P - Trademark Details
Status: 641 - Non-Final Action - Mailed
Serial Number
90059203
Word Mark
P
Status
641 - Non-Final Action - Mailed
Status Date
2021-12-03
Filing Date
2020-07-17
Mark Drawing
5000 - Illustration: Drawing with word(s)/letter(s)/number(s) in Stylized form
Typeset
Published for Opposition Date
2021-08-10
Attorney Name
Law Office Assigned Location Code
M30
Employee Name
AIKENS, RONALD E
Statements
Indication of Colors claimed
The color(s) teal is/are claimed as a feature of the mark.
Description of Mark
The mark consists of a stylized teal "p".
Goods and Services
Computer hardware and software for analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities in the fields of computer security; computer software for provide real-time information security intelligence in the fields of computer, data, internet website, and network security; computer software for protecting and securing computer networks and applications; computer software for providing real-time security audits of an online application, network, and host
Goods and Services
Education, namely, providing classes, individual training, seminars, workshops and training in the fields of computer security
Goods and Services
Providing online non-downloadable software for analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities in the fields of computer security; providing online non-downloadable computer software for provide real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; computer security consultancy; computer security consultancy in the nature of providing technical recommendations and advice in the fields of internet website, network, and computer data security; computer security policy assessment; providing online non-downloadable computer software for providing real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; computer support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; cybersecurity diagnostic services, namely, computer security threat analysis for protecting data; cybersecurity computer hardware, software network and web-based maintenance services; cybersecurity, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials and specified policies; computer security, namely, cybersecurity policy assessment; cybersecurity support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; cybersecurity vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; data security diagnostic services, namely, computer security threat analysis for protecting data; data security computer hardware, software, network and web-based maintenance services; data security, namely, computer security threat analysis for protecting data; computer security, namely, data security policy assessment; data security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; data security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; computer services, namely, endpoint detection and response of computer software and hardware to potential threats; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; firewall security diagnostic services, namely, security threat analysis for protecting data; firewall computer hardware, software and network security maintenance services; firewall security, namely, computer security threat analysis for protecting data; computer security, namely, firewall security policy assessment; firewall security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer hardware diagnostic services; computer hardware maintenance services; hardware security, namely, design and development of computer hardware security systems; computer security, namely, hardware security policy assessment; hardware support services, namely, troubleshooting of computer hardware problems, monitoring technological functions of computer network systems; hardware vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; information technology diagnostic services, namely, computer security threat analysis for protecting data; information technology maintenance services, namely, computer hardware, network, software and web-based maintenance services; information technology security, namely, computer security threat analysis for protecting data; computer security, namely, information technology security policy assessment; information technology support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance of computer software relating to computer security and prevention of computer risks; computer services, namely, managed detection and response of cyber, data, firewall, endpoint, network and security threats and vulnerabilities; managed security service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software, and web sites, of others in the fields of cybersecurity; computer network diagnostic services; computer network maintenance services for others; computer network security, namely, analysis for protecting data, administering digital certificates, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; computer network security policy assessment; computer network support services, namely, installation, administration, and troubleshooting of web and database applications, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; password diagnostic services; computer software and hardware password maintenance services; password security, namely, providing authentication, issuance, validation and revocation of digital certificates, implementing software and network policies; password security policy assessment, namely, analyzing and implementing software and network policies; password support services, namely, providing help desk services to retrieve computer software and hardware passwords; password vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer security consultancy; security policy assessment, namely, data security consultancy, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; support services, namely, troubleshooting of computer software problems, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; testing of computer software and hardware security systems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; penetration testing for cyber, data, firewall, endpoint, network and security threats and vulnerabilities for computer hardware and software; providing temporary use of non-downloadable software for security operations center management; software diagnostic services, namely, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; computer software maintenance services; software security policy assessments, namely, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; software support services, namely, troubleshooting of computer software problems, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities; software vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; vulnerability assessments, namely, analyzing cyber, data, firewall, endpoint, network and security threats and vulnerabilities, scanning and penetration testing of computers and networks to assess information security vulnerability
Pseudo Mark
PRO
Classification Information
International Class
009 - Scientific, nautical, surveying, electric, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus. - Scientific, nautical, surveying, electric, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
US Class Codes
021, 023, 026, 036, 038
Class Status Code
6 - Active
Class Status Date
2021-05-11
Primary Code
009
First Use Anywhere Date
2017-12-15
First Use In Commerce Date
2017-12-15
International Class
041 - Education; providing of training; entertainment; sporting and cultural activities. - Education; providing of training; entertainment; sporting and cultural activities.
US Class Codes
100, 101, 107
Class Status Code
6 - Active
Class Status Date
2021-05-11
Primary Code
041
First Use Anywhere Date
2017-12-15
First Use In Commerce Date
2017-12-15
International Class
042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software; legal services. - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software; legal services.
US Class Codes
100, 101
Class Status Code
6 - Active
Class Status Date
2020-08-13
Primary Code
042
First Use Anywhere Date
2017-12-15
First Use In Commerce Date
2017-12-15
Current Trademark Owners
Party Name
Party Type
10 - Original Applicant
Legal Entity Type
03 - Corporation
Address
Please log in with your Justia account to see this address.
Correspondences
Name
Peter B. Bromaghim
Address
Please log in with your Justia account to see this address.
Trademark Events
Event Date | Event Description |
2020-07-21 | NEW APPLICATION ENTERED IN TRAM |
2020-08-13 | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM |
2020-10-29 | ASSIGNED TO EXAMINER |
2020-11-09 | NON-FINAL ACTION WRITTEN |
2020-11-09 | NON-FINAL ACTION E-MAILED |
2020-11-09 | NOTIFICATION OF NON-FINAL ACTION E-MAILED |
2021-05-10 | TEAS RESPONSE TO OFFICE ACTION RECEIVED |
2021-05-10 | CORRESPONDENCE RECEIVED IN LAW OFFICE |
2021-05-11 | TEAS/EMAIL CORRESPONDENCE ENTERED |
2021-07-06 | APPROVED FOR PUB - PRINCIPAL REGISTER |
2021-07-20 | WITHDRAWN FROM PUB - OG REVIEW QUERY |
2021-07-28 | PREVIOUS ALLOWANCE COUNT WITHDRAWN |
2021-08-26 | TEAS CHANGE OF OWNER ADDRESS RECEIVED |
2021-08-26 | TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED |
2021-08-26 | ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED |
2021-08-26 | TEAS CHANGE OF CORRESPONDENCE RECEIVED |
2021-08-26 | APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED |
2021-12-03 | NON-FINAL ACTION WRITTEN |
2021-12-03 | NON-FINAL ACTION E-MAILED |
2021-12-03 | NOTIFICATION OF NON-FINAL ACTION E-MAILED |