Trademark/Service Mark Application, Principal Register
Under the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless it displays a valid OMB control number.
PTO Form 1478 (Rev 09/2006)
OMB No. 0651-0009 (Exp 02/28/2021)
Trademark/Service Mark Application, Principal Register
*DESCRIPTION OF THE MARK
(and Color Location, if applicable)
The mark consists of the letter k with a directional symbol.
PIXEL COUNT ACCEPTABLE
YES
PIXEL COUNT
798 x 574
REGISTER
Principal
APPLICANT INFORMATION
*OWNER OF MARK
K FIVE FOUR
*STREET
1400 Crystal Drive, Suite 400
*CITY
Arlington
*STATE
(Required for U.S. applicants)
Virginia
*COUNTRY
United States
*ZIP/POSTAL CODE
(Required for U.S. and certain international addresses)
22202
LEGAL ENTITY INFORMATION
TYPE
limited liability company
STATE/COUNTRY WHERE LEGALLY ORGANIZED
Delaware
GOODS AND/OR SERVICES AND BASIS INFORMATION
INTERNATIONAL CLASS
009
*IDENTIFICATION
Downloadable computer software used to detect, monitor, simulate, analyze, evaluate, report, mitigate, and protect computer data and
information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events;
downloadable computer software used to assess vulnerabilities by integrating and summarizing data relating to computer data and information, networks, servers, applications, desktops and other
information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; scientific apparatus used to detect, monitor, simulate, analyze,
evaluate, report, mitigate, and protect computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion,
unauthorized activity, misuse and other anomalous events; scientific apparatus used to assess vulnerabilities by integrating and summarizing data relating to computer data and information, networks,
servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; downloadable electronic
publications, namely, instruction manuals pertaining to computer security, intrusion, vulnerability, and forensics, application delivery, and data protection
FILING BASIS
SECTION 1(b)
INTERNATIONAL CLASS
016
*IDENTIFICATION
Printed manuals, slide decks, and instruction sets in the field of computer security, intrusion, vulnerability, forensics, application
delivery, and data protection
FILING BASIS
SECTION 1(b)
INTERNATIONAL CLASS
041
*IDENTIFICATION
Educational services, namely, providing in-person and online seminars and training in the field of computer security, intrusion,
vulnerability, forensics, application delivery, and data protection
FILING BASIS
SECTION 1(b)
INTERNATIONAL CLASS
042
*IDENTIFICATION
Research, development and engineering, installation, simulation, validation, maintenance and repair of computer software; research,
development and engineering of computer network protection, security software, simulation, validation and reporting; consultation in the field of computer software and computer networks and other
information technology infrastructure; consultation in the field of assessment, detection, protection and security of computer data and information, networks, servers, applications, desktops and
other information technology infrastructure against attack, intrusion, unauthorized activity, misuse and other anomalous events; technical support services, namely, troubleshooting of computer
security network and other information technology infrastructure problems; analysis, evaluation, identification, reporting, and testing of computer networks, servers, applications, desktops and other
information technology infrastructure for attack, intrusion, unauthorized activity, misuse and other anomalous events; remote monitoring, detection and protection of computer data and information,
networks, servers, applications, desktops and other information technology infrastructure for attack, intrusion and misuse and other anomalous events, including deployment of countermeasures in
response to detection of unauthorized access or use of computer data and information, networks, servers, applications, desktops and other information technology infrastructure; assessment of
vulnerabilities of computer data and information, networks, servers, applications, desktops and other information technology infrastructure to attacks, intrusion, unauthorized activity, misuse and
other anomalous events; providing information in the form of early warnings, advisory alerts, notifications, and reports of attacks, security events, unauthorized activity, misuse and other anomalous
events, exploits and vulnerabilities for computer data and information, networks, servers, applications, desktops and other information technology infrastructure; conducting research in the field of
assessment, detection, protection and security of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against attack, intrusion,
unauthorized activity, misuse and other anomalous events; Computer security monitoring, simulation, validation, and reporting of computer network security and information risks; providing computer
security monitoring, simulation, and validation of information in the field of vulnerability assessment and protection of computer data and information, networks, servers, applications, desktops and
other information technology infrastructure against vulnerabilities, attack, intrusion, unauthorized activity, misuse and other anomalous events
Under the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless it displays a valid OMB control number.
PTO Form 1478 (Rev 09/2006)
OMB No. 0651-0009 (Exp 02/28/2021)
Trademark/Service Mark Application, Principal Register
The literal element of the mark consists of k.
The applicant is not claiming color as a feature of the mark. The mark consists of the letter k with a directional symbol.
The applicant, K FIVE FOUR, a limited liability company legally organized under the laws of Delaware, having an address of
1400 Crystal Drive, Suite 400
Arlington, Virginia 22202
United States
requests registration of the trademark/service mark identified above in the United States Patent and Trademark Office on the Principal Register established by the Act of July 5, 1946 (15 U.S.C.
Section 1051 et seq.), as amended, for the following:
International Class 009: Downloadable computer software used to detect, monitor, simulate, analyze, evaluate, report, mitigate, and protect computer data
and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events;
downloadable computer software used to assess vulnerabilities by integrating and summarizing data relating to computer data and information, networks, servers, applications, desktops and other
information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; scientific apparatus used to detect, monitor, simulate, analyze,
evaluate, report, mitigate, and protect computer data and information, networks, servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion,
unauthorized activity, misuse and other anomalous events; scientific apparatus used to assess vulnerabilities by integrating and summarizing data relating to computer data and information, networks,
servers, applications, desktops and other information technology infrastructure against cyberattack, intrusion, unauthorized activity, misuse and other anomalous events; downloadable electronic
publications, namely, instruction manuals pertaining to computer security, intrusion, vulnerability, and forensics, application delivery, and data protection
Intent to Use: The applicant has a bona fide intention, and is entitled, to use the mark in commerce on or in connection with the identified goods/services.
International Class 016: Printed manuals, slide decks, and instruction sets in the field of computer security, intrusion, vulnerability, forensics,
application delivery, and data protection
Intent to Use: The applicant has a bona fide intention, and is entitled, to use the mark in commerce on or in connection with the identified goods/services.
International Class 041: Educational services, namely, providing in-person and online seminars and training in the field of computer security, intrusion,
vulnerability, forensics, application delivery, and data protection
Intent to Use: The applicant has a bona fide intention, and is entitled, to use the mark in commerce on or in connection with the identified goods/services.
International Class 042: Research, development and engineering, installation, simulation, validation, maintenance and repair of computer software; research,
development and engineering of computer network protection, security software, simulation, validation and reporting; consultation in the field of computer software and computer networks and other
information technology infrastructure; consultation in the field of assessment, detection, protection and security of computer data and information, networks, servers, applications, desktops and
other information technology infrastructure against attack, intrusion, unauthorized activity, misuse and other anomalous events; technical support services, namely, troubleshooting of computer
security network and other information technology infrastructure problems; analysis, evaluation, identification, reporting, and testing of computer networks, servers, applications, desktops and other
information technology infrastructure for attack, intrusion, unauthorized activity, misuse and other anomalous events; remote monitoring, detection and protection of computer data and information,
networks, servers, applications, desktops and other information technology infrastructure for attack, intrusion and misuse and other anomalous events, including deployment of countermeasures in
response to detection of unauthorized access or use of computer data and information, networks, servers, applications, desktops and other information technology infrastructure; assessment of
vulnerabilities of computer data and information, networks, servers, applications, desktops and other information technology infrastructure to attacks, intrusion, unauthorized activity, misuse and
other anomalous events; providing information in the form of early warnings, advisory alerts, notifications, and reports of attacks, security events, unauthorized activity, misuse and other anomalous
events, exploits and vulnerabilities for computer data and information, networks, servers, applications, desktops and other information technology infrastructure; conducting research in the field of
assessment, detection, protection and security of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against attack, intrusion,
unauthorized activity, misuse and other anomalous events; Computer security monitoring, simulation, validation, and reporting of computer network security and information risks; providing computer
security monitoring, simulation, and validation of information in the field of vulnerability assessment and protection of computer data and information, networks, servers, applications, desktops and
other information technology infrastructure against vulnerabilities, attack, intrusion, unauthorized activity, misuse and other anomalous events
Intent to Use: The applicant has a bona fide intention, and is entitled, to use the mark in commerce on or in connection with the identified goods/services.
The applicant's current Attorney Information:
Melissa Cross of Fluet Huber + Hoang 1751 Pinnacle Drive, Suite 1000
Tysons, Virginia 22102
United States
703-590-1234 x215(phone)
703-590-0366(fax)
mcross@fhhfirm.com (authorized)
The applicant's current Correspondence Information:
Melissa Cross
Fluet Huber + Hoang
1751 Pinnacle Drive, Suite 1000
Tysons, Virginia 22102
703-590-1234 x215(phone)
703-590-0366(fax)
mcross@fhhfirm.com;fcharles@fhhfirm.com; jmkoromah@fhhfirm.com (authorized) E-mail Authorization: I authorize the USPTO to send e-mail correspondence concerning the application to the applicant, the applicant's attorney, or the applicant's domestic representative at
the e-mail address provided in this application. I understand that a valid e-mail address must be maintained and that the applicant or the applicant's attorney must file the relevant subsequent
application-related submissions via the Trademark Electronic Application System (TEAS). Failure to do so will result in the loss of TEAS Reduced Fee status and a requirement to submit an additional
processing fee of $125 per international class of goods/services.
A fee payment in the amount of $1100 has been submitted with the application, representing payment for 4 class(es).
Declaration
Declaration Signature
Signature: /Melissa Cross/ Date: 05/31/2019
Signatory's Name: Melissa Cross
Signatory's Position: Attorney of record, VA bar
Payment Sale Number: 88454644
Payment Accounting Date: 05/31/2019
Serial Number: 88454644
Internet Transmission Date: Fri May 31 13:47:36 EDT 2019
TEAS Stamp: USPTO/BAS-XXX.XX.XX.XXX-2019053113473670
4235-88454644-620ebf46db5aa6cc985c7b816b
793b45fc59c86b7dbad9df71ae23a39ae71ef-CC
-11113-20190531133356229924