HIDE YOUR ENTERPRISE FROM THE ENEMY Trademark

Trademark Overview


On Wednesday, February 3, 2016, a trademark application was filed for HIDE YOUR ENTERPRISE FROM THE ENEMY with the United States Patent and Trademark Office. The USPTO has given the HIDE YOUR ENTERPRISE FROM THE ENEMY trademark a serial number of 86896484. The federal status of this trademark filing is ABANDONED - NO STATEMENT OF USE FILED as of Monday, June 24, 2019. This trademark is owned by StealthPath LLC. The HIDE YOUR ENTERPRISE FROM THE ENEMY trademark is filed in the Computer & Software Products & Electrical & Scientific Products, Education & Entertainment Services, and Computer & Software Services & Scientific Services categories with the following description:

Computer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, bootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, worms, cyber-attacks, malicious attacks, and advanced persistent threats; computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in, computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer software and hardware providing secure networks over virtual computer systems and virtual computer environments; Industrial firewalls, namely, hardware and embedded software used for monitoring industrial network security; computer networks and platforms, comprising computer hardware, computer network adapters, switches, routers and hubs, and computer firmware and computer software, for enhancing industrial automation and for assessing and identifying vulnerabili...

Training in the use and operation of computer software and computer hardware

Computer services, namely, designing and implementing cyber security and privacy requirements and protocols in information technology systems for others; Information technology consulting services; Maintenance of computer software relating to computer security and prevention of computer risks; Planning, design and implementation of computer technologies for others; Updating of computer software relating to computer security and prevention of computer risks; Software as a service (SAAS) services featuring software for use in detecting, reporting, analyzing and eliminating cyber incidents, such as malware, unauthorized software and network attacks; Software as a service (SAAS) services featuring software for use in identification, acquisition, storage, encryption, management, manipulation, analysis and reporting of security breach events relating to computer and computer network data, metadata, data files, and information; Software as a service (SAAS) services featuring software for use ...
hide your enterprise from the enemy

General Information


Serial Number86896484
Word MarkHIDE YOUR ENTERPRISE FROM THE ENEMY
Filing DateWednesday, February 3, 2016
Status606 - ABANDONED - NO STATEMENT OF USE FILED
Status DateMonday, June 24, 2019
Registration Number0000000
Registration DateNOT AVAILABLE
Mark Drawing4000 - Illustration: Drawing with word(s) / letter(s) / number(s) in Block form
Published for Opposition DateTuesday, September 26, 2017

Trademark Statements


Goods and ServicesComputer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, bootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, worms, cyber-attacks, malicious attacks, and advanced persistent threats; computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in, computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer software and hardware providing secure networks over virtual computer systems and virtual computer environments; Industrial firewalls, namely, hardware and embedded software used for monitoring industrial network security; computer networks and platforms, comprising computer hardware, computer network adapters, switches, routers and hubs, and computer firmware and computer software, for enhancing industrial automation and for assessing and identifying vulnerabilities and cyber security threats and risks in control system infrastructure, computer control systems, networks and devices, and for testing the effectiveness of cyber security applications, devices, and systems to achieve optimal network security, all in the field of cyber security vulnerability testing and prevention; Computer hardware with embedded software, namely, firmware, and software for assessing and identifying vulnerabilities and cyber security threats and risks in control system infrastructure, computer control systems, networks and devices, and testing the effectiveness of cyber security applications and devices and systems to achieve optimal device and network security, in the field of cyber security vulnerability testing and prevention of networked devices; Computer hardware in the field of cyber security vulnerability testing and prevention of networked devices
Goods and ServicesTraining in the use and operation of computer software and computer hardware
Goods and ServicesComputer services, namely, designing and implementing cyber security and privacy requirements and protocols in information technology systems for others; Information technology consulting services; Maintenance of computer software relating to computer security and prevention of computer risks; Planning, design and implementation of computer technologies for others; Updating of computer software relating to computer security and prevention of computer risks; Software as a service (SAAS) services featuring software for use in detecting, reporting, analyzing and eliminating cyber incidents, such as malware, unauthorized software and network attacks; Software as a service (SAAS) services featuring software for use in identification, acquisition, storage, encryption, management, manipulation, analysis and reporting of security breach events relating to computer and computer network data, metadata, data files, and information; Software as a service (SAAS) services featuring software for use in secure cross-enterprise data collaboration, workflow auditing and reporting, data management and sharing, identity management, access control, and data backup and recovery; Computer consultation in the field of computer security; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Scientific and technological services, namely, research and design in the field of cyber security; Consulting services in the field of cyber security; Platform as a service (PAAS) featuring computer software platforms used for monitoring industrial network security; Consulting services in the field of testing and assessing networked devices for cyber security vulnerabilities and risks; Computer consultation in the field of cyber security, namely, providing approvals that minimum security levels have been achieved in the field of cyber security vulnerability testing of networked devices; technical support services, namely, troubleshooting in the nature of the repair of computer hardware; technical support services, namely, troubleshooting of computer software problems in connection with the goods listed in class 009

Classification Information


International Class009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus.
US Class Codes021, 023, 026, 036, 038
Class Status Code6 - Active
Class Status DateMonday, February 8, 2016
Primary Code009
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class041 - Education; providing of training; entertainment; sporting and cultural activities.
US Class Codes100, 101, 107
Class Status Code6 - Active
Class Status DateSaturday, August 19, 2017
Primary Code041
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateMonday, February 8, 2016
Primary Code042
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

Trademark Owner History


Party NameSTEALTHPATH INC.
Party Type20 - Owner at Publication
Legal Entity Type03 - Corporation
AddressRESTON, VA 20191

Party NameSTEALTHPATH INC.
Party Type11 - New Owner Before Publication
Legal Entity Type03 - Corporation
AddressRESTON, VA 20191

Party NameStealthPath LLC
Party Type10 - Original Applicant
Legal Entity Type16 - Limited Liability Company
AddressAlexandria, VA 22315

Trademark Events


Event DateEvent Description
Monday, June 24, 2019ABANDONMENT NOTICE E-MAILED - NO USE STATEMENT FILED
Monday, June 24, 2019ABANDONMENT - NO USE STATEMENT FILED
Saturday, October 13, 2018NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED
Thursday, October 11, 2018EXTENSION 2 GRANTED
Thursday, October 11, 2018EXTENSION 2 FILED
Thursday, October 11, 2018TEAS EXTENSION RECEIVED
Thursday, October 11, 2018TEAS CHANGE OF CORRESPONDENCE RECEIVED
Wednesday, May 9, 2018ASSIGNED TO EXAMINER
Thursday, April 12, 2018NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED
Tuesday, April 10, 2018EXTENSION 1 GRANTED
Tuesday, April 10, 2018EXTENSION 1 FILED
Tuesday, April 10, 2018TEAS EXTENSION RECEIVED
Tuesday, April 10, 2018TEAS CHANGE OF CORRESPONDENCE RECEIVED
Tuesday, November 21, 2017NOA E-MAILED - SOU REQUIRED FROM APPLICANT
Tuesday, September 26, 2017OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
Tuesday, September 26, 2017PUBLISHED FOR OPPOSITION
Wednesday, September 6, 2017NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
Monday, August 21, 2017APPROVED FOR PUB - PRINCIPAL REGISTER
Saturday, August 19, 2017TEAS/EMAIL CORRESPONDENCE ENTERED
Friday, August 18, 2017CORRESPONDENCE RECEIVED IN LAW OFFICE
Friday, August 18, 2017TEAS REQUEST FOR RECONSIDERATION RECEIVED
Wednesday, July 19, 2017AUTOMATIC UPDATE OF ASSIGNMENT OF OWNERSHIP
Wednesday, May 3, 2017ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED
Wednesday, May 3, 2017TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED
Wednesday, March 1, 2017NOTIFICATION OF FINAL REFUSAL EMAILED
Wednesday, March 1, 2017FINAL REFUSAL E-MAILED
Wednesday, March 1, 2017FINAL REFUSAL WRITTEN
Thursday, February 9, 2017TEAS/EMAIL CORRESPONDENCE ENTERED
Thursday, February 9, 2017CORRESPONDENCE RECEIVED IN LAW OFFICE
Tuesday, February 7, 2017ASSIGNED TO LIE
Monday, January 23, 2017NOTICE OF REVIVAL - E-MAILED
Monday, January 23, 2017TEAS RESPONSE TO OFFICE ACTION RECEIVED
Monday, January 23, 2017PETITION TO REVIVE-GRANTED
Monday, January 23, 2017TEAS PETITION TO REVIVE RECEIVED
Wednesday, December 21, 2016ABANDONMENT NOTICE MAILED - FAILURE TO RESPOND
Wednesday, December 21, 2016ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE
Wednesday, May 25, 2016NOTIFICATION OF NON-FINAL ACTION E-MAILED
Wednesday, May 25, 2016NON-FINAL ACTION E-MAILED
Wednesday, May 25, 2016NON-FINAL ACTION WRITTEN
Thursday, May 19, 2016ASSIGNED TO EXAMINER
Monday, February 8, 2016NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM
Saturday, February 6, 2016NEW APPLICATION ENTERED IN TRAM