KRYPTAURI Trademark

Trademark Overview


On Saturday, July 17, 2021, a trademark application was filed for KRYPTAURI with the United States Patent and Trademark Office. The USPTO has given the KRYPTAURI trademark a serial number of 90834467. The federal status of this trademark filing is REGISTERED as of Tuesday, February 7, 2023. This trademark is owned by Kryptauri, Inc.. The KRYPTAURI trademark is filed in the Advertising, Business and Retail Services, Construction & Repair Services, Computer & Software Services & Scientific Services, Personal, and Legal & Social Services categories with the following description:

Modernization of information technology systems and networks, namely, updating of computer hardware; computer hardware installation on information technology systems and networks; Installation of computer networking hardware; Installation, maintenance and repair of Ethernet and wireless networking hardware; Installation, maintenance and repair of computers and computer network hardware; Customizing computer hardware for computer network infrastructure; Maintenance and repair of telecommunications networking hardware, apparatus, and instruments; Providing technical support, namely, technical advice concerning the installation, repair and maintenance of computers, electronic apparatus, and equipment for information systems for military operations, government agencies and commercial enterprises; Consultancy relating to the installation, maintenance and repair of computer hardware

Strategic and tactical business intelligence services, namely, providing business intelligence services in the nature of strategic and tactical intelligence gathering, analysis of intelligence, daily and global intelligence monitoring and reporting, geographic and threat-specific intelligence gathering; Business management of the collection, analysis and reporting of vital data to contribute to the advance of deployed missions throughout the world and the protection of forces on the ground with real-time, actionable intelligence

Providing information in the field of the military, military tactics and strategies; Security assessments and security solutions services, namely, security threat analysis for protecting personal safety and physical security consultancy in the nature of threat assessment and tracking, vulnerability assessments, remediation actions and mitigation strategies, recommendations for network access hardening and best practices, program management assessment and control for others, facility protection, surveillance and countersurveillance, personnel employee background screening, force protection; Strategic and tactical intelligence services, namely, providing intelligence and information to local, state, and federal law enforcement agencies relating to organized crime networks that operate across jurisdictional lines in the nature of strategic and tactical intelligence gathering, analysis of intelligence, daily and global intelligence monitoring and reporting, geographic and threat-specific i...

Computer services, namely remote and on-site management of information technology systems and networks for others; modernization of information technology systems and networks, namely, updating of computer software; computer systems integration services, namely, hardware and software integration planning, development, and implementation, on information technology systems and networks; installation of software on information technology systems and networks; design and development of electronic data security systems, namely, developing and implementing electronic data security systems, for information technology systems and networks; Installation, maintenance and repair of computer software; Computer network configuration services; Cloud storage services for electronic data; Computer disaster recovery planning; Computer security consultancy; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or ne...
kryptauri

General Information


Serial Number90834467
Word MarkKRYPTAURI
Filing DateSaturday, July 17, 2021
Status700 - REGISTERED
Status DateTuesday, February 7, 2023
Registration Number6971084
Registration DateTuesday, February 7, 2023
Mark Drawing3000 - Illustration: Drawing or design which also includes word(s) / letter(s) / number(s)
Published for Opposition DateTuesday, November 22, 2022

Trademark Statements


Description of MarkThe mark consists of a fanciful representation of horns in blue over two angles in black to the left of the stylized word "KRYPTAURI" in black.
Goods and ServicesModernization of information technology systems and networks, namely, updating of computer hardware; computer hardware installation on information technology systems and networks; Installation of computer networking hardware; Installation, maintenance and repair of Ethernet and wireless networking hardware; Installation, maintenance and repair of computers and computer network hardware; Customizing computer hardware for computer network infrastructure; Maintenance and repair of telecommunications networking hardware, apparatus, and instruments; Providing technical support, namely, technical advice concerning the installation, repair and maintenance of computers, electronic apparatus, and equipment for information systems for military operations, government agencies and commercial enterprises; Consultancy relating to the installation, maintenance and repair of computer hardware
Indication of Colors claimedThe color(s) blue and black is/are claimed as a feature of the mark.
Goods and ServicesStrategic and tactical business intelligence services, namely, providing business intelligence services in the nature of strategic and tactical intelligence gathering, analysis of intelligence, daily and global intelligence monitoring and reporting, geographic and threat-specific intelligence gathering; Business management of the collection, analysis and reporting of vital data to contribute to the advance of deployed missions throughout the world and the protection of forces on the ground with real-time, actionable intelligence
Goods and ServicesProviding information in the field of the military, military tactics and strategies; Security assessments and security solutions services, namely, security threat analysis for protecting personal safety and physical security consultancy in the nature of threat assessment and tracking, vulnerability assessments, remediation actions and mitigation strategies, recommendations for network access hardening and best practices, program management assessment and control for others, facility protection, surveillance and countersurveillance, personnel employee background screening, force protection; Strategic and tactical intelligence services, namely, providing intelligence and information to local, state, and federal law enforcement agencies relating to organized crime networks that operate across jurisdictional lines in the nature of strategic and tactical intelligence gathering, analysis of intelligence, daily and global intelligence monitoring and reporting, geographic and threat-specific intelligence gathering, and threat assessment and tracking; Consulting services in the field of security intelligence, namely, physical security consultancy; Consulting services in the field of national security, namely, physical security consultancy; Providing reconnaissance and surveillance services; Providing strategic and tactical intelligence gathering and analysis for military, law enforcement, and the government, namely, providing intelligence and information to local, state, and federal law enforcement agencies relating to organized crime networks that operate across jurisdictional lines; Providing reconnaissance and surveillance services, namely, providing unmanned airborne Intelligence, Surveillance and Reconnaissance (ISR) services to the national Intelligence Community and the military; Providing reconnaissance and surveillance services, providing information in the field of the military, military tactics and strategies, and physical security consultancy, namely, management of the collection, analysis and reporting of vital data to contribute to the advance of deployed missions throughout the world and the protection of forces on the ground with real-time, actionable intelligence; Providing security surveillance of premises for businesses and governmental agencies; National intelligence services, namely, providing reconnaissance and surveillance services in the nature of counterintelligence (CI) services, signals intelligence (SIGINT) services, information collection management, cyber threat analysis being security threat analysis for public safety; Consulting in the field of signals intelligence, namely, consulting in the field of providing intelligence and information to local, state, and federal law enforcement agencies relating to organized crime networks that operate across jurisdictional lines; Technical consulting in the field of physical and personal security in the nature of signals intelligence collection, analysis and dissemination
Goods and ServicesComputer services, namely remote and on-site management of information technology systems and networks for others; modernization of information technology systems and networks, namely, updating of computer software; computer systems integration services, namely, hardware and software integration planning, development, and implementation, on information technology systems and networks; installation of software on information technology systems and networks; design and development of electronic data security systems, namely, developing and implementing electronic data security systems, for information technology systems and networks; Installation, maintenance and repair of computer software; Computer network configuration services; Cloud storage services for electronic data; Computer disaster recovery planning; Computer security consultancy; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security threat analysis for protecting data; Computer technology support services, namely, help desk services; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Computer virus protection services; Computer network design for others; Computer and network security services, namely, restricting unauthorized access for computer networks; Consulting services in the field of cloud computing; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the fields of selection, implementation and use of computer hardware and software systems for others; Development of security systems and contingency planning for information systems; Internet security consultancy; IT consulting services; IT consulting services in the field of cyber defense and cyber-security of computer systems, internet, networks, applications, electronic data, communications and endpoints; IT integration service; Managed computer security services delivered through security operations centers, namely, managing and optimizing computer security software, namely, security information and event management (SIEM), firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), network access control (NAC), data loss prevention, application security, endpoint security, and forensics and incident response; Managed firewall and SIEM solutions, namely, computer security consultancy services; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technical support services, namely, technical administration of servers for others and troubleshooting in the nature of diagnosing server problems; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; Technical support services, namely, troubleshooting of computer software problems; Computer security consultancy, namely, security assessment services for computer networks; Computer security consultancy, namely, security risk assessment relating to computer and network systems; Computer services, namely, computer system administration for others; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; Data security consultancy; Technology consultation in the field of cybersecurity; Computer security consultancy, namely, consulting in the field of signals intelligence; Technical consulting in the field of computer security in the nature of signals intelligence collection, analysis and dissemination; Computer services, namely, remote and on-site management of the information technology (IT) systems of others, namely, management of secure information technology (IT) based services for others in the nature of information technology (IT) software applications management, enterprise services management in the nature of management of software applications, information assurance management in the nature of management of restricting network, data, and information access and management of scanning and eliminating unauthorized data and programs from files and networks and cyber security management in the nature of maintenance of computer software relating to computer security and prevention of computer risks; Technical support in the field of computer network security, namely, monitoring technological functions of computer network systems for detecting unauthorized use of network data; Technical support services for computer security purposes, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Computer network security services, namely, scanning and penetration testing of computer networks to assess information security vulnerability; Monitoring of computer networks for security purposes, namely, restricting unauthorized access to computer networks; Computer security services, namely, protecting data and information in computer networks from unauthorized access; Computer security services in the nature of administering digital keys; Computer security services in the nature of administering digital certificates; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, restricting unauthorized access to computer networks; Security assessments and security solutions services, namely, computer security threat analysis for protecting data and computer security consultancy in the nature of threat assessment and tracking, vulnerability assessments, remediation actions and mitigation strategies, recommendations for network access hardening and best practices, program management assessment and control for others; Consulting services in the field of security intelligence, namely, computer security consultancy Consulting services in the field of national security, namely, computer security consultancy; Computer security services for protecting data and information from unauthorized access, namely, monitoring of computer systems for computer security purposes, for compliance with federal agency and federal department regulations and guidelines, and for compliance with computer security guidelines, and for security risk assessment purposes; National intelligence services, namely, cyber threat analysis being computer security threat analysis for protecting data

Classification Information


International Class035 - Advertising; business management; business administration; office functions.
US Class Codes100, 101, 102
Class Status Code6 - Active
Class Status DateThursday, October 13, 2022
Primary Code035
First Use Anywhere DateThursday, April 1, 2021
First Use In Commerce DateThursday, April 1, 2021

International Class037 - Building construction; repair; installation services.
US Class Codes100, 103, 106
Class Status Code6 - Active
Class Status DateMonday, September 20, 2021
Primary Code037
First Use Anywhere DateThursday, April 1, 2021
First Use In Commerce DateThursday, April 1, 2021

International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateMonday, September 20, 2021
Primary Code042
First Use Anywhere DateThursday, April 1, 2021
First Use In Commerce DateThursday, April 1, 2021

International Class045 - Legal services; security services for the protection of property and individuals; personal and social services rendered by others to meet the needs of individuals.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateMonday, September 20, 2021
Primary Code045
First Use Anywhere DateThursday, April 1, 2021
First Use In Commerce DateThursday, April 1, 2021

Trademark Owner History


Party NameKryptauri, Inc.
Party Type30 - Original Registrant
Legal Entity Type03 - Corporation
AddressWestlake Village, CA 91361

Party NameKryptauri, Inc.
Party Type20 - Owner at Publication
Legal Entity Type03 - Corporation
AddressWestlake Village, CA 91361

Party NameKryptauri, Inc.
Party Type10 - Original Applicant
Legal Entity Type03 - Corporation
AddressWestlake Village, CA 91361

Trademark Events


Event DateEvent Description
Tuesday, February 7, 2023NOTICE OF REGISTRATION CONFIRMATION EMAILED
Tuesday, February 7, 2023REGISTERED-PRINCIPAL REGISTER
Tuesday, November 22, 2022OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
Tuesday, November 22, 2022PUBLISHED FOR OPPOSITION
Wednesday, November 2, 2022NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
Saturday, October 15, 2022APPROVED FOR PUB - PRINCIPAL REGISTER
Thursday, October 13, 2022TEAS/EMAIL CORRESPONDENCE ENTERED
Wednesday, October 12, 2022CORRESPONDENCE RECEIVED IN LAW OFFICE
Wednesday, October 12, 2022TEAS RESPONSE TO OFFICE ACTION RECEIVED
Tuesday, April 12, 2022NOTIFICATION OF NON-FINAL ACTION E-MAILED
Tuesday, April 12, 2022NON-FINAL ACTION E-MAILED
Tuesday, April 12, 2022NON-FINAL ACTION WRITTEN
Wednesday, April 6, 2022ASSIGNED TO EXAMINER
Tuesday, September 21, 2021NOTICE OF DESIGN SEARCH CODE E-MAILED
Monday, September 20, 2021NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Wednesday, July 21, 2021NEW APPLICATION ENTERED