ALLURITY Trademark

Trademark Overview


On Thursday, November 10, 2022, a trademark application was filed for ALLURITY with the United States Patent and Trademark Office. The USPTO has given the ALLURITY trademark a serial number of 79358996. The federal status of this trademark filing is PUBLICATION/ISSUE REVIEW COMPLETE as of Wednesday, October 30, 2024. This trademark is owned by Allurity BidCo AB. The ALLURITY trademark is filed in the Computer & Software Products & Electrical & Scientific Products, Computer & Software Services & Scientific Services, Personal, and Legal & Social Services categories with the following description:

downloadable utility, security and cryptography software for data encryption, detecting unauthorized user access, detecting unauthorized data, blocking unauthorized system user access, data masking, creation of firewalls, identifying and fixing vulnerabilities in computer programs and software code, and verifying authorized system user identity in the fields of network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, and risk management; downloadable utility, security and cryptography software for unauthorized system user access penetration testing, data security analysis, unauthorized user access attempt security analysis, verifying authorized system user identity for identity security, authorized system user identity and access management, data encryption, detection of cyber threats in the nature of unauthorized user access, re...

consultancy in the field of data theft and identity theft, namely, verification of personal identity as part of personal background investigations; identity validation services, namely, verification of personal identity as part of personal background investigations

Updating of computer software relating to computer security and prevention of computer risks; software development, programming and implementation; software design and development; rental of internet security programs for network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, risk management, penetration testing, security analysis, identity security, identity and access management, encryption, detection of cyber threats, response in relation to cyber threats, digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; provision of security services for computer networks, computer access and computerized transactions, namely, providing temporary use of on-line, non-downloadable soft...

General Information


Serial Number79358996
Word MarkALLURITY
Filing DateThursday, November 10, 2022
Status681 - PUBLICATION/ISSUE REVIEW COMPLETE
Status DateWednesday, October 30, 2024
Registration Number0000000
Registration DateNOT AVAILABLE
Mark Drawing4 - Illustration: Drawing with word(s) / letter(s) / number(s) in Block form
Published for Opposition DateNOT AVAILABLE

Trademark Statements


Goods and Servicesdownloadable utility, security and cryptography software for data encryption, detecting unauthorized user access, detecting unauthorized data, blocking unauthorized system user access, data masking, creation of firewalls, identifying and fixing vulnerabilities in computer programs and software code, and verifying authorized system user identity in the fields of network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, and risk management; downloadable utility, security and cryptography software for unauthorized system user access penetration testing, data security analysis, unauthorized user access attempt security analysis, verifying authorized system user identity for identity security, authorized system user identity and access management, data encryption, detection of cyber threats in the nature of unauthorized user access, response being unauthorized system user access in relation to cyber threats, data encryption for digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; downloadable software for data encryption, detecting unauthorized user access, detecting unauthorized data, blocking unauthorized system user access, data masking, creation of firewalls, identifying and fixing vulnerabilities in computer programs and software code, and verifying authorized system user identity in the fields of network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, and risk management; downloadable software for unauthorized system user access penetration testing, data security analysis, unauthorized user access attempt security analysis, verifying authorized system user identity for identity security, authorized system user identity and access management, data encryption, detection of cyber threats in the nature of unauthorized user access, response being unauthorized system user access in relation to cyber threats, data encryption for digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts for network and device security; downloadable software development tools; downloadable security software for data encryption, detecting unauthorized user access, detecting unauthorized data, blocking unauthorized system user access, data masking, creation of firewalls, identifying and fixing vulnerabilities in computer programs and software code, and verifying authorized system user identity in the fields of network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, and risk management; downloadable security software for unauthorized system user access penetration testing, data security analysis, unauthorized user access attempt security analysis, verifying authorized system user identity for identity security, authorized system user identity and access management, data encryption, detection of cyber threats in the nature of unauthorized user access, response being unauthorized system user access in relation to cyber threats, data encryption for digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; network access server hardware; downloadable mobile applications for the management of information; downloadable internet access software; downloadable computer software for the management of information; downloadable computer software for biometric systems for the identification and authentication of persons
Goods and Servicesconsultancy in the field of data theft and identity theft, namely, verification of personal identity as part of personal background investigations; identity validation services, namely, verification of personal identity as part of personal background investigations
Goods and ServicesUpdating of computer software relating to computer security and prevention of computer risks; software development, programming and implementation; software design and development; rental of internet security programs for network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, risk management, penetration testing, security analysis, identity security, identity and access management, encryption, detection of cyber threats, response in relation to cyber threats, digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; provision of security services for computer networks, computer access and computerized transactions, namely, providing temporary use of on-line, non-downloadable software for data encryption, detecting unauthorized user access, detecting unauthorized data, blocking unauthorized system user access, data masking, creation of firewalls, identifying and fixing vulnerabilities in computer programs and software code, and verifying authorized system user identity in the fields of network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, and risk management; provision of security services for computer networks, computer access and computerized transactions, namely, providing temporary use of on-line, non-downloadable software for unauthorized system user access penetration testing, data security analysis, unauthorized user access attempt security analysis, verifying authorized system user identity for identity security, authorized system user identity and access management, data encryption, detection of cyber threats in the nature of unauthorized user access, response being unauthorized system user access in relation to cyber threats, data encryption for digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; provision of computer security risk management programs, namely, providing temporary use of on-line, non-downloadable computer programs for data encryption, detecting unauthorized user access, detecting unauthorized data, blocking unauthorized system user access, data masking, creation of firewalls, identifying and fixing vulnerabilities in computer programs and software code, and verifying authorized system user identity in the fields of network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, and risk management; provision of computer security risk management programs, namely, providing temporary use of on-line, non-downloadable computer programs for unauthorized system user access penetration testing, data security analysis, unauthorized user access attempt security analysis, verifying authorized system user identity for identity security, authorized system user identity and access management, data encryption, detection of cyber threats in the nature of unauthorized user access, response being unauthorized system user access in relation to cyber threats, data encryption for digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; providing information in the field of information technology, namely, providing information in the field of computer software design and development and cybersecurity; IT security, protection and restoration, namely, providing temporary use of on-line, non-downloadable computer software for data encryption, detecting unauthorized user access, detecting unauthorized data, blocking unauthorized system user access, data masking, creation of firewalls, identifying and fixing vulnerabilities in computer programs and software code, and verifying authorized system user identity in the fields of network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, and risk management; IT security, protection and restoration, namely, providing temporary use of on-line, non-downloadable computer software for unauthorized system user access penetration testing, data security analysis, unauthorized user access attempt security analysis, verifying authorized system user identity for identity security, authorized system user identity and access management, data encryption, detection of cyber threats in the nature of unauthorized user access, response being unauthorized system user access in relation to cyber threats, data encryption for digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; providing information in the field of computer software design; programming of internet security programs; monitoring of computer systems for detecting unauthorized user access, detecting unauthorized data, blocking unauthorized system user access, identifying and fixing vulnerabilities in computer programs and software code, and verifying authorized system user identity in the fields of network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, and risk management; monitoring of computer systems for verifying authorized system user identity for identity security, detection of cyber threats in the nature of unauthorized user access, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; maintenance of computer software relating to computer security and prevention of computer risks; IT consultancy, advisory and information services, namely, providing consultancy, advisory and information in the field of computer software design and development relating to cyber security; internet security consultancy; digital asset management, namely, electronic data storage; electronic monitoring of personally identifying information to detect identity theft via the internet; development of software for secure network operations; design and development of virtual private network (VPN) operating software; development of computer hardware and software; design and development of internet security programs; design and development of electronic data security systems; data security consultancy services; IT security consultancy services being data security consultancy for analysing information systems; consultancy in the field of security software; consultancy in the field of data security; consultancy and information services relating to information technology architecture and infrastructure; consultancy in the field of computer data security; consultancy and information services relating to computer system integration; computer security threat analysis for protecting data; computer security services in the nature of administering digital certificates; computer programming services for electronic data security; computer software and information technology in the nature of IT being data security consultancy services; authentication services for computer security, namely, computer software consultancy and software management being design, development, install, and maintenance of computer software in relation to identity security and identity and access management; advisory services relating to computer based information systems, namely, IT security consultancy being software consultancy in the field of data security

Classification Information


International Class009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus.
US Class Codes021, 023, 026, 036, 038
Class Status Code6 - Active
Class Status DateTuesday, January 3, 2023
Primary Code009
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateTuesday, January 3, 2023
Primary Code042
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class045 - Legal services; security services for the protection of property and individuals; personal and social services rendered by others to meet the needs of individuals.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateTuesday, January 3, 2023
Primary Code045
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

Trademark Owner History


Party NameAllurity BidCo AB
Party Type10 - Original Applicant
Legal Entity Type99 - Other
AddressSE

Trademark Events


Event DateEvent Description
Friday, December 30, 2022SN ASSIGNED FOR SECT 66A APPL FROM IB
Tuesday, January 3, 2023NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Saturday, January 7, 2023APPLICATION FILING RECEIPT MAILED
Sunday, February 5, 2023CHANGE OF NAME/ADDRESS REC'D FROM IB
Monday, August 28, 2023NON-FINAL ACTION WRITTEN
Thursday, August 24, 2023ASSIGNED TO EXAMINER
Tuesday, August 29, 2023NON-FINAL ACTION (IB REFUSAL) PREPARED FOR REVIEW
Monday, September 18, 2023NON-FINAL ACTION MAILED - REFUSAL SENT TO IB
Tuesday, October 10, 2023REFUSAL PROCESSED BY IB
Monday, September 18, 2023REFUSAL PROCESSED BY MPU
Monday, March 18, 2024TEAS/EMAIL CORRESPONDENCE ENTERED
Monday, March 18, 2024TEAS RESPONSE TO OFFICE ACTION RECEIVED
Monday, March 18, 2024CORRESPONDENCE RECEIVED IN LAW OFFICE
Tuesday, April 9, 2024FINAL REFUSAL WRITTEN
Tuesday, April 9, 2024FINAL REFUSAL E-MAILED
Tuesday, April 9, 2024NOTIFICATION OF FINAL REFUSAL EMAILED
Friday, June 7, 2024NOTIFICATION OF POSSIBLE OPPOSITION SENT TO IB
Friday, June 7, 2024NOTIFICATION OF POSSIBLE OPPOSITION CREATED, TO BE SENT TO IB
Sunday, June 30, 2024NOTIFICATION OF POSSIBLE OPPOSITION - PROCESSED BY IB
Wednesday, October 9, 2024CORRESPONDENCE RECEIVED IN LAW OFFICE
Wednesday, October 9, 2024TEAS/EMAIL CORRESPONDENCE ENTERED
Wednesday, October 9, 2024TEAS REQUEST FOR RECONSIDERATION RECEIVED
Thursday, October 24, 2024EXAMINER'S AMENDMENT ENTERED
Thursday, October 24, 2024NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED
Thursday, October 24, 2024EXAMINERS AMENDMENT -WRITTEN
Thursday, October 24, 2024EXAMINERS AMENDMENT E-MAILED
Thursday, October 24, 2024APPROVED FOR PUB - PRINCIPAL REGISTER