ALLURITY Trademark

Trademark Overview


On Thursday, November 10, 2022, a trademark application was filed for ALLURITY with the United States Patent and Trademark Office. The USPTO has given the ALLURITY trademark a serial number of 79358996. The federal status of this trademark filing is FINAL REFUSAL - MAILED as of Tuesday, April 9, 2024. This trademark is owned by Allurity BidCo AB. The ALLURITY trademark is filed in the Computer & Software Products & Electrical & Scientific Products, Computer & Software Services & Scientific Services, Personal, and Legal & Social Services categories with the following description:

downloadable utility, security and cryptography software for network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, risk management, penetration testing, security analysis, identity security, identity and access management, encryption, detection of cyber threats, response in relation to cyber threats, digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; downloadable software for network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, risk management, penetration testing, security analysis, identity security, identity ...

consultancy in the field of data theft and identity theft, namely, verification of personal identity as part of personal background investigations; identity validation services, namely, verification of personal identity as part of personal background investigations

updating of computer software relating to computer security and prevention of computer risks; software development, programming and implementation; software design and development; rental of internet security programs for network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, risk management, penetration testing, security analysis, identity security, identity and access management, encryption, detection of cyber threats, response in relation to cyber threats, digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; provision of security services for computer networks, computer access and computerised transactions, namely, network security, endpoint security, data security, appli...
allurity

General Information


Serial Number79358996
Word MarkALLURITY
Filing DateThursday, November 10, 2022
Status645 - FINAL REFUSAL - MAILED
Status DateTuesday, April 9, 2024
Registration Number0000000
Registration DateNOT AVAILABLE
Mark Drawing4 - Illustration: Drawing with word(s) / letter(s) / number(s) in Block form
Published for Opposition DateNOT AVAILABLE

Trademark Statements


Goods and Servicesdownloadable utility, security and cryptography software for network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, risk management, penetration testing, security analysis, identity security, identity and access management, encryption, detection of cyber threats, response in relation to cyber threats, digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; downloadable software for network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, risk management, penetration testing, security analysis, identity security, identity and access management, encryption, detection of cyber threats, response in relation to cyber threats, digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts for network and device security; downloadable software development tools; downloadable security software for network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, risk management, penetration testing, security analysis, identity security, identity and access management, encryption, detection of cyber threats, response in relation to cyber threats, digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; network access server hardware; downloadable mobile applications for the management of information; downloadable internet access software; downloadable computer software for the management of information; downloadable computer software for biometric systems for the identification and authentication of persons
Goods and Servicesconsultancy in the field of data theft and identity theft, namely, verification of personal identity as part of personal background investigations; identity validation services, namely, verification of personal identity as part of personal background investigations
Goods and Servicesupdating of computer software relating to computer security and prevention of computer risks; software development, programming and implementation; software design and development; rental of internet security programs for network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, risk management, penetration testing, security analysis, identity security, identity and access management, encryption, detection of cyber threats, response in relation to cyber threats, digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; provision of security services for computer networks, computer access and computerised transactions, namely, network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, risk management, penetration testing, security analysis, identity security, identity and access management, encryption, detection of cyber threats, response in relation to cyber threats, digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; provision of computer security risk management programs, namely, programs for network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, risk management, penetration testing, security analysis, identity security, identity and access management, encryption, detection of cyber threats, response in relation to cyber threats, digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; providing information in the field of information technology, namely, providing information in the field of computer software design and development and cybersecurity; IT security, protection and restoration, namely, network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, risk management, penetration testing, security analysis, identity security, identity and access management, encryption, detection of cyber threats, response in relation to cyber threats, digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; providing information in the field of computer software design; programming of internet security programs; monitoring of computer systems for security purposes, namely, network security, endpoint security, data security, application security, cloud security, security operations, security operations centers, threat intelligence, security compliance and governance, incident response, risk management, penetration testing, security analysis, identity security, identity and access management, encryption, detection of cyber threats, response in relation to cyber threats, digital risk protection, monitoring of computer systems for detecting unauthorized access, monitoring of computer systems for detecting data breaches, and monitoring unauthorized user account access attempts; maintenance of computer software relating to computer security and prevention of computer risks; IT consultancy, advisory and information services relating to cyber security; internet security consultancy; digital asset management, namely, electronic data storage; electronic monitoring of personally identifying information to detect identity theft via the internet; development of software for secure network operations; design and development of virtual private network (VPN) operating software; development of computer hardware and software; design and development of internet security programs; design and development of electronic data security systems; data security consultancy services; IT security consultancy services for analysing information systems; consultancy in the field of security software; consultancy in the field of data security; consultancy and information services relating to information technology architecture and infrastructure; consultancy in the field of computer data security; consultancy and information services relating to computer system integration; computer security threat analysis for protecting data; computer security services in the nature of administering digital certificates; computer programming services for electronic data security; computer software and information technology in the nature of IT security consultancy services; authentication services for computer security, namely, consultancy and software management in relation to identity security and identity and access management,; advisory services relating to computer based information systems, namely, IT security consultancy

Classification Information


International Class009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus.
US Class Codes021, 023, 026, 036, 038
Class Status Code6 - Active
Class Status DateTuesday, January 3, 2023
Primary Code009
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateTuesday, January 3, 2023
Primary Code042
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class045 - Legal services; security services for the protection of property and individuals; personal and social services rendered by others to meet the needs of individuals.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateTuesday, January 3, 2023
Primary Code045
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

Trademark Owner History


Party NameAllurity BidCo AB
Party Type10 - Original Applicant
Legal Entity Type99 - Other
AddressSE

Trademark Events


Event DateEvent Description
Tuesday, January 3, 2023NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Saturday, January 7, 2023APPLICATION FILING RECEIPT MAILED
Thursday, August 24, 2023ASSIGNED TO EXAMINER
Friday, December 30, 2022SN ASSIGNED FOR SECT 66A APPL FROM IB
Sunday, February 5, 2023CHANGE OF NAME/ADDRESS REC'D FROM IB
Monday, August 28, 2023NON-FINAL ACTION WRITTEN
Tuesday, August 29, 2023NON-FINAL ACTION (IB REFUSAL) PREPARED FOR REVIEW
Monday, September 18, 2023NON-FINAL ACTION MAILED - REFUSAL SENT TO IB
Monday, September 18, 2023REFUSAL PROCESSED BY MPU
Monday, March 18, 2024TEAS/EMAIL CORRESPONDENCE ENTERED
Monday, March 18, 2024CORRESPONDENCE RECEIVED IN LAW OFFICE
Monday, March 18, 2024TEAS RESPONSE TO OFFICE ACTION RECEIVED
Tuesday, April 9, 2024FINAL REFUSAL WRITTEN
Tuesday, April 9, 2024FINAL REFUSAL E-MAILED
Tuesday, April 9, 2024NOTIFICATION OF FINAL REFUSAL EMAILED
Friday, June 7, 2024NOTIFICATION OF POSSIBLE OPPOSITION SENT TO IB
Tuesday, October 10, 2023REFUSAL PROCESSED BY IB
Sunday, June 30, 2024NOTIFICATION OF POSSIBLE OPPOSITION - PROCESSED BY IB
Friday, June 7, 2024NOTIFICATION OF POSSIBLE OPPOSITION CREATED, TO BE SENT TO IB