98574650 - ABSOLUTE RADIX

Information

  • Trademark
  • 98574650
  • Serial Number
    98574650
  • Filing Date
    May 29, 2024
    a year ago
  • Transaction Date
    April 16, 2025
    6 months ago
  • Status Date
    April 15, 2025
    6 months ago
  • Location Date
    April 15, 2025
    6 months ago
  • Status Code
    653
  • Current Location
    TMO LAW OFFICE 123
    Employee Name
    COFFEY, AARON
  • Attorney Docket Number
    T-5066 US
    Attorney Name
    Sydney R. Jensen
    Law Office Assigned Location Code
    N50
  • Owners
Mark Drawing Code
4
Mark Identification
ABSOLUTE RADIX
Case File Statements
  • GS0091: Downloadable computer security software for ensuring the security of computers, computer tablets, personal digital assistants, mobile phones, other computing devices and computer networks; recorded computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; downloadable virtual private network (VPN) operating and network security software; downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; downloadable computer software for tracking and managing information for use in the field of information technology services management; downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; downloadable computer software that generates security access codes for accessing self-encrypting drives; downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices; security software and equipment, namely, pre-recorded disks featuring computer security software and erasable programmable read only memories (EPROMs) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices, and instruction manuals sold together as a unit therewith;
  • GS0451: Providing investigation, surveillance and security services for the purposes of protection of personal property, namely, monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices to prevent loss and theft, and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; computer assisted investigation, surveillance and security services for the purposes of protection of personal property, namely, monitoring and tracking the location of computers, computer tablets, personal digital assistants, mobile phones and other computing devices; surveillance services, namely, monitoring, tracking, analysis and reporting on lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; surveillance services to aid in location, recovery, remote disabling, and removal of data from lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices; identity verification services, namely, providing validation of identity of end users of personal computers; security services for the purposes of protection of personal property, namely, the automatic deletion of files on personal computers and notification of law enforcement authorities if computers, computer tablets, personal digital assistants, mobile phones and other computing devices are lost or stolen;
  • GS0421: Installation, implementation and ongoing technical support and maintenance of computer security software; maintenance of computer software relating to computer security and prevention of computer risks; installation, implementation and ongoing technical support and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and technical ongoing support and maintenance of computer software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices for the protection of data by remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data; installation, implementation and technical ongoing support and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; installation, implementation and technical ongoing support and maintenance of computer software for use in the field of information technology for mobile devices, namely, computer software for tracking and managing information on mobile devices, user, installation and system configuration and installation and deployment of computer software and software upgrades for mobile devices by local or remote means; electronic data back-up services, namely, automatic back-up of information on personal computers; installation, removal and updating of computer software on a personal computer; security testing of computer software applications, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SAAS) services featuring non downloadable software for computer, network and data security; software as a service (SAAS) services featuring non-downloadable software for the creation of a secure distributed network environment; computer network security services; data security services, namely, design and development of electronic data security systems; providing online non-downloadable computer security software for ensuring the security of computers, computer tablets, personal digital assistants, mobile phones, other computing devices and computer networks; providing online non-downloadable computer security firmware for use in investigation, surveillance and security services relating to computer security and prevention of computer risks; providing online non-downloadable virtual private network (VPN) operating and network security software; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology services management; providing online non-downloadable computer software for tracking and managing information for use in the field of information technology asset management for computers and mobile devices; providing online non-downloadable computer software that generates security access codes for accessing self-encrypting drives; providing online non-downloadable computer software pre-loaded into computers and personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; providing online non-downloadable computer software for use in security applications, namely, loss control protection, anti-theft protection, anti-virus protection, intrusion detection, firewall and prevention of computer applications from performing potentially damaging operations, asset management, namely, asset auto-discovery, asset distribution, protection of data, namely, remotely activating automatic geolocation, locking of devices, data encryption and remote deletion of data, through personal computing devices such as laptops, personal computers, personal digital assistants, mobile phones and other computing devices;
Case File Event Statements
  • 5/29/2024 - a year ago
    1 - NEW APPLICATION ENTERED Type: NWAP
  • 12/7/2024 - 10 months ago
    2 - NEW APPLICATION OFFICE SUPPLIED DATA ENTERED Type: NWOS
  • 12/12/2024 - 10 months ago
    6 - NOTIFICATION OF NON-FINAL ACTION E-MAILED Type: GNRN
  • 12/12/2024 - 10 months ago
    4 - NON-FINAL ACTION WRITTEN Type: CNRT
  • 12/11/2024 - 10 months ago
    3 - ASSIGNED TO EXAMINER Type: DOCK
  • 12/12/2024 - 10 months ago
    5 - NON-FINAL ACTION E-MAILED Type: GNRT
  • 3/11/2025 - 7 months ago
    7 - TEAS RESPONSE TO OFFICE ACTION RECEIVED Type: TROA
  • 3/11/2025 - 7 months ago
    8 - CORRESPONDENCE RECEIVED IN LAW OFFICE Type: CRFA
  • 3/12/2025 - 7 months ago
    9 - TEAS/EMAIL CORRESPONDENCE ENTERED Type: TEME
  • 4/15/2025 - 6 months ago
    12 - NOTIFICATION OF LETTER OF SUSPENSION E-MAILED Type: GNS3
  • 4/15/2025 - 6 months ago
    10 - SUSPENSION LETTER WRITTEN Type: CNSL
  • 4/15/2025 - 6 months ago
    11 - LETTER OF SUSPENSION E-MAILED Type: GNSL