Mark For: VENDORBASE® trademark registration is intended to cover the categories of
Research |
![]() ![]() ![]() ![]() ![]() |
Serial Number | 90318446 |
Registration Number | 6625674 |
Mark Literal Elements | VENDORBASE |
Mark Drawing Type | 4 - STANDARD CHARACTER MARK |
Mark Type | Service Mark |
Current Location | NEW APPLICATION PROCESSING 2020-11-17 |
Basis | 1(a) |
Class Status | ACTIVE |
Primary US Classes |
|
Primary International Class |
|
Filed Use | Yes |
Current Use | Yes |
Intent To Use | No |
Filed ITU | No |
44D Filed | No |
44E Current | No |
66A Current | No |
Current Basis | No |
No Basis | No |
Attorney Name | Michael A. Glenn |
Attorney Docket Number | 135237-4007 |
2020-05-20 | Date of First Use |
2020-05-20 | Date of Use In Commerce |
2020-11-13 | Application Filed |
2020-11-17 | Location: NEW APPLICATION PROCESSING |
2020-11-17 | Status: Live/Pending |
2020-11-17 | Status: New application will be assigned to an examining attorney approximately 3 months after filing date. |
2020-11-17 | Transaction Date |
2022-01-25 | Trademark Registered |
Party: | ![]() |
Address | 797 Bryant Street San Francisco, CALIFORNIA UNITED STATES 94107 |
Legal Entity Type | Corporation |
Legal Entity State | DELAWARE |
![]() | MULTI | 2020-11-13 |
![]() | JPEG | 2020-11-13 |
![]() | JPEG | 2020-11-13 |
International Codes: | 42 |
U.S. Codes: | 100,101 |
Type Code | Type |
---|---|
GS0421 | Computer services for evaluating email and relational items to identify fraudulent vendors and then monitoring conduct of those fraudulent vendors on an ongoing basis; Computer services for recording behaviors of vendors deemed to be fraudulent in a blacklist for security purposes; Computer services for tracking digital activities of vendors determined to be fraudulent based on an analysis of emails sent by those vendors; Computer services for generating a federated collection of vendor behaviors to prevent security threats; Computer services for generating a federated blacklist of vendors and associated behaviors to prevent fraud; Computer services for creating, populating, and managing blacklists of vendors determined to be security threats due to involvement in past digital activities; Computer services for analyzing digital activities to discover security threats; Computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats; Security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; Security services, namely, monitoring, detecting, and remediating instances of account takeover; Software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; Platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; Email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; Software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; computer security consultancy |
GS0421 | Computer services for evaluating email and relational items to identify fraudulent vendors and then monitoring conduct of those fraudulent vendors on an ongoing basis, namely, providing a computer program featuring technology for evaluating email and relational items to identify security threats; Computer services for recording behaviors of vendors deemed to be fraudulent in a blacklist for security purposes, namely, identifying and examining digital communications involving vendors to identify security threats; Computer services for tracking digital activities of vendors determined to be fraudulent based on an analysis of emails sent by those vendors, namely, monitoring digital communications involving vendors determined to be fraudulent to identify security threats; Computer services for generating a federated collection of vendor behaviors to prevent security threats, namely, identifying and cataloging vendor behaviors through analysis of digital communications; Computer services for generating a federated blacklist of vendors and associated behaviors to prevent fraud, namely, establishing a federated blacklist by analyzing digital communications involving vendors; Computer services for creating, populating, and managing blacklists of vendors determined to be security threats due to involvement in past digital activities, namely, maintaining blacklists of vendors for the purpose of identifying security threats; Computer services for analyzing digital activities to discover security threats, namely, examining the content and context of digital activities to identify security threats; Computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats, namely, examining the content and context of digital communications to identify security threats; Computer security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; Computer security services, namely, monitoring, detecting, and remediating instances of account takeover; Software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; Platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; Email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; Software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; computer security consultancy |
Description | Date | Proceeding Number |
---|---|---|
NEW APPLICATION ENTERED IN TRAM | 2020-11-17 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.