tm logo
PATCHSTACK
Live/Registered
REGISTERED

on 05 Apr 2022

Last Applicant/ Owned by

Akadeemia tn 1

Pärnu

EE

80011

Serial Number

90546656 filed on 25th Feb 2021

Registration Number

6689783 registered on 05th Apr 2022

in the Principal Register

Correspondent Address

Marius J. Jason

4955 SHANKLAND RD

WILLOUGHBY, OH 44094-5636

Filing Basis

1. intent to use

Disclaimer

NO DATA

PATCHSTACK

Downloadable computer software for detecting and protecting computer networks and software applications from hacking attacks; downloadable computer software that controls input and output to computer files by tracking log in access; downloadable computer software for searching, assessing and fixing weaknesses and vulnerabilities in the software code, open software code and configuration of computeRead More

Classification Information


Class [009]
Computer & Software Products & Electrical & Scientific Products


Downloadable computer software for detecting and protecting computer networks and software applications from hacking attacks; downloadable computer software that controls input and output to computer files by tracking log in access; downloadable computer software for searching, assessing and fixing weaknesses and vulnerabilities in the software code, open software code and configuration of computer systems and software applications, computer networks and computer applications; downloadable computer software for monitoring user behaviors on computer network system for malicious activities; downloadable computer software for storing, managing and analyzing log files from servers, network devices and software applications; downloadable computer software for detecting and preventing threats of hacking of information systems, computer networks and software applications; downloadable computer software for managing, analyzing, and monitoring information technology (IT) infrastructure and security; downloadable computer software for managing, analyzing, and monitoring computer-based information systems and networks; computer hardware, namely, firewalls and networks security devices; downloadable computer software for computer network security; downloadable anti-piracy software; downloadable anti-spyware software; downloadable computer software for the creation of firewalls; Downloadable mobile applications for detecting and protecting computer networks and software applications from hacking attacks; Downloadable mobile application that controls input and output to computer files by tracking log in access; Downloadable mobile applications for searching, assessing and fixing weaknesses and vulnerabilities in the software code, open software code and configuration of computer systems, software applications, computer networks and computer applications; Downloadable mobile applications for monitoring user behaviors on computer network system for malicious activities; Downloadable mobile applications for storing, managing and analyzing log files from servers, network devices and software applications; Downloadable mobile applications for detecting and preventing threats of hacking of information systems, computer networks and software applications; Downloadable mobile applications for managing, analyzing, and monitoring information technology (IT) infrastructure and security; Downloadable mobile applications for managing, analyzing, and monitoring computer-based information systems and networks; Downloadable mobile applications for computer network security; Downloadable mobile applications for the creation of firewalls; computer apparatus, instruments and tools for cyber security and software development

Class [035]
Advertising, Business & Retail Services


Compilation of information into computer databases; Systemization of information into computer databases; Updating and maintenance of data in computer databases; Management and compilation of computerised databases; Collection and compilation of information into computer databases in the field of computer and network security; Conducting incentive award programs for technology professionals to compete for financial payouts to promote the responsible hacking and disclosure of security holes and vulnerabilities in computer software, Internet protocols, and network architecture; conducting incentive award programs for technology professionals to compete for financial payouts to promote the research in the field of Internet security and the development of technology, tools, and techniques in the field of computer and Internet security to identify and address security holes and vulnerabilities in computer software, Internet protocols, and network architecture

Class [042]
Computer & Software Services & Scientific Services


Software as a service (SAAS) services featuring software for computer and network security; Software as a service (SAAS) services featuring computer and network security software, specifically, software for simulating computer, network, and premises security threats, data breaches, and other network and computer attacks, for the purpose of assessing security maturity and incident readiness; Software as a service (SAAS) services featuring computer and network security software, specifically, software for providing threat and vulnerability analysis, security posture and risk analysis and assessment, social engineering and security readiness training, security maturity and incident readiness training, risk triage and response training, perimeter enumeration and discovery services, data breach analysis and forensic incident response and remediation services, and scanning and penetration testing of computers and networks to assess information security vulnerability; Software as a service (SAAS) services featuring computer and network security software, specifically, software for managing, analyzing, and monitoring information technology (IT) infrastructure and security and fixing vulnerabilities; Software as a service (SAAS) featuring software for use in the detection, monitoring, and removal of viruses, worms, spyware, adware, malware, spam and phishing activity, vulnerabilities and unauthorized data and computer programs on third party web sites; Software as a service featuring software for use in searching, assessing and fixing weaknesses and vulnerabilities in the software code, open software code and configuration of computer systems and software applications, computer networks and computer applications; Platform as a service (PAAS) featuring computer software platforms for managing, analyzing, and monitoring information technology (IT) infrastructure and security and fixing vulnerabilities; Platform as a service (PAAS) featuring computer software platforms for simulating computer, network, and premises security threats, data breaches, and other network and computer attacks, for the purpose of assessing security maturity and incident readiness; Platform as a service (PAAS) featuring computer software platforms for providing threat and vulnerability analysis, security posture and risk analysis and assessment, social engineering and security readiness training, security maturity and incident readiness training, risk triage and response training, perimeter enumeration and discovery services, data breach analysis and forensic incident response and remediation services, and scanning and penetration testing of computers and networks to assess information security vulnerability; Platform as a service (PAAS) featuring computer software platforms for the detection, monitoring, and removal of viruses, worms, spyware, adware, malware, spam and phishing activity, vulnerabilities and unauthorized data and computer programs on third party web sites; Platform as a service featuring computer software platforms for the for searching, assessing and fixing weaknesses and vulnerabilities in the software code, open software code and configuration of computer systems and software applications, computer networks and computer applications; Creating and designing website based indexes of information for others using information technology; Computer security consultancy; Computer security consultancy in the field of detecting and preventing threats of hacking of information systems, computer networks and software applications; On-line information and advisory services relating to computer security software and hardware products; Computer systems analysis; computer security consultation services to assist companies in the creation and management of vulnerability disclosure processes and collaboration with independent security researchers; computer system analysis, namely, data analysis for the purpose of generating and transmitting reports on and ratings of the level of security of third party software residing on the computers of others; Maintenance of computer software relating to computer security and prevention of computer risks; Updating of computer software relating to computer security and prevention of computer risks; Monitoring of computer systems for detecting unauthorized access or data breach; Computer security services in the nature of testing for and identifying vulnerabilities in programming code

Mark Details


Serial Number

No 90546656

Mark Type

No Service Mark

Attorney Docket Number

No TM16310US00

44D Filed

No

44D Current

No

44E filed

No

44E Current

No

66A Filed

No

66A Current

No

Current Basis

No

No Basis

No

Legal History


Show more

Status DateAction Taken
05th Apr 2022REGISTERED-PRINCIPAL REGISTER
18th Jan 2022OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
18th Jan 2022PUBLISHED FOR OPPOSITION
29th Dec 2021NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
13th Dec 2021APPROVED FOR PUB - PRINCIPAL REGISTER
13th Dec 2021TEAS/EMAIL CORRESPONDENCE ENTERED
13th Dec 2021CORRESPONDENCE RECEIVED IN LAW OFFICE
13th Dec 2021ASSIGNED TO LIE
08th Dec 2021TEAS RESPONSE TO OFFICE ACTION RECEIVED
01st Oct 2021NOTIFICATION OF NON-FINAL ACTION E-MAILED