Trademark: 86275209
Word
STRIXUS
Status
Dead
Status Code
602
Status Date
Saturday, April 4, 2015
Serial Number
86275209
Mark Type
4000
Filing Date
Thursday, May 8, 2014
Abandoned Date
Tuesday, March 3, 2015

Trademark Owner History

Classifications
42 (Based on 44(d) Priority Application) Computer consultation in the field of computer security; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, hard drive erasure; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Design and development of electronic data security systems; Design and development of home security systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of security systems and contingency planning for information systems; Development of software for secure network operations; Inserting software protection programs and security programs onto magnetic media; Maintenance of computer software relating to computer security and prevention of computer risks; On-line security services, namely, providing security and anonymity for electronically transmitted credit card transactions; Research in the field of intelligence and security technology(Based on 44(e)) Computer consultation in the field of computer security; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, hard drive erasure; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Design and development of electronic data security systems; Design and development of home security systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of security systems and contingency planning for information systems; Development of software for secure network operations; Inserting software protection programs and security programs onto magnetic media; Maintenance of computer software relating to computer security and prevention of computer risks; On-line security services, namely, providing security and anonymity for electronically transmitted credit card transactions; Research in the field of intelligence and security technology
45 (Based on 44(d) Priority Application) Computer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of point of sale activity indicating theft, fraud, or other criminal activity; Consulting and legal services in the field of privacy and security laws, regulations, and requirements; Consulting services in the field of maintaining the security and integrity of databases; Monitoring of computer systems for security purposes; Monitoring of security systems; Providing a web site featuring information in the field of security(Based on 44(e)) Computer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of point of sale activity indicating theft, fraud, or other criminal activity; Consulting and legal services in the field of privacy and security laws, regulations, and requirements; Consulting services in the field of maintaining the security and integrity of databases; Monitoring of computer systems for security purposes; Monitoring of security systems; Providing a web site featuring information in the field of security

Trademark Events
Apr 6, 2015
Abandonment Notice Mailed - Failure To Respond
Apr 4, 2015
Abandonment - Failure To Respond Or Late Response
Sep 2, 2014
Notification Of Non-Final Action E-Mailed
Sep 2, 2014
Non-Final Action E-Mailed
Sep 2, 2014
Non-Final Action Written
Aug 23, 2014
Assigned To Examiner
May 20, 2014
New Application Office Supplied Data Entered In Tram
May 12, 2014
New Application Entered In Tram

Trademark Alertz updated from USPTO on 2030-01-24