Trademark: 79373597
Word
THREATDESK
Status
Dead
Status Code
602
Status Date
Sunday, May 12, 2024
Serial Number
79373597
Mark Type
4
Filing Date
Thursday, January 19, 2023
Abandoned Date
Monday, April 29, 2024

Trademark Owner History

Classifications
41 Technical consulting in the field of cyber security risk management training
9 Computer programs for searching remotely for content on computers and computer networks; computer search engine software; computer software for accessing email and text messages; computer software for accessing information directories that may be downloaded from the global computer network; computer software for accessing, browsing and searching online databases; computer software for accessing, querying and analyzing information stored in databases and data warehouses; computer software for application and database integration; computer software for biometric gait recognition analysis; computer software for bitcoin data mining; computer software for blockchain data mining; computer software for connecting computers and for enabling cloud computing; computer software for controlling and managing access server applications; computer software for converting document images into electronic formats; computer software for creating and inserting meta tags into documents and information; computer software for creating maps; computer software for creating searchable databases; computer software for creating searchable databases of information and data; computer software for creating, sending and receiving e-mail; computer software for data deduplication; computer software for data security; computer software for database management; computer software for document management; computer software for fingerprint imaging; computer software for image processing; computer software for language translations; computer software for managing transactional data, providing statistical analysis, and producing notifications and reports in the field of warehousing and distribution; computer software for monitoring computer network access and activity; computer software for optical character recognition; computer software for organizing and viewing digital images and photographs; computer software for processing digital images; computer software for providing an on-line database in the field of transaction processing to upload transactional data, provide statistical analysis, and produce notifications and reports; computer software for the creation of firewalls; computer software for use as an application programming interface (API) for use in the fields of image content analysis; computer software for use as an application programming interface (API) for use in the fields of natural language processing; computer software for use as an application programming interface (API) for use in the fields of speech recognition; computer software for use as an application programming interface (API) for use in the fields of virtualization; computer software for use in map making; computer software for use in the detection, analysis, mitigation and resolution of threats in the field of cybersecurity; computer software for use in the encryption and decryption of digital files; computer software for word processing; computer software platforms for social networking; computer software to automate data warehousing; computer software to enable accessing information in electronic form via computer and communication networks in the field of news; computer software to enable downloading information in electronic form via computer and communication networks in the field of news; computer software to enable providing information in electronic form via computer and communication networks in the field of news; computer software to enable sharing information in electronic form via computer and communication networks in the field of news; computer software to enable uploading information in electronic form via computer and communication networks in the field of news; computer software used for running cloud computing based applications; security software; software for accessing and searching online databases and websites; software for optical character recognition; software for processing images, graphics and text; software for the integration of artificial intelligence and machine learning in the field of Big Data; software for use in the evaluation and analysis of data utilizing computational linguistics; software for use in the evaluation and analysis of data utilizing machine learning; speech analytics software; speech and voice recognition software; speech recognition software; speech-to-text conversion software
45 Forensic analysis of surveillance video for fraud and theft prevention purposes
42 Application service provider (ASP) services featuring computer software and providing online non-downloadable software, namely, computer software for accessing, browsing and searching online databases; application service provider (ASP) services featuring computer software and providing online non-downloadable software, namely, computer software for storing, organizing, and accessing phone numbers and addresses; application service provider featuring application programming interface (api) software for analyzing market data; application service provider featuring application programming interface (api) software for gathering market data; assessing information technology security and vulnerability of computers and networks; cloud computing provider services for general storage of data; cloud computing providing software for database management; cloud services in the nature of monitoring of computer systems for detecting unauthorized access or data breach; cloud services in the nature of monitoring of the condition and status of computer systems; cloud services in the nature of updating of computer software relating to computer security and prevention of computer risks; cloud-based data protection services; computer anti-virus protection services; computer consultation in the field of computer security; computer network security consultancy; computer network security services; computer security consultancy; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer security threat analysis for protecting data; computer services, namely, providing assistance in developing computer systems, databases and applications (terms too vague in the opinion of the International Bureau - Rule 13 (2) (b) of the Common Regulations). computer systems integration services; consulting services in the field of collection of evidence for forensic purposes; consulting services in the field of software as a service (saas); consulting services in the fields of forensic science; cryptanalysis services; cryptographic engineering; data decryption services; data deduplication services; data encryption and decoding services; data encryption services; data mining services; data security consultancy; data security consulting in the field of using encryption, computer hardware and computer software to ensure that data cannot be accessed by unauthorized parties; digital forensic investigations in the field of computer crimes; electronic monitoring of credit card activity to detect fraud via the internet; electronic monitoring of personally identifying information to detect identity theft via the internet; electronic storage of photographic images; forensic analysis of surveillance video for forensic research purposes; platform as a service (PaaS) provider for the searching and identifying consumer behaviour patterns using a computer searching algorithm to locate data stored in multi-structured formats based on key indexes over the Internet; software as a service (SAAS), namely, search engine software; software as a service (SAAS), namely, software for image analysis and editing; software as a service (SaaS) provider for the searching and identifying consumer behaviour patterns using a computer searching algorithm to locate data stored in multi-structured formats based on key indexes over the Internet; software as a service (SAAS) services featuring non-downloadable security software; software as a service (SAAS) services featuring non-downloadable software for automated cybersecurity monitoring and cybersecurity breach remediation; software as a service (SAAS) services featuring non-downloadable software for computer network security; software as a service (SAAS) services featuring non-downloadable software for computer security; software as a service (SAAS) services featuring non-downloadable software for data security; software as a service (SAAS) services featuring non-downloadable software for use in the detection, analysis, mitigation and resolution of threats in the field of cybersecurity; software as a service (SaaS) services featuring software for enabling others to access and use a virtual cybersecurity expert software platform for assessing and mitigating information security vulnerabilities; software engineering services for data processing programs
THREAT DESK

Trademark Events
Jul 6, 2023
Sn Assigned For Sect 66a Appl From Ib
Jul 7, 2023
New Application Office Supplied Data Entered
Oct 27, 2023
Non-Final Action Mailed - Refusal Sent To Ib
Jul 11, 2023
Application Filing Receipt Mailed
Oct 17, 2023
Assigned To Examiner
Oct 20, 2023
Non-Final Action Written
Oct 21, 2023
Non-Final Action (Ib Refusal) Prepared For Review
Oct 27, 2023
Refusal Processed By Mpu
Nov 22, 2023
Refusal Processed By Ib
May 12, 2024
Abandonment - Failure To Respond Or Late Response
May 12, 2024
Abandonment Notice Mailed - Failure To Respond
May 13, 2024
Abandonment Notice Mailed - Failure To Respond

Trademark Alertz updated from USPTO on 2030-01-24