Trademark: 90833479
Word
ADVANCING THE MISSION
Status
Dead
Status Code
606
Status Date
Monday, November 13, 2023
Serial Number
90833479
Mark Type
4000
Filing Date
Friday, July 16, 2021
Published for Opposition
Tuesday, February 14, 2023
Abandoned Date
Monday, November 13, 2023

Trademark Owner History
Kryptauri, Inc. - Owner At Publication

Classifications
37 Modernization of information technology systems and networks, namely, updating of computer hardware; computer hardware installation on information technology systems and networks; Installation of computer networking hardware; Installation, maintenance and repair of Ethernet and wireless networking hardware; Installation, maintenance and repair of computers and computer network hardware; Customizing computer hardware for computer network infrastructure; Maintenance and repair of telecommunications networking hardware, apparatus, and instruments; Providing technical support, namely, technical advice concerning the installation, repair and maintenance of computers, electronic apparatus, and equipment for information systems for military operations, government agencies and commercial enterprises; Consultancy relating to the installation, maintenance and repair of computer hardware
35 Strategic and tactical business intelligence services, namely, providing business intelligence services in the nature of strategic and tactical intelligence gathering, analysis of intelligence, daily and global intelligence monitoring and reporting, geographic and threat-specific intelligence gathering; Business management of the collection, analysis and reporting of vital data to contribute to the advance of deployed missions throughout the world and the protection of forces on the ground with real-time, actionable intelligence
45 Providing information in the field of the military, military tactics and strategies; Security assessments and security solutions services, namely, security threat analysis for protecting personal safety and physical security consultancy in the nature of threat assessment and tracking, vulnerability assessments, remediation actions and mitigation strategies, recommendations for network access hardening and best practices, program management assessment and control for others, facility protection, surveillance and countersurveillance, personnel employee background screening, force protection; Strategic and tactical intelligence services, namely, providing intelligence and information to local, state, and federal law enforcement agencies relating to organized crime networks that operate across jurisdictional lines in the nature of strategic and tactical intelligence gathering, analysis of intelligence, daily and global intelligence monitoring and reporting, geographic and threat-specific intelligence gathering, and threat assessment and tracking; Consulting services in the field of security intelligence, namely, physical security consultancy; Consulting services in the field of national security, namely, physical security consultancy; Providing reconnaissance and surveillance services; Providing strategic and tactical intelligence gathering and analysis for military, law enforcement, and the government, namely, providing intelligence and information to local, state, and federal law enforcement agencies relating to organized crime networks that operate across jurisdictional lines; Providing reconnaissance and surveillance services, namely, providing unmanned airborne Intelligence, Surveillance and Reconnaissance (ISR) services to the national Intelligence Community and the military; Providing reconnaissance and surveillance services, providing information in the field of the military, military tactics and strategies, and physical security consultancy, namely, management of the collection, analysis and reporting of vital data to contribute to the advance of deployed missions throughout the world and the protection of forces on the ground with real-time, actionable intelligence; Providing security surveillance of premises for businesses and governmental agencies; National intelligence services, namely, providing reconnaissance and surveillance services in the nature of counterintelligence (CI) services, signals intelligence (SIGINT) services, information collection management, cyber threat analysis being security threat analysis for public safety; Consulting in the field of signals intelligence, namely, consulting in the field of providing intelligence and information to local, state, and federal law enforcement agencies relating to organized crime networks that operate across jurisdictional lines; Technical consulting in the field of physical and personal security in the nature of signals intelligence collection, analysis and dissemination
42 Computer services, namely, remote and on-site management of information technology systems and networks for others; modernization of information technology systems and networks, namely, updating of computer software; computer systems integration services, namely, hardware and software integration planning, development, and implementation, on information technology systems and networks; installation of software on information technology systems and networks; design and development of electronic data security systems, namely, developing and implementing electronic data security systems, for information technology systems and networks; Installation, maintenance and repair of computer software; Computer network configuration services; Cloud storage services for electronic data; Computer disaster recovery planning; Computer security consultancy; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security threat analysis for protecting data; Computer technology support services, namely, help desk services; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Computer virus protection services; Computer network design for others; Computer and network security services, namely, restricting unauthorized access for computer networks; Consulting services in the field of cloud computing; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the fields of selection, implementation and use of computer hardware and software systems for others; Development of security systems and contingency planning for information systems; Internet security consultancy; IT consulting services; IT consulting services in the field of cyber defense and cyber-security of computer systems, internet, networks, applications, electronic data, communications and endpoints; IT integration service; Managed computer security services delivered through security operations centers, namely, managing and optimizing computer security software, namely, security information and event management (SIEM), firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), network access control (NAC), data loss prevention, application security, endpoint security, and forensics and incident response; Managed firewall and SIEM solutions, namely, computer security consultancy services; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technical support services, namely, technical administration of servers for others and troubleshooting in the nature of diagnosing server problems; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; Technical support services, namely, troubleshooting of computer software problems; Computer security consultancy, namely, security assessment services for computer networks; Computer security consultancy, namely, security risk assessment relating to computer and network systems; Computer services, namely, computer system administration for others; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; Data security consultancy; Technology consultation in the field of cybersecurity; Computer security consultancy, namely, consulting in the field of signals intelligence; Technical consulting in the field of computer security in the nature of signals intelligence collection, analysis and dissemination; Computer services, namely, remote and on-site management of the information technology (IT) systems of others, namely, management of secure information technology (IT) based services for others in the nature of information technology (IT) software applications management, enterprise services management in the nature of management of software applications, information assurance management in the nature of management of restricting network, data, and information access and management of scanning and eliminating unauthorized data and programs from files and networks and cyber security management in the nature of maintenance of computer software relating to computer security and prevention of computer risks; Technical support in the field of computer network security, namely, monitoring technological functions of computer network systems for detecting unauthorized use of network data; Technical support services for computer security purposes, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Computer network security services, namely, scanning and penetration testing of computer networks to assess information security vulnerability; Monitoring of computer networks for security purposes, namely, restricting unauthorized access to computer networks; Computer security services, namely, protecting data and information in computer networks from unauthorized access; Computer security services in the nature of administering digital keys; Computer security services in the nature of administering digital certificates; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, restricting unauthorized access to computer networks; Security assessments and security solutions services, namely, computer security threat analysis for protecting data and computer security consultancy in the nature of threat assessment and tracking, vulnerability assessments, remediation actions and mitigation strategies, recommendations for network access hardening and best practices, program management assessment and control for others; Consulting services in the field of security intelligence, namely, computer security consultancy Consulting services in the field of national security, namely, computer security consultancy; Computer security services for protecting data and information from unauthorized access, namely, monitoring of computer systems for computer security purposes, for compliance with federal agency and federal department regulations and guidelines, and for compliance with computer security guidelines, and for security risk assessment purposes; National intelligence services, namely, cyber threat analysis being computer security threat analysis for protecting data

Trademark Events
Nov 13, 2023
Abandonment Notice E-Mailed - No Use Statement Filed
Nov 13, 2023
Abandonment - No Use Statement Filed
Apr 11, 2023
Noa E-Mailed - Sou Required From Applicant
Feb 14, 2023
Official Gazette Publication Confirmation E-Mailed
Feb 14, 2023
Published For Opposition
Jan 25, 2023
Notification Of Notice Of Publication E-Mailed
Jan 11, 2023
Approved For Pub - Principal Register
Jan 10, 2023
Teas/Email Correspondence Entered
Jan 10, 2023
Correspondence Received In Law Office
Jan 10, 2023
Assigned To Lie
Nov 14, 2022
Notice Of Revival - E-Mailed
Nov 12, 2022
Teas Response To Office Action Received
Nov 12, 2022
Petition To Revive-Granted
Nov 12, 2022
Teas Petition To Revive Received
Oct 25, 2022
Abandonment Notice E-Mailed - Failure To Respond
Oct 25, 2022
Abandonment Notice Mailed - Failure To Respond
Oct 25, 2022
Abandonment - Failure To Respond Or Late Response
Apr 12, 2022
Notification Of Non-Final Action E-Mailed
Apr 12, 2022
Non-Final Action E-Mailed
Apr 12, 2022
Non-Final Action Written
Apr 6, 2022
Assigned To Examiner
Sep 20, 2021
New Application Office Supplied Data Entered
Jul 20, 2021
New Application Entered

Trademark Alertz updated from USPTO on 2030-01-24