FULL STACK SECURITY Trademark

Trademark Overview


On Friday, June 12, 2015, a trademark application was filed for FULL STACK SECURITY with the United States Patent and Trademark Office. The USPTO has given the FULL STACK SECURITY trademark a serial number of 86661180. The federal status of this trademark filing is ABANDONED - NO STATEMENT OF USE FILED as of Monday, January 23, 2017. This trademark is owned by Barricade Security Systems Limited. The FULL STACK SECURITY trademark is filed in the Computer & Software Products & Electrical & Scientific Products and Computer & Software Services & Scientific Services categories with the following description:

Cyber security software; computer software for monitoring, testing, and tracking computer software, computer hardware, and computer networks relating to security and prevention of cyber risks, threats, events, intrusions, breaches and attacks; computer software for prevention of cyber security risks, threats, events, intrusions, breaches and attacks to computer software, computer hardware, and computer networks; computer software for ensuring the security of computer software, computer hardware, and computer networks; computer software for ensuring the security of IT systems and infrastructure; computer software for ensuring the security of servers; computer software to monitor network traffic and software for prevention of cyber security risks, threats, events, breaches, intrusions and attacks; computer software to track cyber security events, flag and monitor progress of attacks, and alert user of such incidents; computer software to assist and instruct user in understanding, managin...

Software as a service (SAAS) featuring cyber security software; software as a service (SAAS) featuring software for monitoring, testing, and tracking computer software, computer hardware, and computer networks relating to security and prevention of cyber security risks, threats, events, intrusions, breaches and attacks; software as a service (SAAS) featuring software for prevention of cyber security risks, threats, events, intrusions, breaches and attacks to computer software, computer hardware, and computer networks; software as a service (SAAS) featuring software for ensuring the security of computer software, computer hardware, and computer networks; software as a service (SAAS) featuring software for ensuring the security of IT systems and infrastructures; software as a service (SAAS) featuring software for server security; software as a service (SAAS) featuring software to monitor network traffic and software for prevention of cyber security risks, threats, events, breaches, intru...
full stack security

General Information


Serial Number86661180
Word MarkFULL STACK SECURITY
Filing DateFriday, June 12, 2015
Status606 - ABANDONED - NO STATEMENT OF USE FILED
Status DateMonday, January 23, 2017
Registration Number0000000
Registration DateNOT AVAILABLE
Mark Drawing4000 - Illustration: Drawing with word(s) / letter(s) / number(s) in Block form
Published for Opposition DateTuesday, April 26, 2016

Trademark Statements


Disclaimer with Predetermined Text"SECURITY"
Goods and ServicesCyber security software; computer software for monitoring, testing, and tracking computer software, computer hardware, and computer networks relating to security and prevention of cyber risks, threats, events, intrusions, breaches and attacks; computer software for prevention of cyber security risks, threats, events, intrusions, breaches and attacks to computer software, computer hardware, and computer networks; computer software for ensuring the security of computer software, computer hardware, and computer networks; computer software for ensuring the security of IT systems and infrastructure; computer software for ensuring the security of servers; computer software to monitor network traffic and software for prevention of cyber security risks, threats, events, breaches, intrusions and attacks; computer software to track cyber security events, flag and monitor progress of attacks, and alert user of such incidents; computer software to assist and instruct user in understanding, managing, and mitigating cyber security risks, threats, events, intrusions, breaches and attacks; computer software for monitoring computer software, computer hardware, and computer network security to assess information security and network security vulnerability, to provide alerts regarding risks, threats, events, breaches, intrusions, and attacks, and to provide advice and instructions how to handle and address such risks, threats, events breaches, intrusions and attacks; computer software for monitoring IT systems and infrastructure to assess information security and network security vulnerability, to provide alerts regarding risks, threats, events, breaches, intrusions, and attacks, and to provide advice and instructions how to handle and address such risks, threats, events breaches, intrusions and attacks
Goods and ServicesSoftware as a service (SAAS) featuring cyber security software; software as a service (SAAS) featuring software for monitoring, testing, and tracking computer software, computer hardware, and computer networks relating to security and prevention of cyber security risks, threats, events, intrusions, breaches and attacks; software as a service (SAAS) featuring software for prevention of cyber security risks, threats, events, intrusions, breaches and attacks to computer software, computer hardware, and computer networks; software as a service (SAAS) featuring software for ensuring the security of computer software, computer hardware, and computer networks; software as a service (SAAS) featuring software for ensuring the security of IT systems and infrastructures; software as a service (SAAS) featuring software for server security; software as a service (SAAS) featuring software to monitor network traffic and software for prevention of cyber security risks, threats, events, breaches, intrusions and attacks; software as a service (SAAS) featuring software to track cyber security events, flag and monitor progress of attacks, and alert user of such incidents; software as a service (SAAS) featuring software to assist and instruct user in understanding, managing, and mitigating cyber security risks, threats, events, intrusions, breaches and attacks; software as a service (SAAS) featuring software for monitoring computer software, computer hardware, and computer network security to assess information security and network security vulnerability, to provide alerts regarding risks, threats, events, breaches, intrusions, and attacks, and to provide advice and instructions how to handle and address such risks, threats, events breaches, intrusions and attacks; software as a service (SAAS) featuring software for monitoring IT system and infrastructure security to assess information security and network security vulnerability, to provide alerts regarding risks, threats, events, breaches, intrusions, and attacks, and to provide advice and instructions how to handle and address such risks, threats, events breaches, intrusions and attacks; technology consultation in the field of cyber security, computer software security, computer hardware security, computer network security, and IT systems and infrastructure security; cyber risks and security consultancy services

Classification Information


International Class009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus.
US Class Codes021, 023, 026, 036, 038
Class Status Code6 - Active
Class Status DateWednesday, June 17, 2015
Primary Code009
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateWednesday, March 23, 2016
Primary Code042
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

Trademark Owner History


Party NameSOPHOS SECURITY TECHNOLOGY LIMITED
Party Type21 - New Owner After Publication
Legal Entity Type24 - NOT AVAILABLE
AddressDUBLIN
IE

Party NameBarricade Security Systems Limited
Party Type20 - Owner at Publication
Legal Entity Type99 - Other
AddressCork
IE

Party NameBarricade Security Systems Limited
Party Type10 - Original Applicant
Legal Entity Type99 - Other
AddressCork
IE

Trademark Events


Event DateEvent Description
Monday, January 23, 2017ABANDONMENT NOTICE MAILED - NO USE STATEMENT FILED
Monday, January 23, 2017ABANDONMENT - NO USE STATEMENT FILED
Wednesday, December 21, 2016AUTOMATIC UPDATE OF ASSIGNMENT OF OWNERSHIP
Monday, December 19, 2016ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED
Monday, December 19, 2016TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED
Tuesday, June 21, 2016NOA E-MAILED - SOU REQUIRED FROM APPLICANT
Tuesday, April 26, 2016OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
Tuesday, April 26, 2016PUBLISHED FOR OPPOSITION
Wednesday, April 6, 2016NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
Thursday, March 24, 2016LAW OFFICE PUBLICATION REVIEW COMPLETED
Wednesday, March 23, 2016APPROVED FOR PUB - PRINCIPAL REGISTER
Wednesday, March 23, 2016TEAS/EMAIL CORRESPONDENCE ENTERED
Wednesday, March 23, 2016CORRESPONDENCE RECEIVED IN LAW OFFICE
Wednesday, March 16, 2016ASSIGNED TO LIE
Thursday, March 3, 2016TEAS RESPONSE TO OFFICE ACTION RECEIVED
Monday, February 29, 2016NOTIFICATION OF NON-FINAL ACTION E-MAILED
Monday, February 29, 2016NON-FINAL ACTION E-MAILED
Monday, February 29, 2016NON-FINAL ACTION WRITTEN
Saturday, February 27, 2016TEAS/EMAIL CORRESPONDENCE ENTERED
Friday, February 26, 2016CORRESPONDENCE RECEIVED IN LAW OFFICE
Friday, February 26, 2016TEAS RESPONSE TO OFFICE ACTION RECEIVED
Thursday, October 1, 2015NOTIFICATION OF NON-FINAL ACTION E-MAILED
Thursday, October 1, 2015NON-FINAL ACTION E-MAILED
Thursday, October 1, 2015NON-FINAL ACTION WRITTEN
Tuesday, September 22, 2015ASSIGNED TO EXAMINER
Tuesday, September 22, 2015ASSIGNED TO EXAMINER
Wednesday, June 17, 2015NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM
Tuesday, June 16, 2015NEW APPLICATION ENTERED IN TRAM