EPHISHINT Trademark

Trademark Overview


On Thursday, March 5, 2020, a trademark application was filed for EPHISHINT with the United States Patent and Trademark Office. The USPTO has given the EPHISHINT trademark a serial number of 88823211. The federal status of this trademark filing is ABANDONED - NO STATEMENT OF USE FILED as of Monday, October 23, 2023. This trademark is owned by Software 1, LLC. The EPHISHINT trademark is filed in the Computer & Software Products & Electrical & Scientific Products, Education & Entertainment Services, and Computer & Software Services & Scientific Services categories with the following description:

Training services in the field of security awareness for the prevention of security breaches targeting protected information and access to infrastructure; Training services in the field of security awareness training, simulation of security attacks, and vulnerability assessments for employer implementation of security awareness to employees offered via online videos, online games, online seminars, online trainings, in-person seminars, in-person trainings

Downloadable computer software for providing security awareness training and tools to assist in IT risk management and regulatory compliance, simulation of security attacks, and vulnerability assessments to collect data on user responses in order to assess user training necessities and test user training progress; Downloadable multimedia files containing videos, text, images, and audio relating to security awareness training for the prevention of security breaches targeting protected information and access to infrastructure; Downloadable software in the nature of a mobile application for use in the field of cyber security that allows users to upload, post, download, manage, access, display, and edit digital content; Downloadable computer software for searching, detecting, blocking, filtering, tagging, compiling, indexing, analyzing, and reporting on information over and in information networks, global information networks, individual workstations, personal computers, software, e-mail, ...

Computer security consultancy in the field of computer security, network security, network security protocols, and cybersecurity; Computer services, namely, Software-as-a-Service services featuring software for online videos, online games, online seminars, online trainings, in-person seminars, in-person trainings in the field of providing internet security in the form of integrated security awareness training as well as simulated attacks to assess vulnerabilities; Providing temporary use of on-line non-downloadable software for security awareness training, simulation of security attacks, and vulnerability assessments; Computer services, namely, providing application service provider services featuring application programming interface (API) software for interfaces for customized searching, detecting, blocking, filtering, tagging, compiling, indexing, analyzing information, and reporting on information over and in information networks, global information networks, individual workstation...
ephishint

General Information


Serial Number88823211
Word MarkEPHISHINT
Filing DateThursday, March 5, 2020
Status606 - ABANDONED - NO STATEMENT OF USE FILED
Status DateMonday, October 23, 2023
Registration Number0000000
Registration DateNOT AVAILABLE
Mark Drawing4000 - Illustration: Drawing with word(s) / letter(s) / number(s) in Block form
Published for Opposition DateTuesday, July 28, 2020

Trademark Statements


Goods and ServicesTraining services in the field of security awareness for the prevention of security breaches targeting protected information and access to infrastructure; Training services in the field of security awareness training, simulation of security attacks, and vulnerability assessments for employer implementation of security awareness to employees offered via online videos, online games, online seminars, online trainings, in-person seminars, in-person trainings
Goods and ServicesDownloadable computer software for providing security awareness training and tools to assist in IT risk management and regulatory compliance, simulation of security attacks, and vulnerability assessments to collect data on user responses in order to assess user training necessities and test user training progress; Downloadable multimedia files containing videos, text, images, and audio relating to security awareness training for the prevention of security breaches targeting protected information and access to infrastructure; Downloadable software in the nature of a mobile application for use in the field of cyber security that allows users to upload, post, download, manage, access, display, and edit digital content; Downloadable computer software for searching, detecting, blocking, filtering, tagging, compiling, indexing, analyzing, and reporting on information over and in information networks, global information networks, individual workstations, personal computers, software, e-mail, and workgroup communications; downloadable computer software used to maintain security over or in computer networks, web applications and digital data; Downloadable computer software for providing network, Internet, and computer security; downloadable computer software for emulating attack methods used by computer hackers; Downloadable software in the nature of a mobile application for searching, detecting, blocking, filtering, tagging, compiling, indexing, analyzing, and reporting on information over and in information networks, global information networks, individual workstations, personal computers, software, e-mail, and workgroup communications; Downloadable software in the nature of a mobile application for simulating phishing attacks, and reviewing and managing educational quizzes, tests, and employee training results; Downloadable computer software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; Downloadable computer software for providing security assessments of information systems and human susceptibility to malicious software and communications attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; Downloadable computer software for computer security risk and threat analysis, assessment, and management; Downloadable computer software for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing training modules to software users who demonstrate susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs for information systems security education and training; Downloadable computer software for cybersecurity training and reporting purposes, namely, to train employees and others how to identify, report, and avoid cybersecurity threats; Downloadable computer software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; Downloadable computer software for detecting, blocking, and reporting on information over and in information networks, global information networks, individual workstations, personal computers, software, e-mail, and workgroup communications
Goods and ServicesComputer security consultancy in the field of computer security, network security, network security protocols, and cybersecurity; Computer services, namely, Software-as-a-Service services featuring software for online videos, online games, online seminars, online trainings, in-person seminars, in-person trainings in the field of providing internet security in the form of integrated security awareness training as well as simulated attacks to assess vulnerabilities; Providing temporary use of on-line non-downloadable software for security awareness training, simulation of security attacks, and vulnerability assessments; Computer services, namely, providing application service provider services featuring application programming interface (API) software for interfaces for customized searching, detecting, blocking, filtering, tagging, compiling, indexing, analyzing information, and reporting on information over and in information networks, global information networks, individual workstations, personal computers, software, e-mail, and work group communications; software as a service (SaaS), namely, providing temporary use of non-downloadable software used to maintain security over or in computer networks, web applications and digital data; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing network, Internet, and computer security; software as a service (SaaS), namely, providing temporary use of non-downloadable software for emulating attack methods used by computer hackers; software as a service (SaaS), namely, providing temporary use of non-downloadable software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; software as a service (SaaS), namely, providing temporary use of non-downloadable software for providing security assessments of information systems and human susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs; software as a service (SaaS), namely, providing temporary use of non-downloadable software for computer security risk and threat analysis, assessment, and management; software as a service (SaaS), namely, providing temporary use of nondownloadable software for emulating attack methods used by computer hackers, measuring the metrics and performance of software users, and providing training modules to software users who demonstrate susceptibility to malicious electronic mail attempting to obtain confidential information or deliver malware or other unauthorized software, data or programs for information systems security education and training; software as a service (SaaS), namely, providing temporary use of non-downloadable software for cybersecurity training and reporting purposes, namely, to train employees and others how to identify, report, and avoid cybersecurity threats; software as a service (SaaS), namely, providing temporary use of non-downloadable software for use in measuring security awareness, email security awareness and susceptibility to phishing attacks, enterprise risk assessment and management, IT risk assessment and management, and compliance risk assessment and management; Providing temporary use of non-downloadable software for searching, detecting, blocking, filtering, tagging, compiling, indexing, analyzing, and reporting on information over and in information networks, global information networks, individual workstations, personal computers, software, e-mail, and workgroup communications for use with a mobile application; providing temporary use of non-downloadable software for simulating phishing attacks, and reviewing and managing educational quizzes, tests, and employee training results for use with a mobile application

Classification Information


International Class009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus.
US Class Codes021, 023, 026, 036, 038
Class Status Code6 - Active
Class Status DateWednesday, March 11, 2020
Primary Code009
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class041 - Education; providing of training; entertainment; sporting and cultural activities.
US Class Codes100, 101, 107
Class Status Code6 - Active
Class Status DateWednesday, March 11, 2020
Primary Code041
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateWednesday, March 11, 2020
Primary Code042
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

Trademark Owner History


Party NameSoftware 1, LLC
Party Type20 - Owner at Publication
Legal Entity Type16 - Limited Liability Company
AddressIRVINE, CA 92614

Party NameSoftware 1, LLC
Party Type10 - Original Applicant
Legal Entity Type16 - Limited Liability Company
AddressIRVINE, CA 92614

Trademark Events


Event DateEvent Description
Monday, October 23, 2023ABANDONMENT NOTICE E-MAILED - NO USE STATEMENT FILED
Monday, October 23, 2023ABANDONMENT - NO USE STATEMENT FILED
Friday, December 30, 2022NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED
Thursday, December 29, 2022SOU EXTENSION 5 GRANTED
Monday, December 12, 2022SOU EXTENSION 5 FILED
Thursday, December 29, 2022CASE ASSIGNED TO INTENT TO USE PARALEGAL
Monday, December 12, 2022SOU TEAS EXTENSION RECEIVED
Saturday, September 3, 2022NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED
Thursday, September 1, 2022SOU EXTENSION 4 GRANTED
Thursday, September 1, 2022SOU EXTENSION 4 FILED
Thursday, September 1, 2022SOU TEAS EXTENSION RECEIVED
Saturday, February 26, 2022NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED
Thursday, February 24, 2022SOU EXTENSION 3 GRANTED
Thursday, February 24, 2022SOU EXTENSION 3 FILED
Thursday, February 24, 2022SOU TEAS EXTENSION RECEIVED
Friday, September 24, 2021NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED
Wednesday, September 22, 2021SOU EXTENSION 2 GRANTED
Wednesday, September 22, 2021SOU EXTENSION 2 FILED
Wednesday, September 22, 2021SOU TEAS EXTENSION RECEIVED
Tuesday, March 9, 2021NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED
Friday, March 5, 2021SOU EXTENSION 1 GRANTED
Friday, March 5, 2021SOU EXTENSION 1 FILED
Friday, March 5, 2021SOU TEAS EXTENSION RECEIVED
Tuesday, September 22, 2020NOA E-MAILED - SOU REQUIRED FROM APPLICANT
Tuesday, July 28, 2020OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
Tuesday, July 28, 2020PUBLISHED FOR OPPOSITION
Wednesday, July 8, 2020NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
Tuesday, June 23, 2020APPROVED FOR PUB - PRINCIPAL REGISTER
Wednesday, June 17, 2020TEAS/EMAIL CORRESPONDENCE ENTERED
Wednesday, June 17, 2020CORRESPONDENCE RECEIVED IN LAW OFFICE
Wednesday, June 17, 2020TEAS RESPONSE TO OFFICE ACTION RECEIVED
Tuesday, June 2, 2020NOTIFICATION OF NON-FINAL ACTION E-MAILED
Tuesday, June 2, 2020NON-FINAL ACTION E-MAILED
Tuesday, June 2, 2020NON-FINAL ACTION WRITTEN
Monday, May 25, 2020ASSIGNED TO EXAMINER
Wednesday, March 11, 2020NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Monday, March 9, 2020NEW APPLICATION ENTERED