on 18 Apr 2024
Last Applicant/ Owned by
60 E RIO SALADO PARKWAY, STE 1000
TEMPE
AZ
85281
Serial Number
85154143 filed on 15th Oct 2010
Registration Number
4354348 registered on 18th Jun 2013
Correspondent Address
David Jackson
Filing Basis
1. intent to use
2. use application currently
Disclaimer
NO DATA
Development of software for network and Internet security and data encryption; computer consultation; computer consultation in the field of computer security; computer diagnostic services; computer services, namely, filtering of unwanted and unsolicited email; computer services, namely, data recovery services; technical support services, namely, troubleshooting in the nature of diagnosing computer Read More
Monitoring of computer systems for security purposes; monitoring computer networks for security purposes; providing user authentication services in e-commerce transactions; providing information about computer and Internet security in the nature of administering digital keys and certificates
30th Sep 2010
30th Sep 2010
Development of software for network and Internet security and data encryption; computer consultation; computer consultation in the field of computer security; computer diagnostic services; computer services, namely, filtering of unwanted and unsolicited email; computer services, namely, data recovery services; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; technical support services, namely, providing back-up computer programs and facilities; computer virus protection services; computer software installation services; technical consultation in the field of computer software installation and maintenance; development, updating, publishing and maintenance of software for networks and standalone computers in the fields of security, database management, and anti-virus protection and monitoring security systems; providing information in the field of computer network and Internet security; providing technical information in the field of computer software applications; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; updating computer software; providing information in the field of computer database, software, hardware, and network operation, design and development; computer monitoring services in the nature of tracking hardware and software performance and processes and sending reports thereof; monitoring the computer systems of others for technical purposes and providing back-up computer programs and facilities; integration of computer systems and networks; computer services, namely, providing information concerning the encryption and authentication of electronic data for website and ecommerce transaction security; computer and software consultancy services in the fields of digital media, data encryption, computer security, communication security and computer software; encryption and decryption of data and communications; creating indexes of information available on websites and filtering unwanted electronic transmissions from websites; providing security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the Internet, and computer networks; providing information about accessing computer security, preventing computer threats and design and development of computer security hardware and software applications
30th Sep 2010
30th Sep 2010
Electronic storage of data files for clients to store and retrieve data via a global computer network; electronic document and email archiving services
30th Sep 2010
30th Sep 2010
Transmittal of anti-virus scanning and other network security software via a global computer network; information and consultancy with regard to aforementioned services
30th Sep 2010
30th Sep 2010
[ Computer user manuals in the field of computers, computer software, computer peripherals, computer security, computer services, and computer networks; printed matter and publications, namely, ] [ magazines and ] [ conference materials in the field of computers, computer software, computer peripherals, and computer networks ] [ ; paper labels and paper printed hologram labels ]
30th Sep 2010
30th Sep 2010
Computer antivirus software; computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for providing intrusion detection and prevention; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, including computer software for use in the monitoring and control of computer and online activity; computer software for providing online transaction security; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer maintenance software; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; cloning software, namely, software for cloning computer hard drives, software for cloning computer operating systems, software for cloning data files, software reconfiguring personal computers; computer software for the creation of virtual private network; computer utility software; computer utility software for removal of computer applications and software; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software, namely, middleware for interfacing client applications and networked or host based databases; computer software for use in updating other computer software; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software for telecommuting, namely, for connecting to and use of a remote computer network, a remote computer and mobile devices; computer software for use with a home or remote office for connecting computer network users to global networks; computer software and recorded databases for use in diagnosis, repair and configuration of computers, computer software and computer peripherals; computer software, hardware, firmware and peripherals for network and Internet security data and system protection, and storage, server, client, and application performance management; computer hardware; computer hardware appliances that provide firewall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and storage area networks; computer software for backing up and restoring computer data; computer software for use in disaster recovery; computer software for use in removable storage media management; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for use in the field of enterprise information management; computer software for use in the field of online analytical processing (OLAP); computer software for generating reports from databases; computer software for scheduling automated processes; computer software for use in the central management of computer attached to a computer network; computer software for replicating and archiving files from one data store to another; computer software for metering the use of the other computer software; computer software for use in developing data analysis applications and other computer software; computer programs for data security for use with data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; computer programs for remotely monitoring, evaluating, demonstrating and controlling other computer programs or computer processes; computer programs for locking-down one or more computers on a computer network; computer hardware and software for authenticating users and maintaining and managing access to computer data, computer content, electronic communications, and computer networks; embedded software for network monitoring and security; embedded software for authenticating users and maintaining and managing access to computer data, computer content, electronic communications, and computer networks; computer software, namely, content management software which filters, monitors, reports on and controls use of and access to locations on computer systems and networks and on global communication networks; electronic mail and news group filtering software which prevents or shunts delivery of defined categories or origins of electronic mail messages and news postings; protection software which detects electronic inquiries for information from computer systems or of users of computer systems and organizes, monitors, controls and prevents provision of such information; privacy management software which prevents, monitors, certifies, aggregates and reports on the distribution and use of personal identification information on computer systems and networks and on global communications networks; file transfer filtering software which prevents, monitors, reports on or shunts delivery of defined categories, origins, volumes, or timeframes of electronic files; and chat filtering software which prevents, monitors, reports on, analyzes, or shunts delivery of defined categories, senders, recipients, origins, volumes or timeframes of conversations transmitted or stored electronically; downloadable electronic publications in the nature of reference, user, technical and instructional manuals and data sheets for use with computer software, hardware, peripherals and firmware and downloadable electronic publications in the nature of manuals, blogs, instructional materials, teaching materials, newsletters, magazines, newspapers, books and pamphlets in the fields of computer software and computer and on-line security
30th Sep 2010
30th Sep 2010
No 85154143
No Service Mark
No
No
No
No
No
No
No
No
No
24.17.15 -
Check marks
26.01.02 -
Plain single line circles
26.09.14 -
Three or more squares
26.09.16 -
Squares touching or intersecting
26.09.21 -
Squares that are completely or partially shaded
Status Date | Action Taken |
---|---|
18th Apr 2024 | NOTICE OF ACCEPTANCE OF SEC. 8 - E-MAILED |
18th Apr 2024 | REGISTERED AND RENEWED (FIRST RENEWAL - 10 YRS) |
18th Apr 2024 | REGISTERED - SEC. 9 GRANTED/CHECK RECORD FOR SEC. 8 |
18th Apr 2024 | REGISTERED - PARTIAL SEC. 8 (10-YR) ACCEPTED |
18th Apr 2024 | CASE ASSIGNED TO POST REGISTRATION PARALEGAL |
13th Dec 2023 | TEAS SECTION 8 & 9 RECEIVED |
08th Mar 2023 | AUTOMATIC UPDATE OF ASSIGNMENT OF OWNERSHIP |
07th Dec 2022 | ASSIGNMENT OF OWNERSHIP NOT UPDATED AUTOMATICALLY |
16th Nov 2022 | ASSIGNMENT OF OWNERSHIP NOT UPDATED AUTOMATICALLY |
18th Jun 2022 | COURTESY REMINDER - SEC. 8 (10-YR)/SEC. 9 E-MAILED |