Trademark: 79358996
Word
ALLURITY
Status
Pending
Status Code
645
Status Date
Tuesday, April 9, 2024
Serial Number
79358996
Mark Type
4
Filing Date
Thursday, November 10, 2022

Trademark Owner History

Classifications
9 downloadable utility, security and cryptography software for network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, risk management, penetration testing, security analysis, identity security, identity and access management, encryption, detection of cyber threats, response in relation to cyber threats, digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; downloadable software for network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, risk management, penetration testing, security analysis, identity security, identity and access management, encryption, detection of cyber threats, response in relation to cyber threats, digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts for network and device security; downloadable software development tools; downloadable security software for network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, risk management, penetration testing, security analysis, identity security, identity and access management, encryption, detection of cyber threats, response in relation to cyber threats, digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; network access server hardware; downloadable mobile applications for the management of information; downloadable internet access software; downloadable computer software for the management of information; downloadable computer software for biometric systems for the identification and authentication of persons
45 consultancy in the field of data theft and identity theft, namely, verification of personal identity as part of personal background investigations; identity validation services, namely, verification of personal identity as part of personal background investigations
42 updating of computer software relating to computer security and prevention of computer risks; software development, programming and implementation; software design and development; rental of internet security programs for network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, risk management, penetration testing, security analysis, identity security, identity and access management, encryption, detection of cyber threats, response in relation to cyber threats, digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; provision of security services for computer networks, computer access and computerised transactions, namely, network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, risk management, penetration testing, security analysis, identity security, identity and access management, encryption, detection of cyber threats, response in relation to cyber threats, digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; provision of computer security risk management programs, namely, programs for network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, risk management, penetration testing, security analysis, identity security, identity and access management, encryption, detection of cyber threats, response in relation to cyber threats, digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; providing information in the field of information technology, namely, providing information in the field of computer software design and development and cybersecurity; IT security, protection and restoration, namely, network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, risk management, penetration testing, security analysis, identity security, identity and access management, encryption, detection of cyber threats, response in relation to cyber threats, digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; providing information in the field of computer software design; programming of internet security programs; monitoring of computer systems for security purposes, namely, network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, risk management, penetration testing, security analysis, identity security, identity and access management, encryption, detection of cyber threats, response in relation to cyber threats, digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; maintenance of computer software relating to computer security and prevention of computer risks; IT consultancy, advisory and information services relating to cyber security; internet security consultancy; digital asset management, namely, electronic data storage; electronic monitoring of personally identifying information to detect identity theft via the internet; development of software for secure network operations; design and development of virtual private network (VPN) operating software; development of computer hardware and software; design and development of internet security programs; design and development of electronic data security systems; data security consultancy services; IT security consultancy services for analysing information systems; consultancy in the field of security software; consultancy in the field of data security; consultancy and information services relating to information technology architecture and infrastructure; consultancy in the field of computer data security; consultancy and information services relating to computer system integration; computer security threat analysis for protecting data; computer security services in the nature of administering digital certificates; computer programming services for electronic data security; computer software and information technology in the nature of IT security consultancy services; authentication services for computer security, namely, consultancy and software management in relation to identity security and identity and access management,; advisory services relating to computer based information systems, namely, IT security consultancy

Trademark Events
Jan 3, 2023
New Application Office Supplied Data Entered
Jan 7, 2023
Application Filing Receipt Mailed
Feb 5, 2023
Change Of Name/Address Rec'd From Ib
Dec 30, 2022
Sn Assigned For Sect 66a Appl From Ib
Aug 24, 2023
Assigned To Examiner
Sep 18, 2023
Refusal Processed By Mpu
Aug 28, 2023
Non-Final Action Written
Aug 29, 2023
Non-Final Action (Ib Refusal) Prepared For Review
Sep 18, 2023
Non-Final Action Mailed - Refusal Sent To Ib
Oct 10, 2023
Refusal Processed By Ib
Mar 18, 2024
Teas/Email Correspondence Entered
Mar 18, 2024
Teas Response To Office Action Received
Mar 18, 2024
Correspondence Received In Law Office
Apr 9, 2024
Final Refusal Written
Apr 9, 2024
Final Refusal E-Mailed
Apr 9, 2024
Notification Of Final Refusal Emailed
Jun 7, 2024
Notification Of Possible Opposition Created, To Be Sent To Ib
Jun 7, 2024
Notification Of Possible Opposition Created, To Be Sent To Ib
Jun 30, 2024
Notification Of Possible Opposition - Processed By Ib
Jun 7, 2024
Notification Of Possible Opposition Sent To Ib

Trademark Alertz updated from USPTO on 2030-01-24