Mark For: AWAKE® trademark registration is intended to cover the categories of
Research | OneLook Acronym Finder |
Serial Number | 88349524 |
Registration Number | 6513750 |
Mark Literal Elements | AWAKE |
Mark Drawing Type | 4 - STANDARD CHARACTER MARK |
Mark Type | TRADEMARK |
Register | PRINCIPAL |
Current Location | TMO LAW OFFICE 123 - EXAMINING ATTORNEY ASSIGNED 2019-12-12 |
Basis | 1(a) |
Class Status | ACTIVE |
Primary US Classes |
|
Primary International Class |
|
Filed Use | Yes |
Current Use | Yes |
Intent To Use | No |
Filed ITU | No |
44D Filed | No |
44E Current | No |
66A Current | No |
Current Basis | No |
No Basis | No |
Attorney Name | Ariana G. Hiscott |
Attorney Docket Number | 334424-20000 |
2017-05-00 | Date of First Use |
2017-05-01 | Date of First Use |
2017-05-01 | Date of Use In Commerce |
2019-03-20 | Application Filed |
2019-04-08 | Location: NEW APPLICATION PROCESSING |
2019-04-08 | Status: Live/Pending |
2019-04-08 | Transaction Date |
2019-12-12 | Location: TMO LAW OFFICE 123 - EXAMINING ATTORNEY ASSIGNED |
2019-12-12 | Status: An Office action suspending further action on the application has been sent (issued) to the applicant. To view all documents in |
2021-10-12 | Trademark Registered |
Party: | Awake Security, Inc. |
Address | 150 Mathilda Pl Suite 104 Sunnyvale, CALIFORNIA UNITED STATES 94041 |
Legal Entity Type | Corporation |
Legal Entity State | DELAWARE |
Drawing | JPEG | 2019-03-20 |
Specimen | JPEG | 2019-03-20 |
TEAS RF New Application | MULTI | 2019-03-20 |
Offc Action Outgoing | MULTI | 2019-06-04 |
XSearch Search Summary | XML | 2019-06-04 |
Response to Office Action | APPLICATION/XML | 2019-11-04 |
Amendment and Mail Process Complete | MULTI | 2019-11-06 |
Suspension Letter | XML | 2019-12-12 |
Change Address or Representation Form | XML | 2020-06-17 |
IC 009. US 021 023 026 036 038. G & S: network security appliance comprised of computer hardware and artificial intelligence-based software for identifying, analyzing, visualizing, tracking, and collecting information on network security incidents and network traffic, and providing customized cyber security, governance, risk and compliance response options; network security appliance comprised of computer hardware and software featuring dashboard software for searching, mapping and graphing network devices and security threats, producing security incident reports, monitoring, tracking and managing computer and network security and providing trend visualization and analytics regarding computer and network security threats; downloadable, artificial-intelligence based network security software that detects and prioritizes mal-intent and behavioral threats from internal and external sources and performs autonomous incident triage; downloadable computer software for use in protecting and managing enterprise security; downloadable computer software for digital security; downloadable computer software and downloadable software platform, all for monitoring enterprise networks and computer systems to protect against malicious attacks; downloadable computer software for monitoring data and communications for security purposes; downloadable computer software for protecting private information on enterprise networks; downloadable computer software for implementing computer, software and network security measures; downloadable computer software for monitoring and detecting security breaches; downloadable computer software that provides intrusion alert, threat protection and other security functions; downloadable anti-malware software applications; downloadable computer software for providing network, Internet, and computer security; downloadable computer software for scanning, detecting, remediating and removing viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware; downloadable Internet security software, including namely, computer software for use in the monitoring and control of computer and online activity; downloadable computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; downloadable computer software for providing secure networks; downloadable computer software for security analytics; downloadable computer software for network traffic analysis; downloadable computer software for network detection and response; downloadable computer software for threat investigations and incident response; downloadable computer software for threat hunting. FIRST USE: 20170500. FIRST USE IN COMMERCE: 20170500
International Codes: | 9 |
U.S. Codes: | 021,023,026,036,038 |
Type Code | Type |
---|---|
GS0091 | Network security appliance comprised of computer hardware and artificial intelligence-based software for identifying, analyzing, visualizing, tracking, and collecting information on network security incidents and network traffic, and providing customized cyber security, governance, risk and compliance response options; network security appliance comprised of computer hardware and software featuring dashboard software for searching, mapping and graphing network devices and security threats, producing security incident reports, monitoring, tracking and managing computer and network security and providing trend visualization and analytics regarding computer and network security threats; artificial-intelligence based network security software that detects and prioritizes mal-intent and behavioral threats from internal and external sources and performs autonomous incident triage; Computer software for use in protecting and managing enterprise security; computer software for digital security; computer software and software platform for monitoring enterprise networks and computer systems to protect against malicious attacks; computer software for monitoring data and communications for security purposes; computer software for protecting private information on enterprise networks; computer software for implementing computer, software and network security measures; computer software for monitoring and detecting security breaches; computer software that provides intrusion alert, threat protection and other security functions; anti-malware software applications; computer software for providing network, Internet, and computer security; computer software for scanning, detecting, remediating and removing viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware; Internet security software, including computer software for use in the monitoring and control of computer and online activity; computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer software providing secure networks; computer software for security analytics; computer software for network traffic analysis; computer software for network detection and response; computer software for threat investigations and incident response; computer software for threat hunting |
GS0091 | network security appliance comprised of computer hardware and artificial intelligence-based downloadable software for identifying, analyzing, visualizing, tracking, and collecting information on network security incidents and network traffic, and providing customized cyber security, governance, risk and compliance response options; network security appliance comprised of computer hardware and downloadable software featuring dashboard software for searching, mapping and graphing network devices and security threats, producing security incident reports, monitoring, tracking and managing computer and network security and providing trend visualization and analytics regarding computer and network security threats; downloadable, artificial-intelligence based network security software that detects and prioritizes mal-intent and behavioral threats from internal and external sources and performs autonomous incident triage; downloadable computer software for use in protecting and managing enterprise security; downloadable computer software for digital security, namely, for detecting and removing network vulnerabilities and for protecting private information on enterprise networks; downloadable computer software and downloadable software platform, all for monitoring enterprise networks and computer systems to protect against malicious attacks; downloadable computer software for monitoring data and communications for security purposes; downloadable computer software for protecting private information on enterprise networks; downloadable computer software for implementing computer, software and network security measures; downloadable computer software for monitoring and detecting security breaches; downloadable computer software that provides intrusion alert, threat protection and other security functions, all for detecting and removing network vulnerabilities and for protecting private information on enterprise networks; downloadable anti-malware software applications; downloadable computer software for providing network, Internet, and computer security, namely, for detecting and removing network vulnerabilities and for protecting private information on enterprise networks; downloadable computer software for scanning, detecting, remediating and removing viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware; downloadable Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; downloadable computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; downloadable computer software for providing access to secure networks; downloadable computer software for enterprise network security analytics; downloadable computer software for network traffic analysis; downloadable computer software for network detection and response, namely, for detecting and removing network vulnerabilities for computer security and for protecting private information on enterprise networks; downloadable computer software for threat investigations and incident response, namely, for detecting and removing network vulnerabilities for computer security and for protecting private information on enterprise networks; downloadable computer software for threat hunting, namely, for searching through computer networks to detect and isolate network security threats |
Description | Date | Proceeding Number |
---|---|---|
TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED | 2020-06-17 | |
TEAS CHANGE OF CORRESPONDENCE RECEIVED | 2020-06-17 | |
ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED | 2020-06-17 | |
SUSPENSION LETTER WRITTEN | 2019-12-12 | 93419 |
NOTIFICATION OF LETTER OF SUSPENSION E-MAILED | 2019-12-12 | 6332 |
LETTER OF SUSPENSION E-MAILED | 2019-12-12 | 6332 |
TEAS/EMAIL CORRESPONDENCE ENTERED | 2019-11-05 | 88889 |
TEAS RESPONSE TO OFFICE ACTION RECEIVED | 2019-11-04 | |
CORRESPONDENCE RECEIVED IN LAW OFFICE | 2019-11-04 | 88889 |
NOTIFICATION OF NON-FINAL ACTION E-MAILED | 2019-06-04 | 6325 |
NON-FINAL ACTION WRITTEN | 2019-06-04 | 93419 |
NON-FINAL ACTION E-MAILED | 2019-06-04 | 6325 |
ASSIGNED TO EXAMINER | 2019-05-30 | 93419 |
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM | 2019-04-08 | |
NEW APPLICATION ENTERED IN TRAM | 2019-03-23 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.