IMMUTIVERSE Trademark

Trademark Overview


On Saturday, May 25, 2024, a trademark application was filed for IMMUTIVERSE with the United States Patent and Trademark Office. The USPTO has given the IMMUTIVERSE trademark a serial number of 98568895. The federal status of this trademark filing is EX PARTE APPEAL PENDING as of Wednesday, January 28, 2026. This trademark is owned by Immutiverse, Inc.. The IMMUTIVERSE trademark is filed in the Computer & Software Products & Electrical & Scientific Products, Advertising, Business and Retail Services, Treatment & Processing of Materials Services, Education & Entertainment Services, and Computer & Software Services & Scientific Services categories with the following description:

(Based on Intent To Use) Security products, namely, entry door systems comprising touch pads and security doors; Downloadable computer software for implementing engineering analysis of structure against applied loads; Downloadable computer firmware for managing software authenticity and integrity in the field of cybersecurity; Downloadable computer firmware for authenticating software integrity of devices connected to the internet of things, and the systems and networks in which they operate; Downloadable computer firmware for protecting operational technology systems and networks from malware and unauthorized access; Downloadable computer firmware for managing software authenticity and integrity for electronics and protecting operational technology systems and networks for electronics from malware and unauthorized access; Downloadable computer firmware for original equipment manufacturers (OEMs) and their customers for managing software authenticity in the field of cybersecurity; Down...

(Based on Use in Commerce) Computer technology consultancy in the field of cybersecurity; Computer technology consultancy in the field of internet of things; Computer technology consultancy in the field of operational technology; Computer technology consultancy in the field of electronics; Computer technology consultancy in the field of telecommunications; Computer technology consultancy in the field of networking; Computer-aided engineering services for others; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Computer programming consultancy in the field of cybersecurity; Computer programming consultancy in the field of internet of things; Computer programming consultancy in the field of operational technology; Computer programming consultancy in the field of electronics; Computer programming consultancy in the field of telecommunications; Computer programming consultancy in the field of networking; Consulting services in the field of softwa...

(Based on Intent To Use) Business consulting services relating to the integration of the areas of business process technology, organizational learning, change management, and operational sustainability; Value-added reseller services, namely, distributorship services featuring computer security and information technology products

(Based on Intent To Use) Technical consulting in the field of cybersecurity risk management training

(Based on Intent To Use) Treatment of materials, namely, affixing and embedding product authentication security devices and materials in a wide variety of products and documents to protect against counterfeiting, tampering, and diversion, and to ensure the integrity of genuine products and documents
immutiverse

General Information


Serial Number98568895
Word MarkIMMUTIVERSE
Filing DateSaturday, May 25, 2024
Status760 - EX PARTE APPEAL PENDING
Status DateWednesday, January 28, 2026
Registration Number0000000
Registration DateNOT AVAILABLE
Mark Drawing4 - Illustration: Drawing with word(s) / letter(s) / number(s) in Block form
Published for Opposition DateNOT AVAILABLE

Trademark Statements


Goods and Services(Based on Intent To Use) Security products, namely, entry door systems comprising touch pads and security doors; Downloadable computer software for implementing engineering analysis of structure against applied loads; Downloadable computer firmware for managing software authenticity and integrity in the field of cybersecurity; Downloadable computer firmware for authenticating software integrity of devices connected to the internet of things, and the systems and networks in which they operate; Downloadable computer firmware for protecting operational technology systems and networks from malware and unauthorized access; Downloadable computer firmware for managing software authenticity and integrity for electronics and protecting operational technology systems and networks for electronics from malware and unauthorized access; Downloadable computer firmware for original equipment manufacturers (OEMs) and their customers for managing software authenticity in the field of cybersecurity; Downloadable software for secure boot verification and enforcement for an computer operating system; Downloadable software for managing, maintaining, and verifying regulatory compliance of connected devices; Downloadable software for enabling attestation of firmware integrity; Downloadable computer firmware for networking; Downloadable computer software and firmware for operating system programs; Downloadable computer software and firmware for playing games of chance on any computerized platform, including dedicated gaming consoles, video based slot machines, reel based slot machines, and video lottery terminals; Downloadable computer software and firmware for managing software authenticity and integrity in the field of cybersecurity; Downloadable computer software and firmware for authenticating software integrity of devices connected to the internet of things, and the systems and networks in which they operate; Downloadable computer software and firmware for protecting operational technology systems and networks; Downloadable computer software and firmware for managing software authenticity and integrity for electronics and protecting operational technology systems and networks for electronics from malware and unauthorized access; Downloadable computer software and firmware for original equipment manufacturers (OEMs) and their customers for managing software authenticity in the field of cybersecurity; Downloadable computer software and firmware for networking; Electronic video surveillance products, namely, electronic components of security systems; Recorded computer firmware for managing software authenticity and integrity in the field of cybersecurity; Recorded computer firmware for authenticating software integrity of devices connected to the internet of things, and the systems and networks in which they operate; Recorded computer firmware for protecting operational technology systems and networks from malware and unauthorized access; Recorded computer firmware for managing software authenticity and integrity for electronics and protecting operational technology systems and networks for electronics; Recorded computer firmware for original equipment manufacturers (OEMs) and their customers for managing software authenticity in the field of cybersecurity; Recorded computer firmware for networking
Goods and Services(Based on Use in Commerce) Computer technology consultancy in the field of cybersecurity; Computer technology consultancy in the field of internet of things; Computer technology consultancy in the field of operational technology; Computer technology consultancy in the field of electronics; Computer technology consultancy in the field of telecommunications; Computer technology consultancy in the field of networking; Computer-aided engineering services for others; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Computer programming consultancy in the field of cybersecurity; Computer programming consultancy in the field of internet of things; Computer programming consultancy in the field of operational technology; Computer programming consultancy in the field of electronics; Computer programming consultancy in the field of telecommunications; Computer programming consultancy in the field of networking; Consulting services in the field of software as a service (SAAS); Design and development of computer firmware; Design for others in the field of computer networks, software, and engineering for the cybersecurity; Design for others in the field of computer networks, software, and engineering for the internet of things; Design for others in the field of computer networks, software, and engineering for the operational technology; Design for others in the field of computer networks, software, and engineering for the electronics; Design for others in the field of computer networks, software, and engineering for the telecommunications; Design for others in the field of computer networks, software, and engineering for the networking; Professional computer services, namely, network analysis, LAN/WAN design, wireless engineering, virtualization and computer project management; Providing temporary use of on-line non-downloadable firmware for managing software authenticity and integrity in the field of cybersecurity; Providing temporary use of on-line non-downloadable firmware for authenticating software integrity of devices connected to the internet of things, and the systems and networks in which they operate; Providing temporary use of on-line non-downloadable firmware for protecting operational technology systems and networks from malware and unauthorized access; Providing temporary use of on-line non-downloadable firmware for managing software authenticity and integrity for electronics and protecting operational technology systems and networks for electronics from malware and unauthorized access; Providing temporary use of on-line non-downloadable firmware for original equipment manufacturers (OEMs) and their customers for managing software authenticity in the field of cybersecurity; Providing temporary use of on-line non-downloadable firmware for internet-connected electronics that use chips with a secure boot feature; Providing temporary use of on-line non-downloadable software for cryptographic attestation of firmware integrity; Software as a service (SAAS) services featuring software for analyzing and reporting self-assessment of illness; Software as a service (SAAS) services featuring software for recording and analyzing real-time location data for predicting the spread of an illness in a community; Software as a service (SAAS) services featuring software for managing software authenticity and integrity in the field of cybersecurity; Software as a service (SAAS) services featuring software for authenticating software integrity of devices connected to the internet of things, and the systems and networks in which they operate; Software as a service (SAAS) services featuring software for protecting operational technology systems and networks from malware and unauthorized access; Software as a service (SAAS) services featuring software for managing software authenticity and integrity for electronics and protecting operational technology systems and networks for electronics from malware and unauthorized access; Software as a service (SAAS) services featuring software for original equipment manufacturers (OEMs) and their customers for managing software authenticity in the field of cybersecurity; Software as a service (SAAS) services featuring software for internet-connected electronics that use chips with a secure boot feature; Software as a service (SaaS) services featuring software for use in operating connected products and embedded systems; Software as a service (SAAS) services featuring software for connecting products with embedded systems; Software as a service (SAAS) services featuring software using artificial intelligence for managing software authenticity and integrity in the field of cybersecurity; Software as a service (SAAS) services featuring software using artificial intelligence for authenticating software integrity of devices connected to the internet of things, and the systems and networks in which they operate; Software as a service (SAAS) services featuring software using artificial intelligence for protecting operational technology systems and networks from malware and unauthorized access; Software as a service (SAAS) services featuring software using artificial intelligence for managing software authenticity and integrity for electronics and protecting operational technology systems and networks for electronics from malware and unauthorized access; Software as a service (SAAS) services featuring software using artificial intelligence for original equipment manufacturers (OEMs) and their customers for managing software authenticity in the field of cybersecurity; Software as a service (SAAS) services featuring software using artificial intelligence for internet-connected electronics that use chips with a secure boot feature; Software as a service (SAAS) services in the nature of hosting cloud-based software of others; Software as a service (SAAS) services, namely, hosting software for use by others for managing software authenticity and integrity in the field of cybersecurity; Software as a service (SAAS) services, namely, hosting software for use by others for authenticating software integrity of devices connected to the internet of things, and the systems and networks in which they operate; Software as a service (SAAS) services, namely, hosting software for use by others for protecting operational technology systems and networks from malware and unauthorized access; Software as a service (SAAS) services, namely, hosting software for use by others for managing software authenticity and integrity for electronics and protecting operational technology systems and networks for electronics from malware and unauthorized access; Software as a service (SAAS) services, namely, hosting software for use by others for original equipment manufacturers (OEMs) and their customers for managing software authenticity in the field of cybersecurity; Software as a service (SAAS) services, namely, hosting software for use by others for internet-connected electronics that use chips with a secure boot feature; Technology advisory services related to cybersecurity; Technology advisory services related to internet of things; Technology advisory services related to operational technology; Technology advisory services related to electronics; Technology advisory services; related to telecommunications; Technology advisory services related to networking; Technology consultation in the field of cybersecurity
Goods and Services(Based on Intent To Use) Business consulting services relating to the integration of the areas of business process technology, organizational learning, change management, and operational sustainability; Value-added reseller services, namely, distributorship services featuring computer security and information technology products
Goods and Services(Based on Intent To Use) Technical consulting in the field of cybersecurity risk management training
Goods and Services(Based on Intent To Use) Treatment of materials, namely, affixing and embedding product authentication security devices and materials in a wide variety of products and documents to protect against counterfeiting, tampering, and diversion, and to ensure the integrity of genuine products and documents

Classification Information


International Class009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus.
US Class Codes021, 023, 026, 036, 038
Class Status Code6 - Active
Class Status DateSaturday, May 25, 2024
Primary Code009
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class035 - Advertising; business management; business administration; office functions.
US Class Codes100, 101, 102
Class Status Code6 - Active
Class Status DateSaturday, May 25, 2024
Primary Code035
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class040 - Treatment of materials.
US Class Codes100, 103, 106
Class Status Code6 - Active
Class Status DateSaturday, May 25, 2024
Primary Code040
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class041 - Education; providing of training; entertainment; sporting and cultural activities.
US Class Codes100, 101, 107
Class Status Code6 - Active
Class Status DateSaturday, May 25, 2024
Primary Code041
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateSaturday, May 25, 2024
Primary Code042
First Use Anywhere DateSunday, April 7, 2024
First Use In Commerce DateSunday, April 7, 2024

Trademark Owner History


Party NameImmutiverse, Inc.
Party Type10 - Original Applicant
Legal Entity Type03 - Corporation
AddressSan Francisco, CA 94108

Trademark Events


Event DateEvent Description
Saturday, May 25, 2024NEW APPLICATION ENTERED
Tuesday, December 3, 2024NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Monday, December 9, 2024ASSIGNED TO EXAMINER
Monday, December 16, 2024NON-FINAL ACTION WRITTEN
Monday, December 16, 2024NON-FINAL ACTION E-MAILED
Monday, December 16, 2024NOTIFICATION OF NON-FINAL ACTION E-MAILED
Thursday, May 8, 2025ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE
Thursday, May 8, 2025ABANDONMENT NOTICE E-MAILED - FAILURE TO RESPOND
Tuesday, July 8, 2025TEAS PETITION TO REVIVE RECEIVED
Tuesday, July 8, 2025PETITION TO REVIVE-GRANTED
Tuesday, July 8, 2025NOTICE OF REVIVAL - E-MAILED
Tuesday, July 8, 2025TEAS RESPONSE TO OFFICE ACTION RECEIVED
Tuesday, July 8, 2025CORRESPONDENCE RECEIVED IN LAW OFFICE
Tuesday, July 8, 2025TEAS/EMAIL CORRESPONDENCE ENTERED
Wednesday, July 9, 2025FINAL REFUSAL WRITTEN
Wednesday, July 9, 2025FINAL REFUSAL E-MAILED
Wednesday, July 9, 2025NOTIFICATION OF FINAL REFUSAL EMAILED
Tuesday, October 7, 2025APPLICATION EXTENSION TO RESPONSE PERIOD - RECEIVED
Tuesday, October 7, 2025APPLICATION EXTENSION GRANTED/RECEIPT PROVIDED
Friday, January 9, 2026EXPARTE APPEAL RECEIVED AT TTAB
Friday, January 9, 2026JURISDICTION RESTORED TO EXAMINING ATTORNEY
Friday, January 9, 2026EX PARTE APPEAL-INSTITUTED
Friday, January 9, 2026TEAS REQUEST FOR RECONSIDERATION RECEIVED
Thursday, January 15, 2026ASSIGNED TO LIE
Thursday, January 15, 2026CORRESPONDENCE RECEIVED IN LAW OFFICE
Thursday, January 15, 2026TEAS/EMAIL CORRESPONDENCE ENTERED
Wednesday, January 21, 2026ACTION CONTINUING FINAL - COMPLETED
Wednesday, January 21, 2026ACTION DENYING REQ FOR RECON E-MAILED
Wednesday, January 21, 2026NOTIFICATION OF ACTION DENYING REQ FOR RECON E-MAILED