SWELL

Stairwell, Inc.

Application Filed: 2021-06-29
Trademark Application Details
Trademark Logo SWELL

Mark For: SWELL™ trademark registration is intended to cover the categories of downloadable and recorded computer software for providing computer security; downloadable and recorded computer software for computer security risk and threat analysis, assessment, management, remediation, and elimination; downloadable and recorded computer anti-virus software; downloadable and recorded computer software for providing anti-virus scanning, detection, identification, security, management, remediation, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers, and electronic devices; downloadable and recorded computer software for computer security risk and threat analysis, assessment, management, remediation, and elimination for protecting computer hardware, systems, servers, data, and electronic devices; downloadable and recorded computer software in the nature of cybersecurity software tools for assessing the vulnerability of computer networks and for constant cybersecurity monitoring; downloadable and recorded computer software for calculating and simulating security breaches while providing suggestions to protect cybersecurity; downloadable and recorded computer software for collecting relevant configuration details through agents continuously monitoring the entire fleet of digital assets on a real-time basis; downloadable and recorded computer software for providing real-time, on-demand comprehensive configuration and vulnerability assessments; downloadable and recorded computer software restricting unauthorized access to computer systems as part of information security management downloadable and recorded computer software for cybersecurity and computer security; downloadable and recorded computer software for use in preventing unauthorized access to and misuse of computer systems, identifying and detecting viruses, worms, trojans, spyware, adware, malware, and ransomware, authenticating domain-based email messages, and identifying malicious websites; downloadable and recorded computer security software, namely, software for cybersecurity monitoring and control of network activities on a computer; downloadable and recorded computer security software for assessing and quantifying digital security risks, threats, hacks, and data leakage across networks for cybersecurity; downloadable and recorded computer software, namely, software for data gathering, storage, manipulation, management and encryption, and management of security breach incidents and responses, for use in the fields of security, forensic, diagnostic, incident response, and education pertaining to information, computer and internet security; downloadable and recorded computer software for automated cybersecurity, digital forensics, cyber threat intelligence, and incident response; downloadable and recorded computer software for managing security strategy and resources relating to the security risk industry; downloadable and recorded computer programs for managing security strategy and resources for use in the security risk industry; downloadable and recorded computer software for assessing vulnerability, preventing and addressing cybersecurity threats and attacks; downloadable and recorded computer software for monitoring of computer systems for detecting unauthorized access or data breach; downloadable and recorded computer anti-virus and anti-malware software; downloadable and recorded internet security software; downloadable and recorded computer software for detection and prevention of viruses and malware; downloadable and recorded computer software for computer, data and network security; downloadable and recorded computer security software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers; downloadable and recorded computer software for comprehensive network security, intrusion prevention, event alerting, log capture, log analysis, network reporting, backup and recovery of digital and electronic data, and cybersecurity management.

Status

2023-12-23 UTC
DEAD APPLICATION Refused Dismissed or Invalidated
This trademark application was refused, dismissed, or invalidated by the Office and this application is no longer active.


Research OneLook Acronym Finder
Serial Number90801520
Mark Literal ElementsSWELL
Mark Drawing Type4 - STANDARD CHARACTER MARK
Mark TypeTrademark
Current LocationINTENT TO USE SECTION 2022-11-29
Basis1(b)
Class StatusACTIVE
Primary US Classes
  • 021: Electrical Apparatus, Machines and Supplies
  • 023: Cutlery, Machinery, Tools and Parts Thereof
  • 026: Measuring and Scientific Appliances
  • 036: Musical Instruments and Supplies
  • 038: Prints and Publications
Primary International Class
  • 009 - Primary Class
  • (Electrical and scientific apparatus) Scientific, nautical, surveying, electric, photographic, cinematographic, optical, weighing, measuring, signaling, checking (supervision), lifesaving and teaching apparatus and instruments; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
Filed UseNo
Current UseNo
Intent To UseYes
Filed ITUYes
44D FiledNo
44E CurrentNo
66A CurrentNo
Current BasisNo
No BasisNo
Attorney NameDavid A.W. Wong
Attorney Docket Number83882-342966

Timeline

2021-06-29Application Filed
2021-07-02Location: NEW APPLICATION PROCESSING
2021-07-02Status: Live/Pending
2021-07-02Transaction Date
2022-10-04Published
2022-11-29Location: INTENT TO USE SECTION
2023-07-03Status: Abandoned because no Statement of Use or Extension Request timely filed after Notice of Allowance was issued. To view all docume

Trademark Parties (Applicants & Owners)

Party: Stairwell, Inc.
AddressC200 883 N. Shoreline Blvd Mountain View, CALIFORNIA UNITED STATES 94043
Legal Entity TypeCorporation
Legal Entity StateDELAWARE

Attorney of Record

DAVID A.W. WONG
BARNES & THORNBURG LLP
11 SOUTH MERIDIAN STREET
INDIANAPOLIS, IN 46204-3535

Good, Services, and Codes

International Codes:9
U.S. Codes:021,023,026,036,038
International Codes:42
U.S. Codes:100,101
Type CodeType
GS0091downloadable and recorded computer software for providing computer security; downloadable and recorded computer software used to maintain security over or in computer networks, web applications and/or digital data; downloadable and recorded computer software for computer security risk and threat analysis, assessment, management, remediation, and elimination; downloadable and recorded computer anti-virus software; downloadable and recorded computer software for providing anti-virus scanning, detection, identification, security, management, remediation, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers, and electronic devices; downloadable and recorded computer software for computer security risk and threat analysis, assessment, management, remediation, and elimination for protecting computer hardware, systems, servers, data, and electronic devices; downloadable and recorded computer software in the nature of cybersecurity software tools for assessing the vulnerability of computer networks and for constant cybersecurity monitoring; downloadable and recorded computer software for calculating and simulating security breaches while providing suggestions to protect cybersecurity; downloadable and recorded computer software for collecting relevant configuration details through agents continuously monitoring the entire fleet of digital assets on a real-time basis; downloadable and recorded computer software for integrating employees' awareness, including employees' behavioral response patterns; downloadable and recorded computer software for providing real-time, on-demand comprehensive configuration and vulnerability assessments; downloadable and recorded computer software restricting unauthorized access to computer systems as part of information security management downloadable and recorded computer software for cybersecurity and computer security; downloadable and recorded computer software for use in preventing unauthorized access to and misuse of computer systems, identifying and detecting viruses, worms, trojans, spyware, adware, malware, and ransomware, authenticating domain-based email messages, and identifying malicious websites; downloadable and recorded computer security software, namely, software for cybersecurity monitoring and control of network activities on a computer; downloadable and recorded computer security software for assessing and quantifying digital security risks, threats, hacks, and data leakage across networks for cybersecurity; downloadable and recorded computer software, namely, software for data gathering, storage, manipulation, management and encryption, and management of security breach incidents and responses, for use in the fields of security, forensic, diagnostic, incident response, and education pertaining to information, computer and internet security; downloadable and recorded computer software for automated cybersecurity, digital forensics, cyber threat intelligence, and incident response; downloadable and recorded computer and information security software; downloadable and recorded computer software for managing security strategy and resources relating to the security risk industry; downloadable and recorded computer programs for managing security strategy and resources for use in the security risk industry; downloadable and recorded predictive computer and network vulnerability management software; downloadable and recorded computer malware incident forensics software; downloadable and recorded cybersecurity incident response software; downloadable and recorded computer software for assessing vulnerability, preventing and addressing cybersecurity threats and attacks; downloadable and recorded computer software for monitoring of computer systems for detecting unauthorized access or data breach; downloadable and recorded computer anti-virus and anti-malware software; downloadable and recorded internet security software; downloadable and recorded computer software for detection and prevention of viruses and malware; downloadable and recorded computer software for computer, data and network security; downloadable and recorded computer security software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers; downloadable and recorded computer software for comprehensive network security, intrusion prevention, event alerting, log capture, log analysis, network reporting, backup and recovery of digital and electronic data, and cybersecurity management

Trademark Filing History

DescriptionDateProceeding Number
ABANDONMENT NOTICE E-MAILED - NO USE STATEMENT FILED2023-07-03
ABANDONMENT - NO USE STATEMENT FILED2023-07-03
NOA E-MAILED - SOU REQUIRED FROM APPLICANT2022-11-29
PUBLISHED FOR OPPOSITION2022-10-04
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED2022-10-04
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED2022-09-14
NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED2022-08-30
EXAMINERS AMENDMENT E-MAILED2022-08-30
EXAMINERS AMENDMENT -WRITTEN2022-08-30
EXAMINER'S AMENDMENT ENTERED2022-08-30
APPROVED FOR PUB - PRINCIPAL REGISTER2022-08-30
NOTIFICATION OF NON-FINAL ACTION E-MAILED2022-02-14
NON-FINAL ACTION WRITTEN2022-02-14
NON-FINAL ACTION E-MAILED2022-02-14
ASSIGNED TO EXAMINER2022-02-12
TEAS CHANGE OF OWNER ADDRESS RECEIVED2022-02-09
TEAS CHANGE OF CORRESPONDENCE RECEIVED2022-02-09
APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED2022-02-09
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED2021-09-11
NEW APPLICATION ENTERED IN TRAM2021-07-02
NEW APPLICATION ENTERED2021-07-02

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed