The mark consists of the letters RC alongside a container and shield design inside of circle, which is inside a square.
Mark For: RC™ trademark registration is intended to cover the categories of
>Color is not claimed as a feature of the mark. The mark consists of the letters RC alongside a container and shield design inside of circle, which is inside a square.
Research |
![]() ![]() ![]() ![]() ![]() |
Serial Number | 97431925 |
Mark Literal Elements | RC |
Mark Drawing Type | 3 - AN ILLUSTRATION DRAWING WHICH INCLUDES WORD(S)/ LETTER(S)/NUMBER(S) |
Mark Type | TRADEMARK. SERVICE MARK |
Standard Character Claim | No |
Register | PRINCIPAL |
Current Location | NEW APPLICATION PROCESSING 2022-05-31 |
Basis | 44(d) |
Class Status | ACTIVE |
Primary US Classes |
|
Primary International Class |
|
Filed Use | No |
Current Use | No |
Intent To Use | No |
Filed ITU | No |
44D Filed | Yes |
44E Current | No |
66A Current | No |
Current Basis | No |
No Basis | No |
Attorney Name | Bradley M. Stohry |
2022-05-27 | Application Filed |
2022-05-31 | Location: NEW APPLICATION PROCESSING |
2022-05-31 | Status: Live/Pending |
2022-05-31 | Status: New application will be assigned to an examining attorney approximately 6 months after filing date. |
2022-05-31 | Transaction Date |
Party: | ![]() |
Address | ï¿¿ster Snedevej 15B, st. Vejle ï¿¿st DENMARK 7120 |
Legal Entity Type | Aktieselskab (a/s) |
Legal Entity State | DENMARK |
![]() | 2022-05-27 | |
![]() | 2022-05-27 | |
![]() | APPLICATION/XML | 2022-06-03 |
26.01.02 | Circles, plain single line; Plain single line circles |
26.09.21 | Squares that are completely or partially shaded |
190504 | Other large cylindrical containers or drums, including trash cans |
240101 | Shields or crests (plain) with neither a figurative element nor an inscription contained therein or superimposed thereon |
260102 | Circles, plain single line; Plain single line circles |
260921 | Squares that are completely or partially shaded |
IC 009. US 021 023 026 036 038. G & S: Computer hardware; Downloadable software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Recorded software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Downloadable computer firmware for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Recorded computer firmware for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices
IC 042. US 100 101. G & S: Computer security consultancy; Computer security services, namely, restricting unauthorized access to computer networks and monitored devices; Computer technology consultancy; Computer virus protection services; Computer network security consultancy; Consultation services relating to computer software; Design and development of computer firmware; Development of computer platforms; Information technology consulting services; Maintenance of computer software relating to computer security and prevention of computer risks; Monitoring of computer systems for detecting unauthorized access or data breach; Providing on-line non-downloadable software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Providing temporary use of on-line non-downloadable software for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Rental of computer application software for use in detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Software as a service (SAAS) services featuring software for use in detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices; Software design and development; Computer software consultancy; Design and development of computer hardware; Providing temporary use of on-line non-downloadable firmware for detecting, responding to, recovering from, and reporting issues related to cybersecurity breaches and illegitimate encryption on monitored devices
International Codes: | 9 |
U.S. Codes: | 021,023,026,036,038 |
International Codes: | 42 |
U.S. Codes: | 100,101 |
Type Code | Type |
---|---|
DM0000 | The mark consists of the letters RC alongside a container and shield design inside of circle, which is inside a square. |
DM0000 | The mark consists of the letters "RC" alongside a container and shield design inside of circle, which is inside a square. |
Description | Date | Proceeding Number |
---|---|---|
NOTICE OF DESIGN SEARCH CODE E-MAILED | 2022-06-03 | |
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM | 2022-06-02 | |
NEW APPLICATION ENTERED IN TRAM | 2022-05-31 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.