79371223

Information

  • Trademark
  • 79371223
  • Serial Number
    79371223
  • Filing Date
    March 07, 2023
    3 years ago
  • Transaction Date
    July 08, 2025
    9 months ago
  • Status Date
    July 08, 2025
    9 months ago
  • Published for Opposition Date
    July 08, 2025
    9 months ago
  • Location Date
    June 19, 2025
    10 months ago
  • Status Code
    686
  • Current Location
    PUBLICATION AND ISSUE SECTION
    Employee Name
    KHAN, AHSEN
  • Attorney Docket Number
    3724249-0025
    Attorney Name
    Kathryn Starshak
    Law Office Assigned Location Code
    M40
  • Owners
Mark Drawing Code
2
Case File Statements
  • GS0411: Educational services, namely, conducting seminars, conferences and workshops in the field of cyber security; providing of training in the field of cyber security; arranging and conducting seminars, conferences and workshops in the field of cyber security; providing on-line electronic publications, not downloadable, namely, manuals featuring information technology in the field of cyber security
  • DM0000: The mark consists of the stylized letter "W" and "/" (slash).
  • GS0091: Downloadable software and applications for cyber security purposes; downloadable software platforms for cyber security purposes; downloadable software and software platforms for detecting and responding to cyber threats and attacks; downloadable software and software platforms for scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities; downloadable software and software platforms for desktop, laptop, mobile device, server, cloud, network and internet use security and protection; downloadable software and software platforms for data protection, anti-virus protection, anti-theft protection, backup, secure messaging, email security, safe browsing, software updates and remote device management; downloadable software and software platforms for anonymous browsing, encryption, anti-tracking protection, location management, network protection, privacy protection, data compression, data leakage prevention, storing secure notes and data, private messaging and location sharing; downloadable software for on-line storage, management and sharing of photos, videos, documents, data, emails, messaging, contacts, location and other content; downloadable software for use of virtual private networks (VPN); downloadable software and applications for wireless devices for use in data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable computer application software for mobile phones for use in data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; cloud computer network servers for use in data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable cloud computing software for use in data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; wireless routers; computer network routers; computer hardware; computer peripherals; USB hardware and USB flash drives in the nature of pre-recorded USB flash drives featuring a platform for cyber security purposes; downloadable USB operating software; downloadable software and software device drivers for use in data protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, and for detecting and responding to cyber threats and attacks, for scanning and managing vulnerabilities; downloadable electronic publications, namely, manuals featuring information technology in the field of cyber security
  • GS0381: Telecommunication services, namely, delivery of messages by electronic transmission and in the field of private and secure Internet browsing; providing virtual private networks (VPN) services; private electronic messaging services; providing virtual private network (VPN) services for user virtual location management; electronic transmission, retrieval and streaming of files and data, namely, images, audio, video, documents, text, electronic messages, and electronic mail over local or global communications networks, including the Internet, intranets, extranets, television, mobile networks, cellular and satellite networks; secured data, sound and image transmission services; providing access to databases; providing user access to information on the Internet; data transfer re-routing; secure data transfer via computer networks; information, advisory and consultancy services relating to all the aforementioned services
  • CC0000: Color is not claimed as a feature of the mark.
  • GS0351: Business management consulting services in the field of information technology; data processing, systematization into computer databases and database management; collection of data, namely, electronic data collection for business purposes in the field of information technology; computerised data processing; management and compilation of computerised databases; information, advisory and consultancy services relating to all the aforesaid services
  • GS0451: Licensing of technology, namely, licensing of intellectual property in the field of patents and copyrights; licensing services, namely, licensing of software; providing information, advisory and consultation services in the field of data theft and identity theft in the field of cyber security; providing information and consultation relating to security for the protection of property and individuals
  • GS0421: Scientific and technological services, namely, research and design in the field of cyber security; industrial analysis, industrial research and industrial design services in the field of cyber security; design and development of computer hardware and software; development of new technology for others in the field of cyber security; development of technologies for the protection of electronic networks; development of new technology and engineering services in the field of information technology and information technology security; engineering services in the field of data processing technology; consultancy in the field of cyber security, Internet security, computer security, computer network security and data security; research, design, development, implementation, maintenance and updating of software application solutions and IT security software in the field of cyber security and information security, including for scanning, monitoring, analyzing and managing software applications, computer systems and Internet and information networks and their vulnerabilities as well as detecting and responding to cyber threats and attacks; research, design, implementation, maintenance and updating of software application solutions and IT security software in the field of cyber security, including desktop, laptop, mobile device, server, cloud, network and Internet use security and protection; research, design, implementation, maintenance and updating of software application solutions and IT security software in the field of cyber security, including data security and protection, anti-virus protection, anti-theft protection, backup, secure messaging, email security, safe browsing, software updates and remote device management; providing temporary use of online, non-downloadable software for anonymous browsing, anti-tracking protection, location management and privacy protection; data encryption services; computer security services for protection against illegal network access; data compression services; electronic monitoring services for computer security services for prevention of data leakage; IT services in the field of cyber security, namely, data security consultancy; IT consultancy, advisory and information services, as it relates to the field of cyber security; IT security services in the nature of protection and recovery of computer data; providing temporary use of online, non-downloadable cyber security software for networks, end points, computer access and computerised transactions; computer virus protection services; computer data recovery services, namely, information technology restoration services in the field of data and applications; end point cyber security services, in the nature of restricting unauthorized access to computer systems; outsource service providers in the field of information technology relating to installation, maintenance, and repair of computer software; technical support services relating to computer software and applications, namely, troubleshooting of security software problems; monitoring of network and computer systems, for security software problems for quality control purposes; onsite and remote monitoring of computer systems, computer networks and IT infrastructure for cyber security purposes for security software problems for quality control purposes; providing online, non-downloadable software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; providing temporary use of non-downloadable software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; software as a service [SaaS] services featuring software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Platform as a service [PaaS] featuring computer software platforms for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; infrastructure as a service [IaaS] featuring computer software platforms for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; application service provider [ASP] services featuring software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; cloud-based cyber security services; cloud computing services, namely, cloud computing featuring software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; administration of cloud servers, namely technical administration of services for others; cloud-based data protection services, namely, cybersecurity services in the nature of restricting unauthorized access to computer systems; quality control for others and authentication services in the field of cyber security; electronic monitoring of information to detect online frauds and identity thefts; providing temporary use of online, non-downloadable software for protection against fraud and identity thefts; information, advisory and consultancy services relating to all the aforementioned services
Case File Event Statements
  • 6/8/2023 - 2 years ago
    1 - SN ASSIGNED FOR SECT 66A APPL FROM IB Type: REPR
  • 6/9/2023 - 2 years ago
    2 - NEW APPLICATION OFFICE SUPPLIED DATA ENTERED Type: NWOS
  • 6/13/2023 - 2 years ago
    3 - APPLICATION FILING RECEIPT MAILED Type: MAFR
  • 12/5/2023 - 2 years ago
    4 - ASSIGNED TO EXAMINER Type: DOCK
  • 12/5/2023 - 2 years ago
    5 - NON-FINAL ACTION WRITTEN Type: CNRT
  • 12/6/2023 - 2 years ago
    6 - NON-FINAL ACTION (IB REFUSAL) PREPARED FOR REVIEW Type: RFCR
  • 12/14/2023 - 2 years ago
    7 - NON-FINAL ACTION (IB REFUSAL) WITHDRAWN FOR REVIEW Type: RFWR
  • 11/6/2024 - a year ago
    9 - NOTIFICATION OF POSSIBLE OPPOSITION CREATED, TO BE SENT TO IB Type: OPNR
  • 11/6/2024 - a year ago
    10 - NOTIFICATION OF POSSIBLE OPPOSITION SENT TO IB Type: OPNS
  • 7/24/2024 - a year ago
    8 - NON-FINAL ACTION WRITTEN Type: CNRT
  • 11/23/2024 - a year ago
    11 - NOTIFICATION OF POSSIBLE OPPOSITION - PROCESSED BY IB Type: OPNX
  • 11/27/2024 - a year ago
    13 - REFUSAL PROCESSED BY MPU Type: RFRR
  • 11/27/2024 - a year ago
    14 - NON-FINAL ACTION MAILED - REFUSAL SENT TO IB Type: RFCS
  • 11/26/2024 - a year ago
    12 - NON-FINAL ACTION (IB REFUSAL) PREPARED FOR REVIEW Type: RFCR
  • 12/14/2024 - a year ago
    15 - REFUSAL PROCESSED BY IB Type: RFNT
  • 1/24/2025 - a year ago
    16 - CHANGE OF NAME/ADDRESS REC'D FROM IB Type: ADCH
  • 5/26/2025 - 10 months ago
    21 - TEAS CHANGE OF DOMESTIC REPRESENTATIVES ADDRESS Type: ECDR
  • 5/26/2025 - 10 months ago
    20 - ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED Type: ARAA
  • 5/26/2025 - 10 months ago
    19 - TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED Type: REAP
  • 5/26/2025 - 10 months ago
    22 - TEAS CHANGE OF CORRESPONDENCE RECEIVED Type: TCCA
  • 5/26/2025 - 10 months ago
    18 - APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED Type: CHAN
  • 5/27/2025 - 10 months ago
    24 - CORRESPONDENCE RECEIVED IN LAW OFFICE Type: CRFA
  • 5/27/2025 - 10 months ago
    23 - TEAS RESPONSE TO OFFICE ACTION RECEIVED Type: TROA
  • 5/27/2025 - 10 months ago
    25 - TEAS/EMAIL CORRESPONDENCE ENTERED Type: TEME
  • 5/26/2025 - 10 months ago
    17 - TEAS CHANGE OF OWNER ADDRESS RECEIVED Type: COAR
  • 6/6/2025 - 10 months ago
    28 - NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED Type: GNEN
  • 6/6/2025 - 10 months ago
    26 - EXAMINERS AMENDMENT -WRITTEN Type: CNEA
  • 6/6/2025 - 10 months ago
    27 - EXAMINERS AMENDMENT E-MAILED Type: GNEA
  • 6/6/2025 - 10 months ago
    29 - EXAMINER'S AMENDMENT ENTERED Type: XAEC
  • 6/6/2025 - 10 months ago
    30 - APPROVED FOR PUB - PRINCIPAL REGISTER Type: CNSA
  • 7/2/2025 - 9 months ago
    31 - NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED Type: NONP
  • 7/8/2025 - 9 months ago
    32 - PUBLISHED FOR OPPOSITION Type: PUBO
  • 7/8/2025 - 9 months ago
    33 - OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED Type: NPUB