tm logo
K
Live/Registered
REGISTERED

on 27 Apr 2021

Last Applicant/ Owned by

1400 Crystal Drive, Suite 400

Arlington

VA

22202

Serial Number

88454644 filed on 31st May 2019

Registration Number

6335725 registered on 27th Apr 2021

in the Principal Register

Correspondent Address

Milton C. Johns

Executive Law Partners, PLLC

11130 Fairfax Blvd., SUITE 303

Fairfax VA 22030

Filing Basis

1. intent to use

2. use application currently

Disclaimer

NO DATA

K

Educational services, namely, providing in-person and online seminars and training in the field of computer security, intrusion, vulnerability, forensics, application delivery, and data protection The mark consists of the letter "k" with a directional symbol. Printed manuals in the field of computer security, intrusion, vulnerability, forensics, application delivery, and data protection K > CoRead More

Classification Information


Class [016]
Paper Goods and Printed Material


Printed manuals in the field of computer security, intrusion, vulnerability, forensics, application delivery, and data protection


First Use Date in General

20th Jan 2020

First Use Date in Commerce

20th Jan 2020

Class [041]
Education and Entertainment Services


Educational services, namely, providing in-person and online seminars and training in the field of computer security, intrusion, vulnerability, forensics, application delivery, and data protection


First Use Date in General

20th Jan 2020

First Use Date in Commerce

20th Jan 2020

Class [042]
Computer & Software Services & Scientific Services


Research, development and engineering, installation, simulation, validation, maintenance and repair of computer software; research, development and engineering of computer network protection, security software, simulation, validation and reporting; consultation in the field of computer software and computer networks and other information technology infrastructure; consultation in the field of assessment, detection, protection and security of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against attack, intrusion, unauthorized activity, misuse and other anomalous events; technical support services, namely, troubleshooting of computer security network and other information technology infrastructure problems; analysis, evaluation, identification, reporting, and testing of computer networks, servers, applications, desktops and other information technology infrastructure for attack, intrusion, unauthorized activity, misuse and other anomalous events; remote monitoring, detection and protection of computer data and information, networks, servers, applications, desktops and other information technology infrastructure for attack, intrusion and misuse and other anomalous events, including deployment of countermeasures in response to detection of unauthorized access or use of computer data and information, networks, servers, applications, desktops and other information technology infrastructure; assessment of vulnerabilities of computer data and information, networks, servers, applications, desktops and other information technology infrastructure to attacks, intrusion, unauthorized activity, misuse and other anomalous events; providing information in the form of early warnings, advisory alerts, notifications, and reports of attacks, security events, unauthorized activity, misuse and other anomalous events, exploits and vulnerabilities for computer data and information, networks, servers, applications, desktops and other information technology infrastructure; conducting research in the field of assessment, detection, protection and security of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against attack, intrusion, unauthorized activity, misuse and other anomalous events; Computer security monitoring, simulation, validation, and reporting of computer network security and information risks; providing computer security monitoring, simulation, and validation of information in the field of vulnerability assessment and protection of computer data and information, networks, servers, applications, desktops and other information technology infrastructure against vulnerabilities, attack, intrusion, unauthorized activity, misuse and other anomalous events


First Use Date in General

20th Jan 2020

First Use Date in Commerce

20th Jan 2020

Mark Details


Serial Number

No 88454644

Mark Type

No Service Mark

Attorney Docket Number

No

44D Filed

No

44D Current

No

44E filed

No

44E Current

No

66A Filed

No

66A Current

No

Current Basis

No

No Basis

No

Design Code(s)

24.15.04 -

Arrowheads

Description of Design Search

The mark consists of the letter "k" with a directional symbol.

Legal History


Show more

Status DateAction Taken
11th Apr 2022TEAS CHANGE OF CORRESPONDENCE RECEIVED
11th Apr 2022TEAS WITHDRAWAL OF ATTORNEY RECEIVED-FIRM RETAINS
11th Apr 2022ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED
11th Apr 2022TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED
27th Apr 2021REGISTERED-PRINCIPAL REGISTER
23rd Mar 2021NOTICE OF ACCEPTANCE OF STATEMENT OF USE E-MAILED
22nd Mar 2021ALLOWED PRINCIPAL REGISTER - SOU ACCEPTED
26th Feb 2021STATEMENT OF USE PROCESSING COMPLETE
18th Feb 2021USE AMENDMENT FILED
18th Feb 2021TEAS STATEMENT OF USE RECEIVED