97225536 - TRELLIX

Information

  • Trademark
  • 97225536
  • Serial Number
    97225536
  • Registration Number
    7444085
  • Filing Date
    January 18, 2022
    3 years ago
  • Registration Date
    July 09, 2024
    7 months ago
  • Transaction Date
    January 30, 2025
    22 days ago
  • Status Date
    July 09, 2024
    7 months ago
  • Published for Opposition Date
    January 23, 2024
    a year ago
  • Location Date
    June 01, 2024
    8 months ago
  • First Use Anywhere Date
    January 01, 2022
    3 years ago
  • First Use In Commerce Date
    January 01, 2022
    3 years ago
  • Status Code
    700
  • Current Location
    PUBLICATION AND ISSUE SECTION
    Employee Name
    HILLIARD, JESSICA
  • Attorney Docket Number
    T37871US00
    Attorney Name
    Katherine M. Basile & Jason E. Garcia
    Law Office Assigned Location Code
    N20
  • Owners
Mark Drawing Code
4
Mark Identification
TRELLIX
Case File Statements
  • GS0091: Downloadable and recorded computer utility software for configuring and maintaining functionality of computer systems; downloadable computer anti-virus software; downloadable and recorded computer software and computer hardware for providing enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computer security; downloadable and recorded computer software and computer hardware for use in securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers; downloadable and recorded computer software for the detection, blocking and removal of computer viruses, malware and other threats; downloadable and recorded computer communications software for monitoring, managing, filtering, and regulating electronic and wireless communications; downloadable and recorded computer software for protecting and securing computer networks and applications; downloadable and recorded computer software for encrypting and authenticating data; downloadable and recorded computer software for detecting and repairing computer software and hardware; downloadable and recorded computer software and computer hardware for automatically confirming and enforcing computer security policies, for identifying computer security policy violations, and for generating computer security policy compliance reports; downloadable and recorded computer software and computer hardware for the management, administration and optimization of computer networks and applications; downloadable and recorded computer software and computer hardware for use in the monitoring and control of, and generating reports on, computer and online activity; downloadable and recorded computer software for creating and maintaining firewalls; computer hardware and downloadable and recorded computer software for protecting and securing computer systems and computer networks and applications; downloadable software for detecting and preventing intrusions on computer networks and for repairing computer networks; downloadable and recorded computer software and computer hardware for encrypting and authenticating data; downloadable and recorded computer software for protecting the identity protection, authentication of users, authenticating users, and controlling privacy control settings; downloadable and recorded computer software for providing secure storage and management of usernames and passwords; downloadable software for filtering content; computer hardware and downloadable and recorded computer software for automatically updating computer utility and security software; computer hardware and downloadable and recorded computer software for rating the security level of internet sites; downloadable and recorded computer software for securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers, all related to extended detection and response technology
  • GS0421: Providing temporary use of non-downloadable security software for protecting computer networks from unauthorized breach; providing temporary use of non-downloadable software for managing security for enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers; providing temporary use of non-downloadable software for detecting, blocking and removing computer viruses, malware and threats, encrypting and authenticating data, managing and filtering electronic communications, and detecting and repairing computer software and hardware problems; providing temporary use of nondownloadable software for use in securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers, all for use in conjunction with computer software and hardware; technology consultation in the field of cybersecurity; providing temporary use of non-downloadable software for securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers, all related to extended detection and response technology; security as a service (SECaas) featuring computer software platforms for managing security for enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers; security as a service (SECaas) featuring computer software platforms for detecting, blocking and removing computer viruses, malware and threats, encrypting and authenticating data, managing and filtering electronic communications, and detecting and repairing computer software and hardware problems; security as a service (SECaas) featuring computer software platforms for use in securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers; security as a service (SECaas) featuring computer software platforms for securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers, all related to extended detection and response technology; software as a service (SAAS) services featuring computer software platforms for managing security for enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers; software as a service (SAAS) services featuring computer software platforms for detecting, blocking and removing computer viruses, malware and threats, encrypting and authenticating data, managing and filtering electronic communications, and detecting and repairing computer software and hardware problems; software as a service (SAAS) services featuring computer software platforms for use in securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers; software as a service (SAAS) services featuring computer software platforms for securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers, all related to extended detection and response technology; platform as a service (PAAS) featuring computer software platforms for managing security for enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers; platform as a service (PAAS) featuring computer software platforms for detecting, blocking and removing computer viruses, malware and threats, encrypting and authenticating data, managing and filtering electronic communications, and detecting and repairing computer software and hardware problems; platform as a service (PAAS) featuring computer software platforms for use in securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers; platform as a service (PAAS) featuring computer software platforms for securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers, all related to extended detection and response technology; infrastructure as a service (IAAS) services, namely, hosting software for managing security for enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers, all for use by others; infrastructure as a service (IAAS) services, namely, hosting software for detecting, blocking and removing computer viruses, malware and threats, encrypting and authenticating data, managing and filtering electronic communications, and detecting and repairing computer software and hardware problems, all for use by others; infrastructure as a service (IAAS) services, namely, hosting software for use in securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers, all for use by others; infrastructure as a service (IAAS) services, namely, hosting software for securing, monitoring and protecting enterprise systems, endpoints, servers, communication networks, computer networks, data, network, internet, and computers, all for use by others and all related to extended detection and response technology; computer security consulting, computer performance testing services, computer software research services and computer software advisory services all related to computer, data, and network security; technological research in the field of computer hardware; research of computer software; development and design of computer hardware and software; technical support services for others in the fields of computer, data, and network security, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; automatic updating of computer software; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware problems; computer security threat analysis for protecting data in the nature of collecting, compiling, and analyzing data for the purpose of generating and transmitting reports on and ratings of the level of security of third party software residing on the computers of others; computer programming services for others in the fields of computer, data, and network security; computer forensics services; providing computer security information in the fields of network, data, and computer security; maintenance of computer software; monitoring of computer systems for security purposes to protect data and information from unauthorized access, namely, monitoring of computer systems for detecting unauthorized access or data breach; computer security services, namely, intrusion detection services in the nature of monitoring of computer systems for detecting unauthorized access or data breach, intrusion prevention services in the nature of restricting unauthorized access to computer networks and endpoints, vulnerability assessment services, and in the nature of computer security consultancy related to scanning and penetration testing of computer networks to assess information security vulnerability, and computer services in the nature of online detecting and removing of computer viruses and threats on computers; cybersecurity services in the nature of restricting unauthorized access to computer systems
Case File Event Statements
  • 1/21/2022 - 3 years ago
    1 - NEW APPLICATION ENTERED Type: NWAP
  • 1/24/2022 - 3 years ago
    2 - NEW APPLICATION OFFICE SUPPLIED DATA ENTERED Type: NWOS
  • 10/26/2022 - 2 years ago
    3 - ASSIGNED TO EXAMINER Type: DOCK
  • 11/2/2022 - 2 years ago
    4 - NON-FINAL ACTION WRITTEN Type: CNRT
  • 11/2/2022 - 2 years ago
    5 - NON-FINAL ACTION E-MAILED Type: GNRT
  • 11/2/2022 - 2 years ago
    6 - NOTIFICATION OF NON-FINAL ACTION E-MAILED Type: GNRN
  • 5/1/2023 - a year ago
    7 - TEAS RESPONSE TO OFFICE ACTION RECEIVED Type: TROA
  • 5/1/2023 - a year ago
    8 - CORRESPONDENCE RECEIVED IN LAW OFFICE Type: CRFA
  • 5/2/2023 - a year ago
    9 - TEAS/EMAIL CORRESPONDENCE ENTERED Type: TEME
  • 5/30/2023 - a year ago
    10 - NON-FINAL ACTION WRITTEN Type: CNRT
  • 5/30/2023 - a year ago
    11 - NON-FINAL ACTION E-MAILED Type: GNRT
  • 5/30/2023 - a year ago
    12 - NOTIFICATION OF NON-FINAL ACTION E-MAILED Type: GNRN
  • 8/23/2023 - a year ago
    13 - APPLICATION EXTENSION TO RESPONSE PERIOD - RECEIVED Type: XELR
  • 8/23/2023 - a year ago
    14 - APPLICATION EXTENSION GRANTED/RECEIPT PROVIDED Type: XELG
  • 11/22/2023 - a year ago
    15 - TEAS RESPONSE TO OFFICE ACTION RECEIVED Type: TROA
  • 11/22/2023 - a year ago
    16 - CORRESPONDENCE RECEIVED IN LAW OFFICE Type: CRFA
  • 11/23/2023 - a year ago
    17 - TEAS/EMAIL CORRESPONDENCE ENTERED Type: TEME
  • 12/21/2023 - a year ago
    18 - APPROVED FOR PUB - PRINCIPAL REGISTER Type: CNSA
  • 1/3/2024 - a year ago
    19 - NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED Type: NONP
  • 1/23/2024 - a year ago
    20 - PUBLISHED FOR OPPOSITION Type: PUBO
  • 1/23/2024 - a year ago
    21 - OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED Type: NPUB
  • 3/19/2024 - 11 months ago
    22 - NOA E-MAILED - SOU REQUIRED FROM APPLICANT Type: NOAM
  • 5/1/2024 - 9 months ago
    25 - USE AMENDMENT FILED Type: IUAF
  • 5/1/2024 - 9 months ago
    23 - TEAS STATEMENT OF USE RECEIVED Type: EISU
  • 5/29/2024 - 8 months ago
    24 - CASE ASSIGNED TO INTENT TO USE PARALEGAL Type: AITU
  • 5/29/2024 - 8 months ago
    26 - STATEMENT OF USE PROCESSING COMPLETE Type: SUPC
  • 6/1/2024 - 8 months ago
    28 - NOTICE OF ACCEPTANCE OF STATEMENT OF USE E-MAILED Type: SUNA
  • 6/1/2024 - 8 months ago
    27 - ALLOWED PRINCIPAL REGISTER - SOU ACCEPTED Type: CNPR
  • 7/9/2024 - 7 months ago
    29 - REGISTERED-PRINCIPAL REGISTER Type: R.PR
  • 7/9/2024 - 7 months ago
    30 - NOTICE OF REGISTRATION CONFIRMATION EMAILED Type: NRCC
  • 8/29/2024 - 5 months ago
    31 - ASSIGNMENT OF OWNERSHIP NOT UPDATED AUTOMATICALLY Type: ASCK
  • 1/29/2025 - 23 days ago
    32 - ASSIGNMENT OF OWNERSHIP NOT UPDATED AUTOMATICALLY Type: ASCK