ARIA

Csp, Inc.

Application Filed: 2019-12-16
Trademark Application Details
Trademark Logo ARIA

Mark For: ARIA™ trademark registration is intended to cover the categories of recorded or downloadable computer software for network threat/breach detection, situational awareness, creation of behavioral analytics, network traffic analytics, deep packet inspection, application awareness, network traffic inspection, threat detection analytics and report creation, threat intelligence generation, cyber intelligence, and flow monitoring; recorded or downloadable computer and network security software for identifying, managing and resolving cyber security incidents, data breaches and malware; recorded or downloadable software for monitoring and improving the security of, and detecting, reporting, analyzing and protecting against cyber-attacks and threats directed at computers, computer systems, networks, computer and network hardware, cloud infrastructure, software applications, digital devices, digital data, and mobile devices; recorded or downloadable computer software for key management, authentication, and data storage, security, and encryption; computer hardware, namely, network adapters, network interface cards, SmartNICs, security appliances and network servers. [all]

Status

2021-07-25 UTC
LIVE APPLICATION Under Examination
The trademark application has been accepted by the Office (has met the minimum filing requirements) and that this application has been assigned to an examiner.


Research OneLook Acronym Finder
Serial Number88728940
Mark Literal ElementsARIA
Mark Drawing Type4 - STANDARD CHARACTER MARK
Mark TypeTRADEMARK
RegisterPRINCIPAL
Current LocationTMO LAW OFFICE 125 - EXAMINING ATTORNEY ASSIGNED 2020-10-19
Basis1(a)
Class StatusACTIVE
Primary US Classes
  • 021: Electrical Apparatus, Machines and Supplies
  • 023: Cutlery, Machinery, Tools and Parts Thereof
  • 026: Measuring and Scientific Appliances
  • 036: Musical Instruments and Supplies
  • 038: Prints and Publications
Primary International Class
  • 009 - Primary Class
  • (Electrical and scientific apparatus) Scientific, nautical, surveying, electric, photographic, cinematographic, optical, weighing, measuring, signaling, checking (supervision), lifesaving and teaching apparatus and instruments; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
Filed UseYes
Current UseYes
Intent To UseNo
Filed ITUNo
44D FiledNo
44E CurrentNo
66A CurrentNo
Current BasisNo
No BasisNo
Attorney NameGary W. Smith
Attorney Docket Number318861.00012

Timeline

2017-11-09Date of First Use
2017-11-09Date of Use In Commerce
2019-12-16Application Filed
2019-12-16Published for Opposition
2019-12-16Trademark Registered
2019-12-19Location: NEW APPLICATION PROCESSING
2019-12-19Status: Live/Pending
2019-12-20Transaction Date
2020-10-19Location: TMO LAW OFFICE 125 - EXAMINING ATTORNEY ASSIGNED
2020-10-19Status: An Office action suspending further action on the application has been sent (issued) to the applicant. To view all documents in

Trademark Parties (Applicants & Owners)

Party: CSP, INC.
Address175 Cabot Street, Suite 210 Lowell, MASSACHUSETTS UNITED STATES 01854
Legal Entity TypeCorporation
Legal Entity StateMASSACHUSETTS

Documents

Attorney of Record

GARY W. SMITH
ARENT FOX LLP
800 BOYLSTON STREET, 32ND FLOOR
BOSTON, MA 02199

Good, Services, and Codes


IC 009. US 021 023 026 036 038. G & S: Computer software for network threat/breach detection, situational awareness, creation of behavioral analytics, network traffic analytics, deep packet inspection, application awareness, network traffic inspection, threat detection analytics and report creation, threat intelligence generation, cyber intelligence, and flow monitoring; computer and network security software for identifying, managing and resolving cyber security incidents, data breaches and malware; software for monitoring and improving the security of, and detecting, reporting, analyzing and protecting against cyber-attacks and threats directed at computers, computer systems, networks, computer and network hardware, cloud infrastructure, software applications, digital devices, digital data, and mobile devices; computer software for key management, authentication, and data storage, security, and encryption; computer hardware, namely, network adapters, network interface cards, SmartNICs, security appliances and network servers. FIRST USE: 20171109. FIRST USE IN COMMERCE: 20171109

International Codes:9
U.S. Codes:021,023,026,036,038
Type CodeType
GS0091Computer software for network threat/breach detection, situational awareness, creation of behavioral analytics, network traffic analytics, deep packet inspection, application awareness, network traffic inspection, threat detection analytics and report creation, threat intelligence generation, cyber intelligence, and flow monitoring; computer and network security software for identifying, managing and resolving cyber security incidents, data breaches and malware; software for monitoring and improving the security of, and detecting, reporting, analyzing and protecting against cyber-attacks and threats directed at computers, computer systems, networks, computer and network hardware, cloud infrastructure, software applications, digital devices, digital data, and mobile devices; computer software for key management, authentication, and data storage, security, and encryption; computer hardware, namely, network adapters, network interface cards, SmartNICs, security appliances and network servers
GS0091Recorded or downloadable computer software for network threat/breach detection, situational awareness, creation of behavioral analytics, network traffic analytics, deep packet inspection, application awareness, network traffic inspection, threat detection analytics and report creation, threat intelligence generation, cyber intelligence, and flow monitoring; recorded or downloadable computer and network security software for identifying, managing and resolving cyber security incidents, data breaches and malware; recorded or downloadable software for monitoring and improving the security of, and detecting, reporting, analyzing and protecting against cyber-attacks and threats directed at computers, computer systems, networks, computer and network hardware, cloud infrastructure, software applications, digital devices, digital data, and mobile devices; recorded or downloadable computer software for key management, authentication, and data storage, security, and encryption; computer hardware, namely, network adapters, network interface cards, SmartNICs, security appliances and network servers

Trademark Filing History

DescriptionDateProceeding Number
TEAS WITHDRAWAL OF ATTORNEY RECEIVED-FIRM RETAINS2021-05-12
TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED2021-05-12
TEAS CHANGE OF CORRESPONDENCE RECEIVED2021-05-12
ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED2021-05-12
SUSPENSION LETTER WRITTEN2020-10-1993646
NOTIFICATION OF LETTER OF SUSPENSION E-MAILED2020-10-196332
LETTER OF SUSPENSION E-MAILED2020-10-196332
TEAS/EMAIL CORRESPONDENCE ENTERED2020-09-2488889
TEAS RESPONSE TO OFFICE ACTION RECEIVED2020-09-23
CORRESPONDENCE RECEIVED IN LAW OFFICE2020-09-2388889
NOTIFICATION OF NON-FINAL ACTION E-MAILED2020-03-236325
NON-FINAL ACTION WRITTEN2020-03-2393646
NON-FINAL ACTION E-MAILED2020-03-236325
ASSIGNED TO EXAMINER2020-03-1593646
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM2019-12-19
NEW APPLICATION ENTERED IN TRAM2019-12-19

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed