Application

SWELL

Stairwell, Inc.

Trademark/Service Mark Application, Principal Register

PTO- 1478
Approved for use through 06/30/2021. OMB 0651-0009
U.S. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
Under the Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it contains a valid OMB control number

Trademark/Service Mark Application, Principal Register

Serial Number: 90801520
Filing Date: 06/29/2021

The table below presents the data as entered.

Input Field
Entered
SERIAL NUMBER 90801520
MARK INFORMATION
*MARK SWELL
STANDARD CHARACTERS YES
USPTO-GENERATED IMAGE YES
LITERAL ELEMENT SWELL
MARK STATEMENT The mark consists of standard characters, without claim to any particular font style, size, or color.
REGISTER Principal
APPLICANT INFORMATION
*OWNER OF MARK Stairwell, Inc.
*MAILING ADDRESS 500 University Avenue
*CITY Palo Alto
*STATE
(Required for U.S. applicants)
California
*COUNTRY/REGION/JURISDICTION/U.S. TERRITORY United States
*ZIP/POSTAL CODE
(Required for U.S. and certain international addresses)
94301
*EMAIL ADDRESS XXXX
LEGAL ENTITY INFORMATION
TYPE corporation
STATE/COUNTRY/REGION/JURISDICTION/U.S. TERRITORY OF INCORPORATION Delaware
GOODS AND/OR SERVICES AND BASIS INFORMATION
INTERNATIONAL CLASS 009 
*IDENTIFICATION downloadable and recorded computer software for providing computer security; downloadable and recorded computer software used to maintain security over or in computer networks, web applications and/or digital data; downloadable and recorded computer software for computer security risk and threat analysis, assessment, management, remediation, and elimination; downloadable and recorded computer anti-virus software; downloadable and recorded computer software for providing anti-virus scanning, detection, identification, security, management, remediation, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers, and electronic devices; downloadable and recorded computer software for computer security risk and threat analysis, assessment, management, remediation, and elimination for protecting computer hardware, systems, servers, data, and electronic devices; downloadable and recorded computer software in the nature of cybersecurity software tools for assessing the vulnerability of computer networks and for constant cybersecurity monitoring; downloadable and recorded computer software for calculating and simulating security breaches while providing suggestions to protect cybersecurity; downloadable and recorded computer software for collecting relevant configuration details through agents continuously monitoring the entire fleet of digital assets on a real-time basis; downloadable and recorded computer software for integrating employees' awareness, including employees' behavioral response patterns; downloadable and recorded computer software for providing real-time, on-demand comprehensive configuration and vulnerability assessments; downloadable and recorded computer software restricting unauthorized access to computer systems as part of information security management downloadable and recorded computer software for cybersecurity and computer security; downloadable and recorded computer software for use in preventing unauthorized access to and misuse of computer systems, identifying and detecting viruses, worms, trojans, spyware, adware, malware, and ransomware, authenticating domain-based email messages, and identifying malicious websites; downloadable and recorded computer security software, namely, software for cybersecurity monitoring and control of network activities on a computer; downloadable and recorded computer security software for assessing and quantifying digital security risks, threats, hacks, and data leakage across networks for cybersecurity; downloadable and recorded computer software, namely, software for data gathering, storage, manipulation, management and encryption, and management of security breach incidents and responses, for use in the fields of security, forensic, diagnostic, incident response, and education pertaining to information, computer and internet security; downloadable and recorded computer software for automated cybersecurity, digital forensics, cyber threat intelligence, and incident response; downloadable and recorded computer and information security software; downloadable and recorded computer software for managing security strategy and resources relating to the security risk industry; downloadable and recorded computer programs for managing security strategy and resources for use in the security risk industry; downloadable and recorded predictive computer and network vulnerability management software; downloadable and recorded computer malware incident forensics software; downloadable and recorded cybersecurity incident response software; downloadable and recorded computer software for assessing vulnerability, preventing and addressing cybersecurity threats and attacks; downloadable and recorded computer software for monitoring of computer systems for detecting unauthorized access or data breach; downloadable and recorded computer anti-virus and anti-malware software; downloadable and recorded internet security software; downloadable and recorded computer software for detection and prevention of viruses and malware; downloadable and recorded computer software for computer, data and network security; downloadable and recorded computer security software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers; downloadable and recorded computer software for comprehensive network security, intrusion prevention, event alerting, log capture, log analysis, network reporting, backup and recovery of digital and electronic data, and cybersecurity management
FILING BASIS SECTION 1(b)
INTERNATIONAL CLASS 042 
*IDENTIFICATION software as a service (SaaS), namely, providing temporary use of non-downloadable and recorded software for providing computer security; software as a service (SaaS), namely, providing temporary use of non-downloadable and recorded software used to maintain security over or in computer networks, web applications and/or digital data; software as a service (SaaS), namely, providing temporary use of non-downloadable and recorded software for computer security risk and threat analysis, assessment, management, remediation, and elimination; software as a service (SaaS), namely, providing temporary use of non-downloadable and recorded anti-virus software; application service provider featuring software for providing anti-virus scanning, detection, identification, security, management, remediation, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers and electronic devices; providing temporary use of non-downloadable and recorded software for computer security risk and threat analysis, assessment, management, remediation, and elimination for protecting computer hardware, systems, servers, data, and electronic devices; software as a service (SaaS), namely, providing temporary use of non-downloadable and recorded cybersecurity software tools for assessing the vulnerability of computer networks and for constant cybersecurity monitoring; software as a service (SaaS) services featuring software for calculating and simulating security breaches while providing suggestions to protect cybersecurity; software as a service (SaaS) services featuring software for collecting relevant configuration details through agents continuously monitoring the entire fleet of digital assets on a real-time basis; software as a service (SaaS) services featuring software for integrating employees' awareness, including employees' behavioral response patterns; software as a service (SaaS) services featuring software for providing real-time, on-demand comprehensive configuration and vulnerability assessments; software as a service (SaaS) services featuring software restricting unauthorized access to computer systems as part of information security management; software as a service (SaaS) services featuring software, configurations and controls for cybersecurity and computer security; software as a service (SaaS) services, featuring software, configurations and controls for use in preventing unauthorized access to and misuse of computer systems, identifying and detecting viruses, worms, trojans, spyware, adware, malware, and ransomware, authenticating domain-based email messages, and identifying malicious websites; software as a service (SaaS) services featuring software for cybersecurity monitoring and control of network activities on a computer; software as a service (SaaS) services featuring software for assessing and quantifying digital security risks, threats, hacks, and data leakage across networks for cybersecurity; computer services, namely, providing forensic services to recover lost and deleted data; computer services, namely, monitoring of computer systems for detecting unauthorized access or data breach; software as a service (SaaS) services featuring software for automated cybersecurity, digital forensics, cyber threat intelligence, and incident response; software as a service (SaaS) services featuring computer and information security software; software as a service (SaaS) services featuring software for managing security strategy and resources relating to the security risk industry; software as a service (SaaS) services featuring software for managing security strategy and resources for use in the security risk industry; software as a service (SaaS) services featuring predictive computer and network vulnerability management software; software as a service (SaaS) services featuring malware incident forensics software; software as a service (SaaS) services featuring cybersecurity incident response software; software as a service (SaaS) services featuring software for assessing vulnerability, preventing and addressing cybersecurity threats and attacks; software as a service (SaaS) services featuring computer and internet security software, computer antivirus software, and anti-malware software; software as a service (SaaS) services featuring software for computer, data and network security; software as a service (SaaS) services featuring computer security software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers; software as a service (SaaS) featuring software for comprehensive network security, intrusion prevention, event alerting, log capture, log analysis, network reporting, backup and recovery of digital and electronic data, and cybersecurity management
FILING BASIS SECTION 1(b)
ATTORNEY INFORMATION
NAME David A.W. Wong
ATTORNEY DOCKET NUMBER 83882-342966
ATTORNEY BAR MEMBERSHIP NUMBER XXX
YEAR OF ADMISSION XXXX
U.S. STATE/ COMMONWEALTH/ TERRITORY XX
FIRM NAME Barnes & Thornburg LLP
STREET 11 South Meridian Street
CITY Indianapolis
STATE Indiana
COUNTRY/REGION/JURISDICTION/U.S. TERRITORY United States
ZIP/POSTAL CODE 46204-3535
PHONE 317-236-1313
FAX 317-231-7433
EMAIL ADDRESS dwong@btlaw.com
OTHER APPOINTED ATTORNEY All attorneys at law with the law firm of Barnes & Thornburg LLP
CORRESPONDENCE INFORMATION
NAME David A.W. Wong
PRIMARY EMAIL ADDRESS FOR CORRESPONDENCE dwong@btlaw.com
SECONDARY EMAIL ADDRESS(ES) (COURTESY COPIES) TMINDocket@btlaw.com; cbrinson@btlaw.com
FEE INFORMATION
APPLICATION FILING OPTION TEAS Standard
NUMBER OF CLASSES 2
APPLICATION FOR REGISTRATION PER CLASS 350
*TOTAL FEES DUE 700
*TOTAL FEES PAID 700
SIGNATURE INFORMATION
SIGNATURE /Jan Kang/
SIGNATORY'S NAME Jan Kang
SIGNATORY'S POSITION COO + General Counsel
DATE SIGNED 06/29/2021
SIGNATURE METHOD Sent to third party for signature



PTO- 1478
Approved for use through 06/30/2021. OMB 0651-0009
U.S. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
Under the Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it contains a valid OMB control number


Trademark/Service Mark Application, Principal Register

Serial Number: 90801520
Filing Date: 06/29/2021

To the Commissioner for Trademarks:

MARK: SWELL (Standard Characters, see mark)
The literal element of the mark consists of SWELL. The mark consists of standard characters, without claim to any particular font style, size, or color.
The applicant, Stairwell, Inc., a corporation of Delaware, having an address of
      500 University Avenue
      Palo Alto, California 94301
      United States
      XXXX

requests registration of the trademark/service mark identified above in the United States Patent and Trademark Office on the Principal Register established by the Act of July 5, 1946 (15 U.S.C. Section 1051 et seq.), as amended, for the following:

International Class 009:  downloadable and recorded computer software for providing computer security; downloadable and recorded computer software used to maintain security over or in computer networks, web applications and/or digital data; downloadable and recorded computer software for computer security risk and threat analysis, assessment, management, remediation, and elimination; downloadable and recorded computer anti-virus software; downloadable and recorded computer software for providing anti-virus scanning, detection, identification, security, management, remediation, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers, and electronic devices; downloadable and recorded computer software for computer security risk and threat analysis, assessment, management, remediation, and elimination for protecting computer hardware, systems, servers, data, and electronic devices; downloadable and recorded computer software in the nature of cybersecurity software tools for assessing the vulnerability of computer networks and for constant cybersecurity monitoring; downloadable and recorded computer software for calculating and simulating security breaches while providing suggestions to protect cybersecurity; downloadable and recorded computer software for collecting relevant configuration details through agents continuously monitoring the entire fleet of digital assets on a real-time basis; downloadable and recorded computer software for integrating employees' awareness, including employees' behavioral response patterns; downloadable and recorded computer software for providing real-time, on-demand comprehensive configuration and vulnerability assessments; downloadable and recorded computer software restricting unauthorized access to computer systems as part of information security management downloadable and recorded computer software for cybersecurity and computer security; downloadable and recorded computer software for use in preventing unauthorized access to and misuse of computer systems, identifying and detecting viruses, worms, trojans, spyware, adware, malware, and ransomware, authenticating domain-based email messages, and identifying malicious websites; downloadable and recorded computer security software, namely, software for cybersecurity monitoring and control of network activities on a computer; downloadable and recorded computer security software for assessing and quantifying digital security risks, threats, hacks, and data leakage across networks for cybersecurity; downloadable and recorded computer software, namely, software for data gathering, storage, manipulation, management and encryption, and management of security breach incidents and responses, for use in the fields of security, forensic, diagnostic, incident response, and education pertaining to information, computer and internet security; downloadable and recorded computer software for automated cybersecurity, digital forensics, cyber threat intelligence, and incident response; downloadable and recorded computer and information security software; downloadable and recorded computer software for managing security strategy and resources relating to the security risk industry; downloadable and recorded computer programs for managing security strategy and resources for use in the security risk industry; downloadable and recorded predictive computer and network vulnerability management software; downloadable and recorded computer malware incident forensics software; downloadable and recorded cybersecurity incident response software; downloadable and recorded computer software for assessing vulnerability, preventing and addressing cybersecurity threats and attacks; downloadable and recorded computer software for monitoring of computer systems for detecting unauthorized access or data breach; downloadable and recorded computer anti-virus and anti-malware software; downloadable and recorded internet security software; downloadable and recorded computer software for detection and prevention of viruses and malware; downloadable and recorded computer software for computer, data and network security; downloadable and recorded computer security software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers; downloadable and recorded computer software for comprehensive network security, intrusion prevention, event alerting, log capture, log analysis, network reporting, backup and recovery of digital and electronic data, and cybersecurity management
Intent to Use: The applicant has a bona fide intention, and is entitled, to use the mark in commerce on or in connection with the identified goods/services.

International Class 042:  software as a service (SaaS), namely, providing temporary use of non-downloadable and recorded software for providing computer security; software as a service (SaaS), namely, providing temporary use of non-downloadable and recorded software used to maintain security over or in computer networks, web applications and/or digital data; software as a service (SaaS), namely, providing temporary use of non-downloadable and recorded software for computer security risk and threat analysis, assessment, management, remediation, and elimination; software as a service (SaaS), namely, providing temporary use of non-downloadable and recorded anti-virus software; application service provider featuring software for providing anti-virus scanning, detection, identification, security, management, remediation, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers and electronic devices; providing temporary use of non-downloadable and recorded software for computer security risk and threat analysis, assessment, management, remediation, and elimination for protecting computer hardware, systems, servers, data, and electronic devices; software as a service (SaaS), namely, providing temporary use of non-downloadable and recorded cybersecurity software tools for assessing the vulnerability of computer networks and for constant cybersecurity monitoring; software as a service (SaaS) services featuring software for calculating and simulating security breaches while providing suggestions to protect cybersecurity; software as a service (SaaS) services featuring software for collecting relevant configuration details through agents continuously monitoring the entire fleet of digital assets on a real-time basis; software as a service (SaaS) services featuring software for integrating employees' awareness, including employees' behavioral response patterns; software as a service (SaaS) services featuring software for providing real-time, on-demand comprehensive configuration and vulnerability assessments; software as a service (SaaS) services featuring software restricting unauthorized access to computer systems as part of information security management; software as a service (SaaS) services featuring software, configurations and controls for cybersecurity and computer security; software as a service (SaaS) services, featuring software, configurations and controls for use in preventing unauthorized access to and misuse of computer systems, identifying and detecting viruses, worms, trojans, spyware, adware, malware, and ransomware, authenticating domain-based email messages, and identifying malicious websites; software as a service (SaaS) services featuring software for cybersecurity monitoring and control of network activities on a computer; software as a service (SaaS) services featuring software for assessing and quantifying digital security risks, threats, hacks, and data leakage across networks for cybersecurity; computer services, namely, providing forensic services to recover lost and deleted data; computer services, namely, monitoring of computer systems for detecting unauthorized access or data breach; software as a service (SaaS) services featuring software for automated cybersecurity, digital forensics, cyber threat intelligence, and incident response; software as a service (SaaS) services featuring computer and information security software; software as a service (SaaS) services featuring software for managing security strategy and resources relating to the security risk industry; software as a service (SaaS) services featuring software for managing security strategy and resources for use in the security risk industry; software as a service (SaaS) services featuring predictive computer and network vulnerability management software; software as a service (SaaS) services featuring malware incident forensics software; software as a service (SaaS) services featuring cybersecurity incident response software; software as a service (SaaS) services featuring software for assessing vulnerability, preventing and addressing cybersecurity threats and attacks; software as a service (SaaS) services featuring computer and internet security software, computer antivirus software, and anti-malware software; software as a service (SaaS) services featuring software for computer, data and network security; software as a service (SaaS) services featuring computer security software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers; software as a service (SaaS) featuring software for comprehensive network security, intrusion prevention, event alerting, log capture, log analysis, network reporting, backup and recovery of digital and electronic data, and cybersecurity management
Intent to Use: The applicant has a bona fide intention, and is entitled, to use the mark in commerce on or in connection with the identified goods/services.



The owner's/holder's proposed attorney information: David A.W. Wong. Other appointed attorneys are All attorneys at law with the law firm of Barnes & Thornburg LLP. David A.W. Wong of Barnes & Thornburg LLP, is a member of the XX bar, admitted to the bar in XXXX, bar membership no. XXX, and the attorney(s) is located at
      11 South Meridian Street
      Indianapolis, Indiana 46204-3535
      United States
      317-236-1313(phone)
      317-231-7433(fax)
      dwong@btlaw.com
The docket/reference number is 83882-342966.
David A.W. Wong submitted the following statement: The attorney of record is an active member in good standing of the bar of the highest court of a U.S. state, the District of Columbia, or any U.S. Commonwealth or territory.
The applicant's current Correspondence Information:
      David A.W. Wong
       PRIMARY EMAIL FOR CORRESPONDENCE: dwong@btlaw.com
       SECONDARY EMAIL ADDRESS(ES) (COURTESY COPIES): TMINDocket@btlaw.com; cbrinson@btlaw.com


Requirement for Email and Electronic Filing: I understand that a valid email address must be maintained by the applicant owner/holder and the applicant owner's/holder's attorney, if appointed, and that all official trademark correspondence must be submitted via the Trademark Electronic Application System (TEAS).
A fee payment in the amount of $700 has been submitted with the application, representing payment for 2 class(es).

Declaration

Declaration Signature

Signature: /Jan Kang/   Date: 06/29/2021
Signatory's Name: Jan Kang
Signatory's Position: COO + General Counsel
Signatory's Phone Number: Not Provided
Signature method: Sent to third party for signature
Payment Sale Number: 90801520
Payment Accounting Date: 06/29/2021

Serial Number: 90801520
Internet Transmission Date: Tue Jun 29 15:53:36 ET 2021
TEAS Stamp: USPTO/BAS-X.X.XXX.XXX-202106291553369625
10-90801520-780d33ce861c57bd746099f02e71
4dda4e56ee422a6155cbf0ec63658835815c-CC-
53320617-20210629081203121323

Application [image/jpeg]


uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed