To: | KAMIND IT, INC. (klr.docket@chernofflaw.com) |
Subject: | U.S. Trademark Application Serial No. 88742302 - ARMOR - 10158.0003 |
Sent: | March 20, 2020 09:39:20 AM |
Sent As: | ecom112@uspto.gov |
Attachments: | Attachment - 1 Attachment - 2 Attachment - 3 Attachment - 4 Attachment - 5 Attachment - 6 Attachment - 7 Attachment - 8 Attachment - 9 Attachment - 10 Attachment - 11 Attachment - 12 |
United States Patent and Trademark Office (USPTO)
Office Action (Official Letter) About Applicant’s Trademark Application
U.S. Application Serial No. 88742302
Mark: ARMOR
|
|
Correspondence Address: |
|
Applicant: KAMIND IT, INC.
|
|
Reference/Docket No. 10158.0003
Correspondence Email Address: |
|
NONFINAL OFFICE ACTION
The USPTO must receive applicant’s response to this letter within six months of the issue date below or the application will be abandoned. Respond using the Trademark Electronic Application System (TEAS). A link to the appropriate TEAS response form appears at the end of this Office action.
Issue date: March 20, 2020
OPEN APPLICATION ISSUES THAT MUST BE ADDRESSED IN RESPONSE TO OFFICE ACTION:
The following are the open application issues that the applicant must address in order to have a complete response to this Office action:
-Refusal to Register Under Trademark Act Section 2(d)
-Requirement for Clarification and Proper Classification of Identification Language
-Requirement for Submission of Filing Fees for Each Class Identified or Restriction of Identification Language
SEARCH and Potential Suspension –Earlier-Filed Pending Application
In response to this Office action, applicant may present arguments in support of registration by addressing the issue of the potential conflict between applicant’s mark and the mark in the referenced application. Applicant’s election not to submit arguments at this time in no way limits applicant’s right to address this issue later if a refusal under Section 2(d) issues. The applicant should note the following additional grounds for refusal.
REFUSAL to Register Under Trademark Act Section 2(d) –Likelihood of Confusion Exists
The mark for cited Registration Number 5031940 is SECURED BY ARMOR in standard characters for:
“Computer security consulting services, namely, consulting services intended to protect computer software and electronic data from computer viruses and cyber security threats; providing information and online information on protecting against computer viruses and cyber security threats being computer, server and data infrastructure equipment security; Internet hosting services, namely, secure hosting of digital content on the internet and secure website hosting; On-line computer security services, namely, providing security and anonymity for electronically transmitted protected health information, credit card and banking transactions; On-line computer security services, namely, identification of cyber threats through multi-source threat intelligence and analysis, development of mitigation strategies to minimize risk of computer system infection and data exfiltration, remote configuration of pre-integrated security tools to protect computer software and electronic data from viruses and cyber security threats, and infrastructure and security tool notification and configuration to return infrastructure to compliant state, all of the foregoing being for data, programming, equipment and software purposes; Technical support services, namely, remote and on-site infrastructure management services for monitoring, protecting, administration and management of public and private cloud computing IT and application system.”
The mark for cited Registration Number 5686232 is ARMOR COMPLETE in standard characters for:
“Providing information and online information in the fields of computer security, Internet security, data security, cybersecurity, information technology, computer systems, virtualization technologies, cloud computing and computing solutions and systems, datacenter architecture, and enterprise architecture; Computer security services, namely, providing security and anonymity for electronically transmitted protected health information, credit card and banking transactions; Computer security services, namely, identification of cyber threats through multi-source threat intelligence and analysis, development of mitigation strategies to minimize risk of computer system infection and data exfiltration, remote configuration of pre-integrated security tools to protect computer software and electronic data from viruses and cyber security threats, and infrastructure and security tool notification and configuration to return infrastructure to compliant state, all of the foregoing being for data, programming, equipment and software purposes; Secure hosting of digital content on the internet and secure website hosting; Technical support services, namely, remote and on-site infrastructure management services for monitoring, protecting, administration, and management of public and private cloud computing IT and application systems; Technical consulting, analysis, advisory, support, and managed security services in the fields of computer security, Internet security, data security, cybersecurity, information technology, computer systems, virtualization technologies, cloud computing and computing solutions and systems, datacenter architecture, and enterprise architecture; Managed security services and computer security services in the nature of detecting, testing, analyzing, and managing and implementing countermeasures and mitigation strategies and tools against data, computer network, and cyber breaches, threats, and invasions; Planning, designing, integration, configuration, implementation, and management of information technology (IT) systems, and virtualization, cloud-based, and cloud-computing systems and technologies; Software as a service (SAAS), platform as a service (PAAS), and infrastructure as a service (IAAS) featuring software platforms and technical support for the protection and defense against and response to data, computer network, and cyber breaches, threats, and invasions; Internet Protocol (IP) address verification services.”
The mark for cited Registration Number 5929934 is ARMOR in standard characters for:
“Providing information and online information in the fields of computer security, Internet security, data security, cybersecurity, information technology, computer systems, virtualization technologies, cloud computing and computing solutions and systems, datacenter architecture, and enterprise architecture; Computer security services, namely, providing security and anonymity for electronically transmitted protected health information, credit card and banking transactions; Computer security services, namely, identification of cyber threats through multi-source threat intelligence and analysis, development of mitigation strategies to minimize risk of computer system infection and data exfiltration, remote configuration of pre-integrated security tools to protect computer software and electronic data from viruses and cyber security threats, and infrastructure and security tool notification and configuration to return infrastructure to compliant state, all of the foregoing being for data, programming, equipment and software purposes; computer security services, namely, host-based intrusion detection services; Secure hosting of digital content on the internet and secure website hosting; Technical support services, namely, remote and on-site infrastructure management services for monitoring, protecting, administration, and management of public and private cloud computing IT and application systems; Technical consulting, analysis, advisory, support, and managed security services in the fields of computer security, Internet security, data security, cybersecurity, information technology, computer systems, virtualization technologies, cloud computing and computing solutions and systems, datacenter architecture, and enterprise architecture; Managed security services and computer security services in the nature of detecting, testing, analyzing, and managing and implementing countermeasures and mitigation strategies and tools against data, computer network, and cyber breaches, threats, and invasions; Planning, designing, integration, configuration, implementation, and management of information technology (IT) systems, and virtualization, cloud-based, and cloud-computing systems and technologies; Software as a service (SAAS), platform as a service (PAAS), and infrastructure as a service (IAAS) featuring software platforms and technical support for the protection and defense against and response to data, computer network, and cyber breaches, threats, and invasions; Internet Protocol (IP) address verification services; all of the foregoing for use in connection with IT systems.”
All of the cited registrations are owned by Armor Defense, Incorporated.
The mark sought in this application is ARMOR in standard characters for:
“information technology services, namely, technical support services consisting of troubleshooting of computer hardware and software problems, IT infrastructure consulting; design and development of computer hardware and software; computer programming services, maintenance and updating of computer software; computer consulting services; cloud computing services; managed computer and software services; software licensing services; security, cyber security and compliance services; identity information and device protection services; proactive attack prevention services and management.”
Although not all du Pont factors may be relevant, there are generally two key considerations in any likelihood of confusion analysis: (1) the similarities between the compared marks and (2) the relatedness of the compared goods and/or services. See In re i.am.symbolic, llc, 866 F.3d at 1322, 123 USPQ2d at 1747 (quoting Herbko Int’l, Inc. v. Kappa Books, Inc., 308 F.3d 1156, 1164-65, 64 USPQ2d 1375, 1380 (Fed. Cir. 2002)); Federated Foods, Inc. v. Fort Howard Paper Co.,544 F.2d 1098, 1103, 192 USPQ 24, 29 (C.C.P.A. 1976) (“The fundamental inquiry mandated by [Section] 2(d) goes to the cumulative effect of differences in the essential characteristics of the goods [or services] and differences in the marks.”); TMEP §1207.01.
COMPARISON OF THE MARKS
Registration Number 5929934 ARMOR
In the present case, applicant’s mark is ARMOR and registrant’s mark is ARMOR. These marks are identical in appearance, sound, and meaning, “and have the potential to be used . . . in exactly the same manner.” In re i.am.symbolic, llc, 116 USPQ2d 1406, 1411 (TTAB 2015), aff’d, 866 F.3d 1315, 123 USPQ2d 1744 (Fed. Cir. 2017). Additionally, because they are identical, these marks are likely to engender the same connotation and overall commercial impression when considered in connection with applicant’s and registrant’s respective services. Id.
Therefore, the marks are confusingly similar.
Registration Number 5031940 SECURED BY ARMOR
The dominant nature of the cited registered mark is the identical shared wording ARMOR. The registrant has stipulated as to the merely descriptive nature of the additional wording SECURED by disclaiming use of the term apart from its use in the mark as a whole. Although marks are compared in their entireties, one feature of a mark may be more significant or dominant in creating a commercial impression. See In re Viterra Inc., 671 F.3d 1358, 1362, 101 USPQ2d 1905, 1908 (Fed. Cir. 2012); In re Nat’l Data Corp., 753 F.2d 1056, 1058, 224 USPQ 749, 751 (Fed. Cir. 1985); TMEP §1207.01(b)(viii), (c)(ii). Disclaimed matter that is descriptive of or generic for a party’s services is typically less significant or less dominant when comparing marks. In re Detroit Athletic Co., 903 F.3d 1297, 1305, 128 USPQ2d 1047, 1050 (Fed. Cir. 2018) (citing In re Dixie Rests., Inc., 105 F.3d 1405, 1407, 41 USPQ2d 1531, 1533-34 (Fed. Cir. 1997)); TMEP §1207.01(b)(viii), (c)(ii).
Registration Number 5686232 ARMOR COMPLETE
The primary, prominent use of the shared identical wording ARMOR shows the dominant nature of the term as it is used in the marks at issue here. Consumers are generally more inclined to focus on the first word, prefix, or syllable in any trademark or service mark. See Palm Bay Imps., Inc. v. Veuve Clicquot Ponsardin Maison Fondee En 1772, 396 F.3d 1369, 1372, 73 USPQ2d 1689, 1692 (Fed. Cir. 2005) (finding similarity between VEUVE ROYALE and two VEUVE CLICQUOT marks in part because “VEUVE . . . remains a ‘prominent feature’ as the first word in the mark and the first word to appear on the label”); Century 21 Real Estate Corp. v. Century Life of Am., 970 F.2d 874, 876, 23 USPQ2d 1698, 1700 (Fed Cir. 1992) (finding similarity between CENTURY 21 and CENTURY LIFE OF AMERICA in part because “consumers must first notice th[e] identical lead word”); see also In re Detroit Athletic Co., 903 F.3d 1297, 1303, 128 USPQ2d 1047, 1049 (Fed. Cir. 2018) (finding “the identity of the marks’ two initial words is particularly significant because consumers typically notice those words first”).
In all of the marks at issue, the commercial meaning is identical or nearly identical, namely that the software security services provide shielding or a type of armor for consumers using the identified services.
In this case, applicant’s mark does not create a distinct commercial impression from the registered mark because it contains some of the wording in the registered mark and does not add any wording that would distinguish it from that mark. The similarities in the sound, appearance and commercial meaning are all factors that combine to create an overall confusingly similar commercial impression that is shared by the marks in this case.
COMPARISON OF THE SERVICES
In this case, the application uses broad wording to describe “information technology services, namely, technical support services consisting of troubleshooting of computer hardware and software problems, IT infrastructure consulting; design and development of computer hardware and software; computer programming services, maintenance and updating of computer software; computer consulting services; cloud computing services; managed computer and software services; security, cyber security and compliance services; identity information and device protection services; proactive attack prevention services and management”, which presumably encompasses all services of the type described, including the following of the registrant’s more narrowly listed relevant services:
“Providing information and online information in the fields of computer security, Internet security, data security, cybersecurity, information technology, computer systems, virtualization technologies, cloud computing and computing solutions and systems, datacenter architecture, and enterprise architecture; Computer security services, namely, providing security and anonymity for electronically transmitted protected health information, credit card and banking transactions; Computer security services, namely, identification of cyber threats through multi-source threat intelligence and analysis, development of mitigation strategies to minimize risk of computer system infection and data exfiltration, remote configuration of pre-integrated security tools to protect computer software and electronic data from viruses and cyber security threats, and infrastructure and security tool notification and configuration to return infrastructure to compliant state, all of the foregoing being for data, programming, equipment and software purposes; Secure hosting of digital content on the internet and secure website hosting; Technical support services, namely, remote and on-site infrastructure management services for monitoring, protecting, administration, and management of public and private cloud computing IT and application systems; Technical consulting, analysis, advisory, support, and managed security services in the fields of computer security, Internet security, data security, cybersecurity, information technology, computer systems, virtualization technologies, cloud computing and computing solutions and systems, datacenter architecture, and enterprise architecture; Managed security services and computer security services in the nature of detecting, testing, analyzing, and managing and implementing countermeasures and mitigation strategies and tools against data, computer network, and cyber breaches, threats, and invasions; Planning, designing, integration, configuration, implementation, and management of information technology (IT) systems, and virtualization, cloud-based, and cloud-computing systems and technologies; Software as a service (SAAS), platform as a service (PAAS), and infrastructure as a service (IAAS) featuring software platforms and technical support for the protection and defense against and response to data, computer network, and cyber breaches, threats, and invasions; Internet Protocol (IP) address verification services” See, e.g., In re Solid State Design Inc., 125 USPQ2d 1409, 1412-15 (TTAB 2018); Sw. Mgmt., Inc. v. Ocinomled, Ltd., 115 USPQ2d 1007, 1025 (TTAB 2015).
Thus, applicant’s and registrant’s services are legally identical in this case. See, e.g., In re i.am.symbolic, llc, 127 USPQ2d 1627, 1629 (TTAB 2018) (citing Tuxedo Monopoly, Inc. v. Gen. Mills Fun Grp., Inc., 648 F.2d 1335, 1336, 209 USPQ 986, 988 (C.C.P.A. 1981); Inter IKEA Sys. B.V. v. Akea, LLC, 110 USPQ2d 1734, 1745 (TTAB 2014); Baseball Am. Inc. v. Powerplay Sports Ltd., 71 USPQ2d 1844, 1847 n.9 (TTAB 2004)).
Additionally, the services of the parties have no restrictions as to nature, type, channels of trade, or classes of purchasers and are “presumed to travel in the same channels of trade to the same class of purchasers.” In re Viterra Inc., 671 F.3d 1358, 1362, 101 USPQ2d 1905, 1908 (Fed. Cir. 2012) (quoting Hewlett-Packard Co. v. Packard Press, Inc., 281 F.3d 1261, 1268, 62 USPQ2d 1001, 1005 (Fed. Cir. 2002)). Thus, applicant’s and registrant’s services are related.
A likelihood of confusion results when the confusingly similar marks are used in the market for the legally identical services. Accordingly, registration of the mark sought in this application is hereby refused under Section 2(d) of the Trademark Act in this case. Although applicant’s mark has been refused registration, applicant may respond to the refusals by submitting evidence and arguments in support of registration.
REQUIREMENT for Clarification and Proper Classification of Identification Language
Information technology services, namely, technical support services consisting of troubleshooting of computer hardware and software problems, IT infrastructure consulting; design and development of computer hardware and software; computer programming services, maintenance and updating of computer software; computer consulting services; cloud computing services; managed computer and software services; software licensing services; security, cyber security and compliance services; identity information and device protection services; proactive attack prevention services and management”. See 37 C.F.R. §2.32(a)(6); TMEP §1402.01.
The applicant may clarify by amending to some or all of the following suggested amended identification language, if accurate:
Please note that parentheses are not acceptable in the identification. See TMEP Section 1402.12. Where the wording “{specify …}” appears in this Office Action, the examining attorney has merely suggested ways to cure the indefiniteness of the identification. The applicant must list the services without parentheses.
INTERNATIONAL CLASS 037
Information technology services, namely, technical support services consisting of troubleshooting in the nature of the repair of computer hardware.
INTERNATIONAL CLASS 042
Information technology services, namely, technical support services consisting of troubleshooting in the nature of diagnosing computer hardware and software problems, IT infrastructure consulting; Design and development of computer hardware and software; Computer programming services, maintenance and updating of computer software; Computer software consulting services; Computer security consulting services; Computer programming consulting services; Cloud computing services, namely, providing temporary use of on-line non-downloadable cloud computing software for {specify the function of the programs, e.g., use in database management, use in electronic storage of data, etc. and, if software is content- or field-specific, the field of use}; Managed application software service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software and web sites of others in the fields of {specify field, e.g., cyber security}; Computer cyber security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Identity information services in the nature of electronic signature verification services using technology to authenticate user identity; Proactive computer security attack prevention services and management namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials.
INTERNATIONAL CLASS 045
Computer software licensing services; Security services, namely, providing executive protection; Security guard services; Compliance services, in the nature of regulatory compliance consulting in the field of {specify field or subject matter, e.g., cyber security regulations, internet legal regulations}; Compliance services, namely, legal compliance auditing and regulatory compliance auditing; Identity information services in the nature of verification of personal identity as part of personal background investigations; Device protection services, namely, monitoring of {indicate security devices, e.g., alarms, home security systems} for protecting personal property;
For assistance with identifying and classifying goods and services in trademark applications, please see the USPTO’s online searchable U.S. Acceptable Identification of Goods and Services Manual. See TMEP §1402.04.
REQUIREMENT –Submission of Filing Fees for Each Class Identified or Restriction of Identification Language
The application identifies goods and/or services that are classified in at least three (3) classes; however, applicant submitted a fee sufficient for only one (1) class. In a multiple-class application, a fee for each class is required. 37 C.F.R. §2.86(a)(2), (b)(2); TMEP §§810.01, 1403.01. For more information about adding classes to an application, see the Multiple-class Application webpage.
Therefore, applicant must either (1) restrict the application to the number of classes covered by the fees already paid, or (2) submit the fees for each additional class.
(1) List the goods and/or services by their international class number in consecutive numerical order, starting with the lowest numbered class (for example, International Class 3: perfume; International Class 18: cosmetic bags sold empty).
(2) Submit a filing fee for each international class not covered by the fee already paid (view the USPTO’s current fee schedule). Specifically, the application identifies services based on use in commerce that are classified in at least three (3) classes; however, applicant submitted a fee sufficient for only one (1) class. Applicant must either (a) submit the filing fees for the classes not covered by the submitted fees or (b) restrict the application to the number of classes covered by the fees already paid.
(3) Submit verified dates of first use of the mark anywhere and in commerce for each international class. See more information about verified dates of use.
(4) Submit a specimen for each international class. The current specimen is acceptable for International Classes 042 & 045; and applicant needs a specimen for class 037. See more information about specimens.
Please note that specimens for services must show a direct association between the mark and the services and include: (1) copies of advertising and marketing material, (2) a photograph of business signage or billboards, or (3) materials showing the mark in the sale, rendering, or advertising of the services. See 37 C.F.R. §2.56(b)(2), (c); TMEP §1301.04(a), (h)(iv)(C).
Any webpage printout or screenshot submitted as a specimen, whether for goods or services, must include the webpage’s URL and the date it was accessed or printed. 37 C.F.R. §2.56(c).
(5) Submit a verified statement that “The specimen was in use in commerce on or in connection with the goods and/or services listed in the application at least as early as the filing date of the application.” See more information about verification.
See 37 C.F.R. §2.86(a); TMEP §§1403.01, 1403.02(c).
For an overview of the requirements for a Section 1(a) multiple-class application and how to satisfy the requirements online using the Trademark Electronic Application System (TEAS) form, see the Multiple-class Application webpage.
How to respond: Click to file a response to this nonfinal Office action.
/Amy Kean/
Trademark Attorney, Law Office 112
Phone: 571-272-8854
Amy.Kean@uspto.gov
RESPONSE GUIDANCE