Mark For: AUTHENTIK™ trademark registration is intended to cover the categories of technology research in the field of cyber security, data and information security, and network security; product research and development in the field of cyber security; technical consulting services in the field of cyber security, namely, consulting regarding security architecture, information architecture, enterprise architecture, public and private cloud computing software solutions; technology consultation services in the field of cyber security, namely, identification and selection of appropriate technologies that meet business and technical requirements; computer consulting services, namely, implementation and integration of information technology solutions in the field of cyber security; managed computer security services, namely, providing computer security analysis, computer security consulting, computer security assessment, computer security program assessment, and computer testing for vulnerability assessment; managed computer security services, namely, malware mitigation in the nature of detection, blocking, and remediation of malware; computer network security services and communications network security services in the nature of network intrusion protection, computer testing for vulnerability management and assessment, managing endpoint security on networks, data breach threat analysis, network threat analysis, computer incident response, network incident response, and forensics and penetration testing; software as a service (SAAS) services featuring cyber security software; computer security consultancy services, namely, remote and onsite management of computer networks, firewalls, virtual private networks and networked devices of others for the purpose of assessing and preventing information security vulnerability; managed computer security services, namely, design, development and implementation of firewalls, virtual private networks, and intrusion detection systems; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities. [all]
Status
2023-06-10 UTC
LIVE APPLICATION Awaiting Examination
The trademark application has been accepted by the Office (has met the minimum filing requirements) and has not yet been assigned to an examiner.
(Computer, scientific & legal) Scientific and technological services and research and design relating thereto: industrial analysis and research services; design and development of computer hardware and software; legal services.
Filed Use
No
Current Use
No
Intent To Use
Yes
Filed ITU
Yes
44D Filed
No
44E Current
No
66A Current
No
Current Basis
No
No Basis
No
Attorney Name
Anne H. Peck
Attorney Docket Number
347929-20000
Timeline
2023-06-01
Application Filed
2023-06-05
Location: NEW APPLICATION PROCESSING
2023-06-05
Status: Live/Pending
2023-06-05
Status: New application awaiting assignment to an examining attorney. See current trademark processing wait times for more information.
ANNE H. PECK COOLEY LLP 1299 PENNSYLVANIA AVENUE, NW, SUITE 700 WASHINGTON, DC 20004
Good, Services, and Codes
IC 042. US 100 101. G & S: Technology research in the field of cyber security, data and information security, and network security; product research and development in the field of cyber security; technical consulting services in the field of cyber security, namely, consulting regarding security architecture, information architecture, enterprise architecture, public and private cloud computing software solutions; technology consultation services in the field of cyber security, namely, identification and selection of appropriate technologies that meet business and technical requirements; computer consulting services, namely, implementation and integration of information technology solutions in the field of cyber security; managed computer security services, namely, providing computer security analysis, computer security consulting, computer security assessment, computer security program assessment, and computer testing for vulnerability assessment; managed computer security services, namely, malware mitigation in the nature of detection, blocking, and remediation of malware; computer network security services and communications network security services in the nature of network intrusion protection, computer testing for vulnerability management and assessment, managing endpoint security on networks, data breach threat analysis, network threat analysis, computer incident response, network incident response, and forensics and penetration testing; software as a service (SAAS) services featuring cyber security software; computer security consultancy services, namely, remote and onsite management of computer networks, firewalls, virtual private networks and networked devices of others for the purpose of assessing and preventing information security vulnerability; managed computer security services, namely, design, development and implementation of firewalls, virtual private networks, and intrusion detection systems; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities
International Codes:
42
U.S. Codes:
100,101
Type Code
Type
GS0421
Technology research in the field of cyber security, data and information security, and network security; product research and development in the field of cyber security; technical consulting services in the field of cyber security, namely, consulting regarding security architecture, information architecture, enterprise architecture, public and private cloud computing software solutions; technology consultation services in the field of cyber security, namely, identification and selection of appropriate technologies that meet business and technical requirements; computer consulting services, namely, implementation and integration of information technology solutions in the field of cyber security; managed computer security services, namely, providing computer security analysis, computer security consulting, computer security assessment, computer security program assessment, and computer testing for vulnerability assessment; managed computer security services, namely, malware mitigation in the nature of detection, blocking, and remediation of malware; computer network security services and communications network security services in the nature of network intrusion protection, computer testing for vulnerability management and assessment, managing endpoint security on networks, data breach threat analysis, network threat analysis, computer incident response, network incident response, and forensics and penetration testing; software as a service (SAAS) services featuring cyber security software; computer security consultancy services, namely, remote and onsite management of computer networks, firewalls, virtual private networks and networked devices of others for the purpose of assessing and preventing information security vulnerability; managed computer security services, namely, design, development and implementation of firewalls, virtual private networks, and intrusion detection systems; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.