MICROSOFT DEFENDER

Microsoft Corporation

Application Filed: 2022-10-05
Trademark Application Details
Trademark Logo MICROSOFT DEFENDER

Mark For: MICROSOFT DEFENDER® trademark registration is intended to cover the categories of downloadable computer software, namely, downloadable computer security software for computer, applications, cloud, and computer network security, automated domain threat protection and prevention, analysis, management and integration of threat data, security information and event management, detection, investigation and elimination of computer threats, cyberattacks and data breaches, threat and intrusion detection and prevention, exploit protection and prevention, and automated remediation and restoration of compromised computer software and hardware, downloadable computer anti-virus, anti-malware, and privacy control software, downloadable computer software for developing custom security threat detection, investigation, and response tools, downloadable computer software for monitoring applications installed and running on a computer, computer security audits and performance diagnostics, and for scanning, removing and blocking computer applications and files, downloadable computer software for securing, scanning, authenticating, and encrypting email, documents, website links, and data, and controlled folder access, downloadable computer software for securing, scanning, regulating access, and authenticating software tools, role-based access, IP addresses, domains, computer peripherals, and endpoints, downloadable computer security software for the collection, editing, organizing, modifying, transmission, processing, storage, analysis, and sharing of data and information, downloadable computer security software for the creation, monitoring, and enforcement of security protocols, credentials, and policies, downloadable computer software for detecting, analyzing, monitoring, displaying, and countering computer security threats, generating security reports, providing security alerts, and for security compliance, downloadable computer software for collecting and processing user behavioral signals and providing insights, analyzing network traffic, endpoint detections and remediation, attack surfaces reduction, firewall creation, and responses to security threats, downloadable computer software for online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, ransomware, grayware, phishing attempts, and unauthorized data and programs on computers, networks, and electronic devices; none of the aforementioned goods for use in or in relation to vehicles, residential and commercial security systems, home automation systems, and security for physical premises, and protective covers, cases, casings, carrying cases, and chargers for electronic devices. [all]

Status

2023-03-24 UTC
LIVE APPLICATION Awaiting Examination
The trademark application has been accepted by the Office (has met the minimum filing requirements) and has not yet been assigned to an examiner.


Research OneLook Acronym Finder
Serial Number97620590
Registration Number1709898
Mark Literal ElementsMICROSOFT DEFENDER
Mark Drawing Type4 - STANDARD CHARACTER MARK
Mark TypeTRADEMARK. SERVICE MARK
RegisterPRINCIPAL
Current LocationNEW APPLICATION PROCESSING 2022-10-08
Basis1(a) 44(d)
Class StatusACTIVE
Primary US Classes
  • 021: Electrical Apparatus, Machines and Supplies
  • 023: Cutlery, Machinery, Tools and Parts Thereof
  • 026: Measuring and Scientific Appliances
  • 036: Musical Instruments and Supplies
  • 038: Prints and Publications
Primary International Class
  • 009 - Primary Class
  • (Electrical and scientific apparatus) Scientific, nautical, surveying, electric, photographic, cinematographic, optical, weighing, measuring, signaling, checking (supervision), lifesaving and teaching apparatus and instruments; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
Filed UseYes
Current UseYes
Intent To UseNo
Filed ITUNo
44D FiledYes
44E CurrentNo
66A CurrentNo
Current BasisNo
No BasisNo
Attorney NameApril L. Besl

Timeline

2019-03-21Date of First Use
2019-03-21Date of Use In Commerce
2022-10-05Application Filed
2022-10-08Location: NEW APPLICATION PROCESSING
2022-10-08Status: Live/Pending
2022-10-08Status: New application awaiting assignment to an examining attorney. See current trademark processing wait times for more information.
2022-10-08Transaction Date

Trademark Parties (Applicants & Owners)

Party: Microsoft Corporation
Address255 East Fifth Street, Suite 1900 Cincinnati, OHIO UNITED STATES 45202
Legal Entity TypeCorporation
Legal Entity StateWASHINGTON

Documents

Attorney of Record

APRIL L. BESL
DINSMORE & SHOHL LLP
255 EAST FIFTH STREET SUITE 1900
CINCINNATI, OH 45202

Good, Services, and Codes


IC 009. US 021 023 026 036 038. G & S: Downloadable computer software, namely, downloadable computer security software for computer, applications, cloud, and computer network security, automated domain threat protection and prevention, analysis, management and integration of threat data, security information and event management, detection, investigation and elimination of computer threats, cyberattacks and data breaches, threat and intrusion detection and prevention, exploit protection and prevention, and automated remediation and restoration of compromised computer software and hardware, downloadable computer anti-virus, anti-malware, and privacy control software, downloadable computer software for developing custom security threat detection, investigation, and response tools, downloadable computer software for monitoring applications installed and running on a computer, computer security audits and performance diagnostics, and for scanning, removing and blocking computer applications and files, downloadable computer software for securing, scanning, authenticating, and encrypting email, documents, website links, and data, and controlled folder access, downloadable computer software for securing, scanning, regulating access, and authenticating software tools, role-based access, IP addresses, domains, computer peripherals, and endpoints, downloadable computer security software for the collection, editing, organizing, modifying, transmission, processing, storage, analysis, and sharing of data and information, downloadable computer security software for the creation, monitoring, and enforcement of security protocols, credentials, and policies, downloadable computer software for detecting, analyzing, monitoring, displaying, and countering computer security threats, generating security reports, providing security alerts, and for security compliance, downloadable computer software for collecting and processing user behavioral signals and providing insights, analyzing network traffic, endpoint detections and remediation, attack surfaces reduction, firewall creation, and responses to security threats, downloadable computer software for online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, ransomware, grayware, phishing attempts, and unauthorized data and programs on computers, networks, and electronic devices; none of the aforementioned goods for use in or in relation to vehicles, residential and commercial security systems, home automation systems, and security for physical premises, and protective covers, cases, casings, carrying cases, and chargers for electronic devices. FIRST USE: 20190321. FIRST USE IN COMMERCE: 20190321
IC 038. US 100 101 104. G & S: Telecommunication services, namely, electronic transmission, delivery, and retrieval of data, messages, images, digital files, documents, and other data among users of computers, telecommunication services, namely, electronic transmission, delivery, and retrieval of data, messages, images, digital files, documents, and other data by telecommunications networks, wireless communication networks, global communications networks, global computer networks, cloud-based computer networks, and the Internet, telecommunication services, namely, information transmission via electronic communications networks, telecommunication services, namely, transmission of electronic mail and messaging services, telecommunication services, namely, providing access to databases and telecommunications access services, telecommunication services, namely, telecommunications access services for the collection and supply of information, telecommunication services, namely, providing user access to local area computer networks, global computer networks, computer databases, cloud-based computer networks, and the Internet, telecommunication services, namely, electronic transmission of geolocation data from mobile devices, telecommunication services, namely, electronic bulletin board services, telecommunication services, namely, provision of online electronic communication links which transfer the website user to other local and global webpages, telecommunication services, namely, information, advice, and consultancy services in the field of telecommunications, telecommunication services, namely, transmission of data, messages, images, digital files, documents, and other data via telecommunications network; none of the aforementioned services for use in or in relation to vehicles, and residential and commercial security systems, home automation systems, and security for physical premises. FIRST USE: 20190321. FIRST USE IN COMMERCE: 20190321
IC 042. US 100 101. G & S: Software as a service (SaaS) services, namely, providing temporary use of online non-downloadable computer security software for computer, applications, cloud and computer network security, automated domain threat protection and prevention, analysis, management and integration of threat data, security information and event management, detection, investigation and elimination of computer threats, cyberattacks and data breaches, threat and intrusion detection and prevention, exploit protection and prevention, and automated remediation and restoration of compromised computer software and hardware, software as a service (SaaS) services, namely, providing temporary use of online non-downloadable computer software for anti-virus, anti-malware, and privacy protection, software as a service (SaaS) services, namely, providing temporary use of online non-downloadable computer software for developing custom security threat detection, investigation, and response tools, software as a service (SaaS) services, namely, providing temporary use of online non-downloadable computer software for monitoring applications installed and running on a computer, computer security audits and performance diagnostics, and for removing and blocking computer applications and files, software as a service (SaaS) services, namely, providing temporary use of online non-downloadable computer software for securing, scanning, authenticating, and encrypting email, documents, website links, and data, and controlled folder access, software as a service (SaaS) services, namely, providing temporary use of online non-downloadable computer software for securing, scanning, regulating access, and authenticating software tools, role-based access, IP addresses, domains, computer peripherals, and endpoints, software as a service (SaaS) services, namely, providing temporary use of online non-downloadable computer security software for the collection, editing, organizing, modifying, transmission, processing, storage, analysis, and sharing of data and information, software as a service (SaaS) services, namely, providing temporary use of online non-downloadable computer security software for the creation, monitoring, and enforcement of security protocols, credentials, and policies, software as a service (SaaS) services, namely, providing temporary use of online non-downloadable computer software for detecting, analyzing, monitoring, displaying, and countering computer security threats, generating security reports, providing security alerts, and for security compliance, software as a service (SaaS) services, namely, providing temporary use of online non-downloadable computer software for collecting and processing user behavioral signals and providing insights, analyzing network traffic, endpoint detections and remediation, attack surfaces reduction, firewall creation, and responses to security threats, software as a service (SaaS) services, namely, providing temporary use of online non-downloadable software for online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, ransomware, grayware, phishing attempts, and unauthorized data and programs on computers, networks, and electronic devices; none of the aforementioned services for use in or in relation to vehicles, and residential and commercial security systems, home automation systems, and security for physical premises. FIRST USE: 20190321. FIRST USE IN COMMERCE: 20190321

International Codes:9
U.S. Codes:021,023,026,036,038
International Codes:38
U.S. Codes:100,101,104
International Codes:42
U.S. Codes:100,101
Type CodeType
GS0091Downloadable computer software, namely, downloadable computer security software for computer, applications, cloud, and computer network security, automated domain threat protection and prevention, analysis, management and integration of threat data, security information and event management, detection, investigation and elimination of computer threats, cyberattacks and data breaches, threat and intrusion detection and prevention, exploit protection and prevention, and automated remediation and restoration of compromised computer software and hardware, downloadable computer anti-virus, anti-malware, and privacy control software, downloadable computer software for developing custom security threat detection, investigation, and response tools, downloadable computer software for monitoring applications installed and running on a computer, computer security audits and performance diagnostics, and for scanning, removing and blocking computer applications and files, downloadable computer software for securing, scanning, authenticating, and encrypting email, documents, website links, and data, and controlled folder access, downloadable computer software for securing, scanning, regulating access, and authenticating software tools, role-based access, IP addresses, domains, computer peripherals, and endpoints, downloadable computer security software for the collection, editing, organizing, modifying, transmission, processing, storage, analysis, and sharing of data and information, downloadable computer security software for the creation, monitoring, and enforcement of security protocols, credentials, and policies, downloadable computer software for detecting, analyzing, monitoring, displaying, and countering computer security threats, generating security reports, providing security alerts, and for security compliance, downloadable computer software for collecting and processing user behavioral signals and providing insights, analyzing network traffic, endpoint detections and remediation, attack surfaces reduction, firewall creation, and responses to security threats, downloadable computer software for online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, ransomware, grayware, phishing attempts, and unauthorized data and programs on computers, networks, and electronic devices; none of the aforementioned goods for use in or in relation to vehicles, residential and commercial security systems, home automation systems, and security for physical premises, and protective covers, cases, casings, carrying cases, and chargers for electronic devices

Trademark Filing History

DescriptionDateProceeding Number
TEAS CHANGE OF OWNER ADDRESS RECEIVED2023-03-10
TEAS CHANGE OF CORRESPONDENCE RECEIVED2023-03-10
APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED2023-03-1088888
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED2022-10-22
NEW APPLICATION ENTERED IN TRAM2022-10-08
NEW APPLICATION ENTERED2022-10-08

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed