CT Trademark

Trademark Overview


On Thursday, July 23, 2020, a trademark application was filed for CT with the United States Patent and Trademark Office. The USPTO has given the CT trademark a serial number of 90070447. The federal status of this trademark filing is REGISTERED as of Tuesday, September 21, 2021. This trademark is owned by Thinkst Applied Research (Pty) Ltd.. The CT trademark is filed in the Computer & Software Products & Electrical & Scientific Products and Computer & Software Services & Scientific Services categories with the following description:

Recorded and downloadable computer software in the field of IT security for use in the monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on user systems for breach detection, detecting unauthorized activities, and access or data breach; Downloadable computer software in the field of IT security for use in the monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on ...

Design and development of computer software; Computer security consultancy; Computer software consultancy; Computer system analysis; Computer virus protection services; Data encryption services; Data security consultancy; Electronic monitoring of credit card activity to detect fraud via the internet; Electronic monitoring of personally identifying information to detect identity theft via the internet; Internet security consultancy; Maintenance of computer software; Monitoring of computer systems by remote access to ensure proper functioning; Monitoring of computer systems for detecting unauthorized access or data breach; Software as a service (SAAS) services featuring software for IT security, monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, do...
ct

General Information


Serial Number90070447
Word MarkCT
Filing DateThursday, July 23, 2020
Status700 - REGISTERED
Status DateTuesday, September 21, 2021
Registration Number6489337
Registration DateTuesday, September 21, 2021
Mark Drawing3000 - Illustration: Drawing or design which also includes word(s) / letter(s) / number(s)
Published for Opposition DateTuesday, July 6, 2021

Trademark Statements


Description of MarkThe mark consists of a stylized concentric square design which contains stylized depictions of the letters "C" and "T".
Goods and ServicesRecorded and downloadable computer software in the field of IT security for use in the monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on user systems for breach detection, detecting unauthorized activities, and access or data breach; Downloadable computer software in the field of IT security for use in the monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on user systems for breach detection, detecting unauthorized activities, and access or data breach; Downloadable software, downloadable mobile applications, and downloadable computer programs in the field of IT security all of the foregoing for use in the monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on user systems for breach detection, detecting unauthorized activities, and access or data breach; Recorded and downloadable computer operating programs; Recorded and downloadable computer software applications in the field of IT security for use in the monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on user systems for breach detection, detecting unauthorized activities, and access or data breach; Recorded and downloadable computer software platforms in the field of IT security for use in the monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on user systems for breach detection, detecting unauthorized activities, and access or data breach; Recorded and downloadable computer software for issuing honeypots, namely, recorded and downloadable computer software for setting traps to detect, deflect, and/or counteract attempts of unauthorized use of information systems, software applications, computer services and computer networks, tokens, namely, digital tokens which detect attempts of unauthorized use of computer systems, software applications, computer services and computer networks, and decoy systems for detecting early attacker warning signs and redirecting cyber-attacks to a safer location for the organization
Pseudo MarkCANARY TOKENS
Goods and ServicesDesign and development of computer software; Computer security consultancy; Computer software consultancy; Computer system analysis; Computer virus protection services; Data encryption services; Data security consultancy; Electronic monitoring of credit card activity to detect fraud via the internet; Electronic monitoring of personally identifying information to detect identity theft via the internet; Internet security consultancy; Maintenance of computer software; Monitoring of computer systems by remote access to ensure proper functioning; Monitoring of computer systems for detecting unauthorized access or data breach; Software as a service (SAAS) services featuring software for IT security, monitoring of computer systems and networks for detecting unauthorized access or data breach, data security, breach detection, detecting unauthorized activities, access or data breach, for detecting and tracking suspicious or malicious user activity and cyber-related threats, and for creating, downloading and using software-based beacons and traps that are deployed on user systems for breach detection, detecting unauthorized activities, access or data breach; Software as a service (SAAS) services featuring software for issuing honeypots, namely, computer software for setting traps to detect, deflect, and/or counteract attempts of unauthorized use of information systems, software applications, computer services and computer networks, tokens, namely, digital tokens which detect attempts of unauthorized use of computer systems, software applications, computer services and computer networks, and decoy systems for detecting early attacker warning signs and redirecting cyber-attacks to a safer location for the organization; User authentication services using single sign-on technology for online software applications; User authentication services using technology for e-commerce transactions

Classification Information


International Class009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus.
US Class Codes021, 023, 026, 036, 038
Class Status Code6 - Active
Class Status DateThursday, August 20, 2020
Primary Code009
First Use Anywhere DateFriday, August 14, 2015
First Use In Commerce DateFriday, August 14, 2015

International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateThursday, August 20, 2020
Primary Code042
First Use Anywhere DateFriday, August 14, 2015
First Use In Commerce DateFriday, August 14, 2015

Trademark Owner History


Party NameThinkst Applied Research (Pty) Ltd.
Party Type30 - Original Registrant
Legal Entity Type99 - Other
AddressCape Town 7925
ZA

Party NameThinkst Applied Research (Pty) Ltd.
Party Type20 - Owner at Publication
Legal Entity Type99 - Other
AddressCape Town 7925
ZA

Party NameThinkst Applied Research (Pty) Ltd.
Party Type10 - Original Applicant
Legal Entity Type99 - Other
AddressCape Town 7925
ZA

Trademark Events


Event DateEvent Description
Tuesday, September 21, 2021REGISTERED-PRINCIPAL REGISTER
Tuesday, July 6, 2021OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
Tuesday, July 6, 2021PUBLISHED FOR OPPOSITION
Wednesday, June 16, 2021NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
Thursday, May 27, 2021APPROVED FOR PUB - PRINCIPAL REGISTER
Wednesday, May 12, 2021TEAS/EMAIL CORRESPONDENCE ENTERED
Tuesday, May 11, 2021CORRESPONDENCE RECEIVED IN LAW OFFICE
Tuesday, May 11, 2021TEAS RESPONSE TO OFFICE ACTION RECEIVED
Sunday, November 15, 2020NOTIFICATION OF NON-FINAL ACTION E-MAILED
Sunday, November 15, 2020NON-FINAL ACTION E-MAILED
Sunday, November 15, 2020NON-FINAL ACTION WRITTEN
Friday, November 6, 2020ASSIGNED TO EXAMINER
Thursday, August 27, 2020TEAS/EMAIL CORRESPONDENCE ENTERED
Thursday, August 27, 2020CORRESPONDENCE RECEIVED IN LAW OFFICE
Wednesday, August 26, 2020ASSIGNED TO LIE
Friday, August 21, 2020NOTICE OF DESIGN SEARCH CODE E-MAILED
Thursday, August 20, 2020NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Thursday, August 6, 2020TEAS VOLUNTARY AMENDMENT RECEIVED
Monday, July 27, 2020NEW APPLICATION ENTERED