AWAKE

Awake Security, Inc.

Application Filed: 2019-03-20
Trademark Application Details
Trademark Logo AWAKE

Mark For: AWAKE® trademark registration is intended to cover the categories of network security appliance comprised of computer hardware and artificial intelligence-based software for identifying, analyzing, visualizing, tracking, and collecting information on network security incidents and network traffic, and providing customized cyber security, governance, risk and compliance response options; network security appliance comprised of computer hardware and software featuring dashboard software for searching, mapping and graphing network devices and security threats, producing security incident reports, monitoring, tracking and managing computer and network security and providing trend visualization and analytics regarding computer and network security threats; downloadable, artificial-intelligence based network security software that detects and prioritizes mal-intent and behavioral threats from internal and external sources and performs autonomous incident triage; downloadable computer software for use in protecting and managing enterprise security; downloadable computer software for digital security; downloadable computer software and downloadable software platform, all for monitoring enterprise networks and computer systems to protect against malicious attacks; downloadable computer software for monitoring data and communications for security purposes; downloadable computer software for protecting private information on enterprise networks; downloadable computer software for implementing computer, software and network security measures; downloadable computer software for monitoring and detecting security breaches; downloadable computer software that provides intrusion alert, threat protection and other security functions; downloadable anti-malware software applications; downloadable computer software for providing network, Internet, and computer security; downloadable computer software for scanning, detecting, remediating and removing viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware; downloadable Internet security software, including namely, computer software for use in the monitoring and control of computer and online activity; downloadable computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; downloadable computer software for providing secure networks; downloadable computer software for security analytics; downloadable computer software for network traffic analysis; downloadable computer software for network detection and response; downloadable computer software for threat investigations and incident response; downloadable computer software for threat hunting. [all]

Status

2020-07-09 UTC
LIVE APPLICATION Under Examination
The trademark application has been accepted by the Office (has met the minimum filing requirements) and that this application has been assigned to an examiner.


Research OneLook Acronym Finder
Serial Number88349524
Registration Number6513750
Mark Literal ElementsAWAKE
Mark Drawing Type4 - STANDARD CHARACTER MARK
Mark TypeTRADEMARK
RegisterPRINCIPAL
Current LocationTMO LAW OFFICE 123 - EXAMINING ATTORNEY ASSIGNED 2019-12-12
Basis1(a)
Class StatusACTIVE
Primary US Classes
  • 021: Electrical Apparatus, Machines and Supplies
  • 023: Cutlery, Machinery, Tools and Parts Thereof
  • 026: Measuring and Scientific Appliances
  • 036: Musical Instruments and Supplies
  • 038: Prints and Publications
Primary International Class
  • 009 - Primary Class
  • (Electrical and scientific apparatus) Scientific, nautical, surveying, electric, photographic, cinematographic, optical, weighing, measuring, signaling, checking (supervision), lifesaving and teaching apparatus and instruments; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
Filed UseYes
Current UseYes
Intent To UseNo
Filed ITUNo
44D FiledNo
44E CurrentNo
66A CurrentNo
Current BasisNo
No BasisNo
Attorney NameAriana G. Hiscott
Attorney Docket Number334424-20000

Timeline

2017-05-00Date of First Use
2017-05-01Date of First Use
2017-05-01Date of Use In Commerce
2019-03-20Application Filed
2019-04-08Location: NEW APPLICATION PROCESSING
2019-04-08Status: Live/Pending
2019-04-08Transaction Date
2019-12-12Location: TMO LAW OFFICE 123 - EXAMINING ATTORNEY ASSIGNED
2019-12-12Status: An Office action suspending further action on the application has been sent (issued) to the applicant. To view all documents in
2021-10-12Trademark Registered

Trademark Parties (Applicants & Owners)

Party: Awake Security, Inc.
Address150 Mathilda Pl Suite 104 Sunnyvale, CALIFORNIA UNITED STATES 94041
Legal Entity TypeCorporation
Legal Entity StateDELAWARE

Documents

DrawingJPEG2019-03-20
SpecimenJPEG2019-03-20
TEAS RF New ApplicationMULTI2019-03-20
Offc Action OutgoingMULTI2019-06-04
XSearch Search SummaryXML2019-06-04
Response to Office ActionAPPLICATION/XML2019-11-04
Amendment and Mail Process CompleteMULTI2019-11-06
Suspension LetterXML2019-12-12
Change Address or Representation FormXML2020-06-17

Attorney of Record

ARIANA G. HISCOTT
COOLEY LLP
1299 PENNSYLVANIA AVENUE NW, SUITE 700
WASHINGTON, DC 20004

Good, Services, and Codes


IC 009. US 021 023 026 036 038. G & S: network security appliance comprised of computer hardware and artificial intelligence-based software for identifying, analyzing, visualizing, tracking, and collecting information on network security incidents and network traffic, and providing customized cyber security, governance, risk and compliance response options; network security appliance comprised of computer hardware and software featuring dashboard software for searching, mapping and graphing network devices and security threats, producing security incident reports, monitoring, tracking and managing computer and network security and providing trend visualization and analytics regarding computer and network security threats; downloadable, artificial-intelligence based network security software that detects and prioritizes mal-intent and behavioral threats from internal and external sources and performs autonomous incident triage; downloadable computer software for use in protecting and managing enterprise security; downloadable computer software for digital security; downloadable computer software and downloadable software platform, all for monitoring enterprise networks and computer systems to protect against malicious attacks; downloadable computer software for monitoring data and communications for security purposes; downloadable computer software for protecting private information on enterprise networks; downloadable computer software for implementing computer, software and network security measures; downloadable computer software for monitoring and detecting security breaches; downloadable computer software that provides intrusion alert, threat protection and other security functions; downloadable anti-malware software applications; downloadable computer software for providing network, Internet, and computer security; downloadable computer software for scanning, detecting, remediating and removing viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware; downloadable Internet security software, including namely, computer software for use in the monitoring and control of computer and online activity; downloadable computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; downloadable computer software for providing secure networks; downloadable computer software for security analytics; downloadable computer software for network traffic analysis; downloadable computer software for network detection and response; downloadable computer software for threat investigations and incident response; downloadable computer software for threat hunting. FIRST USE: 20170500. FIRST USE IN COMMERCE: 20170500

International Codes:9
U.S. Codes:021,023,026,036,038
Type CodeType
GS0091Network security appliance comprised of computer hardware and artificial intelligence-based software for identifying, analyzing, visualizing, tracking, and collecting information on network security incidents and network traffic, and providing customized cyber security, governance, risk and compliance response options; network security appliance comprised of computer hardware and software featuring dashboard software for searching, mapping and graphing network devices and security threats, producing security incident reports, monitoring, tracking and managing computer and network security and providing trend visualization and analytics regarding computer and network security threats; artificial-intelligence based network security software that detects and prioritizes mal-intent and behavioral threats from internal and external sources and performs autonomous incident triage; Computer software for use in protecting and managing enterprise security; computer software for digital security; computer software and software platform for monitoring enterprise networks and computer systems to protect against malicious attacks; computer software for monitoring data and communications for security purposes; computer software for protecting private information on enterprise networks; computer software for implementing computer, software and network security measures; computer software for monitoring and detecting security breaches; computer software that provides intrusion alert, threat protection and other security functions; anti-malware software applications; computer software for providing network, Internet, and computer security; computer software for scanning, detecting, remediating and removing viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware; Internet security software, including computer software for use in the monitoring and control of computer and online activity; computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer software providing secure networks; computer software for security analytics; computer software for network traffic analysis; computer software for network detection and response; computer software for threat investigations and incident response; computer software for threat hunting
GS0091network security appliance comprised of computer hardware and artificial intelligence-based downloadable software for identifying, analyzing, visualizing, tracking, and collecting information on network security incidents and network traffic, and providing customized cyber security, governance, risk and compliance response options; network security appliance comprised of computer hardware and downloadable software featuring dashboard software for searching, mapping and graphing network devices and security threats, producing security incident reports, monitoring, tracking and managing computer and network security and providing trend visualization and analytics regarding computer and network security threats; downloadable, artificial-intelligence based network security software that detects and prioritizes mal-intent and behavioral threats from internal and external sources and performs autonomous incident triage; downloadable computer software for use in protecting and managing enterprise security; downloadable computer software for digital security, namely, for detecting and removing network vulnerabilities and for protecting private information on enterprise networks; downloadable computer software and downloadable software platform, all for monitoring enterprise networks and computer systems to protect against malicious attacks; downloadable computer software for monitoring data and communications for security purposes; downloadable computer software for protecting private information on enterprise networks; downloadable computer software for implementing computer, software and network security measures; downloadable computer software for monitoring and detecting security breaches; downloadable computer software that provides intrusion alert, threat protection and other security functions, all for detecting and removing network vulnerabilities and for protecting private information on enterprise networks; downloadable anti-malware software applications; downloadable computer software for providing network, Internet, and computer security, namely, for detecting and removing network vulnerabilities and for protecting private information on enterprise networks; downloadable computer software for scanning, detecting, remediating and removing viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware; downloadable Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; downloadable computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; downloadable computer software for providing access to secure networks; downloadable computer software for enterprise network security analytics; downloadable computer software for network traffic analysis; downloadable computer software for network detection and response, namely, for detecting and removing network vulnerabilities for computer security and for protecting private information on enterprise networks; downloadable computer software for threat investigations and incident response, namely, for detecting and removing network vulnerabilities for computer security and for protecting private information on enterprise networks; downloadable computer software for threat hunting, namely, for searching through computer networks to detect and isolate network security threats

Trademark Filing History

DescriptionDateProceeding Number
TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED2020-06-17
TEAS CHANGE OF CORRESPONDENCE RECEIVED2020-06-17
ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED2020-06-17
SUSPENSION LETTER WRITTEN2019-12-1293419
NOTIFICATION OF LETTER OF SUSPENSION E-MAILED2019-12-126332
LETTER OF SUSPENSION E-MAILED2019-12-126332
TEAS/EMAIL CORRESPONDENCE ENTERED2019-11-0588889
TEAS RESPONSE TO OFFICE ACTION RECEIVED2019-11-04
CORRESPONDENCE RECEIVED IN LAW OFFICE2019-11-0488889
NOTIFICATION OF NON-FINAL ACTION E-MAILED2019-06-046325
NON-FINAL ACTION WRITTEN2019-06-0493419
NON-FINAL ACTION E-MAILED2019-06-046325
ASSIGNED TO EXAMINER2019-05-3093419
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM2019-04-08
NEW APPLICATION ENTERED IN TRAM2019-03-23

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed