FF Trademark

Trademark Overview


On Thursday, September 9, 2021, a trademark application was filed for FF with the United States Patent and Trademark Office. The USPTO has given the FF trademark a serial number of 97020482. The federal status of this trademark filing is ABANDONED - NO STATEMENT OF USE FILED as of Monday, October 30, 2023. This trademark is owned by Bracket F, Inc.. The FF trademark is filed in the Computer & Software Products & Electrical & Scientific Products, Advertising, Business and Retail Services, Communication Services, and Computer & Software Services & Scientific Services categories with the following description:

Downloadable computer software for performing security, threat, and risk-management assessments, analyses, and investigations; computer hardware for performing security, threat, and risk-management assessments, analyses, and investigations; downloadable computer software, namely, software for management of security breach incidents and responses; downloadable computer software, namely, software for the protection of digital assets from cyber warfare, computer hacking, and computer viruses; downloadable computer software, namely, software to monitor and collect systems and network data; computer hardware, namely, hardware to monitor and collect systems and network data; downloadable computer software for the collection, analysis, storage, management, manipulation, and processing of multi-source information and data; downloadable computer software for data analytics and databases; recorded computer databases in the field of computer software protection, security threat assessment and thr...

Providing access to computer databases; providing access to computer databases for use by governments, government entities, government agencies, and government contractors

Providing an online searchable database featuring business information; providing on online searchable database featuring business information for use by governments, government entities, government agencies, and government contractors

Providing and hosting a secure electronic online system featuring technology that allows cyber surveillance to assist in providing defense against data breaches and privacy violations; computer security consultancy in the fields of scanning and penetration testing of computers and networks to assess information security vulnerability; security information services, namely, customized computer security platforms that provide real-time analysis of security alerts generated by network hardware and software, namely, platform as a services (PAAS) featuring computer software platforms for computer security; computer security consultancy; computer software testing to identify security vulnerability; computer forensic services; computer security consulting services in the field of maintaining the security and integrity of databases; computer network security services and communications network security services in the nature of network intrusion protection testing, computer testing for vulnera...
ff

General Information


Serial Number97020482
Word MarkFF
Filing DateThursday, September 9, 2021
Status606 - ABANDONED - NO STATEMENT OF USE FILED
Status DateMonday, October 30, 2023
Registration Number0000000
Registration DateNOT AVAILABLE
Mark Drawing3000 - Illustration: Drawing or design which also includes word(s) / letter(s) / number(s)
Published for Opposition DateTuesday, August 2, 2022

Trademark Statements


Description of MarkThe mark consists of two interlocking letter "F"s, one right side up with the other upside down, surrounded by three black rectangles on the top, bottom, and left side.
Goods and ServicesDownloadable computer software for performing security, threat, and risk-management assessments, analyses, and investigations; computer hardware for performing security, threat, and risk-management assessments, analyses, and investigations; downloadable computer software, namely, software for management of security breach incidents and responses; downloadable computer software, namely, software for the protection of digital assets from cyber warfare, computer hacking, and computer viruses; downloadable computer software, namely, software to monitor and collect systems and network data; computer hardware, namely, hardware to monitor and collect systems and network data; downloadable computer software for the collection, analysis, storage, management, manipulation, and processing of multi-source information and data; downloadable computer software for data analytics and databases; recorded computer databases in the field of computer software protection, security threat assessment and threat actor identification, pursuit, and deterrence, cybersecurity, computer security, information security, data security, data breach, identity theft, and fraud risk-management and assessment, and encryption technology recorded on computer media; downloadable computer software for creating searchable databases of information and data; downloadable computer software for scanning, detecting, removing and preventing viruses, worms, Trojan horses, adware, spyware, and other malware in the field of computer software protection; computers and computer hardware; downloadable operating software in the nature of computer software for scanning, detecting, removing and preventing viruses, worms, Trojan horses, adware, spyware, and other malware in the field of computer software protection; downloadable computer operating software; downloadable computer software for monitoring and analysis, namely, for scanning, detecting, removing and preventing viruses, worms, Trojan horses, adware, spyware, and other malware; downloadable computer software for use in monitoring use of computers for security purposes; downloadable computer software for use in accessing databases on the global computer network; downloadable computer software for the detection and removal of computer viruses and threats; downloadable computer software for encrypting and authenticating data; downloadable computer software for detecting and repairing computer software and hardware problems; downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; downloadable computer optimization software for the protection and running of computer hardware; downloadable computer software for performing security, threat, and risk-management assessments, analyses, and investigations for use by governments, government entities, government agencies, and government contractors; computer hardware for performing security, threat, and risk-management assessments, analyses, and investigations for use by governments, government entities, government agencies, and government contractors; downloadable computer software, namely, software for management of security breach incidents and responses for use by governments, government entities, government agencies, and government contractors; downloadable computer software, namely, software for the protection of digital assets from cyber warfare, computer hacking, and computer viruses for use by governments, government entities, government agencies, and government contractors; downloadable computer software, namely, software to monitor and collect systems and network data for use by governments, government entities, government agencies, and government contractors; computer hardware, namely, hardware to monitor and collect systems and network data for use by governments, government entities, government agencies, and government contractors; downloadable computer software for data analytics and databases for use by governments, government entities, government agencies, and government contractors; recorded computer databases in the field of computer software protection, security threat assessment and threat actor identification, pursuit, and deterrence, cybersecurity, computer security, information security, data security, data breach, identity theft, and fraud risk-management and assessment, and encryption technology recorded on computer media for use by governments, government entities, government agencies, and government contractors; downloadable computer software for scanning, detecting, removing and preventing viruses, worms, Trojan horses, adware, spyware, and other malware in the field of computer software protection for use by governments, government entities, government agencies, and government contractors; computers and computer hardware for use by governments, government entities, government agencies, and government contractors; downloadable operating software in the nature of computer software for scanning, detecting, removing and preventing viruses, worms, Trojan horses, adware, spyware, and other malware in the field of computer software protection for use by governments, government entities, government agencies, and government contractors; downloadable computer operating software for use by governments, government entities, government agencies, and government contractors; downloadable computer software for monitoring and analysis, namely, for scanning, detecting, removing and preventing viruses, worms, Trojan horses, adware, spyware, and other malware for use by governments, government entities, government agencies, and government contractors; downloadable computer software for use in monitoring use of computers for security purposes for use by governments, government entities, government agencies, and government contractors; downloadable computer software for use in accessing databases on the global computer network for use by governments, government entities, government agencies, and government contractors; downloadable computer software for the detection and removal of computer viruses and threats for use by governments, government entities, government agencies, and government contractors; downloadable computer software for encrypting and authenticating data for use by governments, government entities, government agencies, and government contractors; downloadable computer software for detecting and repairing computer software and hardware problems for use by governments, government entities, government agencies, and government contractors; downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware for use by governments, government entities, government agencies, and government contractors; downloadable computer optimization software for the protection and running of computer hardware for use by governments, government entities, government agencies, and government contractors
Goods and ServicesProviding access to computer databases; providing access to computer databases for use by governments, government entities, government agencies, and government contractors
Goods and ServicesProviding an online searchable database featuring business information; providing on online searchable database featuring business information for use by governments, government entities, government agencies, and government contractors
Goods and ServicesProviding and hosting a secure electronic online system featuring technology that allows cyber surveillance to assist in providing defense against data breaches and privacy violations; computer security consultancy in the fields of scanning and penetration testing of computers and networks to assess information security vulnerability; security information services, namely, customized computer security platforms that provide real-time analysis of security alerts generated by network hardware and software, namely, platform as a services (PAAS) featuring computer software platforms for computer security; computer security consultancy; computer software testing to identify security vulnerability; computer forensic services; computer security consulting services in the field of maintaining the security and integrity of databases; computer network security services and communications network security services in the nature of network intrusion protection testing, computer testing for vulnerability management and assessment, risk management and assessment, data breach threat analysis, network threat analysis; computer and network incident response and forensics and penetration testing; computer security consulting services in the field of critical incident response to information, computer, and internet security breaches; computer security consulting services intended to identify, pursue, and deter threat actors; computer software development, design, and implementation services in the field of security for computers and computer networks; computer systems analysis in the field of security for computers and computer networks; computer consultation regarding computer networks and internal computer networks and security services for computer networks and internal computer networks, namely, installation, design and customization; computer consulting services in the field of security integration, network security, encryption technology, and computer security; software as a service (SAAS) services featuring software for use in scanning networks and websites to detect and identify vulnerabilities and malware; computer programming of internet security programs; design and development of computer software programs for Internet security; computer software research; computer software installation; computer software design; computer software development; computer software consultancy services; data security services, namely, design and development of internet security software and electronic data security systems; design and development of electronic data security systems; updating of computer software relating to computer security and prevention of computer risks and risk management; maintenance of computer software relating to computer security and prevention of computer risks and risk management; development of technologies, namely, computer software development for scanning, detecting, removing and preventing viruses, worms, Trojan horses, adware, spyware, and other malware for the protection of electronic networks; providing technical information and technical advisory services related to computer software, computer networks, computer and data security, network security, computer security integration, and encryption technology; fraud and identity theft protection services, namely, accessing, scanning and monitoring of reports, the Internet, public records, and computer activity and accounts to facilitate the detection and prevention of data breaches, identity theft and fraud; monitoring of computer systems for detecting unauthorized access or data breach; Data security consultancy in the fields of data breach, identity theft and fraud risk-management and assessment services, fraud detection, and data breach response, threat assessment and simulation, vulnerability analysis and mitigation, and emergency response; Data security consultancy in the field of security threat assessment and threat actor identification, pursuit, and deterrence; monitoring of computer systems, and data network systems, and the Internet for security and risk assessment purposes, namely, detecting unauthorized access or data breach; electronic monitoring services for security purposes in the field of computer and internet services, namely, monitoring of computer systems for detecting unauthorized access or data breach; providing and hosting a secure electronic online system featuring technology that allows cyber surveillance to assist in providing defense against data breaches and privacy violations for use by governments, government entities, government agencies, and government contractors; computer security consultancy in the fields of scanning and penetration testing of computers and networks to assess information security vulnerability for governments, government entities, government agencies, and government contractors; security information services, namely, customized computer security platforms that provide real-time analysis of security alerts generated by network hardware and software, namely, platform as a services (PAAS) featuring computer software platforms for computer security for use by governments, government entities, government agencies, and government contractors; computer security consultancy for governments, government entities, government agencies, and government contractors; computer software testing to identify security vulnerability for governments, government entities, government agencies, and government contractors; computer forensic services for governments, government entities, government agencies, and government contractors; computer security consulting services in the field of maintaining the security and integrity of databases for governments, government entities, government agencies, and government contractors; computer network security services and communications network security services in the nature of network intrusion protection testing, computer testing for vulnerability management and assessment, risk management and assessment, data breach threat analysis, network threat analysis for governments, government entities, government agencies, and government contractors; computer and network incident response and forensics and penetration testing for governments, government entities, government agencies, and government contractors for governments, government entities, government agencies, and government contractors; computer security consulting services in the field of critical incident response to information, computer, and internet security breaches for governments, government entities, government agencies, and government contractors; computer security consulting services intended to identify, pursue, and deter threat actors for governments, government entities, government agencies, and government contractors; computer software development, design, and implementation services in the field of security for computers and computer networks for governments, government entities, government agencies, and government contractors; computer systems analysis in the field of security for computers and computer networks for governments, government entities, government agencies, and government contractors; computer consultation regarding computer networks and internal computer networks and security services for computer networks and internal computer networks, namely, installation, design and customization for governments, government entities, government agencies, and government contractors; computer consulting services in the field of security integration, network security, encryption technology, and computer security for governments, government entities, government agencies, and government contractors; software as a service (SAAS) services featuring software for use in scanning networks and websites to detect and identify vulnerabilities and malware for governments, government entities, government agencies, and government contractors; computer programming of internet security programs for governments, government entities, government agencies, and government contractors; design and development of computer software programs for Internet security for governments, government entities, government agencies, and government contractors; computer software research for governments, government entities, government agencies, and government contractors; computer software installation for governments, government entities, government agencies, and government contractors; computer software design for governments, government entities, government agencies, and government contractors; computer software development for governments, government entities, government agencies, and government contractors; computer software consultancy services for governments, government entities, government agencies, and government contractors; data security services, namely, design and development of internet security software and electronic data security systems for governments, government entities, government agencies, and government contractors; design and development of electronic data security systems for governments, government entities, government agencies, and government contractors; updating of computer software relating to computer security and prevention of computer risks and risk management for governments, government entities, government agencies, and government contractors; maintenance of computer software relating to computer security and prevention of computer risks and risk management for governments, government entities, government agencies, and government contractors; development of technologies, namely, computer software development for scanning, detecting, removing and preventing viruses, worms, Trojan horses, adware, spyware, and other malware for the protection of electronic networks for governments, government entities, government agencies, and government contractors; providing technical information and technical advisory services related to computer software, computer networks, computer and data security, network security, computer security integration, and encryption technology for governments, government entities, government agencies, and government contractors; monitoring of computer systems for detecting unauthorized access or data breach for governments, government entities, government agencies, and government contractors; monitoring of computer systems, and data network systems, and the Internet for security and risk assessment purposes, namely, detecting unauthorized access or data breach for governments, government entities, government agencies, and government contractors; electronic monitoring services for security purposes in the field of computer and internet services, namely, monitoring of computer systems for detecting unauthorized access or data breach for governments, government entities, government agencies, and government contractors

Classification Information


International Class009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus.
US Class Codes021, 023, 026, 036, 038
Class Status Code6 - Active
Class Status DateTuesday, October 19, 2021
Primary Code009
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class035 - Advertising; business management; business administration; office functions.
US Class Codes100, 101, 102
Class Status Code6 - Active
Class Status DateTuesday, October 19, 2021
Primary Code035
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class038 - Services allowing people to communicate with another by a sensory means.
US Class Codes100, 101, 104
Class Status Code6 - Active
Class Status DateTuesday, October 19, 2021
Primary Code038
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateTuesday, October 19, 2021
Primary Code042
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

Trademark Owner History


Party NameBracket F, Inc.
Party Type20 - Owner at Publication
Legal Entity Type03 - Corporation
AddressElkridge, MD 21075

Party NameBracket F, Inc.
Party Type10 - Original Applicant
Legal Entity Type03 - Corporation
AddressElkridge, MD 21075

Trademark Events


Event DateEvent Description
Monday, October 30, 2023ABANDONMENT NOTICE E-MAILED - NO USE STATEMENT FILED
Monday, October 30, 2023ABANDONMENT - NO USE STATEMENT FILED
Friday, March 17, 2023NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED
Wednesday, March 15, 2023SOU EXTENSION 1 GRANTED
Wednesday, March 15, 2023SOU EXTENSION 1 FILED
Wednesday, March 15, 2023SOU TEAS EXTENSION RECEIVED
Tuesday, September 27, 2022NOA E-MAILED - SOU REQUIRED FROM APPLICANT
Tuesday, August 2, 2022OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
Tuesday, August 2, 2022PUBLISHED FOR OPPOSITION
Wednesday, July 13, 2022NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
Friday, June 24, 2022APPROVED FOR PUB - PRINCIPAL REGISTER
Thursday, June 23, 2022EXAMINER'S AMENDMENT ENTERED
Thursday, June 23, 2022NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED
Thursday, June 23, 2022EXAMINERS AMENDMENT E-MAILED
Thursday, June 23, 2022EXAMINERS AMENDMENT -WRITTEN
Monday, June 13, 2022ASSIGNED TO EXAMINER
Thursday, April 28, 2022TEAS CHANGE OF CORRESPONDENCE RECEIVED
Thursday, April 28, 2022TEAS WITHDRAWAL OF ATTORNEY RECEIVED-FIRM RETAINS
Thursday, April 28, 2022ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED
Thursday, April 28, 2022TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED
Wednesday, October 20, 2021NOTICE OF DESIGN SEARCH CODE E-MAILED
Tuesday, October 19, 2021NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Monday, September 13, 2021NEW APPLICATION ENTERED