Mark For: BLACKBERRY® trademark registration is intended to cover the categories of
Research | OneLook Acronym Finder |
Serial Number | 88530445 |
Registration Number | 6012323 |
Mark Literal Elements | BLACKBERRY |
Mark Drawing Type | 4 - STANDARD CHARACTER MARK |
Mark Type | SERVICE MARK |
Register | PRINCIPAL |
Current Location | PUBLICATION AND ISSUE SECTION 2019-11-28 |
Basis | 1(a) |
Class Status | ACTIVE |
Primary US Classes |
|
Primary International Class |
|
Filed Use | Yes |
Current Use | Yes |
Intent To Use | No |
Filed ITU | No |
44D Filed | No |
44E Current | No |
66A Current | No |
Current Basis | No |
No Basis | No |
Attorney Name | G. Roxanne Elings |
Law Office Assigned | L80 |
Employee Name | PETTICAN, NATHANIEL VI |
2013-06-00 | Date of First Use |
2013-06-01 | Date of First Use |
2013-06-01 | Date of Use In Commerce |
2019-07-23 | Application Filed |
2019-11-28 | Location: PUBLICATION AND ISSUE SECTION |
2019-12-31 | Published |
2019-12-31 | Published for Opposition |
2019-12-31 | Status: Application has been published for opposition. The opposition period begins on the date of publication. |
2019-12-31 | Status: Live/Pending |
2019-12-31 | Transaction Date |
2020-03-17 | Trademark Registered |
Party: | BLACKBERRY LIMITED |
Address | 2200 University Avenue East Waterloo, Ontario CANADA N2K0A7 |
Legal Entity Type | Corporation |
Legal Entity State | CANADA |
Drawing | JPEG | 2019-07-23 |
Specimen | JPEG | 2019-07-23 |
TEAS RF New Application | MULTI | 2019-07-23 |
XSearch Search Summary | XML | 2019-10-11 |
Preliminary Amendment | XML | 2019-10-16 |
Amendment and Mail Process Complete | MULTI | 2019-10-17 |
Offc Action Outgoing | XML | 2019-10-23 |
Examiners Amendment | XML | 2019-11-20 |
Notation to File | XML | 2019-11-20 |
Amendment and Mail Process Complete | MULTI | 2019-11-21 |
TRAM Snapshot of App at Pub for Oppostn | MULTI | 2019-11-28 |
Notice of Publication | XML | 2019-12-11 |
Notification Of Notice of Publication | XML | 2019-12-11 |
OG Publication Confirmation | XML | 2019-12-31 |
Registration Certificate | 2020-03-17 |
IC 042. US 100 101. G & S: Providing temporary use of non-downloadable computer software for measuring, assessing, identifying, detecting, analyzing, preventing, and responding to cybersecurity threats, attacks, risks, and vulnerabilities; providing temporary use of non-downloadable software for artificial intelligence, analytics-based machine learning, and deep learning software, all for the purpose of measuring, detecting, analyzing, preventing and responding to cybersecurity attacks; Design and development of crisis communication systems comprised of computer hardware and software; engineering and systems analysis in the field of crisis communication systems; computer services, namely, providing online system management services that allow users to remotely view, monitor, program, operate and control crisis communication systems; research in the field of crisis communication technology; testing of crisis communication systems comprised of computer software and hardware; cloud computing featuring software for providing crisis communication through multiple IP network channels and delivery services; computer services, namely, integration of private and public cloud computing environments for crisis communication; computer services, namely, cloud hosting provider services for crisis communication; computer services, namely, installation of computer software for private cloud computing for crisis communication; consulting services in the field of cloud computing for crisis communication; computer services, namely, creating an online community for registered users to participate in discussions, get feedback from their peers, form virtual communities, invite other organizations to the community and engage collaboration in the field of security and crisis communication and management; providing temporary use of online non-downloadable software featuring software for use in sending, receiving, confirming and responding to alerts, messages, and notifications in the field of crisis communication and management; providing temporary use of online non-downloadable software, namely, hosting software for use by others for use in sending, receiving, confirming and responding to alerts, messages, and notifications in the field of crisis communication and management; providing online non-downloadable computer software for the purposes of data collection, monitoring, and mass notification services for managing emergency and crisis situations and improving crisis communications capability; providing temporary use of on-line non-downloadable computer software for endpoint security, malware analysis, vulnerability testing, penetration testing, and vulnerability assessment; providing temporary use of online non-downloadable software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; providing temporary use of online non-downloadable software for predicting and monitoring security threats to computer networks; providing temporary use of online non-downloadable software for preventing unauthorized access to computers and computer networks; providing temporary use of online non-downloadable software for data analytics; Design, development and maintenance of online computer software systems and software for operation and control of autonomous-driving vehicles; providing temporary use of online non-downloadable software for operation and control of autonomous-driving vehicles; Providing temporary use of non-downloadable software applications and software development tools and platform as a services (PAAS) featuring computer software platforms that enable software developers to program and users to build and configure software applications that work in conjunction with such non-downloadable software applications and platforms to transfer, share, format, manipulate and integrate data, information and such developer software applications working in conjunction with and between such non-downloadable software applications and platforms and third party services; providing temporary use of online non-downloadable software featuring computer software in the field of electronic file security to allow users to encrypt, electronically watermark, provide restricted access to, and provide secure transmission and tracking of electronic documents and other electronic and digital files; platform as a services (PAAS) featuring computer software platforms for creating, managing, and deploying cloud computing infrastructure services; Design and development of on-line computer software systems, computer hardware and computer software; Technical support services, namely, installation, administration, and troubleshooting of web and database applications; providing machine-to-machine (M2M) and Internet of Things (IoT) communication integration services, namely, the integration of disparate computer systems, networks, hardware and software through the application of wireless communication, artificial intelligence, machine learning and/or deep learning technology to facilitate M2M and IoT communication via web based browsers, personal digital assistants, mobile phones, embedded microprocessors, sensors and other electronic devices; providing temporary use of online non-downloadable software applications, software developer kits (SDKs) and software development tools, and platform as a service (PAAS) featuring computer development platforms that enable software developers to design, test, deploy, manage, and monitor internet of things (IoT) and machine-to-machine (m2m) devices; computer software services, namely, development, maintenance, repair, installation, and troubleshooting of computer software problems, support in the nature of diagnosing computer software problems, upgrade and updating computer software, authoring computer software, provision of computer software information, and consultation, design and customization of computer software and middleware; computer security consultancy; technical consulting and assistance with computer-based information systems and components, namely, technical consulting services in the fields of Mobile Device Management (MDM), Mobile Applications Management (MAM), Mobile Security Management (MSM), Mobile Information Management (MIM), mobile Identity and Access Management (IAM), datacenter architecture, public and private cloud computing solutions, cybersecurity, and evaluation and implementation of internet technology and services; providing a secure website in the nature of a web hosting platform for, and providing temporary use of on-line non-downloadable software for allowing users and enterprise software applications to interface with remote devices and to allow connectivity, memory storage, device management, device monitoring, device tracking, and device auditing, all via a computer network; providing temporary use of online non-downloadable software featuring software for Enterprise Mobility Management (EMM), Unified Endpoint Management (UEM), Mobile Device Management (MDM), Mobile Applications Management (MAM), Mobile Security Management (MSM), Mobile Information Management (MIM), and mobile Identity and Access Management (IAM); providing temporary use of online non-downloadable software for the operation, management, security and maintenance of enterprise networks, data center management, resource management and performance optimization. FIRST USE: 20130600. FIRST USE IN COMMERCE: 20130600
International Codes: | 42 |
U.S. Codes: | 100,101 |
Type Code | Type |
---|---|
GS0421 | Providing temporary use of non-downloadable computer software for measuring, assessing, identifying, detecting, analyzing, preventing, and responding to cybersecurity threats, attacks, risks, and vulnerabilities; providing temporary use of non-downloadable software for artificial intelligence, analytics-based machine learning, and deep learning software, all for the purpose of measuring, detecting, analyzing, preventing and responding to cybersecurity attacks; Design and development of crisis communication systems comprised of computer hardware and software; engineering and systems analysis in the field of crisis communication systems; computer services, namely, providing online system management services that allow users to remotely view, monitor, program, operate and control crisis communication systems; research in the field of crisis communication technology; testing of crisis communication systems comprised of computer software and hardware; cloud computing featuring software for providing crisis communication through multiple IP network channels and delivery services; computer services, namely, integration of private and public cloud computing environments for crisis communication; computer services, namely, cloud hosting provider services for crisis communication; computer services, namely, installation of computer software for private cloud computing for crisis communication; consulting services in the field of cloud computing for crisis communication; computer services, namely, creating an online community for registered users to participate in discussions, get feedback from their peers, form virtual communities, invite other organizations to the community and engage collaboration in the field of security and crisis communication and management; providing temporary use of online non-downloadable software featuring software for use in sending, receiving, confirming and responding to alerts, messages, and notifications in the field of crisis communication and management; providing temporary use of online non-downloadable software, namely, hosting software for use by others for use in sending, receiving, confirming and responding to alerts, messages, and notifications in the field of crisis communication and management; providing online non-downloadable computer software for the purposes of data collection, monitoring, and mass notification services for managing emergency and crisis situations and improving crisis communications capability; providing temporary use of on-line non-downloadable computer software for endpoint security, malware analysis, vulnerability testing, penetration testing, and vulnerability assessment; providing temporary use of online non-downloadable software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; providing temporary use of online non-downloadable software for predicting and monitoring security threats to computer networks; providing temporary use of online non-downloadable software for preventing unauthorized access to computers and computer networks; providing temporary use of online non-downloadable software for data analytics; Design, development and maintenance of online computer software systems and software for operation and control of autonomous-driving vehicles; providing temporary use of online non-downloadable software for operation and control of autonomous-driving vehicles; Providing temporary use of non-downloadable software applications and software development tools and platform as a services (PAAS) featuring computer software platforms that enable software developers to program and users to build and configure software applications that work in conjunction with such non-downloadable software applications and platforms to transfer, share, format, manipulate and integrate data, information and such developer software applications working in conjunction with and between such non-downloadable software applications and platforms and third party services; providing temporary use of online non-downloadable software featuring computer software in the field of electronic file security to allow users to encrypt, electronically watermark, provide restricted access to, and provide secure transmission and tracking of electronic documents and other electronic and digital files; platform as a services (PAAS) featuring computer software platforms for creating, managing, and deploying cloud computing infrastructure services; Design and development of on-line computer software systems, computer hardware and computer software; Technical support services, namely, installation, administration, and troubleshooting of web and database applications; providing machine-to-machine (M2M) and Internet of Things (IoT) communication integration services, namely, the integration of disparate computer systems, networks, hardware and software through the application of wireless communication, artificial intelligence, machine learning and/or deep learning technology to facilitate M2M and IoT communication via web based browsers, personal digital assistants, mobile phones, embedded microprocessors, sensors and other electronic devices; providing temporary use of online non-downloadable software applications, software developer kits (SDKs) and software development tools, and platform as a service (PAAS) featuring computer development platforms that enable software developers to design, test, deploy, manage, and monitor internet of things (IoT) and machine-to-machine (m2m) devices; computer software services, namely, development, maintenance, repair, installation, and troubleshooting of computer software problems, support in the nature of diagnosing computer software problems, upgrade and updating computer software, authoring computer software, provision of computer software information, and consultation, design and customization of computer software and middleware; computer security consultancy; technical consulting and assistance with computer-based information systems and components, namely, technical consulting services in the fields of Mobile Device Management (MDM), Mobile Applications Management (MAM), Mobile Security Management (MSM), Mobile Information Management (MIM), mobile Identity and Access Management (IAM), datacenter architecture, public and private cloud computing solutions, cybersecurity, and evaluation and implementation of internet technology and services; providing a secure website in the nature of a web hosting platform for, and providing temporary use of on-line non-downloadable software for allowing users and enterprise software applications to interface with remote devices and to allow connectivity, memory storage, device management, device monitoring, device tracking, and device auditing, all via a computer network; providing temporary use of online non-downloadable software featuring software for Enterprise Mobility Management (EMM), Unified Endpoint Management (UEM), Mobile Device Management (MDM), Mobile Applications Management (MAM), Mobile Security Management (MSM), Mobile Information Management (MIM), and mobile Identity and Access Management (IAM); providing temporary use of online non-downloadable software for the operation, management, security and maintenance of enterprise networks, data center management, resource management and performance optimization |
GS0421 | Providing temporary use of non-downloadable computer software for measuring, assessing, identifying, detecting, analyzing, preventing, and responding to cybersecurity threats, attacks, risks, and vulnerabilities; providing temporary use of non-downloadable software for artificial intelligence, analytics-based machine learning, and deep learning software, all for the purpose of measuring, detecting, analyzing, preventing and responding to cybersecurity attacks; Design and development of crisis communication systems comprised of computer hardware and software; engineering and systems analysis in the field of crisis communication systems; computer services, namely, providing online system management services that allow users to remotely view, monitor, program, operate and control crisis communication systems; research in the field of crisis communication technology; testing of crisis communication systems comprised of computer software and hardware; cloud computing featuring software for providing crisis communication through multiple IP network channels and delivery services; computer services, namely, integration of private and public cloud computing environments for crisis communication; computer services, namely, cloud hosting provider services for crisis communication; computer services, namely, installation of computer software for private cloud computing for crisis communication; consulting services in the field of cloud computing for crisis communication; computer services, namely, creating an online community for registered users to participate in discussions, get feedback from their peers, form virtual communities, invite other organizations to the community and engage collaboration in the field of security and crisis communication and management; providing temporary use of online non-downloadable software featuring software for use in sending, receiving, confirming and responding to alerts, messages, and notifications in the field of crisis communication and management; providing temporary use of online non-downloadable software, namely, hosting software for use by others for use in sending, receiving, confirming and responding to alerts, messages, and notifications in the field of crisis communication and management; providing online non-downloadable computer software for the purposes of data collection, monitoring, and mass notification services for managing emergency and crisis situations and improving crisis communications capability; providing temporary use of on-line non-downloadable computer software for endpoint security, malware analysis, vulnerability testing, penetration testing, and vulnerability assessment; providing temporary use of online non-downloadable software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; providing temporary use of online non-downloadable software for predicting and monitoring security threats to computer networks; providing temporary use of online non-downloadable software for preventing unauthorized access to computers and computer networks; providing temporary use of online non-downloadable software for data analytics; Design, development and maintenance of online computer software systems and software for operation and control of autonomous-driving vehicles; providing temporary use of online non-downloadable software for operation and control of autonomous-driving vehicles; Providing temporary use of non-downloadable software applications and software development tools and platform as a services (PAAS) featuring computer software platforms that enable software developers to program and users to build and configure software applications that work in conjunction with such non-downloadable software applications and platforms to transfer, share, format, manipulate and integrate data, information and such developer software applications working in conjunction with and between such non-downloadable software applications and platforms and third party services; providing temporary use of online non-downloadable software featuring computer software in the field of electronic file security to allow users to encrypt, electronically watermark, provide restricted access to, and provide secure transmission and tracking of electronic documents and other electronic and digital files; platform as a services (PAAS) featuring computer software platforms for creating, managing, and deploying cloud computing infrastructure services; Design and development of on-line computer software systems, computer hardware and computer software; Technical support services, namely, installation, administration, and troubleshooting of web and database applications; providing machine-to-machine (M2M) and Internet of Things (IoT) communication integration services, namely, the integration of disparate computer systems, networks, hardware and software through the application of wireless communication, artificial intelligence, machine learning and/or deep learning technology to facilitate M2M and IoT communication via web based browsers, personal digital assistants, mobile phones, embedded microprocessors, sensors and other electronic devices; providing temporary use of online non-downloadable software applications, software developer kits (SDKs) and software development tools, and platform as a service (PAAS) featuring computer development platforms that enable software developers to design, test, deploy, manage, and monitor internet of things (IoT) and machine-to-machine (m2m) devices; computer software services, namely, development, maintenance, repair, installation, and troubleshooting of computer software problems, support in the nature of diagnosing computer software problems, upgrade and updating computer software, authoring computer software, provision of computer software information, and consultation, design and customization of computer software and middleware; computer security consultancy; technical consulting and assistance with computer-based information systems and components, namely, technical consulting services in the fields of Mobile Device Management (MDM), Mobile Applications Management (MAM), Mobile Security Management (MSM), Mobile Information Management (MIM), mobile Identity and Access Management (IAM), datacenter architecture, public and private cloud computing solutions, cybersecurity, and evaluation and implementation of internet technology and services; providing a secure website in the nature of a web hosting platform for, and providing temporary use of on-line non-downloadable software for allowing users and enterprise software applications to interface with remote devices and to allow connectivity, memory storage, device management, device monitoring, device tracking, and device auditing, all via a computer network; providing temporary use of online non-downloadable software featuring software for Enterprise Mobility Management (EMM), Unified Endpoint Management (UEM), Mobile Device Management (MDM), Mobile Applications Management (MAM), Mobile Security Management (MSM), Mobile Information Management (MIM), and mobile Identity and Access Management (IAM); providing temporary use of online non-downloadable software for the operation, management, security and maintenance of enterprise networks, data center management, resource management and performance optimization |
Description | Date | Proceeding Number |
---|---|---|
REGISTERED-PRINCIPAL REGISTER | 2020-03-17 | |
PUBLISHED FOR OPPOSITION | 2019-12-31 | |
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | 2019-12-31 | |
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | 2019-12-11 | |
APPROVED FOR PUB - PRINCIPAL REGISTER | 2019-11-27 | |
NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED | 2019-11-20 | 6328 |
EXAMINERS AMENDMENT E-MAILED | 2019-11-20 | 6328 |
EXAMINERS AMENDMENT -WRITTEN | 2019-11-20 | 94663 |
EXAMINER'S AMENDMENT ENTERED | 2019-11-20 | 88888 |
NOTIFICATION OF NON-FINAL ACTION E-MAILED | 2019-10-23 | 6325 |
NON-FINAL ACTION WRITTEN | 2019-10-23 | 94663 |
NON-FINAL ACTION E-MAILED | 2019-10-23 | 6325 |
TEAS VOLUNTARY AMENDMENT RECEIVED | 2019-10-16 | |
PRELIMINARY/VOLUNTARY AMENDMENT - ENTERED | 2019-10-16 | 88889 |
APPLICANT AMENDMENT PRIOR TO EXAMINATION - ENTERED | 2019-10-16 | 88889 |
ASSIGNED TO EXAMINER | 2019-10-11 | 94663 |
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM | 2019-07-31 | |
NEW APPLICATION ENTERED IN TRAM | 2019-07-26 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.