Information
-
Trademark
-
79373987
-
Serial Number
79373987
-
Registration Number
7532532
-
International Classifications
- 9 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments
- 38 - Telecommunications
- 42 - Scientific and technological services and research and design relating thereto
-
Filing Date
March 21, 2023
a year ago
-
Registration Date
October 15, 2024
2 months ago
-
Transaction Date
December 17, 2024
6 days ago
-
Status Date
October 15, 2024
2 months ago
-
Published for Opposition Date
July 30, 2024
4 months ago
-
Location Date
October 14, 2024
2 months ago
-
Status Code
700
-
Current Location
FILE REPOSITORY (FRANCONIA)
Employee Name
PHILLIPS, ALEXANDER
-
Attorney Docket Number
ATMA0680WOUS
Attorney Name
Mary Margaret L. O'Donnell
-
Owners
Mark Drawing Code
4
Mark Identification
TIGRANT
Case File Statements
- GS0091: Electronic Encryption units; security token hardware; data networks, namely, data processors and downloadable and recorded
computer software for transmission and reception of data; interactive data transfer apparatus in the nature of network routers;
computers; process calculators; calculating machines; supercomputers; computer servers; computer terminals; Computer display
screens; cloud servers being computer network servers; Downloadable cloud computing server operating software; Downloadable
application software for cloud computing; Downloadable computer software packages comprised of downloadable computer
cybersecurity software, software for use in computer access control, namely, software for imposing access restrictions, software
for high performance computing, namely, software that assists computers in deploying parallel applications and performing
parallel computations, software for operating quantum computers, software for operating artificial intelligence computers, and software for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to
cloud computing systems and quantum computing systems; Downloadable computer software for encryption; computer systems
being computers; information processing apparatus being central processing units for processing information; Downloadable
computer cybersecurity software, downloadable software for use in computer access control, namely, software for imposing
access restrictions, downloadable software for high performance computing, namely, software that assists computers in deploying
parallel applications and performing parallel computations, downloadable software for operating quantum computers,
downloadable software for operating artificial intelligence computers, and downloadable software for accessing cloud computing
systems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantum
computing systems; Downloadable computer software for providing network, Internet, and computer security, namely,
downloadable software for network and computer access control; Downloadable computer software for database management;
Downloadable computer software, namely downloadable computer utility software, downloadable cybersecurity software for
protecting data, and downloadable cryptographic software for generating cryptographic keys for receiving and spending
cryptographic currency; downloadable software for testing software reliability, namely, software for testing and monitoring the
privacy, data security, data vulnerability of other software programs; Recorded computer operating system software;
Downloadable computer anti-virus software; Downloadable computer software for word processing; Downloadable cloud
computing software for cybersecurity, downloadable cloud computing software for use in computer access control, namely,
software for imposing access restrictions, downloadable cloud computing software for high performance computing, namely,
software that assists computers in deploying parallel applications and performing parallel computations, downloadable cloud
computing software for operating quantum computers, downloadable cloud computing software for operating artificial intelligence
computers, and downloadable cloud computing software for accessing cloud computing systems and quantum computing
systems, namely, software for authorizing access to cloud computing systems and quantum computing systems; Downloadable
authentication software for authenticating user identification; Downloadable computer software for protection against spyware,
namely, downloadable anti-spyware software; Downloadable network access server operating software; Downloadable computer
cybersecurity software, downloadable computer software for use in computer access control, namely, software for imposing
access restrictions, downloadable computer software for high performance computing, namely, software that assists computers in
deploying parallel applications and performing parallel computations, downloadable computer software for operating quantum
computers, downloadable computer software for operating artificial intelligence computers, and downloadable computer software
for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloud
computing systems and quantum computing systems; Downloadable computer software for data encryption; Downloadable
computer application software for cybersecurity, downloadable computer application software for use in computer access control,
namely, software for imposing access restrictions, downloadable computer application software for high performance computing,
namely, software that assists computers in deploying parallel applications and performing parallel computations, downloadable
computer application software for operating quantum computers, downloadable computer application software for operating
artificial intelligence computers, and downloadable computer application software for accessing cloud computing systems and
quantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computing
systems; Downloadable speech recognition software; Downloadable facial recognition software, namely, downloadable computer
programs using artificial intelligence for facial recognition; Downloadable artificial intelligence software for cybersecurity,
downloadable artificial intelligence software for use in computer access control, namely, software for imposing access restrictions,
downloadable artificial intelligence software for high performance computing, namely, software that assists computers in deploying
parallel applications and performing parallel computations, downloadable artificial intelligence software for operating quantum
computers, downloadable artificial intelligence software for operating artificial intelligence computers, and downloadable artificial
intelligence software for accessing cloud computing systems and quantum computing systems, namely, software for authorizing
access to cloud computing systems and quantum computing systems; Downloadable computer software designed to be deployed
on web servers for cybersecurity, downloadable computer software designed to be deployed on web servers for use in computer
access control, namely, software for imposing access restrictions, downloadable computer software designed to be deployed on
web servers for high performance computing, namely, software that assists computers in deploying parallel applications and
performing parallel computations, downloadable computer software designed to be deployed on web servers quantum computers,
downloadable computer software designed to be deployed on web servers for operating artificial intelligence computers, and
downloadable computer software designed to be deployed on web servers for accessing cloud computing systems and quantum
computing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems;
Downloadable data communication software, namely, software enabling computers to communicate by sending data;
Downloadable data processing software, namely downloadable software for processing images, graphics and text; Downloadable
cloud-based software for cybersecurity, downloadable cloud-based software for use in computer access control, namely, software
for imposing access restrictions, downloadable cloud-based software for high performance computing, namely, software that
assists computers in deploying parallel applications and performing parallel computations, downloadable cloud-based software for
operating quantum computers, downloadable cloud-based software for operating artificial intelligence computers, and
downloadable cloud-based software for accessing cloud computing systems and quantum computing systems, namely, software
for authorizing access to cloud computing systems and quantum computing systems; Downloadable computer software for the
creation of firewalls; downloadable computer software for providing network security; Downloadable collaborative software
platforms for cybersecurity, downloadable collaborative software platforms for use in computer access control, namely, software
for imposing access restrictions, downloadable collaborative software platforms for high performance computing, namely, software
that assists computers in deploying parallel applications and performing parallel computations, downloadable collaborative
software platforms for operating quantum computers, downloadable collaborative software platforms for operating artificial
intelligence computers, and downloadable collaborative software platforms for accessing cloud computing systems and quantum
computing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems;
Downloadable communications software for connecting computer servers; Downloadable communication software for processing
images, graphics, and text; Downloadable operating software for main frame computers; apparatus and instruments for electric
and electronic security, namely fob-like devices used by an authorized user of a computer system to facilitate authentication;
Electronic target monitoring apparatus, namely, wireless controllers to monitor and control the functioning of other electronic
devices, excluding gaming apparatus; Recorded computer cybersecurity software, Recorded software for use in computer access
control, namely, software for imposing access restrictions, Recorded software for high performance computing, namely, software
that assists computers in deploying parallel applications and performing parallel computations, Recorded software for operating
quantum computers, Recorded software for operating artificial intelligence computers, and Recorded software for accessing cloud
computing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems and
quantum computing systems; Downloadable smartphone software for cybersecurity, downloadable smartphone software for use
in computer access control, namely, software for imposing access restrictions, downloadable smartphone software for high
performance computing, namely, software that assists computers in deploying parallel applications and performing parallel
computations, downloadable smartphone software for operating quantum computers, downloadable smartphone software for
operating artificial intelligence computers, and downloadable smartphone software for accessing cloud computing systems and
quantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computing
systems; Downloadable software for tablet computers for cybersecurity, downloadable software for tablet computers for use in
computer access control, namely, software for imposing access restrictions, downloadable software for tablet computers for high
performance computing, namely, software that assists computers in deploying parallel applications and performing parallel
computations, downloadable software for tablet computers for operating quantum computers, downloadable software for tablet
computers for operating artificial intelligence computers, and downloadable software for tablet computers for accessing cloud
computing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems and
quantum computing systems; Downloadable software for accessing digital content in the fields of entertainment, travel, hotels,
and restaurants via electronic and optical communications networks; Downloadable software for performance testing of computer
hardware; Downloadable software that assists computers in deploying parallel applications and performing parallel computations;
monitors being downloadable software for monitoring and controlling communication between computers and automated machine
systems; Downloadable software for migration between various computer network operating systems; Downloadable software for
testing computer hardware reliability; Downloadable software for maintenance and operation of computer system; Downloadable
software for the integration of artificial intelligence and machine learning in the field of megadata; downloadable computer
software for use as an application programming interface (API); Downloadable computer software for creating searchable
databases of information and data; Downloadable software for providing information in the field of cybersecurity and access
restrictions, high performance computing, quantum computers, artificial intelligence computers, business computing services, and
cloud computing services; Downloadable computer software for transmitting electronic media via communication networks;
downloadable software for remotely accessing and controlling a computer; Downloadable computer software for application and
database integration; Downloadable computer software for controlling and managing access server applications; Downloadable
software for the operational management of portable magnetic and electronic cards; Downloadable software for collecting and
analyzing real-time location data to predict the spread of an illness in a community; Downloadable security software for protecting
data through detection of threats against computer networks; utility software, namely downloadable software for performing
computer system diagnostics; Downloadable software for monitoring the operation of audio and video devices in the field of
security; downloadable software for remote monitoring and analysis of computer systems; Downloadable application software
designed to be deployed on web servers for monitoring computer security incidents and running reports on cloud computing
configuration and metadata; Downloadable and recorded computer platform software for cybersecurity, downloadable and
recorded computer platform software for tablet computers for use in computer access control, namely, software for imposing
access restrictions, downloadable and recorded computer platform software for tablet computers for high performance computing,
namely, software that assists computers in deploying parallel applications and performing parallel computations, downloadable
and recorded computer platform software for tablet computers for operating quantum computers, downloadable and recorded
computer platform software for tablet computers for operating artificial intelligence computers, and downloadable and recorded
computer platform software for tablet computers for accessing cloud computing systems and quantum computing systems,
namely, software for authorizing access to cloud computing systems and quantum computing systems; Downloadable software for
providing information in the field of cybersecurity and access restrictions, high performance computing, quantum computers,
artificial intelligence computers, business computing services, and cloud computing services via the Internet; Downloadable
application software for portable computer devices for cybersecurity, application software for portable computer devices for use in
computer access control, namely, software for imposing access restrictions, downloadable application software for portable
computer devices for high performance computing, namely, software that assists computers in deploying parallel applications and
performing parallel computations, downloadable application software for portable computer devices for operating quantum
computers, downloadable application software for portable computer devices for operating artificial intelligence computers, and
downloadable application software for portable computer devices for accessing cloud computing systems and quantum computing
systems, namely, software for authorizing access to cloud computing systems and quantum computing systems; Downloadable
software for data searching and data retrieval; Downloadable software for system cleaning and optimization; Downloadable
software for network security and computer units, namely, downloadable computer software for detecting threats against
computer networks; Downloadable computer software for authorizing access to databases; calculating devices being calculating machines
- GS0381: Telecommunications access services; Telecommunications access services for electronic sites, namely, providing access to
electronic sites; Providing electronic transmission of secure electronic mail; computer aided transmission of messages, data and
images; providing access to databases; leasing access time to a computer database, namely, rental of access time to global
computer networks; advisory services concerning the rental or leasing of communication equipment; communication services for
information transmission, namely, providing electronic transmission of information stored in a database via interactively
communicating computer systems; electronic communication services, namely, electronic data transmission; Assistance, namely,
advisory, information and consulting services in the field of telecommunications services, namely, transmission of voice, data, and
documents via telecommunications networks; remote transmission of data via telecommunications network; secure transmission
of data, sound and images
- GS0421: Software as a Service (SaaS) services featuring software for cybersecurity, software for use in computer access control, namely,
software for imposing access restrictions, software for high performance computing, namely, software that assists computers in
deploying parallel applications and performing parallel computations, software for operating quantum computers, software for
operating artificial intelligence computers, and software for accessing cloud computing systems and quantum computing systems,
namely, software for authorizing access to cloud computing systems and quantum computing systems; computer Platform as a
Service (PaaS) services featuring computer software platforms for cybersecurity, computer software platforms for use in computer
access control, namely, software platforms for imposing access restrictions, computer software platforms for high performance
computing, namely, software platforms that assist computers in deploying parallel applications and performing parallel
computations, computer software platforms for operating quantum computers, computer software platforms for operating artificial
intelligence computers, and computer software platforms for accessing cloud computing systems and quantum computing
systems, namely, software platforms for authorizing access to cloud computing systems and quantum computing systems;
Software as a Service (SaaS) services featuring software using artificial intelligence for cybersecurity, software using artificial
intelligence for use in computer access control, namely, software for imposing access restrictions, software using artificial
intelligence for high performance computing, namely, software that assists computers in deploying parallel applications and
performing parallel computations, software using artificial intelligence for operating quantum computers, software using artificial
intelligence for operating artificial intelligence computers, and software using artificial intelligence for accessing cloud computing
systems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantum
computing systems; computer programming for others; programming of computer software for others; design, maintenance,
development and updating of computer software; design and development of computers; development of computer platforms;
duplication of computer programs; computer code writing; quantum computing services namely, providing temporary use of online
non-downloadable cloud-based quantum computing software systems and online non-downloadable software development
platforms for use in the development of quantum computing software; consulting services relating to computer systems analysis;
consulting services for analyzing information systems namely, planning, design and management of information technology
systems; computer programming services for data processing; software engineering services for data processing; consulting
services in the field of computer system integration; technological advice relating to digital transformation; outsource service
provider in the field of information technology consulting relating to installation, maintenance and repair of computer software for
cybersecurity and access restrictions, high performance computing, quantum computers, artificial intelligence computers,
business computing services, cloud computing services, and for accessing cloud computing systems and quantum and computing
systems; rental of computers and computer software for cybersecurity, computer software for use in computer access control,
namely, software for imposing access restrictions, computer software for high performance computing, namely, software that
assists computers in deploying parallel applications and performing parallel computations, computer software for operating
quantum computers, computer software for operating artificial intelligence computers, and computer software for accessing cloud
computing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems and
quantum computing systems; rental of computer hardware and computer software for cybersecurity, computer software for use in
computer access control, namely, software for imposing access restrictions, computer software for high performance computing,
namely, software that assists computers in deploying parallel applications and performing parallel computations, computer
software for operating quantum computers, computer software for operating artificial intelligence computers, and computer
software for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to
cloud computing systems and quantum computing systems; technological research in the field of cybersecurity and access
restrictions, high performance computing, quantum computers, artificial intelligence computers, business computing services,
cloud computing services, and for accessing cloud computing systems and quantum and computing systems; cloud seeding;
cloud computing featuring software for cybersecurity, software for use in computer access control, namely, software for imposing
access restrictions, software for high performance computing, namely, software that assists computers in deploying parallel
applications and performing parallel computations, software for operating quantum computers, software for operating artificial
intelligence computers, and software for accessing cloud computing systems and quantum computing systems, namely, software
for authorizing access to cloud computing systems and quantum computing systems; Computer services, namely, cloud hosting
provider services; providing temporary use of on-line non-downloadable software using artificial-intelligence for cybersecurity, online non-downloadable software using artificial-intelligence for use in computer access control, namely, software for imposing
access restrictions, on-line non-downloadable software using artificial-intelligence for high performance computing, namely,
software that assists computers in deploying parallel applications and performing parallel computations, on-line non-downloadable
software using artificial-intelligence for operating quantum computers, on-line non-downloadable software using artificial intelligence for operating artificial intelligence computers, and on-line non-downloadable software using artificial-intelligence for
accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloud
computing systems and quantum computing systems; development of computer hardware; Software as a Service (SaaS) services
featuring software using artificial intelligence for machine learning, deep learning and creation of deep learning networks; Software
as a Service (SaaS) services featuring software for digital asset management; hosting of digital content on the internet; electronic
data storage; digital compression of computer data; data encryption and decoding services; data security consultancy; consultant
services with respect to data security; computer programming services for data storage; computer services concerning electronic
data storage, namely, cybersecurity services and access restrictions, namely, restricting unauthorized access to computer
systems, business computing services, namely, consulting services in the design and implementation of computer-based
information systems for businesses, cloud computing services featuring software for use in database management; development
of data storage systems, namely, software for cloud storage of data; technical data analysis services for protecting data by
assessing computer security threats, namely, computer security threat analysis for protecting data; data mining; computer
programming services for electronic data security; security services for computer networks, computer access and computer-based
transactions, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or
network resources based on assigned credentials; computer security services for protection against unauthorized network access,
namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network
resources based on assigned credentials; monitoring of computer systems for the detection of unauthorized access or data
protection breaches; electronic monitoring of personally identification information for the detection of identity theft via the Internet;
user authentication services using single sign-on technology for online software applications; technological advice in the fields of
selection, implementation, and use of computer programs being software; Access Control as a Service (ACaaS) featuring
software for cybersecurity, software for use in computer access control, namely, software for imposing access restrictions,
software for high performance computing, namely, software that assists computers in deploying parallel applications and
performing parallel computations, software for operating quantum computers, software for operating artificial intelligence
computers, and software for accessing cloud computing systems and quantum computing systems, namely, software for
authorizing access to cloud computing systems and quantum computing systems; application service provider (ASP) featuring
software for cybersecurity, software for use in computer access control, namely, software for imposing access restrictions,
software for high performance computing, namely, software that assists computers in deploying parallel applications and
performing parallel computations, software for operating quantum computers, software for operating artificial intelligence
computers, and software for accessing cloud computing systems and quantum computing systems, namely, software for
authorizing access to cloud computing systems and quantum computing systems; providing virtual computer systems through
cloud computing; conversion of computer programs and data, other than physical conversion; recovery of computer data; cloud stored data protection services in the nature of providing temporary use of online, non-downloadable software for protecting data
stored in the cloud; electronic storage services for archiving databases, images and other electronic data; rental of computer
software for data stream reading; consultancy, advisory and information services in relation to information technology relating to
installation, maintenance and repair of computer software; computer services for the security, protection and restoration of
information technology namely, computer security services in the nature of restricting unauthorized access to computer networks,
computer security threat analysis for protecting data, and computer data recovery services; computer security services, namely,
providing user authentication services using biometric hardware and software technology for hardware and software systems
vulnerability testing; Technical support services, namely, troubleshooting in the nature of diagnosing problems with computer
hardware and software, data communication systems; Telecommunications network security consultancy; computer security
threat analysis for protecting data; monitoring computer systems for security purposes, namely, monitoring of computer systems
for detecting unauthorized access or data breach; computer services for data protection, namely design and development of
computer software for cybersecurity, software for use in computer access control, namely, software for imposing access
restrictions, software for high performance computing, namely, software that assists computers in deploying parallel applications
and performing parallel computations, software for operating quantum computers, software for operating artificial intelligence
computers, and software for accessing cloud computing systems and quantum computing systems, namely, software for
authorizing access to cloud computing systems and quantum computing systems; computer system monitoring services, namely,
monitoring of computer systems for detecting unauthorized access or data breach; computer services, namely, data recovery
services; computer virus protection services; programming of computer software in the field of internet security for others;
consultation with respect to computer security; information security services, namely, installation, maintenance, and repair of
firewall software systems; security technology testing services, namely, testing of security systems; Technological advice in the
field of artificial intelligence; design and development of software for evaluation and calculation of data; IT services, namely,
development, programming and implementation of software for cybersecurity, software for use in computer access control,
namely, software for imposing access restrictions, software for high performance computing, namely, software that assists
computers in deploying parallel applications and performing parallel computations, software for operating quantum computers,
software for operating artificial intelligence computers, and software for accessing cloud computing systems and quantum
computing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems;
design and development of supercomputers, and number crunchers being data processing apparatus
Case File Event Statements
-
7/13/2023 - a year ago
1 - SN ASSIGNED FOR SECT 66A APPL FROM IB
Type: REPR
-
7/14/2023 - a year ago
2 - NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Type: NWOS
-
7/18/2023 - a year ago
3 - APPLICATION FILING RECEIPT MAILED
Type: MAFR
-
8/14/2023 - a year ago
4 - ASSIGNED TO EXAMINER
Type: DOCK
-
8/15/2023 - a year ago
5 - NON-FINAL ACTION WRITTEN
Type: CNRT
-
8/16/2023 - a year ago
6 - NON-FINAL ACTION (IB REFUSAL) PREPARED FOR REVIEW
Type: RFCR
-
9/6/2023 - a year ago
7 - REFUSAL PROCESSED BY MPU
Type: RFRR
-
9/6/2023 - a year ago
8 - NON-FINAL ACTION MAILED - REFUSAL SENT TO IB
Type: RFCS
-
10/5/2023 - a year ago
9 - REFUSAL PROCESSED BY IB
Type: RFNT
-
12/2/2023 - a year ago
10 - LIMITATION OF GOODS RECEIVED FROM IB
Type: LIMG
-
2/13/2024 - 10 months ago
11 - LIMITATION FROM THE IB - REQUEST EXAM REVIEW
Type: LIME
-
3/21/2024 - 9 months ago
12 - ATTORNEY REVIEW COMPLETED
Type: ATRV
-
3/22/2024 - 9 months ago
13 - ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE
Type: ABN2
-
3/22/2024 - 9 months ago
14 - ABANDONMENT NOTICE MAILED - FAILURE TO RESPOND
Type: MAB2
-
3/22/2024 - 9 months ago
15 - ABANDONMENT NOTICE MAILED - FAILURE TO RESPOND
Type: MAB2
-
4/15/2024 - 8 months ago
19 - TEAS RESPONSE TO OFFICE ACTION RECEIVED
Type: TROA
-
4/15/2024 - 8 months ago
16 - TEAS PETITION TO REVIVE RECEIVED
Type: PROA
-
4/15/2024 - 8 months ago
17 - PETITION TO REVIVE-GRANTED
Type: PETG
-
4/15/2024 - 8 months ago
18 - NOTICE OF REVIVAL - E-MAILED
Type: NREV
-
6/17/2024 - 6 months ago
21 - CORRESPONDENCE RECEIVED IN LAW OFFICE
Type: CRFA
-
6/17/2024 - 6 months ago
22 - TEAS/EMAIL CORRESPONDENCE ENTERED
Type: TEME
-
6/21/2024 - 6 months ago
23 - APPROVED FOR PUB - PRINCIPAL REGISTER
Type: CNSA
-
6/17/2024 - 6 months ago
20 - ASSIGNED TO LIE
Type: ALIE
-
7/10/2024 - 5 months ago
24 - NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
Type: NONP
-
7/30/2024 - 4 months ago
25 - PUBLISHED FOR OPPOSITION
Type: PUBO
-
10/15/2024 - 2 months ago
27 - REGISTERED-PRINCIPAL REGISTER
Type: R.PR
-
10/15/2024 - 2 months ago
28 - NOTICE OF REGISTRATION CONFIRMATION EMAILED
Type: NRCC
-
7/30/2024 - 4 months ago
26 - OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
Type: NPUB
-
12/12/2024 - 11 days ago
29 - NOTIFICATION OF POSSIBLE OPPOSITION CREATED, TO BE SENT TO IB
Type: OPNR
-
12/15/2024 - 8 days ago
30 - NOTIFICATION OF POSSIBLE OPPOSITION SENT TO IB
Type: OPNS