Trademark: 88289816
Word
NORTON
Status
Pending
Status Code
661
Status Date
Friday, May 17, 2019
Serial Number
88289816
Mark Type
3000
Filing Date
Tuesday, February 5, 2019

Trademark Owner History

Classifications
9 Downloadable computer antivirus software; recorded computer antivirus software; downloadable computer software for database management in the field of cryptographic network security and data security functions; recorded computer software for database management in the field of cryptographic network security and data security functions; downloadable computer software for providing network, Internet, and computer security; recorded computer software for providing network, Internet, and computer security; downloadable computer software for providing online identity protection and parental control; recorded computer software for providing online identity protection and parental control; downloadable computer software for providing intrusion detection and prevention; recorded computer software for providing intrusion detection and prevention; downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; recorded computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; downloadable Internet security software, including computer software for use in the monitoring and control of computer and online activity; recorded Internet security software, including computer software for use in the monitoring and control of computer and online activity; downloadable computer software for providing online transaction security; recorded computer software for providing online transaction security; downloadable fraud protection software; recorded fraud protection software; downloadable computer optimization software; recorded computer optimization software; downloadable computer software to prevent, diagnose, and repair computer problems; recorded computer software to prevent, diagnose, and repair computer problems; downloadable computer maintenance software; recorded computer maintenance software; downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; recorded computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable enterprise security software; recorded enterprise security software; downloadable firewall software; recorded firewall software; downloadable privacy control software; recorded privacy control software; downloadable content filtering software; recorded content filtering software; computer hardware; computer peripherals; computer hardware appliances that provide fire wall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions; downloadable computer software for providing cryptographic network security and data security functions; recorded computer software for providing cryptographic network security and data security functions; downloadable computer software for integration of information logic and data between computer networks; recorded computer software for integration of information logic and data between computer networks; downloadable computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; recorded computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; downloadable computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; recorded computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; downloadable computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; recorded computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; downloadable computer software for use in analysis and reporting of firewall log data; recorded computer software for use in analysis and reporting of firewall log data; downloadable computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; recorded computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable computer software for encrypting and authenticating data; recorded computer software for encrypting and authenticating data; downloadable computer software for encryption; recorded computer software for encryption; downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; recoded computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable computer software platform for bridging Internet and telephony services and enabling users to communicate and transact business faster across multiple networks via wire line phones, mobile phones, personal computers, PDAs and other personal electronic devices; recorded computer software platform for bridging Internet and telephony services and enabling users to communicate and transact business faster across multiple networks via wire line phones, mobile phones, personal computers, PDAs and other personal electronic devices; downloadable computer software platform for providing faster Internet connections, website resolution and e-mail deliveries; recorded computer software platform for providing faster Internet connections, website resolution and e-mail deliveries; downloadable cloning software, namely, software for cloning computer hard drives, software for cloning computer operating systems, software for cloning data files, software reconfiguring personal computers; recorded cloning software, namely, software for cloning computer hard drives, software for cloning computer operating systems, software for cloning data files, software reconfiguring personal computers; downloadable computer software for the creation of virtual private network; recorded computer software for the creation of virtual private network; downloadable computer software, namely, utility software; recorded computer software, namely, utility software; downloadable computer utility software for removal of computer applications and software; recorded computer utility software for removal of computer applications and software; downloadable utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; recorded utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; downloadable computer software, namely, middleware for interfacing client applications and networked or host based databases; recorded computer software, namely, middleware for interfacing client applications and networked or host based databases; downloadable computer software for use in updating other computer software; recorded computer software for use in updating other computer software; downloadable computer software for use in networking applications; recorded computer software for use in networking applications; downloadable computer software for sending and receiving facsimile transmissions from computers and notebook computers; recorded computer software for sending and receiving facsimile transmissions from computers and notebook computers; downloadable computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; recorded computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; downloadable computer software for file management and transfer; recorded computer software for file management and transfer; downloadable computer software for telecommuting, namely, for connecting to and use of a remote computer network, a remote computer and mobile devices; recorded computer software for telecommuting, namely, for connecting to and use of a remote computer network, a remote computer and mobile devices; downloadable computer communications software for use with a home or remote office for connecting computer network users to global networks; recorded computer communications software for use with a home or remote office for connecting computer network users to global networks; downloadable computer software and databases for use in diagnosis, repair and configuration of computers, computer software and computer peripherals; recorded computer software and databases for use in diagnosis, repair and configuration of computers, computer software and computer peripherals; downloadable computer programs for data communications applications, and for the encryption and authentication of electronic information; recorded computer programs for data communications applications, and for the encryption and authentication of electronic information; downloadable computer software for identity security; recorded computer software for identity security; downloadable computer software for authentication and identity management information security; recorded computer software for authentication and identity management information security; downloadable computer software for digital information and data access; recorded computer software for digital information and data access; downloadable computer software for detecting identity fraud; recorded computer software for detecting identity fraud; downloadable computer software and firmware for the management, transmission, and storage of data and information; recorded computer software and firmware for the management, transmission, and storage of data and information; downloadable computer software for use in networking computers; recorded computer software for use in networking computers; downloadable computer software for use in operating electronic mail; recorded computer software for use in operating electronic mail; downloadable computer software for use in monitoring computers for security purposes; recorded computer software for use in monitoring computers for security purposes; downloadable computer software for use in vulnerability scanning of networks and websites; recorded computer software for use in vulnerability scanning of networks and websites; downloadable computer software for use in detecting malware computer software for use with computer servers for controlling and managing server applications; recorded computer software for use in detecting malware computer software for use with computer servers for controlling and managing server applications; downloadable computer software for use in accessing databases; recorded computer software for use in accessing databases; user manuals and instructional guides supplied with all of the foregoing; downloadable electronic publications in the nature of manuals, blogs, instructional materials, teaching materials, newsletters, magazines, newspapers, books and pamphlets in the field of computer software and computer and on-line security
42 Development of software for network and Internet security and data encryption; electronic storage of data; computer software consultation; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; on-line technical support services, namely, troubleshooting of computer hardware and software problems; technical and customer support services, namely, troubleshooting of computer software problems; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; technical support services, namely, providing back-up computer programs and facilities; updating of computer software for others; computer virus protection services; computer consultation in the field of computer security; computer diagnostic services; computer services, namely, data recovery services; computer software installation services; computer programming; electronic notification and delivery of software updates; research services relating to computer hardware and computer software; technical consultation in the field of computer software installation and maintenance; development, updating, publishing and maintenance of software for networks and standalone computers in the fields of security, databases management, and anti-virus protection and monitoring security systems; providing information in the field of network and Internet security; providing technical information in the field of computer software applications; computer services, namely, providing information concerning the encryption and authentication of electronic data; providing information concerning authentication of user identification data for e-commerce transaction security; consultancy services in the fields of digital media, data encryption, computer security, communication security and computer software; encryption and decryption of data and communications; computer support services, namely, technical support and software update services; computer consulting services related to computer products and services; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; providing consultants to help deploy, supervise and manage information technology projects; providing information in the field of information technology relating to communications devices, computers, computer hardware, computer software, computer peripherals, and computer networks; computer services, namely, providing search engines for obtaining data on a global computer network; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; website hosting; computer services, namely providing temporary use of non-downloadable software applications for creating and operating ecommerce websites; providing authentication of website operator identity; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; development, integration and operation of computer systems to support issuance and management of digital certificates; creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; providing computerized and electronic user authentication services in e-commerce transactions; electronic monitoring of computer systems for security purposes; electronic monitoring of computer networks for security purposes; providing security threat management systems, namely, electronic monitoring and tracking of security vulnerabilities and problems in computer software products, the Internet, and computer networks; providing information in the fields of global computer network and local area network Internet security, preventing computer viruses, preventing computer threats, computer hardware and software applications in security; identity theft protection services, namely, fraud prevention in the form of computerized and electronic monitoring of personal and financial information; authentication, issuance and validation of digital certificates; computerized and electronic identification verification services, namely, providing computerized and electronic authentication of business identification information; computer security services, namely, using technology to provide user identity authentication services in ecommerce transactions; computer security services, namely, using technology to provide authentication of identity; computer security services in the nature of administering digital keys; computer security services in the nature of administering digital certificates
45 Personal background investigation services in order to authenticate identity; providing authentication of identity in the nature of personal identification information
Color is not claimed as a feature of the mark.
The mark consists of a circle with a checkmark in the center of the circle appearing next to the word "NORTON".

Trademark Events
May 17, 2019
Teas/Email Correspondence Entered
May 16, 2019
Correspondence Received In Law Office
May 16, 2019
Teas Response To Office Action Received
Apr 29, 2019
Notification Of Non-Final Action E-Mailed
Apr 29, 2019
Non-Final Action E-Mailed
Apr 29, 2019
Non-Final Action Written
Apr 17, 2019
Assigned To Examiner
Mar 21, 2019
Notice Of Design Search Code E-Mailed
Feb 27, 2019
New Application Office Supplied Data Entered In Tram
Feb 8, 2019
New Application Entered In Tram

Trademark Alertz updated from USPTO on 2028-10-15