CYBEATS SBOM STUDIO Trademark

Trademark Overview


On Friday, January 14, 2022, a trademark application was filed for CYBEATS SBOM STUDIO with the United States Patent and Trademark Office. The USPTO has given the CYBEATS SBOM STUDIO trademark a serial number of 97220769. The federal status of this trademark filing is SUSPENSION LETTER - MAILED as of Wednesday, September 4, 2024. This trademark is owned by Cybeats Technologies Inc.. The CYBEATS SBOM STUDIO trademark is filed in the Computer & Software Products & Electrical & Scientific Products, Construction & Repair Services, and Computer & Software Services & Scientific Services categories with the following description:

Downloadable security software, namely, computer software for encrypting and authenticating data; Downloadable computer software, namely, cyber security software being software for identifying cybersecurity risks and software vulnerabilities; downloadable computer software for computer security, computer network security and information security purposes being software for identifying cybersecurity risks and software vulnerabilities; downloadable computer software in the field of the security risk industry, namely, computer security software being software for identifying cybersecurity risks and software vulnerabilities; downloadable computer software for managing computer security strategy and resources; downloadable computer software for analyzing devices for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems as well as for the purpose of investigating and analyzing cyber security threats and for managing security i...

Services for enhancing the performance, function and security of computer networks, namely, installation and maintenance of computer hardware; troubleshooting of computer hardware, namely, troubleshooting in the nature of the repair of computer hardware; maintenance and repair of computer hardware; installation, maintenance and repair of computer hardware; upgrading of computer hardware; computer consultation in the fields of computer networks security, cyber security, cyber threat detection, cybercrime, and prevention and mitigation of cyber risk consultation about the repair of computer hardware, consultancy relating to the maintenance of computer hardware

Computer network security services, namely, computer network security consultancy, restricting unauthorized access to computer networks; computer security consultancy; design and development of electronic data security systems; developing computer software; internet security consultancy; maintenance of computer software relating to computer security and prevention of computer risks; monitoring of computer systems for detecting unauthorized access or data breach; computer security consultation in the fields of computer networks security, cyber security, cyber threat detection, cybercrime, and prevention and mitigation of cyber risk; providing online non-downloadable software in the field of computer security; Software as a Service (SAAS) services featuring software for performing computer security and risk assessment and remediation; Platform as a Service (PAAS) services featuring software for computer security and risk assessment and remediation; providing online non-downloadable compu...
cybeats sbom studio

General Information


Serial Number97220769
Word MarkCYBEATS SBOM STUDIO
Filing DateFriday, January 14, 2022
Status653 - SUSPENSION LETTER - MAILED
Status DateWednesday, September 4, 2024
Registration Number0000000
Registration DateNOT AVAILABLE
Mark Drawing4 - Illustration: Drawing with word(s) / letter(s) / number(s) in Block form
Published for Opposition DateNOT AVAILABLE

Trademark Statements


Goods and ServicesDownloadable security software, namely, computer software for encrypting and authenticating data; Downloadable computer software, namely, cyber security software being software for identifying cybersecurity risks and software vulnerabilities; downloadable computer software for computer security, computer network security and information security purposes being software for identifying cybersecurity risks and software vulnerabilities; downloadable computer software in the field of the security risk industry, namely, computer security software being software for identifying cybersecurity risks and software vulnerabilities; downloadable computer software for managing computer security strategy and resources; downloadable computer software for analyzing devices for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems as well as for the purpose of investigating and analyzing cyber security threats and for managing security incidents; downloadable cyber security computer software for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems containing devices; downloadable computer software for monitoring information technology (IT), operational technology (OT) and Internet of Things (IoT) devices and networks, storing and analyzing data for the purpose of detecting, responding to, resolving, investigating and mitigating cyber security threats; downloadable computer software for managing cyber incident response, alert management, response management, cyber incident investigation, and cyber incident data collection and analysis; downloadable application programing interfaces (APIs), namely, computer software comprising a set of subroutine definitions, protocols, and tools for building application software, for integrating external systems into detection and incident response management systems; downloadable computer software used to capture data information and meta-data for the purpose of detecting, responding to, resolving, investigating and mitigating cyber security threats
Pseudo MarkCYBEATS SOFTWARE BILL OF MATERIALS STUDIO
Goods and ServicesServices for enhancing the performance, function and security of computer networks, namely, installation and maintenance of computer hardware; troubleshooting of computer hardware, namely, troubleshooting in the nature of the repair of computer hardware; maintenance and repair of computer hardware; installation, maintenance and repair of computer hardware; upgrading of computer hardware; computer consultation in the fields of computer networks security, cyber security, cyber threat detection, cybercrime, and prevention and mitigation of cyber risk consultation about the repair of computer hardware, consultancy relating to the maintenance of computer hardware
NOT AVAILABLE"SBOM STUDIO"
Goods and ServicesComputer network security services, namely, computer network security consultancy, restricting unauthorized access to computer networks; computer security consultancy; design and development of electronic data security systems; developing computer software; internet security consultancy; maintenance of computer software relating to computer security and prevention of computer risks; monitoring of computer systems for detecting unauthorized access or data breach; computer security consultation in the fields of computer networks security, cyber security, cyber threat detection, cybercrime, and prevention and mitigation of cyber risk; providing online non-downloadable software in the field of computer security; Software as a Service (SAAS) services featuring software for performing computer security and risk assessment and remediation; Platform as a Service (PAAS) services featuring software for computer security and risk assessment and remediation; providing online non-downloadable computer software for analyzing devices for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems as well as for the purpose of investigating and analyzing cyber security threats and for managing security incidents; providing online non-downloadable cyber security computer software for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems containing firmware based devices; providing online non-downloadable computer software for monitoring information technology (IT), operational technology (OT) and Internet of Things (IoT) devices and networks, storing and analyzing data for the purpose of detecting, responding to, resolving, investigating and mitigating cyber security threats; providing online non-downloadable computer software for managing cyber incident response, alert management, response management, cyber incident investigation and cyber incident data collection and analysis; providing online non-downloadable computer software used to capture data information and meta-data for the purpose of detecting, responding to, resolving, investigating and mitigating cyber security threats; providing temporary use of on-line non-downloadable security software, namely, computer software for encrypting and authenticating data; providing temporary use of on-line non-downloadable computer software, namely, cyber security software being software for identifying cybersecurity risks and software vulnerabilities; providing temporary use of on-line non-downloadable computer software for computer security, computer network security and information security purposes being software for identifying cybersecurity risks and software vulnerabilities; providing temporary use of online non-downloadable computer software in the field of the security risk industry, namely, computer security software being software for identifying cybersecurity risks and software vulnerabilities; providing temporary use of on-line non-downloadable computer software for managing computer security strategy and resources; providing temporary use of on-line non-downloadable computer software for analyzing devices for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems as well as for the purpose of investigating and analyzing cyber security threats and for managing security incidents; providing temporary use of on-line non-downloadable cyber security computer software for the purpose of protecting information technology (IT), operational technology (OT) and Internet of Things (IoT) systems containing devices; providing temporary use of on-line non-downloadable computer software for monitoring information technology (IT), operational technology (OT) and Internet of Things (IoT) devices and networks, storing and analyzing data for the purpose of detecting, responding to, resolving, investigating and mitigating cyber security threats; providing temporary use of on-line non-downloadable computer software for managing cyber incident response, alert management, response management, cyber incident investigation, and cyber incident data collection and analysis; providing temporary use of on-line non-downloadable application programing interfaces (APIs), namely, computer software comprising a set of subroutine definitions, protocols, and tools for building application software, for integrating external systems into detection and incident response management systems; providing temporary use of on-line non-downloadable computer software used to capture data information and meta-data for the purpose of detecting, responding to, resolving, investigating and mitigating cyber security threats; installation, maintenance and repair of computer software

Classification Information


International Class009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus.
US Class Codes021, 023, 026, 036, 038
Class Status Code6 - Active
Class Status DateFriday, January 21, 2022
Primary Code009
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class037 - Building construction; repair; installation services.
US Class Codes100, 103, 106
Class Status Code6 - Active
Class Status DateFriday, January 21, 2022
Primary Code037
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateFriday, January 21, 2022
Primary Code042
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

Trademark Owner History


Party NameCybeats Technologies Inc.
Party Type10 - Original Applicant
Legal Entity Type03 - Corporation
AddressToronto Ontario M9W6L9
CA

Trademark Events


Event DateEvent Description
Tuesday, January 18, 2022NEW APPLICATION ENTERED
Friday, January 21, 2022NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Saturday, October 22, 2022ASSIGNED TO EXAMINER
Tuesday, November 1, 2022NON-FINAL ACTION WRITTEN
Tuesday, November 1, 2022NON-FINAL ACTION E-MAILED
Tuesday, November 1, 2022NOTIFICATION OF NON-FINAL ACTION E-MAILED
Monday, May 1, 2023TEAS RESPONSE TO OFFICE ACTION RECEIVED
Monday, May 1, 2023CORRESPONDENCE RECEIVED IN LAW OFFICE
Tuesday, May 2, 2023TEAS/EMAIL CORRESPONDENCE ENTERED
Friday, June 2, 2023SUSPENSION LETTER WRITTEN
Friday, June 2, 2023LETTER OF SUSPENSION E-MAILED
Friday, June 2, 2023NOTIFICATION OF LETTER OF SUSPENSION E-MAILED
Wednesday, January 10, 2024SUSPENSION CHECKED - TO ATTORNEY FOR ACTION
Saturday, February 3, 2024SUSPENSION INQUIRY WRITTEN
Saturday, February 3, 2024INQUIRY TO SUSPENSION E-MAILED
Saturday, February 3, 2024NOTIFICATION OF INQUIRY AS TO SUSPENSION E-MAILED
Wednesday, September 4, 2024NOTIFICATION OF LETTER OF SUSPENSION E-MAILED
Wednesday, September 4, 2024CORRESPONDENCE RECEIVED IN LAW OFFICE
Wednesday, September 4, 2024LETTER OF SUSPENSION E-MAILED
Wednesday, September 4, 2024TEAS/EMAIL CORRESPONDENCE ENTERED
Wednesday, September 4, 2024SUSPENSION LETTER WRITTEN
Wednesday, September 4, 2024ASSIGNED TO LIE
Thursday, April 4, 2024TEAS RESPONSE TO SUSPENSION INQUIRY RECEIVED