MDR ONE RESOLUTE Trademark

Trademark Overview


On Tuesday, July 16, 2024, a trademark application was filed for MDR ONE RESOLUTE with the United States Patent and Trademark Office. The USPTO has given the MDR ONE RESOLUTE trademark a serial number of 79411572. The federal status of this trademark filing is APPROVED FOR PUBLICATION as of Saturday, September 13, 2025. This trademark is owned by Kudelski S.A.. The MDR ONE RESOLUTE trademark is filed in the Communication Services, Computer & Software Products & Electrical & Scientific Products, and Computer & Software Services & Scientific Services categories with the following description:

Computer hardware and downloadable software for detecting and responding to threats to computers, computer networks, information systems and telecommunication systems as well as internet websites; data processing equipment; downloadable computer software for database management; downloadable software and computer programs for data protection in computers, computer networks, information systems and telecommunication systems as well as internet websites; downloadable security software for ensuring the security of electronic mail, protecting data, and computer virus scanning, for use with computers, computer networks, information systems and telecommunication systems as well as internet websites; downloadable software for backing up, securing, analyzing and restoring computer and network data; downloadable software for use in managing, monitoring and maintaining the security and integrity of data, files, and information; downloadable software for detecting, analyzing, signaling and restor...

Telecommunications services in the field of security software and security hardware, in the nature of providing access to secure telecommunications networks

Computer programming; Design, development, programming and maintenance of computer software; design, development, computer programming and maintenance of electronic data security systems; design, development, programming and maintenance of computer software relating to computer security and prevention of computer risks; design, development, programming and maintenance of computer programs for the security of computers, computer networks, information systems and telecommunication systems as well as internet websites; software design, development, programming and maintenance services in the field of monitoring and analyzing computer network traffic to maintain the integrity of computers, computer networks, information systems and telecommunication systems as well as internet websites; design, development, programming and maintenance of computer hacking prevention programs on the Internet; design, development, programming and maintenance of programs for the removal of viruses on the Inter...
mdr one resolute

General Information


Serial Number79411572
Word MarkMDR ONE RESOLUTE
Filing DateTuesday, July 16, 2024
Status680 - APPROVED FOR PUBLICATION
Status DateSaturday, September 13, 2025
Registration Number0000000
Registration DateNOT AVAILABLE
Mark Drawing4 - Illustration: Drawing with word(s) / letter(s) / number(s) in Block form
Published for Opposition DateNOT AVAILABLE

Trademark Statements


Goods and ServicesComputer hardware and downloadable software for detecting and responding to threats to computers, computer networks, information systems and telecommunication systems as well as internet websites; data processing equipment; downloadable computer software for database management; downloadable software and computer programs for data protection in computers, computer networks, information systems and telecommunication systems as well as internet websites; downloadable security software for ensuring the security of electronic mail, protecting data, and computer virus scanning, for use with computers, computer networks, information systems and telecommunication systems as well as internet websites; downloadable software for backing up, securing, analyzing and restoring computer and network data; downloadable software for use in managing, monitoring and maintaining the security and integrity of data, files, and information; downloadable software for detecting, analyzing, signaling and restoring modifications made to data, files, applications, computer systems and networks; downloadable software combining learning, automated analysis and hierarchical report functions to detect unauthorized access or attacks on computer systems and networks; downloadable software for monitoring and analyzing computer network traffic and computer network threats; downloadable software for detecting and responding to threats to computers, computer networks, information systems and telecommunication systems as well as internet websites; downloadable software for computer risk and threat assessment and management; downloadable software for computer security and protection for ensuring the security of electronic mail, protecting data, and computer virus scanning; downloadable software for cyber intrusion detection; downloadable software for cyber intrusion protection; downloadable intrusion detection system (IDS) software; downloadable software for cyber security anomaly detection; downloadable cybersecurity computer software for ensuring the security of electronic mail, protecting data, and computer virus scanning; downloadable computer programs for detecting and preventing malware, intrusions and other cyber threats; downloadable cyber-security assessment software; downloadable software for analyzing and preventing cyber threats in the fields of computer security; downloadable software for providing protection against data theft; downloadable software for providing protection against identity theft; downloadable software for cyber security intrusion and cyber security threat detection and response; downloadable security software for ensuring the security of electronic mail, protecting data, and computer virus scanning, in the fields of mobile security, cloud security, secure unified collaboration and the Internet of Things (IoT); security computer hardware in the area of mobile security, cloud security, secure unified collaboration and the Internet of Things (IoT); computer hardware and software systems for security operations center management, namely, computer hardware and downloadable software for ensuring the security of electronic mail, protecting data, and computer virus scanning, performing computer security policy assessment, routing customer support and customer service telephone calls and remotely troubleshooting computers, performing computer vulnerability assessments, performing cybersecurity diagnostics, performing cybersecurity maintenance on hardware and software, performing cybersecurity policy assessment, routing customer support and customer service telephone calls and remotely troubleshooting computers with regard to cybersecurity issues, performing cybersecurity vulnerability assessments, performing data security diagnostics, performing data security maintenance of hardware and software, securing data, performing data security policy assessment, routing customer support and customer service telephone calls and remotely troubleshooting computers with regard to data security issues, performing data security vulnerability assessments, endpoint detection and response, performing firewall security assessments, performing firewall security diagnostics, performing firewall security maintenance, creating firewalls, performing firewall security policy assessment, routing customer support and customer service telephone calls and remotely troubleshooting computers with regard to firewall security issues, performing firewall security vulnerability assessments, performing hardware diagnostics, performing hardware maintenance, securing hardware using encryption, performing hardware security policy assessment, routing customer support and customer service telephone calls and remotely troubleshooting computers with regard to computer hardware issues, performing hardware vulnerability assessments, performing information technology diagnostics, performing information technology maintenance of hardware and software, ensuring the security of electronic mail, protecting data, and computer virus scanning, performing information technology security policy assessment, routing customer support and customer service telephone calls and remotely troubleshooting computers with regard to information technology issues, performing information technology vulnerability assessments, managed detection and response, performing computer network diagnostics, performing computer network maintenance, ensuring the security of electronic mail, protecting data, and computer virus scanning, performing computer network security policy assessment, routing customer support and customer service telephone calls and remotely troubleshooting computers with regard to computer network technology issues, performing computer network vulnerability assessments, password diagnostics in the nature of assessing password strength, password maintenance in the nature of reminding users to change passwords at timed intervals, password security in the nature of assessing password strength, performing password security policy assessment, routing customer support and customer service telephone calls and remotely troubleshooting computers with regard to computer password issues, performing password vulnerability assessments, performing computer security policy assessments, performing computer security vulnerability assessments, network penetration testing, security operations center management in the nature of detecting, analyzing, signaling and restoring modifications made to data, files, applications, computer systems and networks, performing software diagnostics, performing software maintenance, performing software security policy assessments, routing customer support and customer service telephone calls and remotely troubleshooting computers with regard to computer software issues, and performing software vulnerability assessments; digital intrusion detection platforms, namely, downloadable software for detecting cybersecurity intrusion; cyber security platforms, namely, downloadable software for ensuring the security of electronic mail, protecting data, and computer virus scanning; computer network threat detection and response platforms, namely, downloadable software for detecting threats to computer networks and responding to threats by securing computer networks
Goods and ServicesTelecommunications services in the field of security software and security hardware, in the nature of providing access to secure telecommunications networks
NOT AVAILABLE"MDR"
Goods and ServicesComputer programming; Design, development, programming and maintenance of computer software; design, development, computer programming and maintenance of electronic data security systems; design, development, programming and maintenance of computer software relating to computer security and prevention of computer risks; design, development, programming and maintenance of computer programs for the security of computers, computer networks, information systems and telecommunication systems as well as internet websites; software design, development, programming and maintenance services in the field of monitoring and analyzing computer network traffic to maintain the integrity of computers, computer networks, information systems and telecommunication systems as well as internet websites; design, development, programming and maintenance of computer hacking prevention programs on the Internet; design, development, programming and maintenance of programs for the removal of viruses on the Internet; computer services in the nature of computer hardware development, data security consulting, development of security systems and contingency planning for information systems, in the field of security software and security hardware; computer services for automating the real-time detection, mitigation, prioritization and prediction of cyber threats and strikes, namely, software as a service (SAAS) services featuring software for automating the real-time detection, mitigation, prioritization and prediction of cyber threats and strikes; computer services, namely, endpoint detection and response of software and hardware threats being computer security threat analysis for protecting data; computer services, namely, managed detection and response of cyber intrusions and threats being computer security threat analysis for protecting data; computer services, namely, hosting secure networking platforms in the nature of websites on the Internet; providing temporary use of on-line non-downloadable software for database management; providing temporary use of on-line non-downloadable software for data protection in computers, computer networks, information systems and telecommunication systems as well as internet websites; providing temporary use of on-line non-downloadable security software for ensuring the security of electronic mail, protecting data, and computer virus scanning, for use with computers, computer networks, information systems and telecommunication systems as well as internet websites; providing temporary use of on-line non-downloadable software for backing up, securing, analyzing and restoring computer and network data; providing temporary use of on-line non-downloadable software for use in managing, monitoring and maintaining the security and integrity of data, files, and information; providing temporary use of on-line non-downloadable software for detecting, analyzing, signaling and restoring modifications made to data, files, applications, computer systems and networks; providing temporary use of on-line non-downloadable software combining learning, automated analysis and hierarchical report functions to detect unauthorized access or attacks on computer systems and networks; providing temporary use of on-line non-downloadable software for monitoring and analyzing computer network traffic and computer network threats; providing temporary use of on-line non-downloadable software for detecting and responding to threats to computers, computer networks, information systems and telecommunication as well as internet websites; providing temporary use of on-line non-downloadable software for computer risk and threat assessment and management; providing temporary use of on-line non-downloadable software for computer security and protection for ensuring the security of electronic mail, protecting data, and computer virus scanning; providing temporary use of on-line non-downloadable software for cyber intrusion detection; providing temporary use of on-line non-downloadable software for cyber intrusion protection; providing temporary use of on-line non-downloadable intrusion detection system (IDS) software; providing temporary use of on-line non-downloadable software for cyber security anomaly detection; providing temporary use of on-line non-downloadable software for analyzing and preventing cyber threats in the fields of computer security; providing temporary use of on-line non-downloadable computer software for providing protection against data theft; providing temporary use of on-line non-downloadable computer software for providing protection against identity theft; providing temporary use of on-line non-downloadable computer software for cyber security intrusion and cyber security threat detection and response; providing temporary use of on-line non-downloadable security software for ensuring the security of electronic mail, protecting data, and computer virus scanning, in the fields of mobile security, cloud security, secure unified collaboration and the Internet of Things (IoT); software as a service (SaaS) services featuring software for analyzing computer access information for preventing security threats; software as a service (SaaS) services featuring software for analyzing computer access information for preventing security threats, data theft, and identity theft; software as a Service (SaaS) services featuring software for protection of data and transmission of data; software as a service (SaaS) services featuring software for managed detection and response to cybersecurity risks; software as a service (SaaS) services featuring software for mining, tracking, and analyzing data to detect and protect against software vulnerabilities and attacks; computer security services, namely, computer security consulting, hard drive erasure, and restricting unauthorized network access by users without credentials; security services for the protection of data and information, namely, computer security consulting, hard drive erasure, and restricting unauthorized network access by users without credentials; security service for the protection against non-authorized access to computers, computer networks, information systems and telecommunication systems as well as internet websites in the nature of restricting unauthorized network access by users without credentials; computer security services in the nature of administering digital certificates; computer security policy assessment, namely, assessing security threats and the computer's response being computer security threat analysis for protecting data; computer security, namely, cybersecurity protocol assessment being technology consulting in the field of cybersecurity in the nature of analyzing threat response of computers, computer networks, information systems and telecommunication systems as well as internet websites; computer security, namely, data security policy assessment being technology consulting in the field of cybersecurity in the nature of analyzing threat response of computers, computer networks, information systems and telecommunication systems as well as internet websites; computer security, namely, firewall security policy assessment technology consulting in the field of cybersecurity in the nature of analyzing threat response of firewalls; computer security, namely, hardware security policy assessment technology consulting in the field of cybersecurity in the nature of analyzing threat response of computer hardware; computer security, namely, information technology security policy assessment technology consulting in the field of cybersecurity in the nature of analyzing threat response of computers, computer networks, information systems and telecommunication systems as well as internet websites; computer virus protection services, namely, monitoring, detecting, intercepting, diagnosing and repairing computers infected with viruses; computer spyware protection services, namely, monitoring, detecting, intercepting, diagnosing and repairing computers infected with spyware; computer security consulting, namely, computer network security assessments; computer security consulting, namely, information system security assessments; IT consultancy, namely, computer security consulting; computer security consultancy; consultancy with respect to information technology, namely, computer security consulting; technology consulting in the field of cybersecurity, namely, consultancy with respect to the security of computers, computer networks, information systems and telecommunication systems as well as internet websites; computer security consulting, namely, computer consultation services for threat detection and response; computer security consulting, namely, computer consulting services in the field of security operations; data security consulting; computer security consulting, namely, computer breach security consultancy; computer and data security consultancy; data security consultancy; computer programming consultancy in the field of cybersecurity; computer security consultancy in the field of scanning and penetration testing of computers, computer networks, information systems and telecommunication as well as internet websites, to assess information security vulnerability; technology consultation in the field of cybersecurity; technological planning and consulting services in the field of managed detection and response; security software and security computer hardware development consultancy in the field of mobile security, cloud security, secure unified communications, threat detection and response, secure collaboration and the Internet of Things (IoT); scientific and industrial research, namely, research and development of new cybersecurity products and threat intelligence systems being computer hardware and software; computer security consulting services in the nature of providing risk management and data security threat analysis services; providing an Internet website portal featuring temporary use of nondownloadable software that allows users to assess and determine computer breach; authentication services for computer security, namely, user authentication services using single sign-on technology for accessing computer networks; computer security system monitoring services, namely, monitoring of computer systems for detecting unauthorized access or data breach; computer security threat analysis for protecting data; monitoring of computer systems for security purposes for detecting unauthorized access or breach; provision of computer security risk management programs, namely, software as a service (SAAS) services featuring software for ensuring the security of electronic mail, protecting data, and computer virus scanning; updating of computer software; management of computer networks for others, namely, updating of computer networks for the purpose of enhancing computer security and prevention of computer risks; cloud-based data and information protection services, namely, computer security threat analysis for protecting data; computer firewall services, namely, software as a service (SAAS) services featuring software for creating firewalls; data encryption services; computer diagnostic services; computer security consulting services, namely, assessing security threats and response of computers, computer networks, information systems and telecommunication systems as well as internet websites; computer security services for restricting unauthorized access to computers, computer networks, information systems and telecommunication systems as well as internet websites; computer support services, namely, troubleshooting of computer software problems; computer support services, namely, monitoring vulnerability of computers, computer networks, information systems and telecommunication systems as well as internet websites and monitoring intrusions in computers, computer networks, information systems and telecommunication systems as well as internet websites for detecting unauthorized access or data breach; computer vulnerability assessments, namely, computer security and telecommunication network security consulting in the nature of scanning and penetration testing of computers, computer networks, information systems and telecommunication systems as well as internet websites to assess information security vulnerability; data security diagnostic services, namely, computer security threat analysis for protecting data; data security diagnostic services, namely, computer security and telecommunication network security consulting in the nature of security threat analysis for computers, computer networks, information systems and telecommunication systems as well as internet websites for protecting data; data security support services, namely, troubleshooting of computer software problems, monitoring of computer systems for detecting unauthorized access or data breach for the purpose of preventing cybersecurity threats and cyber intrusions; data security vulnerability assessments, namely, troubleshooting in the nature of diagnosing computer hardware and software security vulnerabilities and computer security and telecommunication network security consulting in the nature of scanning and penetration testing of computers, computer networks, information systems and telecommunication systems as well as internet websites to assess information security vulnerability; data security services, namely, computer security threat analysis for protecting data; data security services, namely, computer security and telecommunication network security consulting in the nature of security threat analysis of computers, computer networks, information systems and telecommunication systems as well as internet websites for protecting data; firewall security assessments, namely, computer security and telecommunication network security consulting in the nature of scanning and penetration testing of computers, computer networks, information systems and telecommunication systems as well as internet websites to assess information security vulnerability; firewall security diagnostic services, namely, computer security threat analysis for protecting data, telecommunication network security consultancy in the nature of network security threat analysis for protecting data; firewall security support services, namely, troubleshooting of computer software problems, monitoring of computer systems for detecting unauthorized access or data breach for the purpose of preventing cybersecurity threats and cyber intrusions; firewall security vulnerability assessments, namely, computer security and telecommunication network security consulting in the nature of scanning and penetration testing of computers, computer networks, information systems and telecommunication systems as well as internet websites to assess information security vulnerability; firewall security services, namely, computer security threat analysis for protecting data; technical support services, namely, troubleshooting of computer software problems, monitoring of computer systems for detecting unauthorized access or data breach for the purpose of preventing cybersecurity threats and cyber intrusions; computer hardware vulnerability assessments, namely, computer security and telecommunication network security consulting in the nature of scanning and penetration testing of computers, computer networks, information systems and telecommunication systems as well as internet websites to assess information security vulnerability; information technology diagnostic services, namely, computer security threat analysis for protecting data; information technology security services, namely, computer security threat analysis for protecting data; information technology support services, namely, troubleshooting of computer software problems, monitoring of computer systems for detecting unauthorized access or data breach for the purpose of preventing cybersecurity threats and cyber intrusions; information technology vulnerability assessments, namely, computer security and telecommunication network security consulting in the nature of scanning and penetration testing of computers, computer networks, information systems and telecommunication systems as well as internet websites to assess information security vulnerability; managed security application service provider services, namely, hosting, managing, developing, analyzing, and maintaining applications, software, and web sites of others in the fields of cybersecurity; network vulnerability assessments, namely, computer security and telecommunication network security consulting in the nature of scanning and penetration testing of computers, computer networks, information systems and telecommunication systems as well as internet websites to assess information security vulnerability; computer password diagnostic services; computer password security services, namely, providing authentication, issuance, validation and revocation of digital certificates; computer password technology support services, namely, providing help desk services to retrieve computer software and hardware passwords; password vulnerability assessments, namely, computer security and telecommunication network security consulting in the nature of scanning and penetration testing of computers, computer networks, information systems and telecommunication systems as well as internet websites to assess information security vulnerability; computer security consulting, namely, penetration testing for computer security threats for computer hardware and software; software diagnostic services, namely, computer security threat analysis for protecting data; software security policy assessments, namely, computer security threat analysis for protecting data; testing of security systems comprised of computer software and hardware; vulnerability assessments, namely, computer security and telecommunication network security consulting in the nature of scanning and penetration testing of computers, computer networks, information systems and telecommunication systems as well as internet websites to assess information security vulnerability; cybersecurity services in the nature of restricting unauthorized access to computers, computer networks, information systems and telecommunication systems as well as internet websites; cybersecurity services, namely, computer security threat analysis for protecting data; cybersecurity services, namely, computer security threat analysis in the nature of restricting unauthorized access to computers, computer networks, information systems and telecommunication systems as well as internet websites; cybersecurity services, namely, troubleshooting of computer software problems, monitoring of computer systems for detecting unauthorized access or data breach for the purpose of preventing cybersecurity threats and cyber intrusions; computer cybersecurity services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials and monitoring of computer systems for detecting unauthorized access or data breach for the purpose of preventing cybersecurity threats and intrusions

Classification Information


International Class038 - Services allowing people to communicate with another by a sensory means.
US Class Codes100, 101, 104
Class Status Code6 - Active
Class Status DateThursday, December 5, 2024
Primary Code038
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus.
US Class Codes021, 023, 026, 036, 038
Class Status Code6 - Active
Class Status DateThursday, December 5, 2024
Primary Code009
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateThursday, December 5, 2024
Primary Code042
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

Trademark Owner History


Party NameKudelski S.A.
Party Type10 - Original Applicant
Legal Entity Type33 - NOT AVAILABLE
AddressCH

Trademark Events


Event DateEvent Description
Thursday, December 5, 2024SN ASSIGNED FOR SECT 66A APPL FROM IB
Monday, December 9, 2024NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Monday, December 9, 2024APPLICATION FILING RECEIPT MAILED
Thursday, January 2, 2025ASSIGNED TO EXAMINER
Wednesday, January 8, 2025NON-FINAL ACTION WRITTEN
Saturday, March 15, 2025REFUSAL PROCESSED BY IB
Monday, August 25, 2025CORRESPONDENCE RECEIVED IN LAW OFFICE
Thursday, January 9, 2025NON-FINAL ACTION (IB REFUSAL) PREPARED FOR REVIEW
Tuesday, February 25, 2025NON-FINAL ACTION MAILED - REFUSAL SENT TO IB
Tuesday, February 25, 2025REFUSAL PROCESSED BY MPU
Friday, April 11, 2025NEW REPRESENTATIVE AT IB RECEIVED
Saturday, September 13, 2025NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED
Saturday, September 13, 2025EXAMINERS AMENDMENT E-MAILED
Saturday, September 13, 2025EXAMINERS AMENDMENT -WRITTEN
Saturday, September 13, 2025EXAMINER'S AMENDMENT ENTERED
Saturday, September 13, 2025APPROVED FOR PUB - PRINCIPAL REGISTER
Monday, August 25, 2025TEAS/EMAIL CORRESPONDENCE ENTERED
Monday, August 25, 2025TEAS RESPONSE TO OFFICE ACTION RECEIVED