Mark For: THREATMODELER™ trademark registration is intended to cover the categories of providing temporary use of a web-based software application for manually and automatedly and collaboratively creating and updating representative diagrams of computing networks, computing systems, and computer applications, and for identifying and reporting on threats to components of the computing networks, computing systems, and computer applications, and for representing and reporting on mitigations for the identified threats, and for determining and reporting on compliance with data protection regulatory standards, all in the fields of computer network security, computer system security, computer application security, and data protection.
Status
2021-04-04 UTC
LIVE APPLICATION Awaiting Examination
The trademark application has been accepted by the Office (has met the minimum filing requirements) and has not yet been assigned to an examiner.
(Computer, scientific & legal) Scientific and technological services and research and design relating thereto: industrial analysis and research services; design and development of computer hardware and software; legal services.
Filed Use
Yes
Current Use
Yes
Intent To Use
No
Filed ITU
No
44D Filed
No
44E Current
No
66A Current
No
Current Basis
No
No Basis
No
Attorney Name
Paul B. Johnson
Attorney Docket Number
ThreatM021
Timeline
2019-10-09
Date of First Use
2019-11-04
Date of Use In Commerce
2021-03-31
Application Filed
2021-04-03
Location: NEW APPLICATION PROCESSING
2021-04-03
Status: Live/Pending
2021-04-03
Status: New application will be assigned to an examining attorney approximately 3 months after filing date.
PAUL B. JOHNSON LAW OFFICE OF PAUL B. JOHNSON 8483 SOUTH 1275 EAST SANDY, UT 84094
Good, Services, and Codes
International Codes:
42
U.S. Codes:
100,101
Type Code
Type
GS0421
Providing temporary use of a web-based software application for manually and automatedly and collaboratively creating and updating representative diagrams of computing networks, computing systems, and computer applications, and for identifying and reporting on threats to components of the computing networks, computing systems, and computer applications, and for representing and reporting on mitigations for the identified threats, and for determining and reporting on compliance with data protection regulatory standards, all in the fields of computer network security, computer system security, computer application security, and data protection
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.