CONETRIX

CoNetrix, LLC

Application Filed: 2021-02-18
Trademark Application Details
Trademark Logo CONETRIX
630
Live/Pending
NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER
Research OneLook Acronym Finder
Serial Number90534137
Registration Number6682941
Mark Drawing Code4000: Illustration: Drawing with word(s)/letter(s)/number(s) in Block form
Attorney NameSarah Hegi Simpson
Attorney Docket Number222-CoNetrix

Timeline

2000-12-19Date of First Use
2021-02-18Application Filed
2021-02-22Location: NEW APPLICATION PROCESSING
2021-02-22Status: Live/Pending
2021-02-22Transaction Date
2022-03-29Trademark Registered

Trademark Applicants & Owners

Owner: CoNetrix, LLC
Address5225 S Loop 289 Suite 207 Lubbock TX 79424
Legal Entity TypeLimited Liability Company
Legal Entity StateTX

Documents

Click the blue "Refresh" button to load certificates, specimines, application, and other documents.

Attorney of Record

SARAH HEGI SIMPSON
SIMPSON TRADEMARK LAW, PLLC
3410 98TH ST, STE 4 #315
LUBBOCK, TX 79423

Good, Services, and Codes

International Codes:42
U.S. Codes:100,101
Type CodeType
GS0421Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Backup services for computer hard drive data; Computer consultation in the field of computer security; Computer disaster recovery planning; Computer network configuration services; Computer network design for others; Computer project management services; Computer security consultancy; Computer services, namely, cloud hosting provider services; Computer services, namely, computer system administration for others; Computer services, namely, on-site management of information technology (IT) systems of others; Computer services, namely, remote management of the information technology (IT) systems of others; Computer software installation and maintenance; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Consulting in the field of information technology; Consulting in the field of virtualization technologies for enterprises and businesses; Consulting services in the field of cloud computing; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the field of hosting computer software applications; Development of security systems and contingency planning for information systems; Hosting the software, websites and other computer applications of others on a virtual private server; Installation and maintenance of computer software; Maintenance of computer software relating to computer security and prevention of computer risks; Monitoring of computer systems by remote access to ensure proper functioning; Providing virtual computer systems and virtual computer environments through cloud computing; Technical support services, namely, technical administration of servers for others and troubleshooting in the nature of diagnosing server problems; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; Computer services, namely, data recovery services; Computer systems analysis; Installation of computer software; Integration of computer systems and networks; Information technology audit services, namely, review and analysis of information technology systems; technical support, namely, monitoring technological functions of computer network systems; Business technology software consultation services; Computer services, namely, management of cybersecurity; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Technology consultation in the field of cybersecurity; Computer services, namely, monitoring networks for malicious activity and exploits, stopping malicious activity and exploits, alerting network users and owners, and restoring or recovering normal network operations; Computer services, namely, monitoring computer systems for malicious activity and exploits, stopping malicious activity and exploits, alerting network users and owners, and restoring or recovering normal system operations; Computer services, namely, providing network threat protection services; managed security services, namely, network threat protection services
GS0421Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Backup services for computer hard drive data; Computer disaster recovery planning; Computer network configuration services; Computer network design for others; Computer project management services; Computer security consultancy; Computer services, namely, cloud hosting provider services; Computer services, namely, computer system administration for others; Computer services, namely, on-site management of information technology (IT) systems of others; Computer services, namely, remote management of the information technology (IT) systems of others; Computer software installation and maintenance; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Consulting in the field of information technology; Consulting in the field of virtualization technologies for enterprises and businesses; Consulting services in the field of cloud computing; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the field of hosting computer software applications; Development of security systems and contingency planning for information systems; Hosting the software, websites and other computer applications of others on a virtual private server; Installation and maintenance of computer software; Maintenance of computer software relating to computer security and prevention of computer risks; Monitoring of computer systems by remote access to ensure proper functioning; Providing virtual computer systems and virtual computer environments through cloud computing; Technical support services, namely, technical administration of servers for others and troubleshooting in the nature of diagnosing server problems; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; Computer services, namely, data recovery services; Computer systems analysis; Installation of computer software; Integration of computer systems and networks; Information technology audit services, namely, testing and analysis of information technology systems; technical support, namely, monitoring technological functions of computer network systems; Business technology software consultation services; Computer services, namely, management of cybersecurity specifically computer security systems management; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Technology consultation in the field of cybersecurity; Computer services, namely, monitoring technological functions of networks for malicious activity and exploits, stopping malicious activity and exploits by means of restricting access and blocking unauthorized programs and users of computer systems, alerting network users and owners via notifications of computer network system events, and restoring or recovering normal network operations; Computer services, namely, monitoring technological functions of computer systems for malicious activity and exploits, stopping malicious activity and exploits by means of restricting access and blocking unauthorized programs and users of computer systems, alerting network users and owners via notification of computer network system events, and restoring or recovering normal system operations; Computer services, namely, providing network threat protection services by means of restricting unauthorized access to computer systems and networks; Managed security services, namely, network threat protection services specifically computer security threat analysis for protecting data

Trademark Filing History

DescriptionDateEvent Coding
NEW APPLICATION ENTERED IN TRAM2021-02-221 NWAP I:Incoming Correspondence
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM2021-05-202 NWOS I:Incoming Correspondence
ASSIGNED TO EXAMINER2021-09-133 DOCK D:Assigned to Examiner
NON-FINAL ACTION WRITTEN2021-10-044 CNRT R:Renewal
NON-FINAL ACTION E-MAILED2021-10-045 GNRT F:First Action
NOTIFICATION OF NON-FINAL ACTION E-MAILED2021-10-046 GNRN O:Outgoing Correspondence
TEAS RESPONSE TO OFFICE ACTION RECEIVED2021-12-017 TROA I:Incoming Correspondence
CORRESPONDENCE RECEIVED IN LAW OFFICE2021-12-018 CRFA I:Incoming Correspondence
TEAS/EMAIL CORRESPONDENCE ENTERED2021-12-029 TEME I:Incoming Correspondence
APPROVED FOR PUB - PRINCIPAL REGISTER2021-12-0210 CNSA O:Outgoing Correspondence
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED2021-12-2211 NONP E:E-Mail
PUBLISHED FOR OPPOSITION2022-01-1112 PUBO A:Allowance for Publication
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED2022-01-1113 NPUB E:E-Mail
REGISTERED-PRINCIPAL REGISTER2022-03-2914 R.PR A:Allowance for Publication

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed