VULDOC

Lg Electronics Inc.

Application Filed: 2021-06-15
Trademark Application Details
Trademark Logo VULDOC

Mark For: VULDOC® trademark registration is intended to cover the categories of recorded computer software for scanning and penetration testing of computers and networks to assess information security vulnerability; Downloadable computer software for scanning and penetration testing of computers and networks to assess information security vulnerability; Recorded computer software, namely, an automated vulnerability analysis framework that can perform static and dynamic analysis; Downloadable computer software, namely, an automated vulnerability analysis framework that can perform static and dynamic analysis; Recorded computer software for providing fix guides and patches for vulnerabilities derived based on the analyzed vulnerability results; Downloadable computer software for providing fix guides and patches for vulnerabilities derived based on the analyzed vulnerability results; Recorded computer security software for restricting access to and by computer networks to and of undesired web sites, media, individuals and facilities; Downloadable computer security software for restricting access to and by computer networks to and of undesired web sites, media, individuals and facilities; Recorded computer software for security, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Downloadable computer software for security, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials. [all]

Status

2022-06-24 UTC
LIVE APPLICATION Under Examination
The trademark application has been accepted by the Office (has met the minimum filing requirements) and that this application has been assigned to an examiner.


Research OneLook Acronym Finder
Serial Number90774019
Registration Number6862523
Mark Literal ElementsVULDOC
Mark Drawing Type4 - STANDARD CHARACTER MARK
Mark TypeTRADEMARK
RegisterPRINCIPAL
Current LocationPUBLICATION AND ISSUE SECTION 2022-06-16
Basis44(e)
Class StatusACTIVE
Primary US Classes
  • 021: Electrical Apparatus, Machines and Supplies
  • 023: Cutlery, Machinery, Tools and Parts Thereof
  • 026: Measuring and Scientific Appliances
  • 036: Musical Instruments and Supplies
  • 038: Prints and Publications
Primary International Class
  • 009 - Primary Class
  • (Electrical and scientific apparatus) Scientific, nautical, surveying, electric, photographic, cinematographic, optical, weighing, measuring, signaling, checking (supervision), lifesaving and teaching apparatus and instruments; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
Filed UseNo
Current UseNo
Intent To UseNo
Filed ITUYes
44D FiledYes
44E CurrentYes
66A CurrentNo
Current BasisNo
No BasisNo
Attorney NameMichael T. Smith
Attorney Docket Number0465-8192US1

Timeline

2021-06-15Application Filed
2021-06-18Location: NEW APPLICATION PROCESSING
2021-06-18Status: Live/Pending
2021-06-18Transaction Date
2021-10-14Trademark Registered
2022-06-16Location: PUBLICATION AND ISSUE SECTION
2022-06-16Status: Review prior to publication completed.
2022-07-19Published
2022-10-04Trademark Registered

Trademark Parties (Applicants & Owners)

Party: LG ELECTRONICS INC.
Address128, Yeoui-daero, Yeongdeungpo-gu, Seoul KOREA, REPUBLIC OF 07336
Legal Entity TypeCorporation
Legal Entity StateKOREA, REPUBLIC OF

Attorney of Record

MICHAEL T. SMITH
BIRCH STEWART KOLASCH & BIRCH, LLP
8110 GATEHOUSE ROAD, SUITE 100 EAST
FALLS CHURCH, VA 22042

Good, Services, and Codes


IC 009. US 021 023 026 036 038. G & S: Recorded computer software for scanning and penetration testing of computers and networks to assess information security vulnerability; Downloadable computer software for scanning and penetration testing of computers and networks to assess information security vulnerability; Recorded computer software, namely, an automated vulnerability analysis framework that can perform static and dynamic analysis; Downloadable computer software, namely, an automated vulnerability analysis framework that can perform static and dynamic analysis; Recorded computer software for providing fix guides and patches for vulnerabilities derived based on the analyzed vulnerability results; Downloadable computer software for providing fix guides and patches for vulnerabilities derived based on the analyzed vulnerability results; Recorded computer security software for restricting access to and by computer networks to and of undesired web sites, media, individuals and facilities; Downloadable computer security software for restricting access to and by computer networks to and of undesired web sites, media, individuals and facilities; Recorded computer software for security, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Downloadable computer software for security, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials

International Codes:9
U.S. Codes:021,023,026,036,038
Type CodeType
GS0091Recorded computer software for scanning and penetration testing of computers and networks to assess information security vulnerability; Downloadable computer software for scanning and penetration testing of computers and networks to assess information security vulnerability; Recorded computer software, namely, an automated vulnerability analysis framework that can perform static and dynamic analysis; Downloadable computer software, namely, an automated vulnerability analysis framework that can perform static and dynamic analysis; Recorded computer software for providing fix guides and patches for vulnerabilities derived based on the analyzed vulnerability results; Downloadable computer software for providing fix guides and patches for vulnerabilities derived based on the analyzed vulnerability results; Recorded computer security software, namely, restricting access to and by computer networks to and of undesired web sites, media, individuals and facilities; Downloadable computer security software, namely, restricting access to and by computer networks to and of undesired web sites, media, individuals and facilities; Recorded computer software for security, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Downloadable computer software for security, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials
GS0091Recorded computer software for scanning and penetration testing of computers and networks to assess information security vulnerability; Downloadable computer software for scanning and penetration testing of computers and networks to assess information security vulnerability; Recorded computer software, namely, an automated vulnerability analysis framework that can perform static and dynamic analysis; Downloadable computer software, namely, an automated vulnerability analysis framework that can perform static and dynamic analysis; Recorded computer software for providing fix guides and patches for vulnerabilities derived based on the analyzed vulnerability results; Downloadable computer software for providing fix guides and patches for vulnerabilities derived based on the analyzed vulnerability results; Recorded computer security software for restricting access to and by computer networks to and of undesired web sites, media, individuals and facilities; Downloadable computer security software for restricting access to and by computer networks to and of undesired web sites, media, individuals and facilities; Recorded computer software for security, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Downloadable computer software for security, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials

Trademark Filing History

DescriptionDateProceeding Number
REGISTERED-PRINCIPAL REGISTER2022-10-04
NOTICE OF REGISTRATION CONFIRMATION EMAILED2022-10-04
PUBLISHED FOR OPPOSITION2022-07-19
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED2022-07-19
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED2022-06-29
APPROVED FOR PUB - PRINCIPAL REGISTER2022-06-16
TEAS/EMAIL CORRESPONDENCE ENTERED2022-06-1596463
CORRESPONDENCE RECEIVED IN LAW OFFICE2022-06-1596463
ASSIGNED TO LIE2022-06-1596463
TEAS RESPONSE TO OFFICE ACTION RECEIVED2022-06-07
NOTIFICATION OF NON-FINAL ACTION E-MAILED2022-01-106325
NON-FINAL ACTION WRITTEN2022-01-1091244
NON-FINAL ACTION E-MAILED2022-01-106325
ASSIGNED TO EXAMINER2022-01-0491244
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM2021-09-01
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED2021-09-01
NEW APPLICATION ENTERED IN TRAM2021-06-18
NEW APPLICATION ENTERED2021-06-18

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed