Trademark: 88916350
Word
DECISION INTEGRITY
Status
Dead
Status Code
606
Status Date
Monday, April 18, 2022
Serial Number
88916350
Mark Type
4000
Filing Date
Thursday, May 14, 2020
Published for Opposition
Tuesday, July 20, 2021
Abandoned Date
Monday, April 18, 2022

Trademark Owner History
HEXAGON TECHNOLOGY CENTER GMBH - 1st New Owner After Publication
PAS Global, LLC - Owner At Publication

Classifications
41 Providing technical training regarding the design, implementation, and maintenance of computer software for monitoring, displaying, controlling, configuring, maintaining and operating automated installations, partially automated installations, equipment and predefined graphics and object libraries for use in control systems in industrial applications
9 Recorded and downloadable software for monitoring, displaying, controlling, configuring, maintaining and operating automated installations, partially automated installations and equipment; recorded and downloadable software for diagnosing and monitoring system performance of automated installations, partially automated installations and machines; recorded and downloadable software for determining safety-related characteristics of automated installations, partially automated installations and machines; predefined graphics and object libraries for use in control systems in industrial applications in the nature of downloadable data files and image files featuring graphs, charts and spreadsheets in the field of industrial process data; Recorded and downloadable computer application software for computers used to design and construct industrial manufacturing facilities, namely, software for reducing scheduling risks in order to ensure on-time start-ups, validating configuration data from detailed design through start-up, identification of configuration discrepancies, assigning discrepancies for resolution; recorded and downloadable software for capturing and archiving configuration data from automation and decision support systems, including configuration data graphics, programs, point databases, internal historians, trends, and function charts; recorded and downloadable software for inventory management of proprietary and non-proprietary control system hardware including I/O channels; recorded and downloadable software for assessing and reporting cybersecurity vulnerabilities of proprietary and nonproprietary control system hardware and I/O channels, applications, operating systems and auxiliary devices; recorded and downloadable software for organizing configuration information by asset in a tree hierarchy; recorded and downloadable reference management software for identifying internal and external communications within automation systems; recorded and downloadable data relationship management software for visually mapping object interconnections and internal/external references; recorded and downloadable spare capacity management software for managing, reserving, and allocating spare system capacity; recorded and downloadable change tracking software for detecting changes to inventory, asset configuration, logical and graphical files; recorded and downloadable integrated workflow software having pre-defined workflows for security operations, namely, patch assessment, change testing, change implementation, configuration policy definition, asset disposal, and review/approval processes, and for initiating workflows based on configuration parameters to reduce personnel requirements for managing the configuration process; recorded and downloadable reporting software for generating configurable reports, namely, inventory, configuration detail, change history, and workflow; recorded and downloadable computer application software for computers in industrial manufacturing facilities, namely, software for use in documenting the databases of proprietary, as well as open architecture, industrial distributed control systems in a personal computer and a network-based server which provides searches and queries that enable process plant engineers, managers, and control room and security operations center operators to quickly and accurately locate control systems related information, identify data integrity issues, map process equipment, access control system inventory, identify cybersecurity vulnerabilities, identify and allocate system capacity, discover unknown system modifications, track and manage process changes, support compliance with relevant regulations, and support compliance with cybersecurity standards and identifies changes between various versions of the same database
42 Consultation services, namely, providing technical advice regarding the design, implementation, and maintenance of computer software for monitoring, displaying, controlling, configuring, maintaining and operating automated installations, partially automated installations, equipment and predefined graphics and object libraries for use in control systems in industrial applications; Providing online non-downloadable software for monitoring, displaying, controlling, configuring, maintaining and operating automated installations, partially automated installations and equipment; Providing online non-downloadable software for diagnosing and monitoring system performance of automated installations, partially automated installations and machines; Providing online non-downloadable software for determining safety-related characteristics of automated installations, partially automated installations and machines; Providing online non-downloadable computer application software for computers used to design and construct industrial manufacturing facilities, namely, software for reducing scheduling risks in order to ensure on-time start-ups, validating configuration data from detailed design through start-up, identification of configuration discrepancies, assigning discrepancies for resolution; Providing online non-downloadable software for capturing and archiving configuration data from automation and decision support systems, including configuration data graphics, programs, point databases, internal historians, trends, and function charts; Providing online non-downloadable software for inventory management of proprietary and non-proprietary control system hardware including I/O channels; Providing online non-downloadable software for assessing and reporting cybersecurity vulnerabilities of proprietary and nonproprietary control system hardware and I/O channels, applications, operating systems and auxiliary devices; Providing online non-downloadable software for organizing configuration information by asset in a tree hierarchy; Providing online non-downloadable reference management software for identifying internal and external communications within automation systems; Providing online non-downloadable data relationship management software for visually mapping object interconnections and internal/external references; Providing online non-downloadable spare capacity management software for managing, reserving, and allocating spare system capacity; Providing online non-downloadable change tracking software for detecting changes to inventory, asset configuration, logical and graphical files; Providing online non-downloadable integrated workflow software having pre-defined workflows for security operations, namely, patch assessment, change testing, change implementation, configuration policy definition, asset disposal, and review/approval processes, and for initiating workflows based on configuration parameters to reduce personnel requirements for managing the configuration process; Providing online non-downloadable reporting software for generating configurable reports, namely, inventory, configuration detail, change history, and workflow; Providing online non-downloadable Computer application software for computers in industrial manufacturing facilities, namely, software for use in documenting the databases of proprietary, as well as open architecture, industrial distributed control systems in a personal computer and a network-based server which provides searches and queries that enable process plant engineers, managers, and control room and security operations center operators to quickly and accurately locate control systems related information, identify data integrity issues, map process equipment, access control system inventory, identify cybersecurity vulnerabilities, identify and allocate system capacity, discover unknown system modifications, track and manage process changes, support compliance with relevant regulations, and support compliance with cybersecurity standards and identifies changes between various versions of the same database

Trademark Events
Apr 18, 2022
Abandonment Notice E-Mailed - No Use Statement Filed
Apr 18, 2022
Abandonment - No Use Statement Filed
Nov 24, 2021
Automatic Update Of Assignment Of Ownership
Sep 14, 2021
Noa E-Mailed - Sou Required From Applicant
Jul 20, 2021
Official Gazette Publication Confirmation E-Mailed
Jul 20, 2021
Published For Opposition
Jun 30, 2021
Notification Of Notice Of Publication E-Mailed
Jun 15, 2021
Approved For Pub - Principal Register
Jun 15, 2021
Examiner's Amendment Entered
Jun 15, 2021
Notification Of Examiners Amendment E-Mailed
Jun 15, 2021
Examiners Amendment E-Mailed
Jun 15, 2021
Examiners Amendment -Written
May 28, 2021
Teas/Email Correspondence Entered
May 28, 2021
Correspondence Received In Law Office
May 21, 2021
Assigned To Lie
Feb 16, 2021
Teas Response To Office Action Received
Aug 14, 2020
Notification Of Non-Final Action E-Mailed
Aug 14, 2020
Non-Final Action E-Mailed
Aug 14, 2020
Non-Final Action Written
Aug 12, 2020
Assigned To Examiner
May 28, 2020
New Application Office Supplied Data Entered
May 18, 2020
New Application Entered

Trademark Alertz updated from USPTO on 2030-01-24