Mark For: PROVING GROUND™ trademark registration is intended to cover the categories of
Research |
![]() ![]() ![]() ![]() ![]() |
Serial Number | 88407049 |
Mark Literal Elements | PROVING GROUND |
Mark Drawing Type | 4 - STANDARD CHARACTER MARK |
Mark Type | SERVICE MARK |
Register | PRINCIPAL |
Current Location | INTENT TO USE SECTION 2019-10-15 |
Basis | 1(b) |
Class Status | ACTIVE |
Primary US Classes |
|
Primary International Class |
|
Filed Use | No |
Current Use | No |
Intent To Use | Yes |
Filed ITU | Yes |
44D Filed | No |
44E Current | No |
66A Current | No |
Current Basis | No |
No Basis | No |
Attorney Name | Charles L. Riddle |
Attorney Docket Number | R-11061 |
Law Office Assigned | N40 |
Employee Name | SALCIDO, JOHN CHARLES |
2019-04-29 | Application Filed |
2019-08-20 | Published |
2019-08-20 | Published for Opposition |
2019-10-15 | Location: INTENT TO USE SECTION |
2019-10-15 | Status: Live/Pending |
2019-10-15 | Status: Notice of Allowance (NOA) sent (issued) to the applicant. Applicant must file a Statement of Use or Extension Request within six |
2019-10-15 | Transaction Date |
Party: | ![]() |
Address | 26 Main Street Gibraltar GIBRALTAR GX111AAUK |
Legal Entity Type | Limited Liability Company |
Legal Entity State | GIBRALTAR |
![]() | JPEG | 2019-04-29 |
![]() | MULTI | 2019-04-29 |
![]() | 2019-07-11 | |
![]() | MULTI | 2019-07-12 |
![]() | XML | 2019-07-31 |
![]() | XML | 2019-07-31 |
![]() | APPLICATION/XML | 2019-08-20 |
![]() | APPLICATION/XML | 2019-10-15 |
IC 038. US 100 101 104. G & S: Providing access to a private virtual computer network for use in cybersecurity, penetration testing, and computer forensics education and exploration; Providing access to a private virtual network for the performance of exercises in the field of cybersecurity, penetration testing and computer forensics; Providing access to a private, virtualized computer network environment for use with cybersecurity, penetration testing, and computer forensics exercises, tools and targets; Providing access to physical, virtual, and cloud computing resources, hosted operating systems and computer applications through computer networks, intranets and the Internet; providing access to virtual computing environments consisting of virtualized computer hardware, computer software, Internet connectivity, computer and network security, and data storage facilities through computer networks, intranets and the Internet; Providing access to a private virtual computer network for use in cybersecurity education and exploration; Providing access to a private virtual network for the performance of exercises in the field of cybersecurity; Providing access to a private, virtualized computer network environment for use with cybersecurity exercises, tools and targets
International Codes: | 38 |
U.S. Codes: | 100,101,104 |
Type Code | Type |
---|---|
GS0381 | Providing access to a private virtual computer network for use in cybersecurity, penetration testing, and computer forensics education and exploration; Providing access to a private virtual network for the performance of exercises in the field of cybersecurity, penetration testing and computer forensics; Providing access to a private, virtualized computer network environment for use with cybersecurity, penetration testing, and computer forensics exercises, tools and targets; Providing access to physical, virtual, and cloud computing resources, hosted operating systems and computer applications through computer networks, intranets and the Internet; providing access to virtual computing environments consisting of virtualized computer hardware, computer software, Internet connectivity, computer and network security, and data storage facilities through computer networks, intranets and the Internet; Providing access to a private virtual computer network for use in cybersecurity education and exploration; Providing access to a private virtual network for the performance of exercises in the field of cybersecurity; Providing access to a private, virtualized computer network environment for use with cybersecurity exercises, tools and targets |
Description | Date | Proceeding Number |
---|---|---|
NOA E-MAILED - SOU REQUIRED FROM APPLICANT | 2019-10-15 | |
PUBLISHED FOR OPPOSITION | 2019-08-20 | |
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | 2019-08-20 | |
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | 2019-07-31 | |
APPROVED FOR PUB - PRINCIPAL REGISTER | 2019-07-11 | |
ASSIGNED TO EXAMINER | 2019-07-10 | 93059 |
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM | 2019-05-20 | |
NEW APPLICATION ENTERED IN TRAM | 2019-05-02 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.