VENDORBASE

Abnormal Security Corporation

Application Filed: 2020-11-13
Trademark Application Details
Trademark Logo VENDORBASE

Mark For: VENDORBASE® trademark registration is intended to cover the categories of computer services for evaluating email and relational items to identify fraudulent vendors and then monitoring conduct of those fraudulent vendors on an ongoing basis; Computer services for recording behaviors of vendors deemed to be fraudulent in a blacklist for security purposes; Computer services for tracking digital activities of vendors determined to be fraudulent based on an analysis of emails sent by those vendors; Computer services for generating a federated collection of vendor behaviors to prevent security threats; Computer services for generating a federated blacklist of vendors and associated behaviors to prevent fraud; Computer services for creating, populating, and managing blacklists of vendors determined to be security threats due to involvement in past digital activities; Computer services for analyzing digital activities to discover security threats; Computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats; Security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; Security services, namely, monitoring, detecting, and remediating instances of account takeover; Software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; Platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; Email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; Software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; computer security consultancy.

Status

2020-11-18 UTC
LIVE APPLICATION Awaiting Examination
The trademark application has been accepted by the Office (has met the minimum filing requirements) and has not yet been assigned to an examiner.


Research OneLook Acronym Finder
Serial Number90318446
Registration Number6625674
Mark Literal ElementsVENDORBASE
Mark Drawing Type4 - STANDARD CHARACTER MARK
Mark TypeService Mark
Current LocationNEW APPLICATION PROCESSING 2020-11-17
Basis1(a)
Class StatusACTIVE
Primary US Classes
  • 100: Miscellaneous
  • 101: Advertising and Business
Primary International Class
  • 042 - Primary Class
  • (Computer, scientific & legal) Scientific and technological services and research and design relating thereto: industrial analysis and research services; design and development of computer hardware and software; legal services.
Filed UseYes
Current UseYes
Intent To UseNo
Filed ITUNo
44D FiledNo
44E CurrentNo
66A CurrentNo
Current BasisNo
No BasisNo
Attorney NameMichael A. Glenn
Attorney Docket Number135237-4007

Timeline

2020-05-20Date of First Use
2020-05-20Date of Use In Commerce
2020-11-13Application Filed
2020-11-17Location: NEW APPLICATION PROCESSING
2020-11-17Status: Live/Pending
2020-11-17Status: New application will be assigned to an examining attorney approximately 3 months after filing date.
2020-11-17Transaction Date
2022-01-25Trademark Registered

Trademark Parties (Applicants & Owners)

Party: Abnormal Security Corporation
Address797 Bryant Street San Francisco, CALIFORNIA UNITED STATES 94107
Legal Entity TypeCorporation
Legal Entity StateDELAWARE

Documents

ApplicationMULTI2020-11-13
DrawingJPEG2020-11-13
SpecimenJPEG2020-11-13

Attorney of Record

MICHAEL A. GLENN
PERKINS COIE LLP
3150 PORTER DRIVE
PALO ALTO, CA 94304

Good, Services, and Codes

International Codes:42
U.S. Codes:100,101
Type CodeType
GS0421Computer services for evaluating email and relational items to identify fraudulent vendors and then monitoring conduct of those fraudulent vendors on an ongoing basis; Computer services for recording behaviors of vendors deemed to be fraudulent in a blacklist for security purposes; Computer services for tracking digital activities of vendors determined to be fraudulent based on an analysis of emails sent by those vendors; Computer services for generating a federated collection of vendor behaviors to prevent security threats; Computer services for generating a federated blacklist of vendors and associated behaviors to prevent fraud; Computer services for creating, populating, and managing blacklists of vendors determined to be security threats due to involvement in past digital activities; Computer services for analyzing digital activities to discover security threats; Computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats; Security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; Security services, namely, monitoring, detecting, and remediating instances of account takeover; Software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; Platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; Email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; Software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; computer security consultancy
GS0421Computer services for evaluating email and relational items to identify fraudulent vendors and then monitoring conduct of those fraudulent vendors on an ongoing basis, namely, providing a computer program featuring technology for evaluating email and relational items to identify security threats; Computer services for recording behaviors of vendors deemed to be fraudulent in a blacklist for security purposes, namely, identifying and examining digital communications involving vendors to identify security threats; Computer services for tracking digital activities of vendors determined to be fraudulent based on an analysis of emails sent by those vendors, namely, monitoring digital communications involving vendors determined to be fraudulent to identify security threats; Computer services for generating a federated collection of vendor behaviors to prevent security threats, namely, identifying and cataloging vendor behaviors through analysis of digital communications; Computer services for generating a federated blacklist of vendors and associated behaviors to prevent fraud, namely, establishing a federated blacklist by analyzing digital communications involving vendors; Computer services for creating, populating, and managing blacklists of vendors determined to be security threats due to involvement in past digital activities, namely, maintaining blacklists of vendors for the purpose of identifying security threats; Computer services for analyzing digital activities to discover security threats, namely, examining the content and context of digital activities to identify security threats; Computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats, namely, examining the content and context of digital communications to identify security threats; Computer security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; Computer security services, namely, monitoring, detecting, and remediating instances of account takeover; Software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; Platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; Email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; Software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; computer security consultancy

Trademark Filing History

DescriptionDateProceeding Number
NEW APPLICATION ENTERED IN TRAM2020-11-17

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed