ONE SECURITY Trademark

Trademark Overview


On Tuesday, November 20, 2012, a trademark application was filed for ONE SECURITY with the United States Patent and Trademark Office. The USPTO has given the ONE SECURITY trademark a serial number of 85783895. The federal status of this trademark filing is ABANDONED - FAILURE TO RESPOND OR LATE RESPONSE as of Wednesday, December 14, 2016. This trademark is owned by Tencent Holdings Limited. The ONE SECURITY trademark is filed in the Computer & Software Products & Electrical & Scientific Products and Computer & Software Services & Scientific Services categories with the following description:

(Based on 44(e)) (Based on Intent to Use) Computer hardware; computer network security software; security software for use with wireless devices; computer network security keys; USB computer security keys; anti-spyware software; anti-virus software; software for ensuring the security of electronic mail; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software for detecting, blocking, and intercepting malware and other threats to computer hardware ...

(Based on 44(e)) (Based on Intent to Use) Advisory services relating to computer software, namely, in the field of product development and quality improvement; computer hardware and software consultancy services, namely, consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; computer programming and software design; research and design services relating to network security software; computer software research; design of computer software for use with wireless networks and devices; development of software for secure network operations; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; design of software for pro...
one security

General Information


Serial Number85783895
Word MarkONE SECURITY
Filing DateTuesday, November 20, 2012
Status602 - ABANDONED - FAILURE TO RESPOND OR LATE RESPONSE
Status DateWednesday, December 14, 2016
Registration Number0000000
Registration DateNOT AVAILABLE
Mark Drawing3000 - Illustration: Drawing or design which also includes word(s) / letter(s) / number(s)
Published for Opposition DateNOT AVAILABLE

Trademark Statements


Indication of Colors claimedColor is not claimed as a feature of the mark.
Disclaimer with Predetermined Text"SECURITY"
Description of MarkThe mark consists of a geometric design with a triangular shape placed above the wording "ONE SECURITY".
Goods and Services(Based on 44(e)) (Based on Intent to Use) Computer hardware; computer network security software; security software for use with wireless devices; computer network security keys; USB computer security keys; anti-spyware software; anti-virus software; software for ensuring the security of electronic mail; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; computer software for identity security; computer software for authentication and identity management information security; computer software for detecting identity fraud; computer software and firmware for the management, transmission, and storage of data and information; computer software for use in vulnerability scanning of networks, websites and electronic devices
Goods and Services(Based on 44(e)) (Based on Intent to Use) Advisory services relating to computer software, namely, in the field of product development and quality improvement; computer hardware and software consultancy services, namely, consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; computer programming and software design; research and design services relating to network security software; computer software research; design of computer software for use with wireless networks and devices; development of software for secure network operations; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; design of software for protection of computer network firewalls, servers and other network devices from unauthorized access; design of software for the purpose of scanning, detection and removal of viruses, worms, adware and spyware or any other type of malware; software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; provision of security services for computer networks, computer access and computerised transactions, namely, hard drive erasure

Classification Information


International Class009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus.
US Class Codes021, 023, 026, 036, 038
Class Status Code6 - Active
Class Status DateThursday, November 29, 2012
Primary Code009
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateThursday, November 29, 2012
Primary Code042
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

Trademark Owner History


Party NameTencent Holdings Limited
Party Type10 - Original Applicant
Legal Entity Type03 - Corporation
AddressGrand Cayman
KY

Trademark Events


Event DateEvent Description
Wednesday, December 14, 2016ABANDONMENT NOTICE MAILED - FAILURE TO RESPOND
Wednesday, December 14, 2016ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE
Wednesday, May 18, 2016NOTIFICATION OF FINAL REFUSAL EMAILED
Wednesday, May 18, 2016FINAL REFUSAL E-MAILED
Wednesday, May 18, 2016FINAL REFUSAL WRITTEN
Tuesday, April 26, 2016TEAS/EMAIL CORRESPONDENCE ENTERED
Monday, April 25, 2016CORRESPONDENCE RECEIVED IN LAW OFFICE
Monday, April 25, 2016TEAS RESPONSE TO OFFICE ACTION RECEIVED
Tuesday, February 9, 2016NOTIFICATION OF NON-FINAL ACTION E-MAILED
Tuesday, February 9, 2016NON-FINAL ACTION E-MAILED
Tuesday, February 9, 2016NON-FINAL ACTION WRITTEN
Thursday, January 28, 2016TEAS CHANGE OF CORRESPONDENCE RECEIVED
Saturday, January 9, 2016TEAS/EMAIL CORRESPONDENCE ENTERED
Saturday, January 9, 2016CORRESPONDENCE RECEIVED IN LAW OFFICE
Wednesday, January 6, 2016TEAS RESPONSE TO SUSPENSION INQUIRY RECEIVED
Thursday, September 3, 2015NOTIFICATION OF INQUIRY AS TO SUSPENSION E-MAILED
Thursday, September 3, 2015INQUIRY TO SUSPENSION E-MAILED
Thursday, September 3, 2015SUSPENSION INQUIRY WRITTEN
Wednesday, February 11, 2015REPORT COMPLETED SUSPENSION CHECK CASE STILL SUSPENDED
Wednesday, July 30, 2014REPORT COMPLETED SUSPENSION CHECK CASE STILL SUSPENDED
Wednesday, January 22, 2014REPORT COMPLETED SUSPENSION CHECK CASE STILL SUSPENDED
Friday, July 19, 2013NOTIFICATION OF LETTER OF SUSPENSION E-MAILED
Friday, July 19, 2013LETTER OF SUSPENSION E-MAILED
Friday, July 19, 2013SUSPENSION LETTER WRITTEN
Thursday, June 27, 2013TEAS/EMAIL CORRESPONDENCE ENTERED
Thursday, June 27, 2013CORRESPONDENCE RECEIVED IN LAW OFFICE
Wednesday, June 19, 2013ASSIGNED TO LIE
Monday, June 17, 2013TEAS RESPONSE TO OFFICE ACTION RECEIVED
Saturday, December 15, 2012NOTIFICATION OF NON-FINAL ACTION E-MAILED
Saturday, December 15, 2012NON-FINAL ACTION E-MAILED
Saturday, December 15, 2012NON-FINAL ACTION WRITTEN
Thursday, December 6, 2012ASSIGNED TO EXAMINER
Friday, November 30, 2012NOTICE OF DESIGN SEARCH CODE MAILED
Thursday, November 29, 2012NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM
Friday, November 23, 2012NEW APPLICATION ENTERED IN TRAM