Information
-
Trademark
-
98486979
-
International Classifications
-
Filing Date
April 05, 2024
10 months ago
-
Transaction Date
January 24, 2025
12 days ago
-
Status Date
January 23, 2025
13 days ago
-
Location Date
January 23, 2025
13 days ago
-
Status Code
661
-
Current Location
TMO LAW OFFICE 115
Employee Name
CHANG, KATHERINE
-
Attorney Docket Number
000378-00047
Attorney Name
Peter J. Riebling
Law Office Assigned Location Code
M60
-
Owners
Mark Drawing Code
4
Mark Identification
ULTRASECURE
Case File Statements
- PM0001: ULTRA SECURE
- GS0351: Business data analysis; analyzing for business purposes end users' threat intelligence data to assess, analyze and make inferences regarding their internet traffic and to make determinations as to how such traffic should be handled
- GS0421: Providing online, non-downloadable computer software for safeguarding digital infrastructures and online presences and for protecting computer networks and applications against risks and downtime; providing domain name system (DNS) management services, namely, provision of authoritative and recursive DNS services; computer network security management, namely, restricting unauthorized access to computer networks; distributed denial of service (DDoS) attack management, namely, computer network security consultancy in the field of managing DDoS attacks; web application firewall (WAF) management, namely, computer network security consultancy in the field of managing web application firewalls; bot management, namely, computer network security consultancy in the field of managing bots; computer security threat analysis for protecting data by using end users' threat analysis data to assess, analyze and make inferences regarding their internet traffic and to make determinations as to how such traffic should be handled; computer security threat analysis for protecting data; data automation and collection service using proprietary software to evaluate, analyze and collect service data; providing online non-downloadable software for compiling and organizing statistical analysis of business functions; providing online non-downloadable software which utilizes end users' threat intelligence data to assess and make inferences regarding their internet traffic and to make determinations as to how such traffic should be handled; network security and threat detection, mitigation and resolution services, namely, providing temporary use of non-downloadable cloud-based software for cleaning, scrubbing and filtering of malicious internet and network traffic for network security and threat detection, mitigation, and resolution; electronic monitoring and reporting of servers, computer networks, computer network systems, computer network data, computer network information, electronic data packets, and internet protocol traffic using computers for security purposes including providing related reports featuring suspicious and abnormal patterns and anomalies of networks, system activity reports, and event notification alerts; providing temporary use on non-downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing online threats; providing temporary use of online non-downloadable software for use in blocking unwanted and inappropriate internet and network traffic, for mitigating against and defending computer networks and websites from distributed denial of service (DDoS) attacks, and for implementing of countermeasures to limit exposure from such attacks and protect a website's uptime; providing temporary use of online non-downloadable software for use in providing bot management, mitigation, protection and guarding against online and software threats; computer security threat analysis for protecting data in the field of protecting online businesses from the effects of domain name system (DNS)-based distributed denial of service (DDoS) attacks and other threats; providing temporary use of online non-downloadable website software applications for providing application service provider featuring application programming interface (API) software for security and threat detection, mitigation and resolution services, namely, a web application firewall (WAF) software that cleans, scrubs and filters malicious attacks against website software applications and application programming interfaces (APIs); technology consultation in the field of cybersecurity featuring the electronic monitoring of website software applications and application programming interfaces (APIs) for cybersecurity purposes including providing and the provision of related reports about suspicious and abnormal patterns, anomalies and activities; rental of online downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing threats to website software applications and application programming interfaces (APIs); computer security services, namely, providing temporary use of online non-downloadable software for use restricting unauthorized network access by preventing access to malicious websites and online threats, blocking unwanted and inappropriate interactions with website software applications and application programming interfaces (APIs), mitigating against and defending attacks against website software applications and APIs and implementing countermeasures to limit exposure from such attacks and protect a website's uptime; DNS resolver services that make DNS queries faster and more secure for faster and more private browsing of the internet, namely, providing temporary use of online non-downloadable computer software for use in securing and speeding internet browsing capacity in order to make domain name system (DNS) queries faster and more secure; global DNS resolution services, namely, computer code conversion for others in the field of global domain name system (DNS) resolution; providing temporary use of non-downloadable software for use in providing an internet directory comprising a recursive domain name system server (DNS) service; computer security services, namely, restricting unauthorized computer network access by blocking unwanted and inappropriate internet and computer network traffic, by mitigating against and defending computer networks and websites from distributed denial of service (DDoS) attacks and by implementing countermeasures to limit exposure from such attacks and protect a website's uptime; providing online non-downloadable software for use in providing bot management and mitigation, and for protecting and guarding against network security threats
Case File Event Statements
-
4/5/2024 - 10 months ago
1 - NEW APPLICATION ENTERED
Type: NWAP
-
9/13/2024 - 4 months ago
2 - NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Type: NWOS
-
10/23/2024 - 3 months ago
6 - NOTIFICATION OF NON-FINAL ACTION E-MAILED
Type: GNRN
-
10/23/2024 - 3 months ago
5 - NON-FINAL ACTION E-MAILED
Type: GNRT
-
10/23/2024 - 3 months ago
4 - NON-FINAL ACTION WRITTEN
Type: CNRT
-
1/23/2025 - 13 days ago
9 - TEAS/EMAIL CORRESPONDENCE ENTERED
Type: TEME
-
1/23/2025 - 13 days ago
8 - CORRESPONDENCE RECEIVED IN LAW OFFICE
Type: CRFA
-
1/23/2025 - 13 days ago
7 - TEAS RESPONSE TO OFFICE ACTION RECEIVED
Type: TROA
-
10/21/2024 - 3 months ago
3 - ASSIGNED TO EXAMINER
Type: DOCK