Trademark: 85799762
Word
NETREVEAL
Status
Registered
Status Code
705
Status Date
Friday, September 3, 2021
Serial Number
85799762
Registration Number
4669462
Registration Date
Tuesday, January 13, 2015
Mark Type
4000
Filing Date
Tuesday, December 11, 2012
Published for Opposition
Tuesday, October 28, 2014

Trademark Owner History
BAE Systems plc - Original Registrant

Classifications
9 Computer software, firmware and hardware for searching, mining, analyzing, processing, storing, managing, monitoring, aggregating, manipulating and modeling data; computer software, firmware and hardware for searching for, identifying, analyzing, processing, storing, managing, monitoring, aggregating and modeling transactions; computer software, firmware and hardware for searching, exploring, identifying, analyzing, processing, storing, managing, monitoring, aggregating, manipulating and modeling patterns and networks in data; computer software, firmware and hardware for detecting suspicious behavior, namely, detecting patterns and networks in data which indicate that financial crime, fraud or terrorism have occurred or are likely to occur; computer software, firmware and hardware for analyzing and predicting customer behavior in the field of finance, namely, banking and insurance; computer software, firmware and hardware for use in data mining and customer relationship management; computer software, firmware and hardware for information and communications technology security purposes; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, investigating, reviewing and managing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in defence, law enforcement, and business process optimisation; [ data processing apparatus and instruments, namely, computers; ] downloadable electronic publications in the nature of brochures, reports, certificates, user manuals, user guides, technical manuals, instruction manuals, training manuals, educational, training and instructional materials in electronic form, all in the fields of computer science, information technology, communications technology, finance, crime prevention and terrorism prevention
16 [Printed reports, technical manuals,] instruction manuals, user manuals, user guides, educational, training and instructional materials [, certificates, newsletters, pamphlets, brochures, catalogues, and printed advertising pamphlets, printed advertising newsletters and printed advertising posters all in the fields of computer science, information technology, communications technology, finance, crime prevention and terrorism prevention]
36 [Financial risk management consultation]
35 Compilation and systematization of information into computer databases; [management of computer databases; computer data processing, namely, manual entry and manual processing of computer data;] business research services, namely, providing data searches in computer files for others, namely, carrying out searches of data stored in computers to look for patterns or networks in that data; data processing services, namely, logging, capturing, searching, exploring, identifying, analyzing, processing, managing, monitoring, aggregating and modelling of data, and of patterns and networks in data; [business consulting; ]provision of business information via global computer networks; provision of business management information on a wide variety of topics to service providing professionals; [business data analysis services; business management analysis services;] business research services, namely, carrying out studies to provide evidence to support informed decision making in the operation of a business; [advice and consultancy relating to business risk management; preparation of business reports, commercial business reports and economic business reports; business consultation relating to all of the aforesaid services]
45 Fraud [and identity theft ] protection services; fraud detection services in the fields of banking, credit cards, debit cards, financial transactions and insurance; security inspection services for others [; data security inspection services for others; security consultancy; consulting services in the field of national security; homeland security advisory and consultancy services, namely, advising and consulting on now to reduce vulnerability to terrorism, how to minimize the damage caused by terrorist attacks, and how to recover from terrorist attacks; providing information in the field of the military, military tactics and strategies]
42 [Information technology consultancy services; ]research and development of computer software; design and development of computer software [and computer hardware; computer network design for others; computer monitoring service which tracks computer hardware performance and processes and sends out historical reports and alerts; computer monitoring service which tracks application software, performs periodic maintenance and provides reports and alerts concerning such performance; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; ] installation, configuration, servicing, maintenance and operational support services for computer software; software as a service (SAAS) services featuring software for searching, mining, collection, gathering, storage, exploration, analysis, processing, management, aggregation, modeling, viewing, sharing and monitoring of data and transactions, including patterns and networks in data and transactions; software as a service (SAAS) services featuring software for the detection and prevention of fraud, on-line fraud, financial fraud, financial crime, suspicious behavior, [ terrorism operations, smuggling operations,] money laundering operations and monetary losses; software as a service (SAAS) services featuring software for identifying, investigating, reviewing and managing cases of financial crime of all types; software as a service (SAAS) services featuring software for predictive modeling, regulatory compliance, operational efficiency, risk management, risk prevention, corporate governance and customer relationship management; software as a service (SAAS) services featuring software for due diligence investigations on customers and potential customers; software as a service (SAAS) services featuring software for the analysis and prediction of customer behavior; [computer services, namely, computer system administration for others; computer systems analysis; computer forensic services, namely, forensic analysis of computer operating systems;] software as a service (SAAS) services featuring software for matching, transforming, sampling, partitioning and analysis of data; advanced product research in the field of artificial intelligence; [computer project management services; software as a service (SAAS) services featuring software for raising alerts about actual or threatened security breaches on a computer network; computer virus, malware and spyware protection services; recovery of computer data; geographic mapping;] computer modeling services, namely, computer simulation from computer programs for others; [computer security consultancy; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability;] software as a service (SAAS) services featuring software for gathering intelligence and data in the field of banking, credit cards, debit cards, financial transactions, insurance, government, terrorism and homeland security; [ software as a service (SAAS) services featuring software for countering of improvised explosive devices (IEDs), including minefield clearance]

Trademark Events
Jan 13, 2024
Courtesy Reminder - Sec. 8 (10-Yr)/Sec. 9 E-Mailed
Oct 14, 2022
Teas Change Of Correspondence Received
Oct 14, 2022
Attorney/Dom.Rep.Revoked And/Or Appointed
Oct 14, 2022
Teas Revoke/App/Change Addr Of Atty/Dom Rep Received
Sep 3, 2021
Notice Of Acceptance Of Sec. 8 & 15 - E-Mailed
Sep 3, 2021
Registered - Partial Sec. 8 (6-Yr) Accepted & Sec. 15 Ack.
May 5, 2021
Case Assigned To Post Registration Paralegal
Jan 13, 2021
Teas Section 8 & 15 Received
Jan 13, 2020
Courtesy Reminder - Sec. 8 (6-Yr) E-Mailed
Jan 13, 2015
Registered-Principal Register
Oct 28, 2014
Official Gazette Publication Confirmation E-Mailed
Oct 28, 2014
Published For Opposition
Oct 8, 2014
Notification Of Notice Of Publication E-Mailed
Sep 23, 2014
Law Office Publication Review Completed
Sep 18, 2014
Approved For Pub - Principal Register
Sep 18, 2014
Teas/Email Correspondence Entered
Sep 18, 2014
Correspondence Received In Law Office
Sep 18, 2014
Teas Request For Reconsideration Received
Apr 10, 2014
Notification Of Final Refusal Emailed
Apr 10, 2014
Final Refusal E-Mailed
Apr 10, 2014
Final Refusal Written
Mar 18, 2014
Teas/Email Correspondence Entered
Mar 17, 2014
Correspondence Received In Law Office
Mar 17, 2014
Teas Response To Office Action Received
Sep 19, 2013
Notification Of Non-Final Action E-Mailed
Sep 19, 2013
Non-Final Action E-Mailed
Sep 19, 2013
Non-Final Action Written
Aug 29, 2013
Teas/Email Correspondence Entered
Aug 29, 2013
Correspondence Received In Law Office
Aug 21, 2013
Assigned To Lie
Aug 16, 2013
Teas Response To Office Action Received
Feb 16, 2013
Notification Of Non-Final Action E-Mailed
Feb 16, 2013
Non-Final Action E-Mailed
Feb 16, 2013
Non-Final Action Written
Feb 12, 2013
Assigned To Examiner
Dec 21, 2012
New Application Office Supplied Data Entered
Dec 14, 2012
New Application Entered

Trademark Alertz updated from USPTO on 2030-01-24