tm logo
KFIVEFOUR
Live/Registered
REGISTERED

on 27 Apr 2021

Last Applicant/ Owned by

1400 Crystal Drive, Suite 400

Arlington

VA

22202

Serial Number

88307463 filed on 19th Feb 2019

Registration Number

6335629 registered on 27th Apr 2021

in the Principal Register

Correspondent Address

Milton C. Johns

Milton C. Johns

11130 Fairfax Blvd., SUITE 303

Fairfax VA 22030

Filing Basis

1. intent to use

2. use application currently

Disclaimer

NO DATA

KFIVEFOUR

Educational services, namely, providing in-person and online seminars and training in the field of computer security, intrusion, vulnerability, forensics, application delivery, and data protection Printed manuals in the field of computer security, intrusion, vulnerability, forensics, application delivery, and data protection Research, development and engineering, installation, simulation, valida Read More

Classification Information


Class [016]
Paper Goods and Printed Material


Printed manuals in the field of computer security, intrusion, vulnerability, forensics, application delivery, and data protection


First Use Date in General

20th Jan 2020

First Use Date in Commerce

20th Jan 2020

Class [041]
Education and Entertainment Services


Educational services, namely, providing in-person and online seminars and training in the field of computer security, intrusion, vulnerability, forensics, application delivery, and data protection


First Use Date in General

20th Jan 2020

First Use Date in Commerce

20th Jan 2020

Class [042]
Computer & Software Services & Scientific Services


Research, development and engineering, installation, simulation, validation, maintenance and repair of computer software; research, development and engineering of computer network protection, security software, simulation, validation and reporting; consultation in the field of computer software and computer networks and other information technology infrastructure; consultation in the field of assessment, detection, protection and security of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against attack, intrusion, unauthorized activity, misuse and other anomalous events; technical support services, namely, troubleshooting of computer security network and other information technology infrastructure problems; analysis, evaluation, identification, reporting, and testing of computer networks, servers, applications, desktops and other information technology infrastructure for attack, intrusion, unauthorized activity, misuse and other anomalous events; remote monitoring, detection and protection of computer data and information, networks, servers, applications, desktops and other information technology infrastructure for attack, intrusion and misuse and other anomalous events, including deployment of countermeasures in response to detection of unauthorized access or use of computer data and information, networks, servers, applications, desktops and other information technology infrastructure; assessment of vulnerabilities of computer data and information, networks, servers, applications, desktops and other information technology infrastructure to attacks, intrusion, unauthorized activity, misuse and other anomalous events; providing information in the form of early warnings, advisory alerts, notifications, and reports of attacks, security events, unauthorized activity, misuse and other anomalous events, exploits and vulnerabilities for computer data and information, networks, servers, applications, desktops and other information technology infrastructure; conducting research in the field of assessment, detection, protection and security of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against attack, intrusion, unauthorized activity, misuse and other anomalous events; Computer security monitoring, simulation, validation, and reporting of computer network security and information risks; providing computer security monitoring, simulation, and validation of information in the field of vulnerability assessment and protection of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against vulnerabilities, attack, intrusion, unauthorized activity, misuse and other anomalous events


First Use Date in General

20th Jan 2020

First Use Date in Commerce

20th Jan 2020

Mark Details


Serial Number

No 88307463

Mark Type

No Service Mark

Attorney Docket Number

No

44D Filed

No

44D Current

No

44E filed

No

44E Current

No

66A Filed

No

66A Current

No

Current Basis

No

No Basis

No

Legal History


Show more

Status DateAction Taken
11th Apr 2022TEAS CHANGE OF CORRESPONDENCE RECEIVED
11th Apr 2022TEAS WITHDRAWAL OF ATTORNEY RECEIVED-FIRM RETAINS
11th Apr 2022ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED
11th Apr 2022TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED
27th Apr 2021REGISTERED-PRINCIPAL REGISTER
20th Mar 2021NOTICE OF ACCEPTANCE OF STATEMENT OF USE E-MAILED
19th Mar 2021ALLOWED PRINCIPAL REGISTER - SOU ACCEPTED
08th Mar 2021STATEMENT OF USE PROCESSING COMPLETE
08th Mar 2021CASE ASSIGNED TO INTENT TO USE PARALEGAL
18th Feb 2021USE AMENDMENT FILED