Trademark: 87565406
Word
CRYPTOPASS
Status
Dead
Status Code
606
Status Date
Monday, March 25, 2019
Serial Number
87565406
Mark Type
4000
Filing Date
Friday, August 11, 2017
Published for Opposition
Tuesday, June 26, 2018
Abandoned Date
Monday, March 25, 2019

Trademark Owner History

Classifications
9 Apparatus for recording, transmission and reproduction of computer data, sound and images; Apparatus for the collection, storage, encryption, measuring, processing, verification, conversion, switching, transfer, reproduction and transmission of data, namely, gateway routers; electronic databases and computer databases in the field of communication and file encryption, file sharing and storage, recorded on computer media; downloadable electronic databases and computer databases in the field of communication and file encryption, file sharing and storage; Devices for exchanging and storing data, namely, computers, smartphones, cloud storage servers; Data processors; Data processing and computer apparatus; Computer hardware; Smart cards with embedded secure element and key management solution; Computer and smartphone software for communication and file encryption, file sharing and storage; Apparatus for measuring telematics and telephony traffic, for measuring the quality, the transmission and security thereof; Computers and software for use in telecommunications analysis; Computer and smartphone programs for controlling access to one or several computer networks, in particular for securing access to local networks; Computer and smartphone programs for the protection of communications on telephony, radiotelephony and computer networks, in particular by sealing and encrypting data packets using a chip card; Encoded electronic chip cards for the protection of communications on telephony, radiotelephony and computer networks, in particular by sealing and encrypting data packets; Software for computer security, computer programming, software for image analysis and for digital processing of images; computer and smartphone software for database management in the field of cryptographic network security and data security; computer and smartphone software used for automating an identity authentication process using existing databases in connection with the issue and management of digital certificates used for authentication or encryption of digital communications, or the authentication of a digital signature in an electronic transaction or communication over the internet and other computer networks; Encryption software enabling the secure transmission of digital information; Computer and smartphone software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration with existing communications networks; Computer and smartphone software for use in analyzing and reporting IT infrastructure access log data; Software for detecting, blocking, and intercepting malware and other threats to computer software and hardware; Software for detecting, preventing and diagnosing computer security breaches; computer software for collecting, compressing, verifying, converting, processing, transferring, backing up in the nature of safeguarding, storing, restoring and recovering data; Software for encrypting and decrypting digital files, including audio, video, text, binary, still image, graphics and multimedia files; computer and smartphone software for identity security; computer and smartphone software for authentication and identity management information security; computer and smartphone software for data access and digital information management; Software and firmware for the management, transmission and storage of data and information; computer and smartphone software for use in monitoring computers and smartphone for use in response to network and device vulnerability; Computer and smartphone software for communication and file encryption, file sharing and storage; computer and smartphone software for use in response to network and device vulnerability
38 Telecommunications, namely, secure personal and professional communications; Information about telecommunications; Communications by computer terminals, smartphone and mobile telephony, and by fibre optic networks; Radio communications; Communications by telephone and smartphone; Communications by cellular phones; Communications by radio telephone, smartphone and computer; Provision of access to a global computer network; telecommunication services, namely, electronic bulletin board services; Providing telecommunications connections to a global computer and smartphone network; Rental of telecommunication equipment; Teleconferencing services; Electronic messaging; Providing electronic transmission of secure electronic communication by voice, data, and instant messaging (IM) and file encryption and secure file storage and sharing; Electronic transmission of computer files and data; Electronic communications services, namely, communication and file encryption, file storage and sharing; Communication by or between computers and computer terminals; Electronic transmission of instant messages and data; Providing access to databases; Automatic transfer of digital data using telecommunications channels; Transmission of network security software via a global computer network and electronic transmission of communications and data via email enabling encryption and decryption through the management and filtering of mail sent via a global computer network; providing information, advisory, and consultation services in the field of telecommunications
42 Engineering consultation, namely, providing assessments in the fields of science and technology, provided by engineers; Engineering appraisals and research in the scientific and technological fields; Data mining; Cloud computing featuring software for use in communication and file encryption, file storage and sharing; Computer project management relating to electronic data processing; Research relating to data processing; Technical advisory services relating to data processing; Data conversion from physical to electronic media and copying of electronic data; Data encryption services, namely, encoding of data; Data security, namely, hosting software for use by others for use in communication and file encryption, file storage, and sharing; Providing information concerning encryption of electronic data for website and e-commerce transaction security; Engineering in the field of telephony; Engineering in the field of computing and telecommunications; Design and development of computer and smartphone software; Research and development of new products for others; Conducting technical project studies in the field of implementation, integration, and feasibility analysis in the area of communication and file encryption, file sharing, and storage; Engineering of all kinds; Computer programming; Computer and smartphone security consultation, namely, auditing and monitoring computer and smartphone networks; Data conversion of electronic information; Conversion of computer programs and documents, not physical conversion; Conversion of data or documents from physical to electronic media; Computer system design; Computer and smartphone software and telecommunications networks design; Development and design and installation and maintenance and updating of computer software in the field of computing and telecommunications and telephony; Online detection and scanning of malware on websites; Data encryption, namely, encoding and decoding of data; Decoding of data; Design of encryption systems; Design of systems for decrypting and controlling access to all transmission of information; Issue and management of digital certificates used for the authentication or encryption of a digital communication; Issue and management of digital certificates used for the authentication of a digital signature in an electronic communication or transaction on the internet and other computer networks; Providing technical customer support in relation to the aforesaid services, namely, software deployment, troubleshooting, administration and usage support; Application service provider services, namely, hosting computer and smartphone software applications; Providing online, non-downloadable software for computer security testing in the fields of internet and computer security; Computer programming for securing communications by telephone, radiotelephone or computer transmitted via telecommunications networks; Sealing and encrypting using chip cards, namely, micro-SD and operator SIM cards; Computer and smartphone programming for securing and controlling access to one or more computer networks, in particular by sealing and encrypting using a smart card; Development, design and implementation in the field of security systems for computers; Development, design and implementation in the field of access and authorisation systems for computers; Development, design and implementation in the field of security, access and authorisation systems for computer hardware and computer networks; Testing, analysis and consultancy in the field of security, access and authorisation systems for computers, computer hardware and computer networks; Development, design, and implementation in the field of security, access and authorisation systems for computers, computer hardware and computer networks; Testing, analysis and consultancy in the field of authentication, encryption and identification systems for computers, computer hardware and computer networks; Software as a service (SaaS), namely, hosting software for use by others for use of communication in the form of voice, SMS, IM, video, and file encryption, file sharing and storage; Hosting of data servers; Technical support services, namely, troubleshooting of computer software problems; Technical support services, namely, resolution of computer and smartphone software problems; Computer and smartphone security consultancy as it relates to data theft and identity theft; file sharing services, namely, providing a website featuring technology enabling users to upload and download electronic files; providing information, advisory, and consultation services in the field of data encryption, electronic data storage, and electronic file sharing
45 LLegal services; Security for the protection of property, except for the transport thereof, namely, threat analysis for protecting personal and professional property; Physical consultancy and advice relating to security; computer and smartphone security consultancy as it relates to data theft and identity theft; Identity verification services, namely, verification of personal identity as part of personal background investigations; Licensing in the field of technology, namely, licensing of source code, computer software and other intellectual property; licensing of computer software for the protection of computers, computer systems, computer networks and internet websites against attacks from computer viruses, hackers, tampering, unauthorized intrusion and unauthorized manipulation of data; provision of legal and personal physical security information, and advisory and consultancy services
CRYPTO PASS

Trademark Events
Mar 25, 2019
Abandonment Notice E-Mailed - No Use Statement Filed
Mar 25, 2019
Abandonment - No Use Statement Filed
Aug 21, 2018
Noa E-Mailed - Sou Required From Applicant
Jun 26, 2018
Official Gazette Publication Confirmation E-Mailed
Jun 26, 2018
Published For Opposition
Jun 6, 2018
Notification Of Notice Of Publication E-Mailed
May 15, 2018
Approved For Pub - Principal Register
May 15, 2018
Examiner's Amendment Entered
May 15, 2018
Notification Of Examiners Amendment E-Mailed
May 15, 2018
Examiners Amendment E-Mailed
May 15, 2018
Examiners Amendment -Written
May 11, 2018
Teas/Email Correspondence Entered
May 11, 2018
Correspondence Received In Law Office
May 11, 2018
Teas Response To Office Action Received
Nov 15, 2017
Notification Of Non-Final Action E-Mailed
Nov 15, 2017
Non-Final Action E-Mailed
Nov 15, 2017
Non-Final Action Written
Nov 14, 2017
Assigned To Examiner
Aug 18, 2017
New Application Office Supplied Data Entered In Tram
Aug 15, 2017
New Application Entered In Tram

Trademark Alertz updated from USPTO on 2030-01-24