TEAS RF New Application

K

K FIVE FOUR LLC

Trademark/Service Mark Application, Principal Register

Under the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless it displays a valid OMB control number.
PTO Form 1478 (Rev 09/2006)
OMB No. 0651-0009 (Exp 02/28/2021)

Trademark/Service Mark Application, Principal Register

Serial Number: 88454644
Filing Date: 05/31/2019

The table below presents the data as entered.

Input Field
Entered
SERIAL NUMBER 88454644
MARK INFORMATION
*MARK \\TICRS\EXPORT17\IMAGEOUT 17\884\546\88454644\xml1\ RFA0002.JPG
SPECIAL FORM YES
USPTO-GENERATED IMAGE NO
LITERAL ELEMENT k
COLOR MARK NO
*DESCRIPTION OF THE MARK
(and Color Location, if applicable)
The mark consists of the letter k with a directional symbol.
PIXEL COUNT ACCEPTABLE YES
PIXEL COUNT 798 x 574
REGISTER Principal
APPLICANT INFORMATION
*OWNER OF MARK K FIVE FOUR
*STREET 1400 Crystal Drive, Suite 400
*CITY Arlington
*STATE
(Required for U.S. applicants)
Virginia
*COUNTRY United States
*ZIP/POSTAL CODE
(Required for U.S. and certain international addresses)
22202
LEGAL ENTITY INFORMATION
TYPE limited liability company
STATE/COUNTRY WHERE LEGALLY ORGANIZED Delaware
GOODS AND/OR SERVICES AND BASIS INFORMATION
INTERNATIONAL CLASS 009 
*IDENTIFICATION Downloadable computer software used to detect, monitor, simulate, analyze, evaluate, report, mitigate, and protect computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; downloadable computer software used to assess vulnerabilities by integrating and summarizing data relating to computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; scientific apparatus used to detect, monitor, simulate, analyze, evaluate, report, mitigate, and protect computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; scientific apparatus used to assess vulnerabilities by integrating and summarizing data relating to computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; downloadable electronic publications, namely, instruction manuals pertaining to computer security, intrusion, vulnerability, and forensics, application delivery, and data protection
FILING BASIS SECTION 1(b)
INTERNATIONAL CLASS 016 
*IDENTIFICATION Printed manuals, slide decks, and instruction sets in the field of computer security, intrusion, vulnerability, forensics, application delivery, and data protection
FILING BASIS SECTION 1(b)
INTERNATIONAL CLASS 041 
*IDENTIFICATION Educational services, namely, providing in-person and online seminars and training in the field of computer security, intrusion, vulnerability, forensics, application delivery, and data protection
FILING BASIS SECTION 1(b)
INTERNATIONAL CLASS 042 
*IDENTIFICATION Research, development and engineering, installation, simulation, validation, maintenance and repair of computer software; research, development and engineering of computer network protection, security software, simulation, validation and reporting; consultation in the field of computer software and computer networks and other information technology infrastructure; consultation in the field of assessment, detection, protection and security of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against attack, intrusion, unauthorized activity, misuse and other anomalous events; technical support services, namely, troubleshooting of computer security network and other information technology infrastructure problems; analysis, evaluation, identification, reporting, and testing of computer networks, servers, applications, desktops and other information technology infrastructure for attack, intrusion, unauthorized activity, misuse and other anomalous events; remote monitoring, detection and protection of computer data and information, networks, servers, applications, desktops and other information technology infrastructure for attack, intrusion and misuse and other anomalous events, including deployment of countermeasures in response to detection of unauthorized access or use of computer data and information, networks, servers, applications, desktops and other information technology infrastructure; assessment of vulnerabilities of computer data and information, networks, servers, applications, desktops and other information technology infrastructure to attacks, intrusion, unauthorized activity, misuse and other anomalous events; providing information in the form of early warnings, advisory alerts, notifications, and reports of attacks, security events, unauthorized activity, misuse and other anomalous events, exploits and vulnerabilities for computer data and information, networks, servers, applications, desktops and other information technology infrastructure; conducting research in the field of assessment, detection, protection and security of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against attack, intrusion, unauthorized activity, misuse and other anomalous events; Computer security monitoring, simulation, validation, and reporting of computer network security and information risks; providing computer security monitoring, simulation, and validation of information in the field of vulnerability assessment and protection of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against vulnerabilities, attack, intrusion, unauthorized activity, misuse and other anomalous events
FILING BASIS SECTION 1(b)
ATTORNEY INFORMATION
NAME Melissa Cross
FIRM NAME Fluet Huber + Hoang
STREET 1751 Pinnacle Drive, Suite 1000
CITY Tysons
STATE Virginia
COUNTRY United States
ZIP/POSTAL CODE 22102
PHONE 703-590-1234 x215
FAX 703-590-0366
EMAIL ADDRESS mcross@fhhfirm.com
AUTHORIZED TO COMMUNICATE VIA EMAIL Yes
CORRESPONDENCE INFORMATION
NAME Melissa Cross
FIRM NAME Fluet Huber + Hoang
STREET 1751 Pinnacle Drive, Suite 1000
CITY Tysons
STATE Virginia
COUNTRY United States
ZIP/POSTAL CODE 22102
PHONE 703-590-1234 x215
FAX 703-590-0366
*EMAIL ADDRESS mcross@fhhfirm.com; fcharles@fhhfirm.com; jmkoromah@fhhfirm.com
*AUTHORIZED TO COMMUNICATE VIA EMAIL Yes
FEE INFORMATION
APPLICATION FILING OPTION TEAS RF
NUMBER OF CLASSES 4
APPLICATION FOR REGISTRATION PER CLASS 275
*TOTAL FEE DUE 1100
*TOTAL FEE PAID 1100
SIGNATURE INFORMATION
SIGNATURE /Melissa Cross/
SIGNATORY'S NAME Melissa Cross
SIGNATORY'S POSITION Attorney of record, VA bar
SIGNATORY'S PHONE NUMBER 202-215-8789 x215
DATE SIGNED 05/31/2019



Under the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless it displays a valid OMB control number.
PTO Form 1478 (Rev 09/2006)
OMB No. 0651-0009 (Exp 02/28/2021)


Trademark/Service Mark Application, Principal Register

Serial Number: 88454644
Filing Date: 05/31/2019

To the Commissioner for Trademarks:

MARK: k (stylized and/or with design, see mark)

The literal element of the mark consists of k.
The applicant is not claiming color as a feature of the mark. The mark consists of the letter k with a directional symbol.
The applicant, K FIVE FOUR, a limited liability company legally organized under the laws of Delaware, having an address of
      1400 Crystal Drive, Suite 400
      Arlington, Virginia 22202
      United States

requests registration of the trademark/service mark identified above in the United States Patent and Trademark Office on the Principal Register established by the Act of July 5, 1946 (15 U.S.C. Section 1051 et seq.), as amended, for the following:

       International Class 009:  Downloadable computer software used to detect, monitor, simulate, analyze, evaluate, report, mitigate, and protect computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; downloadable computer software used to assess vulnerabilities by integrating and summarizing data relating to computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; scientific apparatus used to detect, monitor, simulate, analyze, evaluate, report, mitigate, and protect computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; scientific apparatus used to assess vulnerabilities by integrating and summarizing data relating to computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; downloadable electronic publications, namely, instruction manuals pertaining to computer security, intrusion, vulnerability, and forensics, application delivery, and data protection
Intent to Use: The applicant has a bona fide intention, and is entitled, to use the mark in commerce on or in connection with the identified goods/services.

       International Class 016:  Printed manuals, slide decks, and instruction sets in the field of computer security, intrusion, vulnerability, forensics, application delivery, and data protection
Intent to Use: The applicant has a bona fide intention, and is entitled, to use the mark in commerce on or in connection with the identified goods/services.

       International Class 041:  Educational services, namely, providing in-person and online seminars and training in the field of computer security, intrusion, vulnerability, forensics, application delivery, and data protection
Intent to Use: The applicant has a bona fide intention, and is entitled, to use the mark in commerce on or in connection with the identified goods/services.

       International Class 042:  Research, development and engineering, installation, simulation, validation, maintenance and repair of computer software; research, development and engineering of computer network protection, security software, simulation, validation and reporting; consultation in the field of computer software and computer networks and other information technology infrastructure; consultation in the field of assessment, detection, protection and security of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against attack, intrusion, unauthorized activity, misuse and other anomalous events; technical support services, namely, troubleshooting of computer security network and other information technology infrastructure problems; analysis, evaluation, identification, reporting, and testing of computer networks, servers, applications, desktops and other information technology infrastructure for attack, intrusion, unauthorized activity, misuse and other anomalous events; remote monitoring, detection and protection of computer data and information, networks, servers, applications, desktops and other information technology infrastructure for attack, intrusion and misuse and other anomalous events, including deployment of countermeasures in response to detection of unauthorized access or use of computer data and information, networks, servers, applications, desktops and other information technology infrastructure; assessment of vulnerabilities of computer data and information, networks, servers, applications, desktops and other information technology infrastructure to attacks, intrusion, unauthorized activity, misuse and other anomalous events; providing information in the form of early warnings, advisory alerts, notifications, and reports of attacks, security events, unauthorized activity, misuse and other anomalous events, exploits and vulnerabilities for computer data and information, networks, servers, applications, desktops and other information technology infrastructure; conducting research in the field of assessment, detection, protection and security of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against attack, intrusion, unauthorized activity, misuse and other anomalous events; Computer security monitoring, simulation, validation, and reporting of computer network security and information risks; providing computer security monitoring, simulation, and validation of information in the field of vulnerability assessment and protection of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against vulnerabilities, attack, intrusion, unauthorized activity, misuse and other anomalous events
Intent to Use: The applicant has a bona fide intention, and is entitled, to use the mark in commerce on or in connection with the identified goods/services.



The applicant's current Attorney Information:
      Melissa Cross of Fluet Huber + Hoang      1751 Pinnacle Drive, Suite 1000
      Tysons, Virginia 22102
      United States
      703-590-1234 x215(phone)
      703-590-0366(fax)
      mcross@fhhfirm.com (authorized)


The applicant's current Correspondence Information:
      Melissa Cross
      Fluet Huber + Hoang
      1751 Pinnacle Drive, Suite 1000
      Tysons, Virginia 22102
      703-590-1234 x215(phone)
      703-590-0366(fax)
      mcross@fhhfirm.com;fcharles@fhhfirm.com; jmkoromah@fhhfirm.com (authorized)
E-mail Authorization: I authorize the USPTO to send e-mail correspondence concerning the application to the applicant, the applicant's attorney, or the applicant's domestic representative at the e-mail address provided in this application. I understand that a valid e-mail address must be maintained and that the applicant or the applicant's attorney must file the relevant subsequent application-related submissions via the Trademark Electronic Application System (TEAS). Failure to do so will result in the loss of TEAS Reduced Fee status and a requirement to submit an additional processing fee of $125 per international class of goods/services.

A fee payment in the amount of $1100 has been submitted with the application, representing payment for 4 class(es).

Declaration

Declaration Signature

Signature: /Melissa Cross/   Date: 05/31/2019
Signatory's Name: Melissa Cross
Signatory's Position: Attorney of record, VA bar
Payment Sale Number: 88454644
Payment Accounting Date: 05/31/2019

Serial Number: 88454644
Internet Transmission Date: Fri May 31 13:47:36 EDT 2019
TEAS Stamp: USPTO/BAS-XXX.XX.XX.XXX-2019053113473670
4235-88454644-620ebf46db5aa6cc985c7b816b
793b45fc59c86b7dbad9df71ae23a39ae71ef-CC
-11113-20190531133356229924

TEAS RF New Application [image/jpeg]


uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed