Trademark: 90070447
Word
CT
Status
Registered
Status Code
700
Status Date
Tuesday, September 21, 2021
Serial Number
90070447
Registration Number
6489337
Registration Date
Tuesday, September 21, 2021
Mark Type
3000
Filing Date
Thursday, July 23, 2020
Published for Opposition
Tuesday, July 6, 2021

Trademark Owner History
Thinkst Applied Research (Pty) Ltd. - Original Registrant

Classifications
9 Recorded and downloadable computer software in the field of IT security for use in the monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on user systems for breach detection, detecting unauthorized activities, and access or data breach; Downloadable computer software in the field of IT security for use in the monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on user systems for breach detection, detecting unauthorized activities, and access or data breach; Downloadable software, downloadable mobile applications, and downloadable computer programs in the field of IT security all of the foregoing for use in the monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on user systems for breach detection, detecting unauthorized activities, and access or data breach; Recorded and downloadable computer operating programs; Recorded and downloadable computer software applications in the field of IT security for use in the monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on user systems for breach detection, detecting unauthorized activities, and access or data breach; Recorded and downloadable computer software platforms in the field of IT security for use in the monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on user systems for breach detection, detecting unauthorized activities, and access or data breach; Recorded and downloadable computer software for issuing honeypots, namely, recorded and downloadable computer software for setting traps to detect, deflect, and/or counteract attempts of unauthorized use of information systems, software applications, computer services and computer networks, tokens, namely, digital tokens which detect attempts of unauthorized use of computer systems, software applications, computer services and computer networks, and decoy systems for detecting early attacker warning signs and redirecting cyber-attacks to a safer location for the organization
42 Design and development of computer software; Computer security consultancy; Computer software consultancy; Computer system analysis; Computer virus protection services; Data encryption services; Data security consultancy; Electronic monitoring of credit card activity to detect fraud via the internet; Electronic monitoring of personally identifying information to detect identity theft via the internet; Internet security consultancy; Maintenance of computer software; Monitoring of computer systems by remote access to ensure proper functioning; Monitoring of computer systems for detecting unauthorized access or data breach; Software as a service (SAAS) services featuring software for IT security, monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on user systems for breach detection, detecting unauthorized activities, access or data breach; Software as a service (SAAS) services featuring software for issuing honeypots, namely, computer software for setting traps to detect, deflect, and/or counteract attempts of unauthorized use of information systems, software applications, computer services and computer networks, tokens, namely, digital tokens which detect attempts of unauthorized use of computer systems, software applications, computer services and computer networks, and decoy systems for detecting early attacker warning signs and redirecting cyber-attacks to a safer location for the organization; User authentication services using single sign-on technology for online software applications; User authentication services using technology for e-commerce transactions
The mark consists of a stylized concentric square design which contains stylized depictions of the letters "C" and "T".
CANARY TOKENS

Trademark Events
Sep 21, 2021
Registered-Principal Register
Jul 6, 2021
Official Gazette Publication Confirmation E-Mailed
Jul 6, 2021
Published For Opposition
Jun 16, 2021
Notification Of Notice Of Publication E-Mailed
May 27, 2021
Approved For Pub - Principal Register
May 12, 2021
Teas/Email Correspondence Entered
May 11, 2021
Correspondence Received In Law Office
May 11, 2021
Teas Response To Office Action Received
Nov 15, 2020
Notification Of Non-Final Action E-Mailed
Nov 15, 2020
Non-Final Action E-Mailed
Nov 15, 2020
Non-Final Action Written
Nov 6, 2020
Assigned To Examiner
Aug 27, 2020
Teas/Email Correspondence Entered
Aug 27, 2020
Correspondence Received In Law Office
Aug 26, 2020
Assigned To Lie
Aug 21, 2020
Notice Of Design Search Code E-Mailed
Aug 20, 2020
New Application Office Supplied Data Entered
Aug 6, 2020
Teas Voluntary Amendment Received
Jul 27, 2020
New Application Entered

Trademark Alertz updated from USPTO on 2030-01-24