MDR ONE RESOLUTE Trademark

Trademark Overview


On Tuesday, July 16, 2024, a trademark application was filed for MDR ONE RESOLUTE with the United States Patent and Trademark Office. The USPTO has given the MDR ONE RESOLUTE trademark a serial number of 79411572. The federal status of this trademark filing is NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER as of Thursday, December 5, 2024. This trademark is owned by Kudelski S.A.. The MDR ONE RESOLUTE trademark is filed in the Communication Services, Computer & Software Products & Electrical & Scientific Products, and Computer & Software Services & Scientific Services categories with the following description:

Computer hardware and software; data processing equipment; computer software for database management; software and computer programs for data protection in computers, computer networks, information systems and telecommunication systems as well as internet websites; security software for computers, computer networks, information systems and telecommunication systems as well as internet websites; software for backing up, securing, analyzing and restoring computer and network data; software for use in managing, monitoring and/or maintaining the security and integrity of data, files, information; software in the field of detecting, analyzing, signaling and restoring modifications made to data, files, applications, computer systems and networks; software combining learning, automated analysis and hierarchical report functions to detect unauthorized access or attacks on computer systems and networks; software for monitoring and analyzing computer network traffic and computer network threats;...

Telecommunications services in the field of security software and security hardware, in the nature of providing access to secure telecommunications networks.

Computer programming; Design, development, programming and maintenance of computer software; design, development, programming and maintenance of data security systems; design, development, programming and maintenance of computer software relating to computer security and prevention of computer risks; design, development, programming and maintenance of computer programs for the security of computers, computer networks, information systems and telecommunication systems as well as internet websites; software design, development, programming and maintenance services in the field of monitoring and analyzing computer network traffic to maintain the integrity of computers, computer networks, information systems and telecommunication systems as well as internet websites; design, development, programming and maintenance of computer hacking prevention programs on the Internet; design, development, programming and maintenance of programs for the removal of viruses on the Internet; computer servic...

General Information


Serial Number79411572
Word MarkMDR ONE RESOLUTE
Filing DateTuesday, July 16, 2024
Status630 - NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER
Status DateThursday, December 5, 2024
Registration Number0000000
Registration DateNOT AVAILABLE
Mark Drawing4 - Illustration: Drawing with word(s) / letter(s) / number(s) in Block form
Published for Opposition DateNOT AVAILABLE

Trademark Statements


Goods and ServicesComputer hardware and software; data processing equipment; computer software for database management; software and computer programs for data protection in computers, computer networks, information systems and telecommunication systems as well as internet websites; security software for computers, computer networks, information systems and telecommunication systems as well as internet websites; software for backing up, securing, analyzing and restoring computer and network data; software for use in managing, monitoring and/or maintaining the security and integrity of data, files, information; software in the field of detecting, analyzing, signaling and restoring modifications made to data, files, applications, computer systems and networks; software combining learning, automated analysis and hierarchical report functions to detect unauthorized access or attacks on computer systems and networks; software for monitoring and analyzing computer network traffic and computer network threats; software for detecting and responding to threats to computers, computer networks, information systems and telecommunication systems as well as internet websites; software for computer security, protection and risk and threat assessment and management; software for intrusion detection; software for intrusion protection; intrusion detection system (IDS) software; software for security anomaly detection; cybersecurity computer software; computer programs for detecting and preventing malware, intrusions and other cyber threats; cyber-security assessment software; software for analyzing and preventing cyber threats in the fields of computer security; software for providing protection against data theft; software for providing protection against identity theft; software for security intrusion and security threat detection and response; security software and security computer hardware in the area of mobile security, cloud security, secure unified collaboration and the Internet of Things (IoT); computer hardware and software systems for security operations center management, namely, hardware and software for performing computer security, computer security policy assessment, computer support, computer vulnerability assessments, cybersecurity diagnostics, cybersecurity maintenance, cybersecurity policy assessment, cybersecurity support, cybersecurity vulnerability assessments, data security diagnostics, data security maintenance, data security, data security policy assessment, data security support, data security vulnerability assessments, endpoint detection and response, firewall security assessments, firewall security diagnostics, firewall security maintenance, firewall security, firewall security policy assessment, firewall security support, firewall security vulnerability assessments, hardware diagnostics, hardware maintenance, hardware security, hardware security policy assessment, hardware support, hardware vulnerability assessments, information technology diagnostics, information technology maintenance, information technology security, information technology security policy assessment, information technology support, information technology vulnerability assessments, managed detection and response, network diagnostics, network maintenance, network security, network security policy assessment, network support, network vulnerability assessments, password diagnostics, password maintenance, password security, password security policy assessment, password support, password vulnerability assessments, security policy assessments, security vulnerability assessments, penetration testing, security operations center management, software diagnostics, software maintenance, software security policy assessments, software support, and software vulnerability assessments; digital intrusion detection platforms; cyber security platforms; computer network threat detection and response platforms.
Goods and ServicesTelecommunications services in the field of security software and security hardware, in the nature of providing access to secure telecommunications networks.
Goods and ServicesComputer programming; Design, development, programming and maintenance of computer software; design, development, programming and maintenance of data security systems; design, development, programming and maintenance of computer software relating to computer security and prevention of computer risks; design, development, programming and maintenance of computer programs for the security of computers, computer networks, information systems and telecommunication systems as well as internet websites; software design, development, programming and maintenance services in the field of monitoring and analyzing computer network traffic to maintain the integrity of computers, computer networks, information systems and telecommunication systems as well as internet websites; design, development, programming and maintenance of computer hacking prevention programs on the Internet; design, development, programming and maintenance of programs for the removal of viruses on the Internet; computer services in the field of security software and security hardware; computer services for automating the real-time detection, mitigation, prioritization and/or prediction of cyber threats and strikes; computer services, namely, endpoint detection and response of software and hardware threats; computer services, namely, managed detection and response of cyber intrusions and threats; computer services, namely, hosting secure networking platforms on the Internet; providing temporary use of on-line non-downloadable software for database management; providing temporary use of on-line non-downloadable software for data protection in computers, computer networks, information systems and telecommunication systems as well as internet websites; providing temporary use of on-line non-downloadable security software for computers, computer networks, information systems and telecommunication systems as well as internet websites; providing temporary use of on-line non-downloadable software for backing up, securing, analyzing and restoring computer and network data; providing temporary use of on-line non-downloadable software for use in managing, monitoring and/or maintaining the security and integrity of data, files, information; providing temporary use of on-line non-downloadable software in the field of detecting, analyzing, signaling and restoring modifications made to data, files, applications, computer systems and networks; providing temporary use of on-line non-downloadable software combining learning, automated analysis and hierarchical report functions to detect unauthorized access or attacks on computer systems and networks; providing temporary use of on-line non-downloadable software for monitoring and analyzing computer network traffic and computer network threats; providing temporary use of on-line non-downloadable software for detecting and responding to threats to computers, computer networks, information systems and telecommunication as well as internet websites; providing temporary use of on-line non-downloadable software for computer security, protection and risk and threat assessment and management; providing temporary use of on-line non-downloadable software for intrusion detection; providing temporary use of on-line non-downloadable software for intrusion protection; providing temporary use of on-line non-downloadable intrusion detection system (IDS) software; providing temporary use of on-line non-downloadable software for security anomaly detection; providing temporary use of on-line non-downloadable software for analyzing and preventing cyber threats in the fields of computer security; providing temporary use of on-line non-downloadable computer software for providing protection against data theft; providing temporary use of on-line non-downloadable computer software for providing protection against identity theft; providing temporary use of on-line non-downloadable computer software for security intrusion and security threat detection and response; providing temporary use of on-line non-downloadable security software in the area of mobile security, cloud security, secure unified collaboration and the Internet of Things (IoT); software as a service (SaaS) services featuring software for analyzing computer access information for preventing security threats; software as a service (SaaS) featuring software for analyzing computer access information for preventing security threats, data theft, and identity theft; software as a Service (SaaS) featuring software for protection of data and transmission of data; software as a service (SaaS) services featuring software for managed detection and response to cybersecurity risks; software as a service (SaaS) services featuring software for mining, tracking, and analyzing data to detect and protect against software vulnerabilities and attacks; computer security services; security services for the protection of data and information; security service for the protection against non-authorized access to computers, computer networks, information systems and telecommunication systems as well as internet websites; computer security services in the nature of administering digital certificates; computer security policy assessment, namely, assessing security threats and the computer's response; computer security, namely, cybersecurity protocol assessment in the nature of analyzing threat response of computers, computer networks, information systems and telecommunication systems as well as internet websites; computer security, namely, data security policy assessment in the nature of analyzing threat response of computers, computer networks, information systems and telecommunication systems as well as internet websites; computer security, namely, firewall security policy assessment in the nature of analyzing threat response of firewalls; computer security, namely, hardware security policy assessment in the nature of analyzing threat response of computer hardware; computer security, namely, information technology security policy assessment in the nature of analyzing threat response of computers, computer networks, information systems and telecommunication systems as well as internet websites; monitoring, detecting, intercepting, diagnosing and repairing computer viruses; monitoring, detecting, intercepting, diagnosing and repairing spyware; computer network security assessments; information system security assessments; IT consultancy; computer security consultancy; consultancy with respect to information technology; consultancy with respect to the security of computers, computer networks, information systems and telecommunication systems as well as internet websites; computer consultation services for threat detection and response; computer consulting services in the field of security operations; data security consulting; computer breach security consultancy; computer and data security consultancy; data security consultancy; computer programming consultancy in the field of cybersecurity; computer security consultancy in the field of scanning and penetration testing of computers, computer networks, information systems and telecommunication as well as internet websites, to assess information security vulnerability; technology consultation in the field of cybersecurity; technological planning and consulting services in the field of managed detection and response; consultancy in the field of security software and security hardware development in the field of mobile security, cloud security, secure unified communications, threat detection and response, secure collaboration and the Internet of Things (IoT); scientific and industrial research, namely, research and development of new cybersecurity products or threat intelligence systems; providing risk management and data security threat analysis services; providing an Internet website portal that allows users to assess and determine computer breach; authentication services for computer security; computer security system monitoring services; computer security threat analysis; monitoring of computer systems for security purposes; provision of computer security risk management programs; updating of computer software and networks relating to computer security and prevention of computer risks; cloud-based data and information protection services; computer firewall services; data encryption services; computer diagnostic services; computer services, namely, assessing security threats and response of computers, computer networks, information systems and telecommunication systems as well as internet websites; computer security services for protection against illegal access to computers, computer networks, information systems and telecommunication systems as well as internet websites; computer support services, namely, troubleshooting of computer software problems, monitoring vulnerability of computers, computer networks, information systems and telecommunication systems as well as internet websites and monitoring intrusions in computers, computer networks, information systems and telecommunication systems as well as internet websites; computer vulnerability assessments, namely, scanning and penetration testing of computers, computer networks, information systems and telecommunication systems as well as internet websites to assess information security vulnerability; data security diagnostic services, namely, computer security threat analysis for protecting data, security threat analysis for computers, computer networks, information systems and telecommunication systems as well as internet websites for protecting data; data security support services, namely, troubleshooting of computer software problems, monitoring cybersecurity threats, preventing cyber intrusions; data security vulnerability assessments, namely, diagnostic, scanning and penetration testing of computers, computer networks, information systems and telecommunication systems as well as internet websites to assess information security vulnerability; data security services, namely, computer security threat analysis for protecting data as well as threat analysis security of computers, computer networks, information systems and telecommunication systems as well as internet websites for protecting data; firewall security assessments, namely, scanning and penetration testing of computers, computer networks, information systems and telecommunication systems as well as internet websites to assess information security vulnerability; firewall security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; firewall security support services, namely, troubleshooting of computer software problems, monitoring cybersecurity threats, preventing cyber intrusions; firewall security vulnerability assessments, namely, scanning and penetration testing of computers, computer networks, information systems and telecommunication systems as well as internet websites to assess information security vulnerability; firewall security services, namely, security threat analysis for protecting data; technical support services, namely, troubleshooting of computer software problems, monitoring cybersecurity threats, preventing cyber intrusions; computer hardware vulnerability assessments, namely, scanning and penetration testing of computers, computer networks, information systems and telecommunication systems as well as internet websites to assess information security vulnerability; information technology diagnostic services, namely, computer security threat analysis for protecting data; information technology security services, namely, security threat analysis for protecting data; information technology support services, namely, troubleshooting of computer software problems, monitoring cybersecurity threats, preventing cyber intrusions; information technology vulnerability assessments, namely, scanning and penetration testing of computers, computer networks, information systems and telecommunication systems as well as internet websites to assess information security vulnerability; managed security service provider services, namely, hosting, managing, developing, analyzing, and maintaining applications, software, and web sites of others in the fields of cybersecurity; network vulnerability assessments, namely, scanning and penetration testing of computers, computer networks, information systems and telecommunication systems as well as internet websites to assess information security vulnerability; password diagnostic services; password security, namely, providing authentication, issuance, validation and revocation of digital credentials; password support services, namely, providing help desk services to retrieve computer software and hardware passwords; password vulnerability assessments, namely, scanning and penetration testing of computers, computer networks, information systems and telecommunication systems as well as internet websites to assess information security vulnerability; penetration testing for computer security threats for computer hardware and software; software diagnostic services, namely, computer security threat analysis for protecting data; software security policy assessments, namely, computer security threat analysis for protecting data; testing of computer software and hardware security systems; vulnerability assessments, namely, scanning and penetration testing of computers, computer networks, information systems and telecommunication systems as well as internet websites to assess information security vulnerability; cybersecurity services in the nature of restricting unauthorized access to computers, computer networks, information systems and telecommunication systems as well as internet websites; cybersecurity services, namely, computer security threat analysis for protecting data and access to computers, computer networks, information systems and telecommunication systems as well as internet websites; cybersecurity services, namely, troubleshooting of computer software problems, monitoring cybersecurity threats, preventing cyber intrusions; cybersecurity services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, detecting threats and intrusions, preventing intrusions.

Classification Information


International Class038 - Services allowing people to communicate with another by a sensory means.
US Class Codes100, 101, 104
Class Status Code6 - Active
Class Status DateThursday, December 5, 2024
Primary Code038
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus.
US Class Codes021, 023, 026, 036, 038
Class Status Code6 - Active
Class Status DateThursday, December 5, 2024
Primary Code009
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateThursday, December 5, 2024
Primary Code042
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

Trademark Owner History


Party NameKudelski S.A.
Party Type10 - Original Applicant
Legal Entity Type33 - NOT AVAILABLE
AddressCH

Trademark Events


Event DateEvent Description
Thursday, December 5, 2024SN ASSIGNED FOR SECT 66A APPL FROM IB
Monday, December 9, 2024NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Monday, December 9, 2024APPLICATION FILING RECEIPT MAILED