Trademark: 97520702
Word
MICROSOFT ENTRA
Status
Pending
Status Code
730
Status Date
Thursday, March 7, 2024
Serial Number
97520702
Mark Type
4000
Filing Date
Tuesday, July 26, 2022
Published for Opposition
Tuesday, August 1, 2023

Trademark Owner History
Microsoft Corporation - Owner At Publication

Classifications
9 Downloadable computer software, namely, downloadable computer software for computer, data, and computer network security, identity and access management and verification, privilege and permissions access management and verification, and cloud infrastructure entitlements management (CIEM), downloadable computer software to secure, manage, and govern access to computer systems, platforms, networks, databases, applications, websites, devices, and other online resources, downloadable computer software to identify, evaluate, remediate, monitor, and govern permission risks and to manage, secure, authenticate, automate, and verify all identities, workload identities, certificates, actions, and resources across cloud, hybrid, and multi-cloud environments, downloadable computer software to implement, manage, automate, and govern security policies and automatically intelligently adapt based on real-time risk assessments and insights, downloadable computer software to create, issue, restrict, and verify decentralized identity credentials and to digitally validate information and invalidate credentials, downloadable computer software to automate verification of identity credentials and enable privacy protected online interactions between organizations and users, downloadable computer software for the collection, editing, organizing, modifying, transmission, processing, storage, analysis, and sharing of data and information in the field of cybersecurity, downloadable computer software for monitoring of cloud systems for anomalous activity, outliers, vulnerabilities, misconfigurations, and compliance violations, downloadable computer software to detect, prevent, and mitigate data breach risks and cybersecurity attacks, reduce attack surfaces, and protect privacy, downloadable computer software for detecting, analyzing, monitoring, displaying, and countering computer security threats, reducing risks, generating security reports, providing security alerts, and for security and regulatory compliance, downloadable computer software for cloud security, protection of cloud-based information, database management, data security, risk assessment and monitoring of cloud systems, detection and remediation of machine and user privileges, multifactor authentication, and detection and prevention of unauthorized user access and computer data breaches, downloadable computer security software for the creation, monitoring, and enforcement of security protocols, credentials, and access policies, downloadable computer software for digital threat information management, cloud platform security management and auditing, user account protection and prevention of unauthorized access to web applications and cloud applications, downloadable computer software for enforcing, restricting, and controlling access privileges of machines and users of computing resources for cloud, mobile, and network resources, and downloadable computer software for auditing and monitoring computer systems, computer system resources, machine activity, and user activity; all of the foregoing excluding electronic communications software for the delivery of broadband data and video services and software used to configure and monitor access nodes and legacy adapters
42 Software as a service (SaaS) services, namely, providing temporary use of online non-downloadable computer software for computer, data, and computer network security, identity and access management and verification, privilege and permissions access management and verification, and cloud infrastructure entitlements management (CIEM), providing temporary use of online non-downloadable computer software to secure, manage, and govern access to computer systems, platforms, networks, databases, applications, websites, devices, and other online resources, providing temporary use of online non-downloadable computer software to identify, evaluate, remediate, monitor, and govern permission risks and to manage, secure, authenticate, automate, and verify all identities, workload identities, certificates, actions, and resources across cloud, hybrid, and multi-cloud environments, providing temporary use of online non-downloadable computer software to implement, manage, automate, and govern security policies and automatically intelligently adapt based on real-time risk assessments and insights, providing temporary use of online non-downloadable computer software to create, issue, restrict, and verify decentralized identity credentials and to digitally validate information and invalidate credentials, providing temporary use of online non-downloadable computer software to automate verification of identity credentials and enable privacy protected online interactions between organizations and users, providing temporary use of online non-downloadable computer software for the collection, editing, organizing, modifying, transmission, processing, storage, analysis, and sharing of data and information in the field of cybersecurity, providing temporary use of online non-downloadable computer software for monitoring of cloud systems for anomalous activity, outliers, vulnerabilities, misconfigurations, and compliance violations, providing temporary use of online non-downloadable computer software to detect, prevent, and mitigate data breach risks and cybersecurity attacks, reduce attack surfaces, and protect privacy, providing temporary use of online non-downloadable computer software for detecting, analyzing, monitoring, displaying, and countering computer security threats, reducing risks, generating security reports, providing security alerts, and for security and regulatory compliance, providing temporary use of online non-downloadable computer software for cloud security, protection of cloud-based information, database management, data security, risk assessment and monitoring of cloud systems, detection and remediation of machine and user privileges, multifactor authentication, and detection and prevention of unauthorized user access and computer data breaches, providing temporary use of online non-downloadable computer security software for the creation, monitoring, and enforcement of security protocols, credentials, and access policies, providing temporary use of online non-downloadable computer software for digital threat information management, cloud platform security management and auditing, user account protection and prevention of unauthorized access to web applications and cloud applications, providing temporary use of online non-downloadable computer software for enforcing, restricting, and controlling access privileges of machines and users of computing resources for cloud, mobile, and network resources, and providing temporary use of online non-downloadable computer software for auditing and monitoring computer systems, computer system resources, machine activity, and user activity; all of the foregoing excluding non-downloadable electronic communications software for the delivery of broadband data and video services and non-downloadable software used to configure and monitor access nodes and legacy adapters
The English translation of ENTRA in the mark is enters.

Trademark Events
Mar 8, 2024
Notice Of Approval Of Extension Request E-Mailed
Mar 7, 2024
Sou Extension 1 Granted
Mar 7, 2024
Sou Extension 1 Filed
Mar 7, 2024
Sou Teas Extension Received
Sep 26, 2023
Noa E-Mailed - Sou Required From Applicant
Aug 1, 2023
Official Gazette Publication Confirmation E-Mailed
Aug 1, 2023
Published For Opposition
Jul 12, 2023
Notification Of Notice Of Publication E-Mailed
Jun 29, 2023
Electronic Record Review Complete
Jun 23, 2023
On Hold - Electronic Record Review Required
Jun 20, 2023
Approved For Pub - Principal Register
Jun 17, 2023
Teas/Email Correspondence Entered
Jun 16, 2023
Correspondence Received In Law Office
Jun 16, 2023
Teas Response To Office Action Received
Mar 20, 2023
Notification Of Non-Final Action E-Mailed
Mar 20, 2023
Non-Final Action E-Mailed
Mar 20, 2023
Non-Final Action Written
Mar 20, 2023
Assigned To Examiner
Mar 10, 2023
Applicant/Correspondence Changes (Non-Responsive) Entered
Mar 10, 2023
Teas Change Of Correspondence Received
Mar 10, 2023
Teas Change Of Owner Address Received
Jan 4, 2023
Teas Amendment Entered Before Attorney Assigned
Jan 4, 2023
Teas Voluntary Amendment Received
Aug 17, 2022
New Application Office Supplied Data Entered
Jul 29, 2022
New Application Entered

Trademark Alertz updated from USPTO on 2030-01-24