tm logo
CT
Live/Registered
REGISTERED

on 21 Sep 2021

Last Applicant/ Owned by

Unit L6, 5 Howe Street, Observatory

Cape Town

ZA

7925

Serial Number

90070447 filed on 23rd Jul 2020

Registration Number

6489337 registered on 21st Sep 2021

in the Principal Register

Correspondent Address

Jonathan A. Hyman

KNOBBE, MARTENS, OLSON & BEAR, LLP

2040 MAIN STREET, 14TH FLOOR

IRVINE CA 92614

Filing Basis

1. filed as use application

2. use application currently

Disclaimer

NO DATA

CT

Design and development of computer software; Computer security consultancy; Computer software consultancy; Computer system analysis; Computer virus protection services; Data encryption services; Data security consultancy; Electronic monitoring of credit card activity to detect fraud via the internet; Electronic monitoring of personally identifying information to detect identity theft via the interRead More

Classification Information


Class [042]
Computer & Software Services & Scientific Services


Design and development of computer software; Computer security consultancy; Computer software consultancy; Computer system analysis; Computer virus protection services; Data encryption services; Data security consultancy; Electronic monitoring of credit card activity to detect fraud via the internet; Electronic monitoring of personally identifying information to detect identity theft via the internet; Internet security consultancy; Maintenance of computer software; Monitoring of computer systems by remote access to ensure proper functioning; Monitoring of computer systems for detecting unauthorized access or data breach; Software as a service (SAAS) services featuring software for IT security, monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on user systems for breach detection, detecting unauthorized activities, access or data breach; Software as a service (SAAS) services featuring software for issuing honeypots, namely, computer software for setting traps to detect, deflect, and/or counteract attempts of unauthorized use of information systems, software applications, computer services and computer networks, tokens, namely, digital tokens which detect attempts of unauthorized use of computer systems, software applications, computer services and computer networks, and decoy systems for detecting early attacker warning signs and redirecting cyber-attacks to a safer location for the organization; User authentication services using single sign-on technology for online software applications; User authentication services using technology for e-commerce transactions


First Use Date in General

14th Aug 2015

First Use Date in Commerce

14th Aug 2015

Class [009]
Computer & Software Products & Electrical & Scientific Products


Recorded and downloadable computer software in the field of IT security for use in the monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on user systems for breach detection, detecting unauthorized activities, and access or data breach; Downloadable computer software in the field of IT security for use in the monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on user systems for breach detection, detecting unauthorized activities, and access or data breach; Downloadable software, downloadable mobile applications, and downloadable computer programs in the field of IT security all of the foregoing for use in the monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on user systems for breach detection, detecting unauthorized activities, and access or data breach; Recorded and downloadable computer operating programs; Recorded and downloadable computer software applications in the field of IT security for use in the monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on user systems for breach detection, detecting unauthorized activities, and access or data breach; Recorded and downloadable computer software platforms in the field of IT security for use in the monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on user systems for breach detection, detecting unauthorized activities, and access or data breach; Recorded and downloadable computer software for issuing honeypots, namely, recorded and downloadable computer software for setting traps to detect, deflect, and/or counteract attempts of unauthorized use of information systems, software applications, computer services and computer networks, tokens, namely, digital tokens which detect attempts of unauthorized use of computer systems, software applications, computer services and computer networks, and decoy systems for detecting early attacker warning signs and redirecting cyber-attacks to a safer location for the organization


First Use Date in General

14th Aug 2015

First Use Date in Commerce

14th Aug 2015

Mark Details


Serial Number

No 90070447

Mark Type

No Service Mark

Attorney Docket Number

No VONS023.004T

44D Filed

Yes

44D Current

No

44E filed

No

44E Current

No

66A Filed

No

66A Current

No

Current Basis

No

No Basis

No

Design Code(s)

26.09.03 -

Incomplete squares

26.09.12 -

Squares with bars, bands and lines

26.09.20 -

Squares inside one another

26.09.21 -

Squares that are completely or partially shaded

26.17.01 -

Straight line(s), band(s) or bar(s)

26.17.06 -

Diagonal line(s), band(s) or bar(s)

27.03.01 -

Geometric figures forming letters or numerals, including punctuation

Description of Design Search

The mark consists of a stylized concentric square design which contains stylized depictions of the letters "C" and "T".

Legal History


Show more

Status DateAction Taken
21st Sep 2021REGISTERED-PRINCIPAL REGISTER
06th Jul 2021PUBLISHED FOR OPPOSITION
06th Jul 2021OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
16th Jun 2021NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
27th May 2021APPROVED FOR PUB - PRINCIPAL REGISTER
12th May 2021TEAS/EMAIL CORRESPONDENCE ENTERED
11th May 2021TEAS RESPONSE TO OFFICE ACTION RECEIVED
11th May 2021CORRESPONDENCE RECEIVED IN LAW OFFICE
15th Nov 2020NON-FINAL ACTION WRITTEN
15th Nov 2020NON-FINAL ACTION E-MAILED