIL Yes
DOCKET/REFERENCE NUMBER 334424-20000
ATTORNEY SECTION (proposed)
NAME Ariana G. Hiscott
ATTORNEY BAR MEMBERSHIP NUMBER XXX
YEAR OF ADMISSION XXXX
U.S. STATE/ COMMONWEALTH/ TERRITORY XX
FIRM NAME COOLEY LLP
STREET 1299 PENNSYLVANIA AVENUE NW, SUITE 700
CITY WASHINGTON
STATE District of Columbia
POSTAL CODE 20004
COUNTRY United States
EMAIL trademarks@cooley.com
AUTHORIZED TO COMMUNICATE VIA EMAIL Yes
DOCKET/REFERENCE NUMBER 334424-20000
OTHER APPOINTED ATTORNEY Salsabil Ahmed, Susan Piascik Christoff, John W. Crittenden, Brian Focarino, Bobby A. Ghajar, Colette A. Ghazarian, Rebecca Givner-Forbes, Jeffrey H. Greene, Shannan Higgins, Brendan J. Hughes, Rose Mendenhall Kautz, Judd D. Lauter, Lori A. Levine, John Paul Oleksiuk, Anne H. Peck, Marcus D. Peterson, Elisa Rosen, Dina Roumiantseva, Shane Rumbaugh, Jane van Benten, and Colleen Wellington-Caban
CORRESPONDENCE SECTION (current)
NAME ARIANA G. HISCOTT
FIRM NAME COOLEY LLP
STREET 1299 PENNSYLVANIA AVENUE NW, SUITE 700
CITY WASHINGTON
STATE District of Columbia
POSTAL CODE 20004
COUNTRY US
EMAIL trademarks@cooley.com; ahiscott@cooley.com; myoung@cooley.com; jcrittenden@cooley.com
AUTHORIZED TO COMMUNICATE VIA EMAIL Yes
DOCKET/REFERENCE NUMBER 334424-20000
CORRESPONDENCE SECTION (proposed)
NAME Ariana G. Hiscott
FIRM NAME COOLEY LLP
STREET 1299 PENNSYLVANIA AVENUE NW, SUITE 700
CITY WASHINGTON
STATE District of Columbia
POSTAL CODE 20004
COUNTRY United States
EMAIL trademarks@cooley.com
AUTHORIZED TO COMMUNICATE VIA EMAIL Yes
DOCKET/REFERENCE NUMBER 334424-20000
PAYMENT SECTION
NUMBER OF CLASSES 1
APPLICATION FOR REGISTRATION PER CLASS 275
TOTAL FEES DUE 275
SIGNATURE SECTION
DECLARATION SIGNATURE / Rahul Kashyap/
SIGNATORY'S NAME Rahul Kashyap
SIGNATORY'S POSITION CEO
DATE SIGNED 11/05/2019
RESPONSE SIGNATURE /John W. Crittenden/
SIGNATORY'S NAME John W. Crittenden
SIGNATORY'S POSITION Attorney of record, Member, State Bar of California
SIGNATORY'S PHONE NUMBER 415 693-2090
DATE SIGNED 11/05/2019
AUTHORIZED SIGNATORY YES
FILING INFORMATION SECTION
SUBMIT DATE Tue Nov 05 13:24:46 EST 2019
TEAS STAMP USPTO/ROA-XXX.XX.XXX.XX-2
0191105132446833411-88349
521-700bb10ab479ebb4b58ae
5e9c9140562bfa17cf678ea0c
0a22937ef89c459a6-DA-2446
9894-20191101124347767218



Under the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless it displays a valid OMB control number.
PTO Form 1957 (Rev 10/2011)
OMB No. 0651-0050 (Exp 09/20/2020)

Response to Office Action


To the Commissioner for Trademarks:

Application serial no. 88349521 AWAKE(Standard Characters, see http://uspto.report/TM/88349521/mark.png) has been amended as follows:

CLASSIFICATION AND LISTING OF GOODS/SERVICES

Applicant proposes to amend the following class of goods/services in the application:
Current: Class 042 for Information technology troubleshooting, namely, investigation, research and diagnosis of computer system and computer network threats; Computer consultation in the field of computer security to detect and assess information security vulnerability; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats, malware and unauthorized data and programs on computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer security services for protecting and managing enterprise networks; computer security services, namely, restricting and detecting unauthorized access to enterprise computer networks; technical support and consulting services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security systems for others; technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; cloud computing services featuring software and databases for use in computer security and prevention and mitigation of computer risks; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; application service provider (asp) featuring software for use for detection, blocking, and facilitating removal and remediation of viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; application service provider (asp) featuring software that provides secure virtual computer systems and virtual computing environments
Original Filing Basis:
Filing Basis: Section 1(a), Use in Commerce: For all applications: The mark is in use in commerce and was in use in commerce as of the application filing date. The provided specimen shows the mark in use in commerce (see specimen statement below). For a collective trademark, collective service mark, collective membership mark, or certification mark application: The applicant is exercising legitimate control over the use of the mark in commerce and was exercising legitimate control over the use of the mark in commerce as of the application filing date. For a certification mark application: The applicant is not engaged in the production or marketing of the goods/services to which the mark is applied, except to advertise or promote recognition of the certification program or of the goods/services that meet the certification standards of the applicant. The mark was first used at least as early as 05/00/2017 and first used in commerce at least as early as 05/00/2017 , and is now in use in such commerce.

Proposed:
Tracked Text Description: information technology troubleshooting, namely, investigation, research and diagnosis of computer system and computer network threats; Computer consultation in the field of computer security to detect and assess information security vulnerability; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats, malware and unauthorized data and programs on computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer security services for protecting and managing enterprise networks; computer security services, namely, restricting and detecting unauthorized access to enterprise computer networks; technical support and consulting services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security systems for others; technical support and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security systems for others; technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; cloud computing services featuring software and databases for use in computer security and prevention and mitigation of computer risks; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; application service provider (asp) featuring software for use for detection, blocking, and facilitating removal and remediation of viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; application service provider (asp) featuring software that provides secure virtual computer systems and virtual computing environments; providing temporary use of non-downloadable, artificial-intelligence based network security software that detects and prioritizes mal-intent and behavioral threats from internal and external sources and performs autonomous incident triage; providing temporary use of non-downloadable computer software for use in protecting and managing enterprise security; providing temporary use of non-downloadable computer software for digital security; providing temporary use of non-downloadable computer software and non-downloadable software platform, all for monitoring enterprise networks and computer systems to protect against malicious attacks; providing temporary use of non-downloadable computer software for monitoring data and communications for security purposes; providing temporary use of non-downloadable computer software for protecting private information on enterprise networks; providing temporary use of non-downloadable computer software for implementing computer, software and network security measures; providing temporary use of non-downloadable computer software for monitoring and detecting security breaches; providing temporary use of non-downloadable computer software that provides intrusion alert, threat protection and other security functions; providing temporary use of non-downloadable anti-malware software applications; providing temporary use of non-downloadable computer software for providing network, Internet, and computer security; providing temporary use of non-downloadable computer software for scanning, detecting, remediating and removing viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware; providing temporary use of non-downloadable Internet security software, including namely, computer software for use in the monitoring and control of computer and online activity; providing temporary use of non-downloadable computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; providing temporary use of non-downloadable computer software for providing secure networks; providing temporary use of non-downloadable computer software for security analytics; providing temporary use of non-downloadable computer software for network traffic analysis; providing temporary use of non-downloadable computer software for network detection and response; providing temporary use of non-downloadable computer software for threat investigations and incident response; providing temporary use of non-downloadable computer software for threat huntingClass 042 for information technology troubleshooting, namely, investigation, research and diagnosis of computer system and computer network threats; Computer consultation in the field of computer security to detect and assess information security vulnerability; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats, malware and unauthorized data and programs on computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer security services for protecting and managing enterprise networks; computer security services, namely, restricting and detecting unauthorized access to enterprise computer networks; technical support and consulting services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical support and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security systems for others; technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; cloud computing services featuring software and databases for use in computer security and prevention and mitigation of computer risks; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; application service provider (asp) featuring software for use for detection, blocking, and facilitating removal and remediation of viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; application service provider (asp) featuring software that provides secure virtual computer systems and virtual computing environments; providing temporary use of non-downloadable, artificial-intelligence based network security software that detects and prioritizes mal-intent and behavioral threats from internal and external sources and performs autonomous incident triage; providing temporary use of non-downloadable computer software for use in protecting and managing enterprise security; providing temporary use of non-downloadable computer software for digital security; providing temporary use of non-downloadable computer software and non-downloadable software platform, all for monitoring enterprise networks and computer systems to protect against malicious attacks; providing temporary use of non-downloadable computer software for monitoring data and communications for security purposes; providing temporary use of non-downloadable computer software for protecting private information on enterprise networks; providing temporary use of non-downloadable computer software for implementing computer, software and network security measures; providing temporary use of non-downloadable computer software for monitoring and detecting security breaches; providing temporary use of non-downloadable computer software that provides intrusion alert, threat protection and other security functions; providing temporary use of non-downloadable anti-malware software applications; providing temporary use of non-downloadable computer software for providing network, Internet, and computer security; providing temporary use of non-downloadable computer software for scanning, detecting, remediating and removing viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware; providing temporary use of non-downloadable Internet security software, including namely, computer software for use in the monitoring and control of computer and online activity; providing temporary use of non-downloadable computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; providing temporary use of non-downloadable computer software for providing secure networks; providing temporary use of non-downloadable computer software for security analytics; providing temporary use of non-downloadable computer software for network traffic analysis; providing temporary use of non-downloadable computer software for network detection and response; providing temporary use of non-downloadable computer software for threat investigations and incident response; providing temporary use of non-downloadable computer software for threat hunting
Filing Basis: Section 1(a), Use in Commerce:For all applications: The mark is in use in commerce and was in use in commerce as of the application filing date. The provided specimen shows the mark in use in commerce (see specimen statement below). For a collective trademark, collective service mark, collective membership mark, or certification mark application: The applicant is exercising legitimate control over the use of the mark in commerce and was exercising legitimate control over the use of the mark in commerce as of the application filing date. For a certification mark application: The applicant is not engaged in the production or marketing of the goods/services to which the mark is applied, except to advertise or promote recognition of the certification program or of the goods/services that meet the certification standards of the applicant. The mark was first used at least as early as 05/00/2017 and first used in commerce at least as early as 05/00/2017 , and is now in use in such commerce.
Applicant hereby adds the following class of goods/services to the application:
New: Class 037 for technical support and consulting services related to customizing, installing, maintaining and repairing cyber-security computer hardware systems for others
Filing Basis: Section 1(a), Use in Commerce: For all applications: The mark is in use in commerce and was in use in commerce as of the application filing date. The provided specimen shows the mark in use in commerce (see specimen statement below). For a collective trademark, collective service mark, collective membership mark, or certification mark application: The applicant is exercising legitimate control over the use of the mark in commerce and was exercising legitimate control over the use of the mark in commerce as of the application filing date. For a certification mark application: The applicant is not engaged in the production or marketing of the goods/services to which the mark is applied, except to advertise or promote recognition of the certification program or of the goods/services that meet the certification standards of the applicant. The mark was first used at least as early as 05/00/2017 and first used in commerce at least as early as 05/00/2017 , and is now in use in such commerce.
Applicant hereby submits a specimen for Class 037 . The specimen(s) submitted consists of a datasheet listing the technical support services available to the user .
"The substitute (or new, or originally submitted, if appropriate) specimen(s) was/were in use in commerce at least as early as the filing date of the application"[for an application based on Section 1(a), Use in Commerce] OR "The substitute (or new, or originally submitted, if appropriate) specimen(s) was/were in use in commerce prior either to the filing of the Amendment to Allege Use or expiration of the filing deadline for filing a Statement of Use" [for an application based on Section 1(b) Intent-to-Use]. OR "The attached specimen is a true copy of the specimen that was originally submitted with the application, amendment to allege use, or statement of use" [for an illegible specimen].
Original PDF file:
SPN0-1045820710-20191101124347767218_._AWAKE_class_37.pdf
Converted PDF file(s) ( 1 page)
Specimen File1

The applicant's current attorney information: Ariana G. Hiscott. Ariana G. Hiscott of COOLEY LLP, is located at

      1299 PENNSYLVANIA AVENUE NW, SUITE 700
      WASHINGTON, District of Columbia 20004
      US
The docket/reference number is 334424-20000.

The email address is trademarks@cooley.com

The applicants proposed attorney information: Ariana G. Hiscott. Other appointed attorneys are Salsabil Ahmed, Susan Piascik Christoff, John W. Crittenden, Brian Focarino, Bobby A. Ghajar, Colette A. Ghazarian, Rebecca Givner-Forbes, Jeffrey H. Greene, Shannan Higgins, Brendan J. Hughes, Rose Mendenhall Kautz, Judd D. Lauter, Lori A. Levine, John Paul Oleksiuk, Anne H. Peck, Marcus D. Peterson, Elisa Rosen, Dina Roumiantseva, Shane Rumbaugh, Jane van Benten, and Colleen Wellington-Caban. Ariana G. Hiscott of COOLEY LLP, is a member of the XX bar, admitted to the bar in XXXX, bar membership no. XXX, and the attorney(s) is located at

      1299 PENNSYLVANIA AVENUE NW, SUITE 700
      WASHINGTON, District of Columbia 20004
      United States
The docket/reference number is 334424-20000.

The email address is trademarks@cooley.com

Ariana G. Hiscott submitted the following statement: The attorney of record is an active member in good standing of the bar of the highest court of a U.S. state, the District of Columbia, or any U.S. Commonwealth or territory.
The applicant's current correspondence information: ARIANA G. HISCOTT. ARIANA G. HISCOTT of COOLEY LLP, is located at

      1299 PENNSYLVANIA AVENUE NW, SUITE 700
      WASHINGTON, District of Columbia 20004
      US
The docket/reference number is 334424-20000.

The email address is trademarks@cooley.com; ahiscott@cooley.com; myoung@cooley.com; jcrittenden@cooley.com

The applicants proposed correspondence information: Ariana G. Hiscott. Ariana G. Hiscott of COOLEY LLP, is located at

      1299 PENNSYLVANIA AVENUE NW, SUITE 700
      WASHINGTON, District of Columbia 20004
      United States
The docket/reference number is 334424-20000.

The email address is trademarks@cooley.com

FEE(S)
Fee(s) in the amount of $275 is being submitted.

SIGNATURE(S)
Declaration Signature

DECLARATION: The signatory being warned that willful false statements and the like are punishable by fine or imprisonment, or both, under 18 U.S.C. § 1001, and that such willful false statements and the like may jeopardize the validity of the application or submission or any registration resulting therefrom, declares that, if the applicant submitted the application or allegation of use (AOU) unsigned, all statements in the application or AOU and this submission based on the signatory's own knowledge are true, and all statements in the application or AOU and this submission made on information and belief are believed to be true.

STATEMENTS FOR UNSIGNED SECTION 1(a) APPLICATION/AOU: If the applicant filed an unsigned application under 15 U.S.C. §1051(a) or AOU under 15 U.S.C. §1051(c), the signatory additionally believes that: the applicant is the owner of the mark sought to be registered; the mark is in use in commerce and was in use in commerce as of the filing date of the application or AOU on or in connection with the goods/services/collective membership organization in the application or AOU; the original specimen(s), if applicable, shows the mark in use in commerce as of the filing date of the application or AOU on or in connection with the goods/services/collective membership organization in the application or AOU; for a collective trademark, collective service mark, collective membership mark application, or certification mark application, the applicant is exercising legitimate control over the use of the mark in commerce and was exercising legitimate control over the use of the mark in commerce as of the filing date of the application or AOU; for a certification mark application, the applicant is not engaged in the production or marketing of the goods/services to which the mark is applied, except to advertise or promote recognition of the certification program or of the goods/services that meet the certification standards of the applicant. To the best of the signatory's knowledge and belief, no other persons, except, if applicable, authorized users, members, and/or concurrent users, have the right to use the mark in commerce, either in the identical form or in such near resemblance as to be likely, when used on or in connection with the goods/services/collective membership organization of such other persons, to cause confusion or mistake, or to deceive.

STATEMENTS FOR UNSIGNED SECTION 1(b)/SECTION 44 APPLICATION AND FOR SECTION 66(a) COLLECTIVE/CERTIFICATION MARK APPLICATION: If the applicant filed an unsigned application under 15 U.S.C. §§ 1051(b), 1126(d), and/or 1126(e), or filed a collective/certification mark application under 15 U.S.C. §1141f(a), the signatory additionally believes that: for a trademark or service mark application, the applicant is entitled to use the mark in commerce on or in connection with the goods/services specified in the application; the applicant has a bona fide intention to use the mark in commerce and had a bona fide intention to use the mark in commerce as of the application filing date; for a collective trademark, collective service mark, collective membership mark, or certification mark application, the applicant has a bona fide intention, and is entitled, to exercise legitimate control over the use of the mark in commerce and had a bona fide intention, and was entitled, to exercise legitimate control over the use of the mark in commerce as of the application filing date; the signatory is properly authorized to execute the declaration on behalf of the applicant; for a certification mark application, the applicant will not engage in the production or marketing of the goods/services to which the mark is applied, except to advertise or promote recognition of the certification program or of the goods/services that meet the certification standards of the applicant. To the best of the signatory's knowledge and belief, no other persons, except, if applicable, authorized users, members, and/or concurrent users, have the right to use the mark in commerce, either in the identical form or in such near resemblance as to be likely, when used on or in connection with the goods/services/collective membership organization of such other persons, to cause confusion or mistake, or to deceive.



Signature: / Rahul Kashyap/      Date: 11/05/2019
Signatory's Name: Rahul Kashyap
Signatory's Position: CEO

Response Signature
Signature: /John W. Crittenden/     Date: 11/05/2019
Signatory's Name: John W. Crittenden
Signatory's Position: Attorney of record, Member, State Bar of California

Signatory's Phone Number: 415 693-2090

The signatory has confirmed that he/she is a U.S.-licensed attorney who is an active member in good standing of the bar of the highest court of a U.S. state (including the District of Columbia and any U.S. Commonwealth or territory); and he/she is currently the owner's/holder's attorney or an associate thereof; and to the best of his/her knowledge, if prior to his/her appointment another U.S.-licensed attorney not currently associated with his/her company/firm previously represented the owner/holder in this matter: the owner/holder has revoked their power of attorney by a signed revocation or substitute power of attorney with the USPTO; the USPTO has granted that attorney's withdrawal request; the owner/holder has filed a power of attorney appointing him/her in this matter; or the owner's/holder's appointed U.S.-licensed attorney has filed a power of attorney appointing him/her as an associate attorney in this matter.

Mailing Address:    ARIANA G. HISCOTT
   COOLEY LLP
   
   1299 PENNSYLVANIA AVENUE NW, SUITE 700
   WASHINGTON, District of Columbia 20004
Mailing Address:    Ariana G. Hiscott
   COOLEY LLP
   1299 PENNSYLVANIA AVENUE NW, SUITE 700
   WASHINGTON, District of Columbia 20004
        
RAM Sale Number: 88349521
RAM Accounting Date: 11/05/2019
        
Serial Number: 88349521
Internet Transmission Date: Tue Nov 05 13:24:46 EST 2019
TEAS Stamp: USPTO/ROA-XXX.XX.XXX.XX-2019110513244683
3411-88349521-700bb10ab479ebb4b58ae5e9c9
140562bfa17cf678ea0c0a22937ef89c459a6-DA
-24469894-20191101124347767218


Response to Office Action [image/jpeg]

Response to Office Action [image/jpeg]


uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed