S Trademark

Trademark Overview


On Wednesday, October 1, 2025, a trademark application was filed for S with the United States Patent and Trademark Office. The USPTO has given the S trademark a serial number of 99424113. The federal status of this trademark filing is APPROVED FOR PUBLICATION as of Tuesday, May 12, 2026. This trademark is owned by Scinary Cybersecurity, LLC. The S trademark is filed in the Computer & Software Services & Scientific Services category with the following description:

Computer disaster recovery planning; Computer forensic services; Computer security threat analysis for protecting data; Computer technology consultancy; Computer technology consultancy in the field of cybersecurity, malware analysis, threat hunting, IT support, technology audits, disaster recovery, antivirus monitoring, and incident response and handling; Consultancy in the field of software design; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Design and development of software and hardware for cybersecurity, malware analysis, threat hunting, IT support, technology audits, disaster recovery, antivirus monitoring, and incident response and handling; Design and development of computer hardware and software; Design and development of computer software; Design and development of on-line compute...
s

General Information


Serial Number99424113
Word MarkS
Filing DateWednesday, October 1, 2025
Status680 - APPROVED FOR PUBLICATION
Status DateTuesday, May 12, 2026
Registration Number0000000
Registration DateNOT AVAILABLE
Mark Drawing3 - Illustration: Drawing or design which also includes word(s) / letter(s) / number(s)
Published for Opposition DateNOT AVAILABLE

Trademark Statements


Goods and ServicesComputer disaster recovery planning; Computer forensic services; Computer security threat analysis for protecting data; Computer technology consultancy; Computer technology consultancy in the field of cybersecurity, malware analysis, threat hunting, IT support, technology audits, disaster recovery, antivirus monitoring, and incident response and handling; Consultancy in the field of software design; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Design and development of software and hardware for cybersecurity, malware analysis, threat hunting, IT support, technology audits, disaster recovery, antivirus monitoring, and incident response and handling; Design and development of computer hardware and software; Design and development of computer software; Design and development of on-line computer software systems; Design, development, installation and maintenance of computer software; Design, development, and implementation of software for cybersecurity, malware analysis, threat hunting, IT support, technology audits, disaster recovery, antivirus monitoring, and incident response and handling; Design, development and implementation of software; Design, maintenance, development and updating of computer software; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of security systems and contingency planning for information systems; Information technology consulting relating to computer network design; Planning, design and management of information technology systems; Providing temporary use of non-downloadable computer anti-virus software; Software design and development; Computer software design and development; Design and development of software; Software engineering services; Technological planning and consulting services in the field of cybersecurity, malware analysis, threat hunting, IT support, technology audits, disaster recovery, antivirus monitoring, and incident response and handling; Testing, analysis, and evaluation of computer software and computer hardware for cybersecurity, malware analysis, threat hunting, IT support, technology audits, disaster recovery, antivirus monitoring, and incident response and handling to assure compliance with industry standards; Computer software consultancy; Computer software consultation; Computer software design; Computer software design and updating; Computer software design for others; Design of computer software; Computer software design, computer programming, and maintenance of computer software; Design, programming, and maintenance of computer software platforms; Computer software development and computer programming development for others; Computer software development, computer programming and maintenance of computer software for cybersecurity, malware analysis, threat hunting, IT support, technology audits, disaster recovery, antivirus monitoring, and incident response and handling; Computer software installation and maintenance; Preparation, update, installation and maintenance of computer software; Installation, maintenance, and updating of computer software; Installation, maintenance and repair of computer software; Design, installation, updating and maintenance of computer software; Installation, maintenance and repair of software for computer systems; Information technology consultancy relating to installation, maintenance and repair of computer software; Computer programming and software design; Computer programming consultancy in the field of cybersecurity, malware analysis, threat hunting, IT support, technology audits, disaster recovery, antivirus monitoring, and incident response and handling; Computer security consultancy in the field of cybersecurity, malware analysis, threat hunting, IT support, technology audits, disaster recovery, antivirus monitoring, and incident response and handling; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer services, namely, on-site management of information technology (IT) systems of others; Computer services, namely, remote management of the information technology (IT) systems of others; Consultation services relating to computer software; Outsource service provider in the field of information technology consulting relating to installation, maintenance and repair of computer software; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Creating, maintaining, and modernizing computer software; Custom design of computer software; Design and development of electronic data security systems; Design and writing of computer software; Design for others in the field of computer software; Developing and updating computer software; Developing computer software; Development of software for secure network operations; Installation and maintenance of computer software; Providing a website that features technology that enables the secure exchange of information by users; Technology consultation in the field of cybersecurity; Updating of computer software; Maintenance and updating of computer software; Updating of computer software for others; Updating and design of computer software; Updating and maintenance of computer software; Updating of computer software relating to computer security and prevention of computer risks; Monitoring of computer systems to detect cybersecurity incidents; Computer programming consultancy in the field of cybersecurity
Description of MarkThe mark consists of a helmet that is gray and light gray on the left side and blue and light blue on the right side. The left side of the helmet forms the stylized letter "S". At the top of the helmet is a blue and light blue quadrilateral shape. The color white represents background and/or transparent areas and is not claimed as a feature of the mark.
Indication of Colors claimedThe color(s) light gray, gray, light blue, and blue is/are claimed as a feature of the mark.

Classification Information


International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateWednesday, October 1, 2025
Primary Code042
First Use Anywhere DateThursday, December 9, 2021
First Use In Commerce DateFriday, September 9, 2022

Trademark Owner History


Party NameScinary Cybersecurity, LLC
Party Type10 - Original Applicant
Legal Entity Type16 - Limited Liability Company
AddressWaco, TX 76715
US

Trademark Events


Event DateEvent Description
Wednesday, October 1, 2025NEW APPLICATION ENTERED
Wednesday, October 1, 2025APPLICATION FILING RECEIPT MAILED
Sunday, February 8, 2026NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Sunday, February 8, 2026NOTICE OF DESIGN SEARCH CODE E-MAILED
Monday, February 9, 2026ASSIGNED TO EXAMINER
Wednesday, February 11, 2026NON-FINAL ACTION WRITTEN
Wednesday, February 11, 2026NON-FINAL ACTION E-MAILED
Wednesday, February 11, 2026NOTIFICATION OF NON-FINAL ACTION E-MAILED
Monday, May 11, 2026TEAS RESPONSE TO OFFICE ACTION RECEIVED
Monday, May 11, 2026CORRESPONDENCE RECEIVED IN LAW OFFICE
Monday, May 11, 2026TEAS/EMAIL CORRESPONDENCE ENTERED
Tuesday, May 12, 2026EXAMINERS AMENDMENT -WRITTEN
Tuesday, May 12, 2026EXAMINERS AMENDMENT E-MAILED
Tuesday, May 12, 2026NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED
Tuesday, May 12, 2026EXAMINER'S AMENDMENT ENTERED
Tuesday, May 12, 2026APPROVED FOR PUB - PRINCIPAL REGISTER