Trademark: 97290941
Word

Status
Pending
Status Code
807
Status Date
Monday, March 25, 2024
Serial Number
97290941
Mark Type
2000
Filing Date
Wednesday, March 2, 2022
Published for Opposition
Tuesday, August 8, 2023

Trademark Owner History
Loki Labs, Inc. - Owner At Publication

Classifications
9 Computer backup and storage systems with multiple removable RAID cartridges; Computer hardware and peripheral devices and recorded computer software for data communication and translating and transmitting data sold therewith; Computer hardware and recorded software for setting up and configuring local area networks sold as a unit; Computer hardware and recorded software for setting up and configuring wide area networks sold as a unit; Computer hardware and recorded software systems for use in network management of computers, computer networks, and Internet security; Computer hardware for monitoring and detecting computer network security events; Computer hardware with preinstalled software for monitoring and detecting computer network security events; Computer programs, recorded, for use in network management of computers, computer networks, and Internet security; Computer software platforms, downloadable, for monitoring and detecting computer network security events; Computer software platforms, recorded, for monitoring and detecting computer network security events; Data sets in the field of computer and network security recorded on computer media; Digital materials, namely, downloadable audio/video files featuring educational instruction in the field of computer network administration; Digital media, namely, pre-recorded DVDs, downloadable audio and video recordings, and CDs featuring and promoting educational instruction in the field of computer network administration; Digital media, namely, electronic content in the form of downloadable audio/video recordings featuring educational instruction in the field of computer network administration; Downloadable .csv files featuring settings, parameters, and values for educational instruction in the fields of computers, computer networks, and Internet security; Downloadable anti-piracy software; Downloadable anti-spyware software; Downloadable application programming interface (API) software; Downloadable application programming interface (API) software for monitoring and detecting computer network security events; Downloadable audio and video recordings featuring educational instruction in the fields of computers, computer networks, and Internet security authenticated by non-fungible tokens (NFTs); Downloadable audio recordings featuring educational instruction in the field of computer network administration; Downloadable audio recordings featuring educational instruction in the field of computer network administration authenticated by non-fungible tokens (NFTs); Downloadable augmented reality software for use in mobile devices for integrating electronic data with real world environments for the purpose of IT administrator training in the field of computer network security events and for monitoring and detecting computer network security events; Downloadable augmented reality software for IT administrator training in the field of computer network security events and for monitoring of computers and computer networks for security events; Downloadable basic Input/Output System (BIOS) software; Downloadable BIOS (basic input output system) computer programs; Downloadable booklets in the field of network administration; Downloadable CAD/CAM software for IT administrator training in the field of computer network security events and for monitoring and detecting computer network security events; Downloadable catalogs in the field of computer network administration; Downloadable chatbot software for IT administrator training in the field of computer network security events and for monitoring and detecting computer network security events; Downloadable chatbot software using artificial intelligence for monitoring and detecting computer network security events; Downloadable cloud-based software for monitoring computers and computer networks for security events; Downloadable cloud-computing software for monitoring computers and computer networks for security events; Downloadable communication software for providing access to the Internet; Downloadable communications software for connecting computers and computer networks for use in monitoring and controlling communication between computers and automated machine systems; Downloadable compiler software; Downloadable computer application software for mobile phones, namely, software for monitoring and detecting computer network security events; Downloadable computer anti-virus software; Downloadable computer application software for electronic devices, namely, software for monitoring and detecting computer network security events; Downloadable computer chatbot software for simulating conversations; Downloadable computer e-commerce software to allow users to perform electronic business transactions via a global computer network; Downloadable computer firmware for monitoring and detecting computer network security events; Downloadable computer graphics; Downloadable computer graphics software; Downloadable computer groupware for monitoring and detecting computer network security events; Downloadable computer manuals in the field of computer network administration for monitoring and detecting computer network security events; Downloadable computer operating programs; Downloadable computer operating programs and computer operating systems; Downloadable computer operating software; Downloadable computer operating system software; Downloadable computer program manuals in the field of computer network administration for monitoring and detecting computer network security events; Downloadable computer programmes for document management; Downloadable computer programs for connecting remotely to computers or computer networks; Downloadable computer programs for network management; Downloadable computer programs for project management; Downloadable computer programs for searching remotely for content on computers and computer networks; Downloadable computer programs for searching the contents of computers and computer networks by remote control; Downloadable computer programs for the enabling of access or entrance control; Downloadable computer programs for user interface design; Downloadable computer programs for using the internet and the world wide web; Downloadable computer programs for using the internet and the worldwide web; Downloadable computer programs for monitoring and detecting computer network security events; Downloadable computer programs using artificial intelligence for monitoring and detecting computer network security events; Downloadable computer screen saver software; Downloadable computer search engine software; Downloadable computer shareware for IT administrator training in the field of computer network security events and for monitoring and detecting computer network security events; Downloadable computer simulation software for modeling computer configuration settings in the field of computer network administration; Downloadable computer software and firmware for operating system programs; Downloadable computer software and firmware for monitoring and detecting computer network security events; Downloadable computer software designed to be deployed on web servers for monitoring and detecting computer network security events; Downloadable computer software development tools; Downloadable computer software for accessing, reading, and tracking information in the field of computer security on a blockchain; Downloadable computer software for administration of computer local area networks; Downloadable computer software for administration of computer networks; Downloadable computer software for application and database integration; Downloadable computer software for authorising access to data bases; Downloadable computer software for authorising access to databases; Downloadable computer software for computer system and application development, deployment and management; Downloadable computer software for controlling and managing access server applications; Downloadable computer software for controlling self-service terminals; Downloadable computer software for controlling the operation of audio and video devices; Downloadable computer software for creating searchable databases of information and data; Downloadable computer software for database management; Downloadable computer software for document management; Downloadable computer software for encryption; Downloadable computer software for managing and validating cryptocurrency transactions using blockchain-based smart contracts; Downloadable computer software for managing and verifying cryptocurrency transactions on a blockchain; Downloadable computer software for managing cryptocurrency transactions using blockchain technology; Downloadable computer software for managing electronic payment transactions using distributed ledger technology (DLT); Downloadable computer software for manipulating digital audio information for use in audio media applications; Downloadable computer software for organizing and viewing digital images and photographs; Downloadable computer software for processing digital images; Downloadable computer software for providing an on-line database in the field of transaction processing to upload transactional data, provide statistical analysis, and produce notifications and reports; Downloadable computer software for the collection, editing, organizing, modifying, book marking, transmission, storage, and sharing of data and information; Downloadable computer software for the creation of firewalls; Downloadable computer software for transmitting emails from a subscriber list; Downloadable computer software for use as a cryptocurrency wallet; Downloadable computer software for use as a digital wallet; Downloadable computer software for use as a spreadsheet; Downloadable computer software for use as an application programming interface (API); Downloadable computer software for use as an electronic wallet; Downloadable computer software for use in computer access control; Downloadable computer software for use in customer relationship management (CRM); Downloadable computer software for use in database management; Downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Downloadable computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Downloadable computer software for wireless content delivery; Downloadable computer software for monitoring and detecting computer network security events and instructional user guides sold as a unit; Downloadable computer software for monitoring and detecting computer network security events; Downloadable computer software for configuring computers and computer networks in the field of computer network administration; Downloadable computer software platforms for monitoring and detecting computer network security events; Downloadable computer software programs for spreadsheet management; Downloadable computer software that assists computers in deploying parallel applications and performing parallel computations; Downloadable computer software to maintain and operate computer system; Downloadable computer software using artificial intelligence for monitoring and detecting computer network security events; Downloadable computer software, namely, an electronic financial platform that accommodates multiple types of payment and debt transactions in an integrated mobile phone, PDA, and web-based environment; Downloadable computer software, namely, software development tools for the creation of mobile internet applications and client interfaces; Downloadable computer utility programs for performing computer maintenance; Downloadable computer-aided design (CAD) software for general use; Downloadable computer-aided design (CAD) software for designing systems for IT administrator training in the field of computer network security events and for monitoring and detecting computer network security events; Downloadable computer-aided manufacturing (CAM) software for general use; Downloadable data compression software; Downloadable data sets in the field of computer and network security; Downloadable database management software for computer, computer network, and Internet security; Downloadable databases in the field of computer network administration; Downloadable decoder software; Downloadable digital video recording software for IP (Internet protocol) video surveillance; Downloadable documents in the field of computer network administration provided via a website; Downloadable e-books in the field of computer network administration; Downloadable educational computer applications featuring instruction in the field of computers, computer networks, and Internet security; Downloadable educational course materials in the field of computer network administration; Downloadable educational media, namely, courses featuring instruction in monitoring and detecting computer network security events; Downloadable educational mobile applications featuring instruction in monitoring and detecting computer network security events; Downloadable educational simulation software featuring instruction in monitoring and detecting computer network security events; Downloadable educational software featuring instruction in monitoring and detecting computer network security events; Downloadable educational tablet applications featuring instruction in monitoring and detecting computer network security events; Downloadable electronic books in the field of computer network administration; Downloadable electronic data files featuring configuration data in computer network administration; Downloadable electronic dictionaries; Downloadable electronic newsletters delivered by e-mail in the field of computer network administration; Downloadable electronic newsletters in the field of computer network administration; Downloadable electronic publications in the nature of newsletter alerts in the field of computer, computer networks, and Internet security; Downloadable emoticons for mobile phones; Downloadable enterprise software for monitoring and detecting computer network security events; Downloadable enterprise software in the nature of a database for non-transactional data and a search engine for database content; Downloadable fact sheets in the field of computer network administration; Downloadable gesture recognition software; Downloadable graphical user interface software; Downloadable graphics featuring educational instruction in the field of computer security for use on computers and computer networks; Downloadable image files containing educational instruction in the field of computer network administration; Downloadable image files containing educational instruction in the field of computers, computer networks, and Internet security authenticated by non-fungible tokens (NFTs); Downloadable images featuring educational instruction in the field of computer network administration; Downloadable images featuring educational instruction in the field of computer network administration for mobile phones; Downloadable industrial process control software; Downloadable intelligent personal assistant software for monitoring and detecting computer network security events; Downloadable interactive multimedia computer program for monitoring and detecting computer network security events; Downloadable interactive software for training IT administrators in the field of computer network administration; Downloadable journals in the field of computer network administration; Downloadable LAN (local area network) operating software; Downloadable magazines in the field of network administration; Downloadable middleware for software application integration; Downloadable middleware for configuring computers and computer networks in the field of computer network administration; Downloadable mobile applications for training IT administrators in the field of computer network administration; Downloadable mobile operating system software; Downloadable multimedia file containing artwork relating to computer network administration; Downloadable multimedia file containing artwork relating to computers, computer networks, and Internet security authenticated by non-fungible tokens (NFTs); Downloadable multimedia file containing artwork, text, audio, and video relating to computers, computer networks, and Internet security authenticated by non-fungible tokens (NFTs); Downloadable multimedia file containing artwork, text, audio, video, games, and Internet Web links relating to computer network administration; Downloadable multimedia file containing audio relating to computer network administration; Downloadable multimedia file containing audio relating to computers, computer networks, and Internet security authenticated by non-fungible tokens (NFTs); Downloadable multimedia file containing text relating to computer network administration; Downloadable multimedia file containing text relating to computers, computer networks, and Internet security authenticated by non-fungible tokens (NFTs); Downloadable multimedia file containing video relating to computer network administration; Downloadable multimedia file containing video relating to computer network administration authenticated by non-fungible tokens (NFTs); Downloadable network access server operating software; Downloadable network video recording software for IP (Internet Protocol) video surveillance; Downloadable non-fiction books in the field of computer network administration; Downloadable open-source computer software for monitoring and detecting computer network security events; Downloadable operating system programs; Downloadable pamphlets in the field of computer network administration; Downloadable pattern recognition software for monitoring and detecting computer network security events; Downloadable payment gateway software for linking e-commerce websites to credit card processing networks; Downloadable periodicals in the field of computers, computer networks, and Internet security; Downloadable photographs; Downloadable photographs in the field of computer network administration; Downloadable pictures in the field of computer network administration; Downloadable podcasts in the field of computer network administration; Downloadable project management software; Downloadable project management software in the field of computer, network, and Internet security; Downloadable ring tones, graphics and music via a global computer network and wireless devices; Downloadable scientific and medical data via the internet; Downloadable software development kits (SDK); Downloadable software for blockchain-based inventory management; Downloadable software for ensuring the security of electronic mail; Downloadable software for generating cryptographic keys for receiving and spending crypto assets; Downloadable software for generating cryptographic keys for receiving and spending cryptocurrency; Downloadable software for monitoring and controlling communication between computers and automated machine systems; Downloadable software for optical character recognition; Downloadable software for processing images, graphics and text; Downloadable software for the operational management of portable magnetic and electronic cards; Downloadable software for the redirection of electronic messages to alternate addresses; Downloadable software for monitoring and detecting computer network security events; Downloadable software for connecting computer networks in the field of computer, computer networks, and Internet security; Downloadable software in the nature of a mobile application for configuring computers and computer networks in the field of computer network administration; Downloadable speech recognition software; Downloadable spreadsheet software for general use; Downloadable spreadsheet software for use by budget analysts; Downloadable spreadsheet software for configuring computers and computer networks in the field of computer, computer network, and Internet security; Downloadable tablet applications for monitoring and detecting computer network security events; Downloadable templates for configuring computers and computer networks in the field of computer network administration; Downloadable tutorial e-books in the field of computer network administration; Downloadable tutorial software featuring instruction in computer network administration; Downloadable UPI (universal peripheral interface) software; Downloadable USB (universal serial bus) operating software; Downloadable video recordings featuring educational instruction in the field of computer network administration; Downloadable video recordings featuring educational instruction in the field of computer network administration authenticated by non-fungible tokens (NFTs); Downloadable virtual goods, namely, computer programs featuring computer network security icons for use in online virtual worlds; Downloadable virtual reality software for educational training in the fields of computer, computer network, and Internet security; Downloadable virtual reality training simulation software in the field of computers, computer networks, and Internet security; Downloadable VPN (virtual private network) operating software; Downloadable WAN (wide area network) operating software; Downloadable web site development software; Downloadable webcasts in the field of computer network administration; Downloadable webinars in the field of computer network administration; Downloadable written articles in the field of computer network administration; Downloadable network security icons via the internet and wireless devices; E-books featuring educational instruction in the field of computer network administration recorded on computer media; Electronic books featuring educational instruction in the field of computer network administration recorded on computer media; Electronic database in the field of computer, computer networks, and Internet security recorded on computer media; Electronic publications, namely, e-zines featuring educational instruction in the field of computer network administration recorded on computer media; Electronic publications, namely, newsletters in the field of accounting recorded on computer media; Electronic publications, namely, newsletters featuring computer threats in the field of computer network administration recorded on computer media; Electronic software updates, namely, downloadable computer software and associated downloadable data files for updating computer software in the fields of computer security, computer networks security, and Internet security, provided via computer and communication networks; Encoded electronic chip cards containing programming used to protect computers and computer networks from security events; Encoded integrated circuit cards containing programming used to protect computers and computer networks from security events; Encoded smart cards containing programming used for computer network security in the field of computer network administration; Encoded smart cards containing programming used to protect computers and computer networks from security events; Encoded smart cards embedded with transponders and containing programming used to monitor computer networks for security events; Hard discs for computers featuring recorded computer security software and computer network security software; Hard drives for computers featuring recorded software monitoring for security events; Non-fiction audio books on a variety of topics; Non-fiction e-books on a variety of topics recorded on computer media; Operating and user instructions for computer software and computers stored on digital storage media; Pre-recorded USB cards featuring educational instruction in the field of computer network administration; Pre-recorded USB flash drives featuring educational instruction in the field of computer network administration; Recorded anti-spyware software; Recorded application programming interface (API) software; Recorded CAD/CAM software for monitoring and detecting computer network security events; Recorded computer application software for mobile phones, namely, software for monitoring and detecting computer network security events; Recorded computer anti-virus software; Recorded computer application software for electronic devices, namely, software for monitoring and detecting computer network security events; Recorded computer firmware for monitoring and detecting computer network security events; Recorded computer game programs; Recorded computer operating programs; Recorded computer operating software; Recorded computer operating system software; Recorded computer programmes for document management; Recorded computer programs for monitoring and detecting computer network security events; Recorded computer programs using artificial intelligence for monitoring and detecting computer network security events; Recorded computer search engine software; Recorded computer simulation software for modeling computer installation, computer configuration, and computer connections in the field of computer network administration; Recorded computer software and hardware for monitoring and detecting computer network security events sold as a unit; Recorded computer software designed to be deployed on web servers for monitoring and detecting computer network security events; Recorded computer software development tools; Recorded computer software for database management; Recorded computer software for use as a spreadsheet; Recorded computer software for use as an application programming interface (API); Recorded computer software for use in database management; Recorded computer software for IT administrator training in the field of computer network security events and for monitoring and detecting computer network security events and instructional user guides sold as a unit; Recorded computer software for monitoring and detecting computer network security events; Recorded computer software platforms for monitoring and detecting computer network security events; Recorded computer software using artificial intelligence for monitoring and detecting computer network security events; Recorded computer utility programs for performing computer maintenance; Recorded computer-aided design (CAD) software for IT administrator training in the field of computer network security events and for monitoring and detecting computer network security events; Recorded computer-aided manufacturing (CAM) software for monitoring and detecting computer network security events; Recorded database management software for monitoring and detecting computer network security events; Recorded educational computer applications featuring instruction in the field of computers, computer networks, and Internet security; Recorded educational software featuring instruction in monitoring and detecting computer network security events; Recorded interactive software for educational instruction in the field of computer network administration; Recorded mobile operating system software; Recorded open-source computer software for monitoring and detecting computer network security events; Recorded operating system programs; Recorded software for the redirection of electronic messages to alternate addresses; Recorded software for monitoring and detecting computer network security events; Recorded speech recognition software; Recorded spreadsheet software for computer security, computer network security, and Internet security; Recorded tutorial software featuring instruction in the field of computer network administration; Recorded virtual reality software for IT administrator training in the field of computer network security events and for monitoring and detecting computer network security events; Routers with embedded network configuration software; Series of downloadable non-fiction books in the field of network administration; Tutorial e-books in the field of computer network administration recorded on computer media; Video recordings featuring educational instruction in the field of computer network administration
Color is not claimed as a feature of the

Trademark Events
Mar 25, 2024
Notification Of Non-Final Action E-Mailed
Mar 25, 2024
Non-Final Action E-Mailed
Mar 25, 2024
Su - Non-Final Action - Written
Mar 21, 2024
Statement Of Use Processing Complete
Mar 1, 2024
Use Amendment Filed
Mar 21, 2024
Case Assigned To Intent To Use Paralegal
Mar 1, 2024
Teas Statement Of Use Received
Oct 3, 2023
Noa E-Mailed - Sou Required From Applicant
Aug 8, 2023
Official Gazette Publication Confirmation E-Mailed
Aug 8, 2023
Published For Opposition
Jul 19, 2023
Notification Of Notice Of Publication E-Mailed
Jul 6, 2023
Approved For Pub - Principal Register
Jul 6, 2023
Examiner's Amendment Entered
Jul 6, 2023
Notification Of Examiners Amendment E-Mailed
Jul 6, 2023
Examiners Amendment E-Mailed
Jul 6, 2023
Examiners Amendment -Written
Jun 21, 2023
Teas/Email Correspondence Entered
Jun 21, 2023
Correspondence Received In Law Office
Jun 20, 2023
Assigned To Lie
Feb 23, 2023
Teas Response To Office Action Received
Dec 19, 2022
Notification Of Non-Final Action E-Mailed
Dec 19, 2022
Non-Final Action E-Mailed
Dec 19, 2022
Non-Final Action Written
Dec 19, 2022
Removed From Teas Plus
Dec 8, 2022
Assigned To Examiner
Aug 31, 2022
Teas Amendment Entered Before Attorney Assigned
Aug 31, 2022
Teas Voluntary Amendment Received
Jul 25, 2022
Teas Amendment Entered Before Attorney Assigned
Jul 25, 2022
Teas Voluntary Amendment Received
Mar 8, 2022
Notice Of Design Search Code E-Mailed
Mar 7, 2022
New Application Office Supplied Data Entered
Mar 5, 2022
New Application Entered

Trademark Alertz updated from USPTO on 2030-01-24