K

K Five Four Llc

Application Filed: 2019-05-31
Trademark Application Details
Trademark Logo K

The mark consists of the letter "k" with a directional symbol.

Mark For: K® trademark registration is intended to cover the categories of downloadable computer software used to detect, monitor, simulate, analyze, evaluate, report, mitigate, and protect computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; downloadable computer software used to assess vulnerabilities by integrating and summarizing data relating to computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; scientific apparatus used to detect, monitor, simulate, analyze, evaluate, report, mitigate, and protect computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; scientific apparatus used to assess vulnerabilities by integrating and summarizing data relating to computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; downloadable electronic publications, namely, instruction manuals pertaining to computer security, intrusion, vulnerability, and forensics, application delivery, and data protection. [all]

>Color is not claimed as a feature of the mark. The mark consists of the letter "k" with a directional symbol.

Status

2020-04-21 UTC
LIVE APPLICATION Published for Opposition
A pending trademark application has been examined by the Office and has been published in a way that provides an opportunity for the public to oppose its registration.


Research OneLook Acronym Finder
Serial Number88454644
Registration Number6335725
Mark Literal ElementsK
Mark Drawing Type3 - AN ILLUSTRATION DRAWING WHICH INCLUDES WORD(S)/ LETTER(S)/NUMBER(S)
Mark TypeTRADEMARK. SERVICE MARK
Standard Character ClaimNo
RegisterPRINCIPAL
Current LocationINTENT TO USE SECTION 2019-11-05
Basis1(b)
Class StatusACTIVE
Primary US Classes
  • 021: Electrical Apparatus, Machines and Supplies
  • 023: Cutlery, Machinery, Tools and Parts Thereof
  • 026: Measuring and Scientific Appliances
  • 036: Musical Instruments and Supplies
  • 038: Prints and Publications
Primary International Class
  • 009 - Primary Class
  • (Electrical and scientific apparatus) Scientific, nautical, surveying, electric, photographic, cinematographic, optical, weighing, measuring, signaling, checking (supervision), lifesaving and teaching apparatus and instruments; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
Filed UseNo
Current UseNo
Intent To UseYes
Filed ITUYes
44D FiledNo
44E CurrentNo
66A CurrentNo
Current BasisNo
No BasisNo
Attorney NameMelissa Cross
Law Office AssignedL30
Employee NameLAW, CHRISTOPHER M

Timeline

2019-05-31Application Filed
2019-09-10Published
2019-09-10Published for Opposition
2019-11-05Location: INTENT TO USE SECTION
2019-11-05Status: Live/Pending
2019-11-05Status: Notice of Allowance (NOA) sent (issued) to the applicant. Applicant must file a Statement of Use or Extension Request within six
2019-11-05Transaction Date
2021-04-27Trademark Registered

Trademark Parties (Applicants & Owners)

Party: K FIVE FOUR LLC
Address1400 Crystal Drive, Suite 400 Arlington, VIRGINIA UNITED STATES 22202
Legal Entity TypeLimited Liability Company
Legal Entity StateDELAWARE

Design Search Codes

241504Arrowheads

Attorney of Record

Melissa Cross
FLUET HUBER + HOANG
1751 PINNACLE DRIVE, SUITE 1000
TYSONS, VA 22102

Good, Services, and Codes


IC 009. US 021 023 026 036 038. G & S: Downloadable computer software used to detect, monitor, simulate, analyze, evaluate, report, mitigate, and protect computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; downloadable computer software used to assess vulnerabilities by integrating and summarizing data relating to computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; scientific apparatus used to detect, monitor, simulate, analyze, evaluate, report, mitigate, and protect computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; scientific apparatus used to assess vulnerabilities by integrating and summarizing data relating to computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; downloadable electronic publications, namely, instruction manuals pertaining to computer security, intrusion, vulnerability, and forensics, application delivery, and data protection
IC 016. US 002 005 022 023 029 037 038 050. G & S: Printed manuals, slide decks, and instruction sets in the field of computer security, intrusion, vulnerability, forensics, application delivery, and data protection
IC 041. US 100 101 107. G & S: Educational services, namely, providing in-person and online seminars and training in the field of computer security, intrusion, vulnerability, forensics, application delivery, and data protection
IC 042. US 100 101. G & S: Research, development and engineering, installation, simulation, validation, maintenance and repair of computer software; research, development and engineering of computer network protection, security software, simulation, validation and reporting; consultation in the field of computer software and computer networks and other information technology infrastructure; consultation in the field of assessment, detection, protection and security of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against attack, intrusion, unauthorized activity, misuse and other anomalous events; technical support services, namely, troubleshooting of computer security network and other information technology infrastructure problems; analysis, evaluation, identification, reporting, and testing of computer networks, servers, applications, desktops and other information technology infrastructure for attack, intrusion, unauthorized activity, misuse and other anomalous events; remote monitoring, detection and protection of computer data and information, networks, servers, applications, desktops and other information technology infrastructure for attack, intrusion and misuse and other anomalous events, including deployment of countermeasures in response to detection of unauthorized access or use of computer data and information, networks, servers, applications, desktops and other information technology infrastructure; assessment of vulnerabilities of computer data and information, networks, servers, applications, desktops and other information technology infrastructure to attacks, intrusion, unauthorized activity, misuse and other anomalous events; providing information in the form of early warnings, advisory alerts, notifications, and reports of attacks, security events, unauthorized activity, misuse and other anomalous events, exploits and vulnerabilities for computer data and information, networks, servers, applications, desktops and other information technology infrastructure; conducting research in the field of assessment, detection, protection and security of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against attack, intrusion, unauthorized activity, misuse and other anomalous events; Computer security monitoring, simulation, validation, and reporting of computer network security and information risks; providing computer security monitoring, simulation, and validation of information in the field of vulnerability assessment and protection of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against vulnerabilities, attack, intrusion, unauthorized activity, misuse and other anomalous events

International Codes:9
U.S. Codes:021,023,026,036,038
International Codes:16
U.S. Codes:002,005,022,023,029,037,038,050
International Codes:41
U.S. Codes:100,101,107
International Codes:42
U.S. Codes:100,101
Type CodeType
CC0000Color is not claimed as a feature of the mark.
CC0000Color is not claimed as a feature of the mark.

Trademark Filing History

DescriptionDateProceeding Number
TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED2020-02-14
ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED2020-02-14
NOA E-MAILED - SOU REQUIRED FROM APPLICANT2019-11-05
CHANGES/CORRECTIONS AFTER PUB APPROVAL ENTERED2019-10-0967832
ASSIGNED TO PETITION STAFF2019-10-0867832
PUBLISHED FOR OPPOSITION2019-09-10
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED2019-09-10
TEAS POST PUBLICATION AMENDMENT RECEIVED2019-09-081111
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED2019-08-21
ASSIGNED TO EXAMINER2019-07-3078475
APPROVED FOR PUB - PRINCIPAL REGISTER2019-07-30
NOTICE OF DESIGN SEARCH CODE E-MAILED2019-06-18
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM2019-06-15
NEW APPLICATION ENTERED IN TRAM2019-06-04

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed