N SECURE AVAILABLE RELIABLE COMPREHENSIVE DNS SERVICES ALWAYS-ON APP SECURITY DDOS ATTACK MITIGATION

Security Services, LLC

Application Filed: 2022-04-13
Trademark Application Details
Trademark Logo N SECURE AVAILABLE RELIABLE COMPREHENSIVE DNS SERVICES ALWAYS-ON APP SECURITY DDOS ATTACK MITIGATION

The mark consists of a shield with an inner center shield with three arms trisecting the outer shield. The inner shield contains a stylized letter "N". The upper left triad contains a stylized atom above the stacked wording "COMPREHENSIVE DNS SERVICES", the upper right triad contains a shield with a cross on the center surface and having the stacked wording "ALWAYS-ON APP SECURITY" under the shield, and the bottom triad containing a target with the stacked wording "DDOS ATTACK MITIGATION" below the target. Each arm of the trisecting bar contain one word from the following: "SECURE", "AVAILBLE", and "RELIABLE".

Mark For: N SECURE AVAILABLE RELIABLE COMPREHENSIVE DNS SERVICES ALWAYS-ON APP SECURITY DDOS ATTACK MITIGATION™ trademark registration is intended to cover the categories of computer hardware and downloadable software for use in assessing, analyzing and making inferences with respect to detecting, mitigating and resolving Internet traffic threats, assessing intelligence data, and analyzing and making inferences regarding end user's Internet traffic to determine how such traffic should be handled; Downloadable software for use in providing statistical analysis of business functions; downloadable software for providing demographic information and data concerning the geographic location of internet access devices used by consumers, the geographic locations of consumers, the connection speed and method by which consumers are accessing the internet, and the specific types of devices used by consumers to access the internet; Downloadable software for providing access to and creating databases featuring IT information about Internet Protocol addresses in the nature of the user's location, Internet service provider, organization, connection type, user type and other data associated with specific Internet Protocol addresses; Downloadable software for providing access to technology that allows users to determine the location, Internet service provider, organization, connection type, user type, and other data associated with specific Internet Protocol addresses; Downloadable software for providing (IP) address verification services; Downloadable software for providing access to and creating databases featuring the location, internet service provider and organization associated with specific internet addresses; Downloadable software for providing identification of website visitor geographical location by using IP address; Downloadable software for providing identification of the location and other characteristics of Internet users for a wide range of applications including content personalization, fraud detection, ad targeting, traffic analysis, compliance, geo-targeting, geofencing and digital rights management; Downloadable software for providing internet directory services, namely, recursive domain name server (DNS) services; Downloadable software for identification and tracking of IP addresses and ranking or scoring them according to their reputation; Downloadable software for use in detecting, mitigating and resolving Internet traffic threats and for use in providing intelligence data to assess, analyze and make inferences regarding an end user's Internet traffic, to make determinations as to how such traffic should be handled; Downloadable software for use in detecting, mitigating and resolving Internet traffic security threats; Downloadable software for use in compiling computer security threat intelligence data to assess, analyze and make inferences regarding an end user's Internet traffic and to make determinations as to how such traffic should be handled; Downloadable software for providing machine readable threat intelligence (MRTI) information and data to help determine if incoming Internet traffic is malicious and to discover associations among threat actors to track and block their activity. [all]

Status

2022-04-18 UTC
LIVE APPLICATION Awaiting Examination
The trademark application has been accepted by the Office (has met the minimum filing requirements) and has not yet been assigned to an examiner.


Research OneLook Acronym Finder
Serial Number97361962
Mark Literal ElementsN SECURE AVAILABLE RELIABLE COMPREHENSIVE DNS SERVICES ALWAYS-ON APP SECURITY DDOS ATTACK MITIGATION
Mark Drawing Type-
Mark TypeTRADEMARK. SERVICE MARK
Standard Character ClaimNo
RegisterPRINCIPAL
Current LocationNEW APPLICATION PROCESSING 2022-04-16
Basis1(b)
Class StatusACTIVE
Primary US Classes
  • 021: Electrical Apparatus, Machines and Supplies
  • 023: Cutlery, Machinery, Tools and Parts Thereof
  • 026: Measuring and Scientific Appliances
  • 036: Musical Instruments and Supplies
  • 038: Prints and Publications
Primary International Class
  • 009 - Primary Class
  • (Electrical and scientific apparatus) Scientific, nautical, surveying, electric, photographic, cinematographic, optical, weighing, measuring, signaling, checking (supervision), lifesaving and teaching apparatus and instruments; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
Filed UseNo
Current UseNo
Intent To UseYes
Filed ITUYes
44D FiledNo
44E CurrentNo
66A CurrentNo
Current BasisNo
No BasisNo
Attorney NamePeter J. Riebling
Attorney Docket Number000378-00006

Timeline

2022-04-13Application Filed
2022-04-16Location: NEW APPLICATION PROCESSING
2022-04-16Status: Live/Pending
2022-04-16Status: New application will be assigned to an examining attorney approximately 6 months after filing date.
2022-04-16Transaction Date

Trademark Parties (Applicants & Owners)

Party: Security Services, LLC
Address45890 Center Oak Plaza Sterling, VIRGINIA UNITED STATES 20166
Legal Entity TypeLimited Liability Company
Legal Entity StateDELAWARE

Documents

Application2022-04-13
Drawing2022-04-13

Design Search Codes

010905Atomic models; Molecular models
010925Asteroids; Atoms; Meteors
210324Targets with alignment guides; Targets with crosshairs
240102Shields or crests with figurative elements contained therein or superimposed thereon
240103Shields or crests with letters, punctuation or inscriptions contained therein or superimposed thereon
240105More than one shield or crest; Shields or crests (more than one)
241301Cross, Latin (shorter horizontal lines); Latin cross (shorter horizontal lines)

Attorney of Record

PETER J. RIEBLING
RIEBLING IP, PLLC
1717 PENNSYLVANIA AVENUE, N.W.
SUITE 1025
WASHINGTON, DC 20006

Good, Services, and Codes


IC 009. US 021 023 026 036 038. G & S: Computer hardware and downloadable software for use in assessing, analyzing and making inferences with respect to detecting, mitigating and resolving Internet traffic threats, assessing intelligence data, and analyzing and making inferences regarding end user's Internet traffic to determine how such traffic should be handled; Downloadable software for use in providing statistical analysis of business functions; downloadable software for providing demographic information and data concerning the geographic location of internet access devices used by consumers, the geographic locations of consumers, the connection speed and method by which consumers are accessing the internet, and the specific types of devices used by consumers to access the internet; Downloadable software for providing access to and creating databases featuring IT information about Internet Protocol addresses in the nature of the user's location, Internet service provider, organization, connection type, user type and other data associated with specific Internet Protocol addresses; Downloadable software for providing access to technology that allows users to determine the location, Internet service provider, organization, connection type, user type, and other data associated with specific Internet Protocol addresses; Downloadable software for providing (IP) address verification services; Downloadable software for providing access to and creating databases featuring the location, internet service provider and organization associated with specific internet addresses; Downloadable software for providing identification of website visitor geographical location by using IP address; Downloadable software for providing identification of the location and other characteristics of Internet users for a wide range of applications including content personalization, fraud detection, ad targeting, traffic analysis, compliance, geo-targeting, geofencing and digital rights management; Downloadable software for providing internet directory services, namely, recursive domain name server (DNS) services; Downloadable software for identification and tracking of IP addresses and ranking or scoring them according to their reputation; Downloadable software for use in detecting, mitigating and resolving Internet traffic threats and for use in providing intelligence data to assess, analyze and make inferences regarding an end user's Internet traffic, to make determinations as to how such traffic should be handled; Downloadable software for use in detecting, mitigating and resolving Internet traffic security threats; Downloadable software for use in compiling computer security threat intelligence data to assess, analyze and make inferences regarding an end user's Internet traffic and to make determinations as to how such traffic should be handled; Downloadable software for providing machine readable threat intelligence (MRTI) information and data to help determine if incoming Internet traffic is malicious and to discover associations among threat actors to track and block their activity
IC 042. US 100 101. G & S: Providing on-line searchable databases featuring IT information about Internet Protocol addresses in the nature of the user's location, Internet service provider, organization, connection type, user type and other data associated with specific Internet Protocol addresses; computer services, namely, providing an interactive web site featuring technology that allows users to determine the location, Internet service provider, organization, connection type, user type, and other data associated with specific Internet Protocol addresses; Internet Protocol (IP) address verification services; providing online searchable databases featuring the location, internet service provider and organization associated with specific internet addresses; providing an interactive website featuring technology that enables user to identify the geographical location of website visitors by IP address, for a wide range of applications including, fraud detection, compliance, geo-targeting, geo-fencing and digital rights management; computer security threat analysis for protecting data by providing using threat analysis data to assess, analyze and make inferences regarding an end user's Internet traffic and to make determinations as to how such traffic should be handled; Network security and threat detection, mitigation and resolution services, namely, providing temporary use of non-downloadable cloud-based software for cleaning, scrubbing and filtering of malicious internet and network traffic; electronic monitoring and reporting of servers, networks, network systems, network data, network information, data packets, and internet protocol traffic using computers for security purposes and providing related reports featuring suspicious and abnormal patterns and anomalies of networks, system activity reports, and event notification alerts; providing temporary use on non-downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing online threats; providing temporary use of on-line non-downloadable software for use in preventing access to malicious websites and online threats; providing temporary use of online non-downloadable software for use in blocking unwanted and inappropriate internet and network traffic, for mitigating against and defending networks and websites from distributed denial of service (DDoS) attacks and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime; providing temporary use of online non-downloadable software for use in providing bot management, mitigation, protection and guarding against online and software threats; Computer security services, namely, a providing temporary use of non-downloadable cloud-based firewall software that monitors and filters DNS queries to prevent and block computer network users from accessing unwanted and inappropriate content and from accessing custom-designated third-party websites or preventing access to malicious websites or online threats; providing temporary use of cloud-based computer software for domain name system (DNS resolution services); computer security threat analysis for protecting data by protecting online businesses from the effects of DNS-based DDoS attacks and other threats; computer security threat analysis for protecting data through identification, blocking and mitigating targeted online threats such as malware, ransom ware, phishing, DNS data exfiltration, and advanced zero-day attacks; providing temporary use of on-line non-downloadable website software application and API security and threat detection, mitigation and resolution services, namely, a web application firewall (WAF) that cleans, scrubs and filters malicious attacks against website software applications and application programming interface (API's); electronic monitoring of website software applications and API's for security purposes and providing related reports featuring suspicious and abnormal patterns, anomalies and activities; providing temporary use of online downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing threats to website software applications and API's; computer security services, namely, providing temporary use of online non-downloadable software for use restricting unauthorized network access by preventing access to malicious websites and online threats, blocking unwanted and inappropriate interactions with website software applications and API's, mitigating against and defending attacks against website software applications and API's and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime; DNS resolver services that make DNS queries faster and more secure for faster and more private browsing of the Internet, namely, providing temporary use of online non-downloadable computer software for use in securing and speeding internet browsing capacity; global DNS resolution service, namely, computer code conversion for others; providing temporary use of non-downloadable software for use in providing an internet directory comprising recursive domain name server (DNS) services

International Codes:9
U.S. Codes:021,023,026,036,038
International Codes:42
U.S. Codes:100,101
Type CodeType
DM0000The mark consists of a shield with an inner center shield with three arms trisecting the outer shield. The inner shield contains a stylized letter "N". The upper left triad contains a stylized atom above the stacked wording "COMPREHENSIVE DNS SERVICES", the upper right triad contains a shield with a cross on the center surface and having the stacked wording "ALWAYS-ON APP SECURITY" under the shield, and the bottom triad containing a target with the stacked wording "DDOS ATTACK MITIGATION" below the target. Each arm of the trisecting bar contain one word from the following: "SECURE", "AVAILBLE", and "RELIABLE".

Trademark Filing History

DescriptionDateProceeding Number
NEW APPLICATION ENTERED IN TRAM2022-04-16

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed