Mark For: VULDOC® trademark registration is intended to cover the categories of
Research | OneLook Acronym Finder |
Serial Number | 90774019 |
Registration Number | 6862523 |
Mark Literal Elements | VULDOC |
Mark Drawing Type | 4 - STANDARD CHARACTER MARK |
Mark Type | TRADEMARK |
Register | PRINCIPAL |
Current Location | PUBLICATION AND ISSUE SECTION 2022-06-16 |
Basis | 44(e) |
Class Status | ACTIVE |
Primary US Classes |
|
Primary International Class |
|
Filed Use | No |
Current Use | No |
Intent To Use | No |
Filed ITU | Yes |
44D Filed | Yes |
44E Current | Yes |
66A Current | No |
Current Basis | No |
No Basis | No |
Attorney Name | Michael T. Smith |
Attorney Docket Number | 0465-8192US1 |
2021-06-15 | Application Filed |
2021-06-18 | Location: NEW APPLICATION PROCESSING |
2021-06-18 | Status: Live/Pending |
2021-06-18 | Transaction Date |
2021-10-14 | Trademark Registered |
2022-06-16 | Location: PUBLICATION AND ISSUE SECTION |
2022-06-16 | Status: Review prior to publication completed. |
2022-07-19 | Published |
2022-10-04 | Trademark Registered |
Party: | LG ELECTRONICS INC. |
Address | 128, Yeoui-daero, Yeongdeungpo-gu, Seoul KOREA, REPUBLIC OF 07336 |
Legal Entity Type | Corporation |
Legal Entity State | KOREA, REPUBLIC OF |
Application | 2021-06-15 | |
Drawing | 2021-06-15 | |
XSearch Search Summary | 2022-01-06 | |
Offc Action Outgoing | 2022-01-10 | |
Response to Office Action | 2022-06-07 | |
Amendment and Mail Process Complete | 2022-06-16 | |
Amendment to Delete or Correct Basis | 2022-06-16 | |
Public Note | 2022-06-16 | |
TRAM Snapshot of App at Pub for Oppostn | 2022-06-17 | |
Notice of Publication | 2022-06-29 | |
Notification Of Notice of Publication | 2022-06-29 | |
OG Publication Confirmation | 2022-07-19 | |
Notice of Registration-Notice | 2022-10-04 | |
Registration Certificate | 2022-10-04 |
IC 009. US 021 023 026 036 038. G & S: Recorded computer software for scanning and penetration testing of computers and networks to assess information security vulnerability; Downloadable computer software for scanning and penetration testing of computers and networks to assess information security vulnerability; Recorded computer software, namely, an automated vulnerability analysis framework that can perform static and dynamic analysis; Downloadable computer software, namely, an automated vulnerability analysis framework that can perform static and dynamic analysis; Recorded computer software for providing fix guides and patches for vulnerabilities derived based on the analyzed vulnerability results; Downloadable computer software for providing fix guides and patches for vulnerabilities derived based on the analyzed vulnerability results; Recorded computer security software for restricting access to and by computer networks to and of undesired web sites, media, individuals and facilities; Downloadable computer security software for restricting access to and by computer networks to and of undesired web sites, media, individuals and facilities; Recorded computer software for security, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Downloadable computer software for security, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials
International Codes: | 9 |
U.S. Codes: | 021,023,026,036,038 |
Type Code | Type |
---|---|
GS0091 | Recorded computer software for scanning and penetration testing of computers and networks to assess information security vulnerability; Downloadable computer software for scanning and penetration testing of computers and networks to assess information security vulnerability; Recorded computer software, namely, an automated vulnerability analysis framework that can perform static and dynamic analysis; Downloadable computer software, namely, an automated vulnerability analysis framework that can perform static and dynamic analysis; Recorded computer software for providing fix guides and patches for vulnerabilities derived based on the analyzed vulnerability results; Downloadable computer software for providing fix guides and patches for vulnerabilities derived based on the analyzed vulnerability results; Recorded computer security software, namely, restricting access to and by computer networks to and of undesired web sites, media, individuals and facilities; Downloadable computer security software, namely, restricting access to and by computer networks to and of undesired web sites, media, individuals and facilities; Recorded computer software for security, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Downloadable computer software for security, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials |
GS0091 | Recorded computer software for scanning and penetration testing of computers and networks to assess information security vulnerability; Downloadable computer software for scanning and penetration testing of computers and networks to assess information security vulnerability; Recorded computer software, namely, an automated vulnerability analysis framework that can perform static and dynamic analysis; Downloadable computer software, namely, an automated vulnerability analysis framework that can perform static and dynamic analysis; Recorded computer software for providing fix guides and patches for vulnerabilities derived based on the analyzed vulnerability results; Downloadable computer software for providing fix guides and patches for vulnerabilities derived based on the analyzed vulnerability results; Recorded computer security software for restricting access to and by computer networks to and of undesired web sites, media, individuals and facilities; Downloadable computer security software for restricting access to and by computer networks to and of undesired web sites, media, individuals and facilities; Recorded computer software for security, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Downloadable computer software for security, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials |
Description | Date | Proceeding Number |
---|---|---|
REGISTERED-PRINCIPAL REGISTER | 2022-10-04 | |
NOTICE OF REGISTRATION CONFIRMATION EMAILED | 2022-10-04 | |
PUBLISHED FOR OPPOSITION | 2022-07-19 | |
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | 2022-07-19 | |
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | 2022-06-29 | |
APPROVED FOR PUB - PRINCIPAL REGISTER | 2022-06-16 | |
TEAS/EMAIL CORRESPONDENCE ENTERED | 2022-06-15 | 96463 |
CORRESPONDENCE RECEIVED IN LAW OFFICE | 2022-06-15 | 96463 |
ASSIGNED TO LIE | 2022-06-15 | 96463 |
TEAS RESPONSE TO OFFICE ACTION RECEIVED | 2022-06-07 | |
NOTIFICATION OF NON-FINAL ACTION E-MAILED | 2022-01-10 | 6325 |
NON-FINAL ACTION WRITTEN | 2022-01-10 | 91244 |
NON-FINAL ACTION E-MAILED | 2022-01-10 | 6325 |
ASSIGNED TO EXAMINER | 2022-01-04 | 91244 |
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM | 2021-09-01 | |
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | 2021-09-01 | |
NEW APPLICATION ENTERED IN TRAM | 2021-06-18 | |
NEW APPLICATION ENTERED | 2021-06-18 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.