Amendment and Mail Process Complete

AWAKE

Awake Security, Inc.

Amendment and Mail Process Complete

Trademark Snap Shot Amendment & Mail Processing Stylesheet
(Table presents the data on Amendment & Mail Processing Complete)

OVERVIEW

SERIAL NUMBER 88349524 FILING DATE 03/20/2019
REG NUMBER 0000000 REG DATE N/A
REGISTER PRINCIPAL MARK TYPE TRADEMARK
INTL REG # N/A INTL REG DATE N/A
TM ATTORNEY SHERMAN, SAMANTHA LEIG
L.O. ASSIGNED N50-NOT FOUND

PUB INFORMATION

RUN DATE 11/06/2019
PUB DATE N/A
STATUS 661-RESPONSE AFTER NON-FINAL-ACTION-ENTERED
STATUS DATE 11/05/2019
LITERAL MARK ELEMENT AWAKE

DATE ABANDONED N/A DATE CANCELLED N/A
SECTION 2F NO SECTION 2F IN PART NO
SECTION 8 NO SECTION 8 IN PART NO
SECTION 15 NO REPUB 12C N/A
RENEWAL FILED NO RENEWAL DATE N/A
DATE AMEND REG N/A


FILING BASIS

FILED BASIS CURRENT BASIS AMENDED BASIS
1 (a) YES 1 (a) YES 1 (a) NO
1 (b) NO 1 (b) NO 1 (b) NO
44D NO 44D NO 44D NO
44E NO 44E NO 44E NO
66A NO 66A NO

NO BASIS NO NO BASIS NO


MARK DATA

STANDARD CHARACTER MARK YES
LITERAL MARK ELEMENT AWAKE
MARK DRAWING CODE 4-STANDARD CHARACTER MARK
COLOR DRAWING FLAG NO

CURRENT OWNER INFORMATION

PARTY TYPE 10-ORIGINAL APPLICANT
NAME Awake Security, Inc.
ADDRESS 150 Mathilda Pl Suite 104
Sunnyvale, CA 94041
ENTITY 03-CORPORATION
CITIZENSHIP Delaware

GOODS AND SERVICES

INTERNATIONAL CLASS 009
          DESCRIPTION TEXT network security appliance comprised of computer hardware and artificial intelligence-based software for identifying, analyzing, visualizing, tracking, and collecting information on network security incidents and network traffic, and providing customized cyber security, governance, risk and compliance response options; network security appliance comprised of computer hardware and software featuring dashboard software for searching, mapping and graphing network devices and security threats, producing security incident reports, monitoring, tracking and managing computer and network security and providing trend visualization and analytics regarding computer and network security threats; downloadable, artificial-intelligence based network security software that detects and prioritizes mal-intent and behavioral threats from internal and external sources and performs autonomous incident triage; downloadable computer software for use in protecting and managing enterprise security; downloadable computer software for digital security; downloadable computer software and downloadable software platform, all for monitoring enterprise networks and computer systems to protect against malicious attacks; downloadable computer software for monitoring data and communications for security purposes; downloadable computer software for protecting private information on enterprise networks; downloadable computer software for implementing computer, software and network security measures; downloadable computer software for monitoring and detecting security breaches; downloadable computer software that provides intrusion alert, threat protection and other security functions; downloadable anti-malware software applications; downloadable computer software for providing network, Internet, and computer security; downloadable computer software for scanning, detecting, remediating and removing viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware; downloadable Internet security software, including namely, computer software for use in the monitoring and control of computer and online activity; downloadable computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; downloadable computer software for providing secure networks; downloadable computer software for security analytics; downloadable computer software for network traffic analysis; downloadable computer software for network detection and response; downloadable computer software for threat investigations and incident response; downloadable computer software for threat hunting

GOODS AND SERVICES CLASSIFICATION

INTERNATIONAL CLASS 009 FIRST USE DATE 05/00/2017 FIRST USE IN COMMERCE DATE 05/00/2017 CLASS STATUS 6-ACTIVE

MISCELLANEOUS INFORMATION/STATEMENTS

CHANGE IN REGISTRATION NO

PROSECUTION HISTORY

DATE ENT CD ENT TYPE DESCRIPTION ENT NUM
11/05/2019 TEME I TEAS/EMAIL CORRESPONDENCE ENTERED 009
11/04/2019 CRFA I CORRESPONDENCE RECEIVED IN LAW OFFICE 008
11/04/2019 TROA I TEAS RESPONSE TO OFFICE ACTION RECEIVED 007
06/04/2019 GNRN O NOTIFICATION OF NON-FINAL ACTION E-MAILED 006
06/04/2019 GNRT F NON-FINAL ACTION E-MAILED 005
06/04/2019 CNRT R NON-FINAL ACTION WRITTEN 004
05/30/2019 DOCK D ASSIGNED TO EXAMINER 003
04/08/2019 NWOS I NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM 002
03/23/2019 NWAP I NEW APPLICATION ENTERED IN TRAM 001

CURRENT CORRESPONDENCE INFORMATION

ATTORNEY Ariana G. Hiscott
CORRESPONDENCE ADDRESS Ariana G. Hiscott
COOLEY LLP
1299 PENNSYLVANIA AVENUE NW, SUITE 700
WASHINGTON DC 20004
DOMESTIC REPRESENTATIVE NONE

Amendment and Mail Process Complete [image/jpeg]


uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed