no statement of use filed
on 26 Aug 2019
Last Applicant/ Owned by
PO Box 10995
McLean
VA
221027995
Serial Number
86757280 filed on 15th Sep 2015
Registration Number
N/A
Correspondent Address
Elizabeth K. Stanley
Filing Basis
1. intent to use
2. intent to use current
Disclaimer
NO DATA
Computer hardware; Computer software for protecting IT systems and enterprises from external and internal cybersecurity attacks; Computer software and hardware for encryption; Computer software and hardware for the encryption of data and digital files, including audio, video, text, binary, executables, images, graphics and multimedia files; Computer software used to affiliate a computer software a Read More
Consulting services in the fields of implementation and use of computer hardware and software; Technical support services for others, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; Computer monitoring services, namely, tracking hardware performance and processes, and sending out historical reports and alerts; Computer security consultancy; Computer consultation; Computer security consultancy, namely, computer consultation in the fields of computer, data, network and electronic device security; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems and computer networks for others; Computer security consultancy, namely, consulting in the field of user access to data; Computer security consultancy in the field of computer systems, namely, security of data flows; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, computer networks and electronic devices; Technical support services for others, namely, monitoring of network system software, server software and web and database applications for security breaches and vulnerabilities, and repair, remediation and management of same; Computer security consultancy, namely, consulting services in the field of maintaining the security and integrity of IT systems and enterprises
Computer hardware; Computer software for protecting IT systems and enterprises from external and internal cybersecurity attacks; Computer software and hardware for encryption; Computer software and hardware for the encryption of data and digital files, including audio, video, text, binary, executables, images, graphics and multimedia files; Computer software used to affiliate a computer software application with a computer operating system in an effort to prevent viruses, worms, trojans, spyware, adware, and malware from impersonating the valid computer software application by registering the legitimate application with the operating system to ensure only legitimate use; Computer software and firmware for use in hardening computer software applications by watermarking the applications to the operating system with a unique wrapper that is validated by the operating system prior to the running of the applications; Computer software and hardware for the detection, protection and prevention of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, computer networks and electronic devices; Computer software and hardware for monitoring computers, computer networks and electronic devices for security purposes; Computer software and hardware for protecting and securing the integrity of data by retaining a duplicate copy of the software on the hard drive and at reboot, comparing and eliminating any changes made to the software or new files introduced; Computer chips; Electronic integrated circuit computer chips; Electronic integrated circuit computer chips for authentication and identity management information security using out-of-band network devices; Encoded electronic chip cards for encrypting computer, data, network and electronic devices; Encoded electronic chip cards for security, authentication, tracking and information assurance by identifying particular users of computer software applications; Computer software and hardware for security, authentication, tracking and information assurance used to authenticate the identity of users of devices and applications and to prevent backdoor access to applications; Computer software and hardware for use in computer, data, network and electronic device security used to identify and authenticate the source of data in an IT system and enterprise and to validate that the source, user, device and application are authorized to conduct the attempted activity; Computer software and hardware for managing, monitoring and controlling device, software, and user access to information systems data; Computer software and hardware for authenticating user identification or digital certificates of sites, systems, devices, software and data; Computer software and hardware for the defining and managing the roles of users and their access to information technology systems data by systems, devices, software users and data; Computer software and hardware for monitoring of cybersecurity status and alarms; Computer software and hardware for monitoring systems for security, authentication, tracking and information assurance; Computer software and hardware for monitoring and reconfiguring computer, data, network and electronic device security systems and authorizations
Monitoring of computer systems for security purposes
No 86757280
No Service Mark
No 082747.0114
No
No
No
No
No
No
No
No
Status Date | Action Taken |
---|---|
26th Aug 2019 | ABANDONMENT - NO USE STATEMENT FILED |
26th Aug 2019 | ABANDONMENT NOTICE E-MAILED - NO USE STATEMENT FILED |
12th Jan 2019 | NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED |
11th Jan 2019 | EXTENSION 5 GRANTED |
11th Jan 2019 | CASE ASSIGNED TO INTENT TO USE PARALEGAL |
28th Dec 2018 | EXTENSION 5 FILED |
28th Dec 2018 | TEAS EXTENSION RECEIVED |
16th Jun 2018 | NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED |
14th Jun 2018 | EXTENSION 4 GRANTED |
14th Jun 2018 | EXTENSION 4 FILED |