Serial Number | 88823211 |
Word Mark | EPHISHINT |
Filing Date | Thursday, March 5, 2020 |
Status | 606 - ABANDONED - NO STATEMENT OF USE FILED |
Status Date | Monday, October 23, 2023 |
Registration Number | 0000000 |
Registration Date | NOT AVAILABLE |
Mark Drawing | 4000 - Illustration: Drawing with word(s) / letter(s) / number(s) in Block form |
Published for Opposition Date | Tuesday, July 28, 2020 |
Goods and Services | Training services in the field of security awareness for the prevention of security breaches targeting protected information and access to infrastructure; Training services in the field of security awareness training, simulation of security attacks, and vulnerability assessments for employer implementation of security awareness to employees offered via online videos, online games, online seminars, online trainings, in-person seminars, in-person trainings |
Goods and Services | Downloadable computer software for providing security awareness training and tools to assist in IT risk management and regulatory compliance, simulation of security attacks, and vulnerability assessments to collect data on user responses in order to assess user training necessities and test user training progress; Downloadable multimedia files containing videos, text, images, and audio relating to security awareness training for the prevention of security breaches targeting protected information and access to infrastructure; Downloadable software in the nature of a mobile application for use in the field of cyber security that allows users to upload, post, download, manage, access, display, and edit digital content; Downloadable computer software for searching, detecting, blocking, filtering, tagging, compiling, indexing, analyzing, and reporting on information over and in information networks, global information networks, individual workstations, personal computers, software, e-mail, and workgroup communications; downloadable computer software used to maintain security over or in computer networks, web applications and digital data; Downloadable computer software for providing network, Internet, and computer security; downloadable computer software for emulating attack methods used by computer hackers; Downloadable software in the nature of a mobile application for searching, detecting, blocking, filtering, tagging, compiling, indexing, analyzing, and reporting on information over and in information networks, global information networks, individual workstations, personal computers, software, e-mail, and workgroup communications; Downloadable software in the nature of a mobile application for simulating phishing attacks, and reviewing and managing educational quizzes, tests, and employee training results; Downloadable computer software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; Downloadable computer software for providing security assessments of information systems and human susceptibility to malicious software and communications attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; Downloadable computer software for computer security risk and threat analysis, assessment, and management; Downloadable computer software for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing training modules to software users who demonstrate susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs for information systems security education and training; Downloadable computer software for cybersecurity training and reporting purposes, namely, to train employees and others how to identify, report, and avoid cybersecurity threats; Downloadable computer software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; Downloadable computer software for detecting, blocking, and reporting on information over and in information networks, global information networks, individual workstations, personal computers, software, e-mail, and workgroup communications |
Goods and Services | Computer security consultancy in the field of computer security, network security, network security protocols, and cybersecurity; Computer services, namely, Software-as-a-Service services featuring software for online videos, online games, online seminars, online trainings, in-person seminars, in-person trainings in the field of providing internet security in the form of integrated security awareness training as well as simulated attacks to assess vulnerabilities; Providing temporary use of on-line non-downloadable software for security awareness training, simulation of security attacks, and vulnerability assessments; Computer services, namely, providing application service provider services featuring application programming interface (API) software for interfaces for customized searching, detecting, blocking, filtering, tagging, compiling, indexing, analyzing information, and reporting on information over and in information networks, global information networks, individual workstations, personal computers, software, e-mail, and work group communications; software as a service (SaaS), namely, providing temporary use of non-downloadable software used to maintain security over or in computer networks, web applications and digital data; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing network, Internet, and computer security; software as a service (SaaS), namely, providing temporary use of non-downloadable software for emulating attack methods used by computer hackers; software as a service (SaaS), namely, providing temporary use of non-downloadable software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing security assessments of information systems and human susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; software as a service (SaaS), namely, providing temporary use of non-downloadable software for computer security risk and threat analysis, assessment, and management; software as a service (SaaS), namely, providing temporary use of nondownloadable software for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing training modules to software users who demonstrate susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs for information systems security education and training; software as a service (SaaS), namely, providing temporary use of non-downloadable software for cybersecurity training and reporting purposes, namely, to train employees and others how to identify, report, and avoid cybersecurity threats; software as a service (SaaS), namely, providing temporary use of non-downloadable software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; Providing temporary use of non-downloadable software for searching, detecting, blocking, filtering, tagging, compiling, indexing, analyzing, and reporting on information over and in information networks, global information networks, individual workstations, personal computers, software, e-mail, and workgroup communications for use with a mobile application; providing temporary use of non-downloadable software for simulating phishing attacks, and reviewing and managing educational quizzes, tests, and employee training results for use with a mobile application |
International Class | 009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus. |
US Class Codes | 021, 023, 026, 036, 038 |
Class Status Code | 6 - Active |
Class Status Date | Wednesday, March 11, 2020 |
Primary Code | 009 |
First Use Anywhere Date | NOT AVAILABLE |
First Use In Commerce Date | NOT AVAILABLE |
International Class | 041 - Education; providing of training; entertainment; sporting and cultural activities. |
US Class Codes | 100, 101, 107 |
Class Status Code | 6 - Active |
Class Status Date | Wednesday, March 11, 2020 |
Primary Code | 041 |
First Use Anywhere Date | NOT AVAILABLE |
First Use In Commerce Date | NOT AVAILABLE |
International Class | 042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software. |
US Class Codes | 100, 101 |
Class Status Code | 6 - Active |
Class Status Date | Wednesday, March 11, 2020 |
Primary Code | 042 |
First Use Anywhere Date | NOT AVAILABLE |
First Use In Commerce Date | NOT AVAILABLE |
Party Name | Software 1, LLC |
Party Type | 20 - Owner at Publication |
Legal Entity Type | 16 - Limited Liability Company |
Address | IRVINE, CA 92614 |
Party Name | Software 1, LLC |
Party Type | 10 - Original Applicant |
Legal Entity Type | 16 - Limited Liability Company |
Address | IRVINE, CA 92614 |
Event Date | Event Description |
Monday, October 23, 2023 | ABANDONMENT NOTICE E-MAILED - NO USE STATEMENT FILED |
Monday, October 23, 2023 | ABANDONMENT - NO USE STATEMENT FILED |
Friday, December 30, 2022 | NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED |
Thursday, December 29, 2022 | SOU EXTENSION 5 GRANTED |
Monday, December 12, 2022 | SOU EXTENSION 5 FILED |
Thursday, December 29, 2022 | CASE ASSIGNED TO INTENT TO USE PARALEGAL |
Monday, December 12, 2022 | SOU TEAS EXTENSION RECEIVED |
Saturday, September 3, 2022 | NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED |
Thursday, September 1, 2022 | SOU EXTENSION 4 GRANTED |
Thursday, September 1, 2022 | SOU EXTENSION 4 FILED |
Thursday, September 1, 2022 | SOU TEAS EXTENSION RECEIVED |
Saturday, February 26, 2022 | NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED |
Thursday, February 24, 2022 | SOU EXTENSION 3 GRANTED |
Thursday, February 24, 2022 | SOU EXTENSION 3 FILED |
Thursday, February 24, 2022 | SOU TEAS EXTENSION RECEIVED |
Friday, September 24, 2021 | NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED |
Wednesday, September 22, 2021 | SOU EXTENSION 2 GRANTED |
Wednesday, September 22, 2021 | SOU EXTENSION 2 FILED |
Wednesday, September 22, 2021 | SOU TEAS EXTENSION RECEIVED |
Tuesday, March 9, 2021 | NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED |
Friday, March 5, 2021 | SOU EXTENSION 1 GRANTED |
Friday, March 5, 2021 | SOU EXTENSION 1 FILED |
Friday, March 5, 2021 | SOU TEAS EXTENSION RECEIVED |
Tuesday, September 22, 2020 | NOA E-MAILED - SOU REQUIRED FROM APPLICANT |
Tuesday, July 28, 2020 | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED |
Tuesday, July 28, 2020 | PUBLISHED FOR OPPOSITION |
Wednesday, July 8, 2020 | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED |
Tuesday, June 23, 2020 | APPROVED FOR PUB - PRINCIPAL REGISTER |
Wednesday, June 17, 2020 | TEAS/EMAIL CORRESPONDENCE ENTERED |
Wednesday, June 17, 2020 | CORRESPONDENCE RECEIVED IN LAW OFFICE |
Wednesday, June 17, 2020 | TEAS RESPONSE TO OFFICE ACTION RECEIVED |
Tuesday, June 2, 2020 | NOTIFICATION OF NON-FINAL ACTION E-MAILED |
Tuesday, June 2, 2020 | NON-FINAL ACTION E-MAILED |
Tuesday, June 2, 2020 | NON-FINAL ACTION WRITTEN |
Monday, May 25, 2020 | ASSIGNED TO EXAMINER |
Wednesday, March 11, 2020 | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED |
Monday, March 9, 2020 | NEW APPLICATION ENTERED |