Research |
![]() ![]() ![]() ![]() ![]() |
Serial Number | 88982960 |
Registration Number | 6548603 |
Mark Drawing Code | 4000: Illustration: Drawing with word(s)/letter(s)/number(s) in Block form |
Attorney Name | Joshua L. Simmons |
Attorney Docket Number | 46516-4 |
Law Office Assigned | M50 |
Employee Name | KEAM, ALEX S |
2018-09-09 | Application Filed |
2018-10-25 | Date of First Use |
2020-03-03 | Published for Opposition |
2021-09-16 | Location: TMO LAW OFFICE 114 |
2021-09-16 | Status: Live/Pending |
2021-09-16 | Transaction Date |
2021-11-02 | Trademark Registered |
Owner: | ![]() |
Address | 425 MARKET ST., 8TH FLOOR SAN FRANCISCO DE 94105 |
Legal Entity Type | Limited Liability Company |
Legal Entity State | DE |
Click the blue "Refresh" button to load certificates, specimines, application, and other documents.
International Codes: | 42 |
U.S. Codes: | 100,101 |
Type Code | Type |
---|---|
GS0421 | Providing on-line non-downloadable software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; providing a web site featuring temporary use of non-downloadable software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; providing temporary use of on-line non-downloadable software and applications for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; software as a service (saas) services featuring software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; monitoring data, namely, monitoring of computer systems for detecting data associated with the configuration, operation, and behavior of networked computing systems; application service provider featuring application programming interface (api) software for downloading internet intelligence information, edge tracking remediation statuses, and information about risks on enterprise network edges; computer services, namely, electronic digitizing of or data visualizations in the nature of maps of internet connected assets and external facing protocols and services and mapping of data related to information technology assets and their associated behaviors; software as a service (saas) services featuring software for use in data science, asset optimization, and optimization of infrastructure management and/or information security processes for information technology security, governance, and compliance, namely, testing, analysis, identification, evaluation and reporting on computer assets and systems on the internet or in the cloud of others to facilitate identification, remediation, and management of security vulnerabilities; data mining; data automation and collection service using proprietary software to evaluate, analyze and collect service data; providing on-line non-downloadable software for use in connection with any one or more of the previously named services for information technology security, governance, and compliance, namely, testing, analysis, identification, evaluation and reporting on computer assets and systems on the internet or in the cloud of others to facilitate identification, remediation, and management of security vulnerabilities; providing on-line non-downloadable software for use in monitoring of computer systems all to, namely, allow users to aggregate, model, and analyze data from their machines and infrastructure for security purposes; development, maintenance, repair, and configuration of software for machine learning; development, maintenance, repair, and configuration of software for forecasting, predicting, and monitoring system failures; software as a service (saas) services featuring software for providing descriptive analytics, diagnostic analytics, predictive analytics, prescriptive analytics and analytics against data, namely, computer systems analysis, computer systems security analysis, computer network security analysis, computer network management and optimization, information technology management and optimization; data security consultancy; computer security and information technology consultancy in the field of data collection, attack surface and vulnerability enumeration and remediation, and penetration testing of computers and networks to assess information security vulnerability and IT operations; development of electronic reporting for others using computers or sensors of information technology assets, computer networking systems and appliances, and cloud computing platforms for use in risk assessment, information security, business analysis, audit and audit planning, and process management |
GS0421 | Providing on-line non-downloadable software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; providing a web site featuring temporary use of non-downloadable software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; providing temporary use of on-line non-downloadable software and applications for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; software as a service (saas) services featuring software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; monitoring data, namely, monitoring of computer systems for detecting data associated with the configuration, operation, and behavior of networked computing systems; application service provider featuring application programming interface (api) software for downloading internet intelligence information, edge tracking remediation statuses, and information about risks on enterprise network edges; computer services, namely, electronic digitizing of or data visualizations in the nature of maps of internet connected assets and external facing protocols and services and mapping of data related to information technology assets and their associated behaviors; software as a service (saas) services featuring software for use in data science, asset optimization, and optimization of infrastructure management and/or information security processes for information technology security, governance, and compliance, namely, testing, analysis, identification, evaluation and reporting on computer assets and systems on the internet or in the cloud of others to facilitate identification, remediation, and management of security vulnerabilities; data mining; data automation and collection service using proprietary software to evaluate, analyze and collect service data; providing on-line non-downloadable software for use in connection with any one or more of the previously named services for information technology security, governance, and compliance, namely, testing, analysis, identification, evaluation and reporting on computer assets and systems on the internet or in the cloud of others to facilitate identification, remediation, and management of security vulnerabilities; providing on-line non-downloadable software for use in monitoring of computer systems all to, namely, allow users to aggregate, model, and analyze data from their machines and infrastructure for security purposes; development, maintenance, repair, and configuration of software for machine learning; development, maintenance, repair, and configuration of software for forecasting, predicting, and monitoring system failures; software as a service (saas) services featuring software for providing descriptive analytics, diagnostic analytics, predictive analytics, prescriptive analytics and analytics against data, namely, computer systems analysis, computer systems security analysis, computer network security analysis, computer network management and optimization, information technology management and optimization; data security consultancy; computer security and information technology consultancy in the field of data collection, attack surface and vulnerability enumeration and remediation, and penetration testing of computers and networks to assess information security vulnerability and IT operations; development of electronic reporting for others using computers or sensors of information technology assets, computer networking systems and appliances, and cloud computing platforms for use in risk assessment, information security, business analysis, audit and audit planning, and process management |
Description | Date | Event Coding |
---|---|---|
NEW APPLICATION ENTERED IN TRAM | 2018-09-12 | 1 NWAP I:Incoming Correspondence |
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM | 2018-09-17 | 2 NWOS I:Incoming Correspondence |
ASSIGNED TO EXAMINER | 2018-12-19 | 3 DOCK D:Assigned to Examiner |
NON-FINAL ACTION WRITTEN | 2018-12-20 | 4 CNRT R:Renewal |
NON-FINAL ACTION E-MAILED | 2018-12-20 | 5 GNRT F:First Action |
NOTIFICATION OF NON-FINAL ACTION E-MAILED | 2018-12-20 | 6 GNRN O:Outgoing Correspondence |
TEAS RESPONSE TO OFFICE ACTION RECEIVED | 2019-06-19 | 7 TROA I:Incoming Correspondence |
CORRESPONDENCE RECEIVED IN LAW OFFICE | 2019-06-19 | 8 CRFA I:Incoming Correspondence |
TEAS/EMAIL CORRESPONDENCE ENTERED | 2019-06-20 | 9 TEME I:Incoming Correspondence |
FINAL REFUSAL WRITTEN | 2019-07-19 | 10 CNFR R:Renewal |
FINAL REFUSAL E-MAILED | 2019-07-19 | 11 GNFR O:Outgoing Correspondence |
NOTIFICATION OF FINAL REFUSAL EMAILED | 2019-07-19 | 12 GNFN O:Outgoing Correspondence |
AUTOMATIC UPDATE OF ASSIGNMENT OF OWNERSHIP | 2019-11-20 | 13 ASGN I:Incoming Correspondence |
EXPARTE APPEAL RECEIVED AT TTAB | 2020-01-21 | 14 EXAF T:TTAB Proceeding |
JURISDICTION RESTORED TO EXAMINING ATTORNEY | 2020-01-21 | 15 JURT T:TTAB Proceeding |
EX PARTE APPEAL-INSTITUTED | 2020-01-21 | 16 EXPI T:TTAB Proceeding |
TEAS REQUEST FOR RECONSIDERATION RECEIVED | 2020-01-20 | 17 ERFR I:Incoming Correspondence |
ASSIGNED TO LIE | 2020-01-27 | 18 ALIE A:Allowance for Publication |
CORRESPONDENCE RECEIVED IN LAW OFFICE | 2020-01-28 | 19 CRFA I:Incoming Correspondence |
TEAS/EMAIL CORRESPONDENCE ENTERED | 2020-01-28 | 20 TEME I:Incoming Correspondence |
APPROVED FOR PUB - PRINCIPAL REGISTER | 2020-01-28 | 21 CNSA P: |
EXPARTE APPEAL TERMINATED | 2020-01-28 | 22 EXPT T:TTAB Proceeding |
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | 2020-02-12 | 23 NONP E:E-Mail |
PUBLISHED FOR OPPOSITION | 2020-03-03 | 24 PUBO A:Allowance for Publication |
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | 2020-03-03 | 25 NPUB E:E-Mail |
EXTENSION OF TIME TO OPPOSE RECEIVED | 2020-04-01 | 26 ETOF T:TTAB Proceeding |
EXTENSION OF TIME TO OPPOSE PROCESS - TERMINATED | 2020-07-12 | 27 ETOP T:TTAB Proceeding |
NOA E-MAILED - SOU REQUIRED FROM APPLICANT | 2020-08-25 | 28 NOAM E:E-Mail |
AUTOMATIC UPDATE OF ASSIGNMENT OF OWNERSHIP | 2020-12-16 | 29 ASGN I:Incoming Correspondence |
TEAS EXTENSION RECEIVED | 2021-02-08 | 30 EEXT I:Incoming Correspondence |
EXTENSION 1 FILED | 2021-02-08 | 31 EXT1 S: |
EXTENSION 1 GRANTED | 2021-02-08 | 32 EX1G S: |
NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED | 2021-02-10 | 33 EXRA E:E-Mail |
TEAS CHANGE OF OWNER ADDRESS RECEIVED | 2021-06-17 | 34 COAR I:Incoming Correspondence |
TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED | 2021-06-17 | 35 REAP I:Incoming Correspondence |
ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED | 2021-06-17 | 36 ARAA I:Incoming Correspondence |
TEAS WITHDRAWAL OF ATTORNEY RECEIVED-FIRM RETAINS | 2021-06-17 | 37 EWAF I:Incoming Correspondence |
TEAS CHANGE OF CORRESPONDENCE RECEIVED | 2021-06-17 | 38 TCCA I:Incoming Correspondence |
APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED | 2021-06-17 | 39 CHAN I:Incoming Correspondence |
TEAS EXTENSION RECEIVED | 2021-08-25 | 40 EEXT I:Incoming Correspondence |
EXTENSION 2 FILED | 2021-08-25 | 41 EXT2 S: |
EXTENSION 2 GRANTED | 2021-08-25 | 42 EX2G S: |
NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED | 2021-08-27 | 43 EXRA E:E-Mail |
TEAS STATEMENT OF USE RECEIVED | 2021-09-09 | 44 EISU I:Incoming Correspondence |
TEAS REQUEST TO DIVIDE RECEIVED | 2021-09-09 | 45 ERTD I:Incoming Correspondence |
CASE ASSIGNED TO INTENT TO USE PARALEGAL | 2021-09-16 | 46 AITU A:Allowance for Publication |
DIVISIONAL REQUEST RECEIVED | 2021-09-09 | 47 DRRR I:Incoming Correspondence |
DIVISIONAL PROCESSING COMPLETE | 2021-09-16 | 48 DPCC D:Assigned to Examiner |
USE AMENDMENT FILED | 2021-09-09 | 49 IUAF S: |
STATEMENT OF USE PROCESSING COMPLETE | 2021-09-16 | 50 SUPC I:Incoming Correspondence |
ALLOWED PRINCIPAL REGISTER - SOU ACCEPTED | 2021-09-30 | 51 CNPR P: |
NOTICE OF ACCEPTANCE OF STATEMENT OF USE E-MAILED | 2021-10-01 | 52 SUNA E:E-Mail |
REGISTERED-PRINCIPAL REGISTER | 2021-11-02 | 53 R.PR A:Allowance for Publication |
AUTOMATIC UPDATE OF ASSIGNMENT OF OWNERSHIP | 2023-03-15 | 54 ASGN I:Incoming Correspondence |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.