MAZE Trademark

Trademark Overview


On Monday, February 10, 2025, a trademark application was filed for MAZE with the United States Patent and Trademark Office. The USPTO has given the MAZE trademark a serial number of 99035630. The federal status of this trademark filing is NON-FINAL ACTION - MAILED as of Wednesday, January 21, 2026. This trademark is owned by Canvas Software Limited. The MAZE trademark is filed in the Computer & Software Services & Scientific Services category with the following description:

Software as a service (SAAS) featuring software for ensuring the security of electronic mail; software as a service (SAAS) featuring network and device security software for detecting, aggregating, prioritizing and remediating security threats and vulnerabilities in computer systems; software as a service (SAAS) featuring computer security software for detecting, aggregating, prioritizing and remediating security threats and vulnerabilities in computer systems; software as a service (SAAS) featuring computer software for the detection of cyber threats to computer networks; software as a service (SAAS) featuring privacy protection software for detecting, aggregating, prioritizing and remediating security threats and vulnerabilities in computer systems; software as a service (SAAS) featuring anti-malware software; software as a service (SAAS) featuring anti-spyware software; software as a service (SAAS) featuring computer software for the creation of firewalls; Software as a service (SAA...
maze

General Information


Serial Number99035630
Word MarkMAZE
Filing DateMonday, February 10, 2025
Status641 - NON-FINAL ACTION - MAILED
Status DateWednesday, January 21, 2026
Registration Number0000000
Registration DateNOT AVAILABLE
Mark Drawing3 - Illustration: Drawing or design which also includes word(s) / letter(s) / number(s)
Published for Opposition DateNOT AVAILABLE

Trademark Statements


Indication of Colors claimedThe colors dark blue, light blue and black are claimed as a feature of the mark.
Goods and ServicesSoftware as a service (SAAS) featuring software for ensuring the security of electronic mail; software as a service (SAAS) featuring network and device security software for detecting, aggregating, prioritizing and remediating security threats and vulnerabilities in computer systems; software as a service (SAAS) featuring computer security software for detecting, aggregating, prioritizing and remediating security threats and vulnerabilities in computer systems; software as a service (SAAS) featuring computer software for the detection of cyber threats to computer networks; software as a service (SAAS) featuring privacy protection software for detecting, aggregating, prioritizing and remediating security threats and vulnerabilities in computer systems; software as a service (SAAS) featuring anti-malware software; software as a service (SAAS) featuring anti-spyware software; software as a service (SAAS) featuring computer software for the creation of firewalls; Software as a service (SAAS) featuring computer software for encryption; software as a service (SAAS) featuring threat detection software for detecting cybers threats on computer systems; software as a service (SAAS) featuring risk detection software for detecting cyber risks on computer systems; software as a service (SAAS) featuring computer software for detecting and preventing computer intrusion by detecting, aggregating, prioritizing and remediating security threats and vulnerabilities in computer systems; software as a service (SAAS) featuring downloadable network, Internet, and computer security computer software for detecting, aggregating, prioritizing and remediating security threats and vulnerabilities in computer systems; software as a service (SAAS) featuring computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware from computer systems; software as a service (SAAS) featuring computer software for the back-up, storage, restoration and recovery of computer data, folders, and files; software as a service (SAAS) featuring computer software for preventing, diagnosing, and repairing computer problems; software as a service (SAAS) featuring cybersecurity software using artificial intelligence (AI) for detecting, aggregating, prioritizing and remediating security threats and vulnerabilities in computer systems; software as a service (SAAS) featuring threat detection software using artificial intelligence (AI) for detecting, aggregating, prioritizing and remediating security threats and vulnerabilities in computer systems; software as a service (SAAS) featuring computer software using artificial intelligence (AI) for creating machine learning algorithms for cybersecurity; software as a service (SAAS) featuring vulnerability management software for detecting, aggregating, prioritizing and remediating security threats and vulnerabilities in computer systems; software as a service (SAAS) featuring vulnerability analysis software using artificial intelligence (AI) for detecting, aggregating, prioritizing and remediating security threats and vulnerabilities in computer systems; computer services being detection of computer viruses and computer security threats, namely, computer virus protection services, and monitoring of computer systems to detect cybersecurity incidents; computer services, namely, data recovery services; computer software installation services; computer support services, namely, technical support in the nature of troubleshooting of computer software problems by diagnosing problems with computer software and updating of computer software; computer systems in the field of security, access, authorization, authentication, encryption, and identification systems for computers and computer networks; computer security consultancy; Internet security consultancy; authentication services for computer security, namely, computer security services in the nature of providing authentication of digital certificates; data security firewall services, namely, cybersecurity services in the nature of restricting unauthorized access to computer systems; computer security threat analysis for protecting data; technology consultation in the field of cybersecurity; telecommunication network security consultancy; data security consultancy; data security services, namely, computer security threat analysis for protecting data; computer security services for protection against illegal network access, namely, restricting unauthorized network access by users without credentials; computer security system monitoring services, namely, monitoring of computer systems to detect cybersecurity incidents; providing temporary use of online non-downloadable computer programs for computer security risk management; professional consultancy relating to computer security; monitoring of computer systems to detect cybersecurity incidents for security purposes; consultancy in the field of cybersecurity computer software; maintenance of computer software relating to computer security and prevention of computer risks; rental of Internet security computer programs for detecting, aggregating, prioritizing and remediating security threats and vulnerabilities in computer systems; consultancy in the field of data security; computer programming services for electronic data security; computer security services in the nature of administering digital certificates; updating of computer software relating to computer security and prevention of computer risks; provision of security services for computer networks, computer access and computerised transactions being computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer programming of Internet security programs; design and development of Internet security programs for computers; design and development of electronic data security systems; technology research relating to cybersecurity; information technology (IT) security, protection and restoration services, namely, updating of computer software relating to computer security and prevention of computer risks; computer virus protection services; design and development of antivirus software; design and development of cybersecurity software; software as a service (SAAS) services featuring cybersecurity software for detecting, aggregating, prioritizing and remediating security threats and vulnerabilities in computer systems; software as a service (SAAS) services featuring antivirus, anti-malware and anti-spyware software; computer firewall services, namely, cybersecurity services in the nature of restricting unauthorized access to computer systems; computer software installation; rental of computer software for detecting, aggregating, prioritizing and remediating security threats and vulnerabilities in computer systems; computer software consultancy; software as a service (SAAS) services featuring computer software platforms using artificial intelligence (AI) for detecting, aggregating, prioritizing and remediating security threats and vulnerabilities in computer systems; providing security threat management services for the purpose of protecting information and data from unauthorized access featuring electronic monitoring and tracking of security vulnerabilities and problems in computer software products, the Internet, and computer networks, namely, monitoring of computer systems for detecting unauthorized access or data breach, and cybersecurity services in the nature of restricting unauthorized access to computer systems; technical consultation in the field of computer software installation and maintenance; artificial intelligence as a service (AIAAS) featuring cybersecurity software using artificial intelligence (AI) for detecting, aggregating, prioritizing and remediating security threats and vulnerabilities in computer systems; technology consultation in the field of artificial intelligence
Description of MarkThe mark consists of a design of a hexagon stylized with dark blue and light blue lines. Next to the design is the stylized term "MAZE" in black.

Classification Information


International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateMonday, February 10, 2025
Primary Code042
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

Trademark Owner History


Party NameCanvas Software Limited
Party Type10 - Original Applicant
Legal Entity Type99 - Other
AddressLondon SW4 9PT
GB

Trademark Events


Event DateEvent Description
Monday, February 10, 2025NEW APPLICATION ENTERED
Monday, February 10, 2025APPLICATION FILING RECEIPT MAILED
Thursday, July 10, 2025NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Thursday, July 10, 2025NOTICE OF DESIGN SEARCH CODE E-MAILED
Friday, July 18, 2025ASSIGNED TO EXAMINER
Friday, July 18, 2025NON-FINAL ACTION WRITTEN
Friday, July 18, 2025NON-FINAL ACTION E-MAILED
Friday, July 18, 2025NOTIFICATION OF NON-FINAL ACTION E-MAILED
Friday, October 17, 2025APPLICATION EXTENSION TO RESPONSE PERIOD - RECEIVED
Friday, October 17, 2025APPLICATION EXTENSION GRANTED/RECEIPT PROVIDED
Tuesday, January 20, 2026TEAS RESPONSE TO OFFICE ACTION RECEIVED
Tuesday, January 20, 2026CORRESPONDENCE RECEIVED IN LAW OFFICE
Tuesday, January 20, 2026TEAS/EMAIL CORRESPONDENCE ENTERED
Wednesday, January 21, 2026NON-FINAL ACTION WRITTEN
Wednesday, January 21, 2026NON-FINAL ACTION E-MAILED
Wednesday, January 21, 2026NOTIFICATION OF NON-FINAL ACTION E-MAILED