Trademark Overview
On Thursday, September 26, 2019, a trademark application was filed for IONIC MACHINA with the United States Patent and Trademark Office. The USPTO has given the IONIC MACHINA trademark a serial number of 88631806. The federal status of this trademark filing is ABANDONED - FAILURE TO RESPOND OR LATE RESPONSE as of Wednesday, July 22, 2020. This trademark is owned by Ionic Security Inc.. The IONIC MACHINA trademark is filed in the Computer & Software Products & Electrical & Scientific Products, Advertising, Business and Retail Services, and Computer & Software Services & Scientific Services categories with the following description:
Downloadable computer software for encryption and decoding of data and files; computer software platforms for data protection and privacy; downloadable computer software that enables searching of encrypted data and files; downloadable computer software for data usage analytics and visibility; downloadable software for use by others for identity and credential management, application rights management, encryption key management, and logging and auditing management; downloadable software for providing software development kits and application programmable interfaces for developers
Data usage analytics and visibility services, namely, business data analysis; providing search engine services for encrypted data
Data encryption and decoding services; software-as-a-service (SaaS) services for encryption and decoding of data and files; providing online, non-downloadable software for encryption and decoding; software-as-a-service (SaaS) services in the field of data protection and privacy; providing online, non-downloadable software in the field of data usage analytics and visibility; providing online, non-downloadable software for identity and credential management, application rights management, encryption key management, and logging and auditing management; provision of software development kits and application programmable interfaces (APIs) for developers; computer security services, namely, enforcing, restricting, and controlling access privileges of users of computing resources for cloud, mobile, or network resources based on assigned credentials or policies