RADICALLY OPEN SECURITY Trademark

Trademark Overview


On Monday, May 26, 2014, a trademark application was filed for RADICALLY OPEN SECURITY with the United States Patent and Trademark Office. The USPTO has given the RADICALLY OPEN SECURITY trademark a serial number of 86291495. The federal status of this trademark filing is ABANDONED - FAILURE TO RESPOND OR LATE RESPONSE as of Tuesday, April 14, 2015. The RADICALLY OPEN SECURITY trademark is filed in the Computer & Software Services & Scientific Services category with the following description:

Computer consultation in the field of computer security; Computer forensic services; Computer hardware and software design; Computer network configuration services; Computer network design and computer software design for the computer security; Computer programming and computer system analysis; Computer programming and software design; Computer programming consultancy; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the web sites of others; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, w...
radically open security

General Information


Serial Number86291495
Word MarkRADICALLY OPEN SECURITY
Filing DateMonday, May 26, 2014
Status602 - ABANDONED - FAILURE TO RESPOND OR LATE RESPONSE
Status DateTuesday, April 14, 2015
Registration Number0000000
Registration DateNOT AVAILABLE
Mark Drawing4000 - Illustration: Drawing with word(s) / letter(s) / number(s) in Block form
Published for Opposition DateNOT AVAILABLE

Trademark Statements


Goods and ServicesComputer consultation in the field of computer security; Computer forensic services; Computer hardware and software design; Computer network configuration services; Computer network design and computer software design for the computer security; Computer programming and computer system analysis; Computer programming and software design; Computer programming consultancy; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the web sites of others; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software consultancy; Computer software consultation; Computer software consulting; Computer software design; Computer software design for others; Computer software development; Computer software development and computer programming development for others; Computer software development in the field of computer security; Computer software development, computer programming and maintenance of computer software for computer security; Computer systems analysis; Computer virus protection services; Consulting in the field of configuration management for computer hardware and software; Design and development of computer software; Design and development of computers and programs for computers; Design and development of electronic data security systems; Development and creation of computer programmes for data processing; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit Computer consultation in the field of computer security; Computer forensic services; Computer hardware and software design; Computer network configuration services; Computer network design and computer software design for the computer security; Computer programming and computer system analysis; Computer programming and software design; Computer programming consultancy; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the web sites of others; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software consultancy; Computer software consultation; Computer software consulting; Computer software design; Computer software design for others; Computer software development; Computer software development and computer programming development for others; Computer software development in the field of computer security; Computer software development, computer programming and maintenance of computer software for computer security; Computer systems analysis; Computer virus protection services; Consulting in the field of configuration management for computer hardware and software; Design and development of computer software; Design and development of computers and programs for computers; Design and development of electronic data security systems; Development and creation of computer programmes for data processing; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of security systems and contingency planning for information systems; Development of software for secure network operations; Maintenance of computer software relating to computer security and prevention of computer risks; On-line security services, namely, providing security and anonymity for electronically transmitted credit card transactions; Planning, design and implementation of computer technologies for others; Programming of computer software for others; Recovery of computer data; Rental of computers relating to computer security and prevention of computer risks; Research and development of computer software; Research in the field of intelligence and security technology; Technical advice relating to operation of computers; Technical support, namely, monitoring technological functions of computer network systems; Technological consultation in the technology field of computer security; Technological planning and consulting services in the field of computer security; Testing of security systems; Updating of computer software relating to computer security and prevention of computer risksplanning, and sales management; Development of security systems and contingency planning for information systems; Development of software for secure network operations; Maintenance of computer software relating to computer security and prevention of computer risks; On-line security services, namely, providing security and anonymity for electronically transmitted credit card transactions; Planning, design and implementation of computer technologies for others; Programming of computer software for others; Recovery of computer data; Rental of computers relating to computer security and prevention of computer risks; Research and development of computer software; Research in the field of intelligence and security technology; Technical advice relating to operation of computers; Technical support, namely, monitoring technological functions of computer network systems; Technological consultation in the technology field of computer security; Technological planning and consulting services in the field of computer security; Testing of security systems; Updating of computer software relating to computer security and prevention of computer risks

Classification Information


International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateMonday, June 9, 2014
Primary Code042
First Use Anywhere DateThursday, March 27, 2014
First Use In Commerce DateThursday, March 27, 2014

Trademark Owner History


Party NameNOT AVAILABLE
Party Type10 - Original Applicant
Legal Entity Type01 - Individual
AddressCoral Springs, FL 33067

Trademark Events


Event DateEvent Description
Tuesday, April 14, 2015ABANDONMENT NOTICE MAILED - FAILURE TO RESPOND
Tuesday, April 14, 2015ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE
Tuesday, September 16, 2014NOTIFICATION OF NON-FINAL ACTION E-MAILED
Tuesday, September 16, 2014NON-FINAL ACTION E-MAILED
Tuesday, September 16, 2014NON-FINAL ACTION WRITTEN
Tuesday, September 9, 2014ASSIGNED TO EXAMINER
Monday, June 9, 2014NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM
Thursday, May 29, 2014NEW APPLICATION ENTERED IN TRAM