Trademark: 97835946
Word
IRONVEST
Status
Pending
Status Code
681
Status Date
Tuesday, March 12, 2024
Serial Number
97835946
Mark Type
3000
Filing Date
Monday, March 13, 2023
Published for Opposition
Tuesday, April 16, 2024

Trademark Owner History

Classifications
9 Downloadable software for user identity authentication; Downloadable software for securing user identity; Downloadable software for securing digital assets; Downloadable software for securing online transactions; Downloadable software for securing electronic commerce transactions; Downloadable software for securing applications and processes for opening or creating new accounts; Downloadable software for protecting identities and online identities of users; Downloadable software for securing user data; Downloadable software for transaction verification; Downloadable software for detecting malicious cyber activity; Downloadable software for detecting fraudulent transactions; Downloadable software for blocking a suspicious transaction; Downloadable software for tokenizing user identity data with transaction data; Downloadable software for combining user identity data with transaction data; Downloadable software for verifying user identity data and transaction data; Downloadable software for blocking cyber attacks; Downloadable software for securing transactions performed via electronic devices and computerized devices; Downloadable software for securing transactions performed via mobile applications and web-based applications; Downloadable software for securing transactions performed via a web browser; Downloadable software for online identity protection; Downloadable software for securing financial transactions; Downloadable software for securing legal transactions; Downloadable software for secure file sharing; Downloadable software for secure management of digital wallets; Downloadable software for creating, minting, transferring, trading, exchanging, selling, buying, utilizing, and/or transacting with digital assets, such as crypto-currencies, crypto-coins, Non-Fungible Tokens (NFTs), metaverse avatars, Virtual Reality (VR) assets, Augmented Reality (AR) assets, metaverse assets; Downloadable software for preventing biometric fraud; Downloadable software for access protection; Downloadable software for access guarding; Downloadable software for controlled access to online services; Downloadable software for managing authentication factors; Downloadable software for managing passwords, PINs, and user credentials; Downloadable software for factor-less user authentication; Downloadable software for password-less user authentication; Downloadable software for protection against SIM swap attacks; Downloadable software for protection against Business Email Compromise attacks; Downloadable software for protection against email hijack attacks
42 Software as a service (SAAS) services featuring software for user identity authentication; Software as a service (SAAS) services featuring software for securing user identity; Software as a service (SAAS) services featuring software for securing digital assets; Software as a service (SAAS) services featuring software for securing online transactions; Software as a service (SAAS) services featuring software for securing electronic commerce transactions; Software as a service (SAAS) services featuring software for securing applications and processes for opening or creating new accounts; Software as a service (SAAS) services featuring software for protecting identities and online identities of users; Software as a service (SAAS) services featuring software for securing user data; Software as a service (SAAS) services featuring software for transaction verification; Software as a service (SAAS) services featuring software for detecting malicious cyber activity; Software as a service (SAAS) services featuring software for detecting fraudulent transactions; Software as a service (SAAS) services featuring software for blocking a suspicious transaction; Software as a service (SAAS) services featuring software for tokenizing user identity data with transaction data; Software as a service (SAAS) services featuring software for combining user identity data with transaction data; Software as a service (SAAS) services featuring software for verifying user identity data and transaction data; Software as a service (SAAS) services featuring software for blocking cyber attacks; Software as a service (SAAS) services featuring software for securing transactions performed via electronic devices and computerized devices; Software as a service (SAAS) services featuring software for securing transactions performed via mobile applications and web-based applications; Software as a service (SAAS) services featuring software for securing transactions performed via a web browser; Software as a service (SAAS) services featuring software for online identity protection; Software as a service (SAAS) services featuring software for securing financial transactions; Software as a service (SAAS) services featuring software for securing legal transactions; Software as a service (SAAS) services featuring software for secure file sharing; Software as a service (SAAS) services featuring software for secure management of digital wallets; Software as a service (SAAS) services featuring software for creating, minting, transferring, trading, exchanging, selling, buying, utilizing, and/or transacting with digital assets, such as crypto-currencies, crypto-coins, Non-Fungible Tokens (NFTs), metaverse avatars, Virtual Reality (VR) assets, Augmented Reality (AR) assets, metaverse assets; Software as a service (SAAS) services featuring software for preventing biometric fraud; Software as a service (SAAS) services featuring software for access protection; Software as a service (SAAS) services featuring software for access guarding; Software as a service (SAAS) services featuring software for controlled access to online services; Software as a service (SAAS) services featuring software for managing authentication factors; Software as a service (SAAS) services featuring software for managing passwords, PINs, and user credentials; Software as a service (SAAS) services featuring software for factor-less user authentication; Software as a service (SAAS) services featuring software for password-less user authentication; Software as a service (SAAS) services featuring software for protection against SIM swap attacks; Software as a service (SAAS) services featuring software for protection against Business Email Compromise attacks; Software as a service (SAAS) services featuring software for protection against email hijack attacks; Platform as a service (PAAS) services featuring software for user identity authentication; Platform as a service (PAAS) services featuring software for securing user identity; Platform as a service (PAAS) services featuring software for securing digital assets; Platform as a service (PAAS) services featuring software for securing online transactions; Platform as a service (PAAS) services featuring software for securing electronic commerce transactions; Platform as a service (PAAS) services featuring software for securing applications and processes for opening or creating new accounts; Platform as a service (PAAS) services featuring software for protecting identities and online identities of users; Platform as a service (PAAS) services featuring software for securing user data; Platform as a service (PAAS) services featuring software for transaction verification; Platform as a service (PAAS) services featuring software for detecting malicious cyber activity; Platform as a service (PAAS) services featuring software for detecting fraudulent transactions; Platform as a service (PAAS) services featuring software for blocking a suspicious transaction; Platform as a service (PAAS) services featuring software for tokenizing user identity data with transaction data; Platform as a service (PAAS) services featuring software for combining user identity data with transaction data; Platform as a service (PAAS) services featuring software for verifying user identity data and transaction data; Platform as a service (PAAS) services featuring software for blocking cyber attacks; Platform as a service (PAAS) services featuring software for securing transactions performed via electronic devices and computerized devices; Platform as a service (PAAS) services featuring software for securing transactions performed via mobile applications and web-based applications; Platform as a service (PAAS) services featuring software for securing transactions performed via a web browser; Platform as a service (PAAS) services featuring software for online identity protection; Platform as a service (PAAS) services featuring software for securing financial transactions; Platform as a service (PAAS) services featuring software for securing legal transactions; Platform as a service (PAAS) services featuring software for secure file sharing; Platform as a service (PAAS) services featuring software for secure management of digital wallets; Platform as a service (PAAS) services featuring software for creating, minting, transferring, trading, exchanging, selling, buying, utilizing, and/or transacting with digital assets, such as crypto-currencies, crypto-coins, Non-Fungible Tokens (NFTs), metaverse avatars, Virtual Reality (VR) assets, Augmented Reality (AR) assets, metaverse assets; Platform as a service (PAAS) services featuring software for preventing biometric fraud; Platform as a service (PAAS) services featuring software for access protection; Platform as a service (PAAS) services featuring software for access guarding; Platform as a service (PAAS) services featuring software for controlled access to online services; Platform as a service (PAAS) services featuring software for managing authentication factors; Platform as a service (PAAS) services featuring software for managing passwords, PINs, and user credentials; Platform as a service (PAAS) services featuring software for factor-less user authentication; Platform as a service (PAAS) services featuring software for password-less user authentication; Platform as a service (PAAS) services featuring software for protection against SIM swap attacks; Platform as a service (PAAS) services featuring software for protection against Business Email Compromise attacks; Platform as a service (PAAS) services featuring software for protection against email hijack attacks; Providing temporary use of non-downloadable computer software for user identity authentication; Providing temporary use of non-downloadable computer software for securing user identity; Providing temporary use of non-downloadable computer software for securing digital assets; Providing temporary use of non-downloadable computer software for securing online transactions; Providing temporary use of non-downloadable computer software for securing electronic commerce transactions; Providing temporary use of non-downloadable computer software for securing applications and processes for opening or creating new accounts; Providing temporary use of non-downloadable computer software for protecting identities and online identities of users; Providing temporary use of non-downloadable computer software for securing user data; Providing temporary use of non-downloadable computer software for transaction verification; Providing temporary use of non-downloadable computer software for detecting malicious cyber activity; Providing temporary use of non-downloadable computer software for detecting fraudulent transactions; Providing temporary use of non-downloadable computer software for blocking a suspicious transaction; Providing temporary use of non-downloadable computer software for tokenizing user identity data with transaction data; Providing temporary use of non-downloadable computer software for combining user identity data with transaction data; Providing temporary use of non-downloadable computer software for verifying user identity data and transaction data; Providing temporary use of non-downloadable computer software for blocking cyber attacks; Providing temporary use of non-downloadable computer software for securing transactions performed via electronic devices and computerized devices; Providing temporary use of non-downloadable computer software for securing transactions performed via mobile applications and web-based applications; Providing temporary use of non-downloadable computer software for securing transactions performed via a web browser; Providing temporary use of non-downloadable computer software for online identity protection; Providing temporary use of non-downloadable computer software for securing financial transactions; Providing temporary use of non-downloadable computer software for securing legal transactions; Providing temporary use of non-downloadable computer software for secure file sharing; Providing temporary use of non-downloadable computer software for secure management of digital wallets; Providing temporary use of non-downloadable computer software for creating, minting, transferring, trading, exchanging, selling, buying, utilizing, and/or transacting with digital assets, such as crypto-currencies, crypto-coins, Non-Fungible Tokens (NFTs), metaverse avatars, Virtual Reality (VR) assets, Augmented Reality (AR) assets, metaverse assets; Providing temporary use of non-downloadable computer software for preventing biometric fraud; Providing temporary use of non-downloadable computer software for access protection; Providing temporary use of non-downloadable computer software for access guarding; Providing temporary use of non-downloadable computer software for controlled access to online services; Providing temporary use of non-downloadable computer software for managing authentication factors; Providing temporary use of non-downloadable computer software for managing passwords, PINs, and user credentials; Providing temporary use of non-downloadable computer software for factor-less user authentication; Providing temporary use of non-downloadable computer software for password-less user authentication; Providing temporary use of non-downloadable computer software for protection against SIM swap attacks; Providing temporary use of non-downloadable computer software for protection against Business Email Compromise attacks; Providing temporary use of non-downloadable computer software for protection against email hijack attacks
The mark consists of the word "IronVest" appearing in a stylized font appearing to the right of a stylistic representations of two rectangular cubes overlapping each other, the top rectangular cube positioned diagonally to the left and the bottom rectangular cube positioned diagonally to the right.
IRON VEST
Color is not claimed as a feature of the mark.

Trademark Events
Mar 27, 2024
Notification Of Notice Of Publication E-Mailed
Mar 11, 2024
Approved For Pub - Principal Register
Mar 6, 2024
Teas/Email Correspondence Entered
Mar 6, 2024
Correspondence Received In Law Office
Mar 6, 2024
Teas Response To Office Action Received
Dec 13, 2023
Notification Of Non-Final Action E-Mailed
Dec 13, 2023
Non-Final Action E-Mailed
Dec 13, 2023
Non-Final Action Written
Dec 11, 2023
Assigned To Examiner
Apr 4, 2023
Notice Of Design Search Code E-Mailed
Apr 2, 2023
New Application Office Supplied Data Entered
Mar 16, 2023
New Application Entered

Trademark Alertz updated from USPTO on 2030-01-24