STEALTHPATH Trademark

Trademark Overview


On Thursday, November 19, 2015, a trademark application was filed for STEALTHPATH with the United States Patent and Trademark Office. The USPTO has given the STEALTHPATH trademark a serial number of 86826134. The federal status of this trademark filing is ABANDONED - NO STATEMENT OF USE FILED as of Monday, August 5, 2019. This trademark is owned by Apical IQ LLC. The STEALTHPATH trademark is filed in the Computer & Software Products & Electrical & Scientific Products, Construction & Repair Services, Education & Entertainment Services, and Computer & Software Services & Scientific Services categories with the following description:

Computer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, bootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, worms, cyber-attacks, malicious attacks, and advanced persistent threats; computer software for preventing malicious attacks on, and unauthorized activities and intrusions in, computers, computer systems, software applications, digital devices; computer software and hardware providing secure networks over virtual computer systems and virtual computer environments; computer firmware and computer software for enhancing industrial automation and for assessing and identifying vulnerabilities and cyber security threats and risks in control system infrastructure, computer control systems, and devices, and for testing the effectiveness of cyber security applications, devices, and systems to achieve optimal network security, all in the field of cyber security vulnerability t...

Technical support services, namely, installation and troubleshooting of computer hardware, computer networks and platforms all in the field of cyber security

Training in the use and operation of computer software, hardware, computer networks and platforms all in the field of cyber security

Computer services, namely, designing and implementing cyber security and privacy requirements and protocols in information technology systems for others; Information technology consulting services; Maintenance of computer software relating to computer security and prevention of computer risks; Planning, design and implementation of computer technologies for others; Updating of computer software relating to computer security and prevention of computer risks; Software as a service (SAAS) services featuring software for use in detecting, reporting, analyzing and eliminating cyber incidents, namely malware, unauthorized software and network attacks; Software as a service (SAAS) services featuring software for use in identification, acquisition, storage, encryption, management, manipulation, analysis and reporting of security breach events of computer and computer network data, metadata, data files, and information; Software as a service (SAAS) services featuring software for use in secure ...
stealthpath

General Information


Serial Number86826134
Word MarkSTEALTHPATH
Filing DateThursday, November 19, 2015
Status606 - ABANDONED - NO STATEMENT OF USE FILED
Status DateMonday, August 5, 2019
Registration Number0000000
Registration DateNOT AVAILABLE
Mark Drawing4000 - Illustration: Drawing with word(s) / letter(s) / number(s) in Block form
Published for Opposition DateTuesday, May 10, 2016

Trademark Statements


Goods and ServicesComputer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, bootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, worms, cyber-attacks, malicious attacks, and advanced persistent threats; computer software for preventing malicious attacks on, and unauthorized activities and intrusions in, computers, computer systems, software applications, digital devices; computer software and hardware providing secure networks over virtual computer systems and virtual computer environments; computer firmware and computer software for enhancing industrial automation and for assessing and identifying vulnerabilities and cyber security threats and risks in control system infrastructure, computer control systems, and devices, and for testing the effectiveness of cyber security applications, devices, and systems to achieve optimal network security, all in the field of cyber security vulnerability testing and prevention
Goods and ServicesTechnical support services, namely, installation and troubleshooting of computer hardware, computer networks and platforms all in the field of cyber security
Goods and ServicesTraining in the use and operation of computer software, hardware, computer networks and platforms all in the field of cyber security
Goods and ServicesComputer services, namely, designing and implementing cyber security and privacy requirements and protocols in information technology systems for others; Information technology consulting services; Maintenance of computer software relating to computer security and prevention of computer risks; Planning, design and implementation of computer technologies for others; Updating of computer software relating to computer security and prevention of computer risks; Software as a service (SAAS) services featuring software for use in detecting, reporting, analyzing and eliminating cyber incidents, namely malware, unauthorized software and network attacks; Software as a service (SAAS) services featuring software for use in identification, acquisition, storage, encryption, management, manipulation, analysis and reporting of security breach events of computer and computer network data, metadata, data files, and information; Software as a service (SAAS) services featuring software for use in secure cross-enterprise data collaboration, workflow auditing and reporting, data management and sharing, identity management, access control, and data backup and recovery in the field of cyber security; Computer consultation in the field of computer security; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Scientific and technological services, namely, research and design in the field of cyber security; Consulting services in the field of cyber security; Platform as a service (PAAS) featuring computer software platforms used for monitoring industrial network security in the field of cyber security; Consulting services in the field of testing and assessing networked devices for cyber security vulnerabilities and risks; Computer consultation in the field of cyber security, namely, providing approvals that minimum security levels have been achieved in the field of cyber security vulnerability testing of networked devices; technical support services, namely, installation, administration, and troubleshooting of computer software in the field of cyber security
Pseudo MarkSTEALTH PATH

Classification Information


International Class009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus.
US Class Codes021, 023, 026, 036, 038
Class Status Code6 - Active
Class Status DateTuesday, November 24, 2015
Primary Code009
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class037 - Building construction; repair; installation services.
US Class Codes100, 103, 106
Class Status Code6 - Active
Class Status DateThursday, March 10, 2016
Primary Code037
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class041 - Education; providing of training; entertainment; sporting and cultural activities.
US Class Codes100, 101, 107
Class Status Code6 - Active
Class Status DateThursday, March 10, 2016
Primary Code041
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateTuesday, November 24, 2015
Primary Code042
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

Trademark Owner History


Party NameSTEALTHPATH INC.
Party Type21 - New Owner After Publication
Legal Entity Type03 - Corporation
AddressRESTON, VA 20191

Party NameSTEALTHPATH LLC
Party Type20 - Owner at Publication
Legal Entity Type16 - Limited Liability Company
AddressALEXANDRIA, VA 22315

Party NameSTEALTHPATH LLC
Party Type11 - New Owner Before Publication
Legal Entity Type16 - Limited Liability Company
AddressALEXANDRIA, VA 22315

Party NameApical IQ LLC
Party Type10 - Original Applicant
Legal Entity Type03 - Corporation
AddressBoynton Beach, FL 33472

Trademark Events


Event DateEvent Description
Monday, August 5, 2019ABANDONMENT NOTICE E-MAILED - NO USE STATEMENT FILED
Monday, August 5, 2019ABANDONMENT - NO USE STATEMENT FILED
Saturday, January 5, 2019NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED
Wednesday, January 2, 2019TEAS CHANGE OF CORRESPONDENCE RECEIVED
Friday, January 4, 2019EXTENSION 5 GRANTED
Wednesday, January 2, 2019EXTENSION 5 FILED
Wednesday, January 2, 2019TEAS EXTENSION RECEIVED
Tuesday, June 19, 2018NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED
Friday, June 15, 2018TEAS CHANGE OF CORRESPONDENCE RECEIVED
Friday, June 15, 2018EXTENSION 4 GRANTED
Friday, June 15, 2018EXTENSION 4 FILED
Friday, June 15, 2018TEAS EXTENSION RECEIVED
Thursday, December 28, 2017NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED
Tuesday, December 26, 2017EXTENSION 3 GRANTED
Tuesday, December 26, 2017EXTENSION 3 FILED
Tuesday, December 26, 2017TEAS EXTENSION RECEIVED
Wednesday, July 19, 2017AUTOMATIC UPDATE OF ASSIGNMENT OF OWNERSHIP
Friday, May 26, 2017NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED
Thursday, May 25, 2017EXTENSION 2 GRANTED
Friday, May 12, 2017EXTENSION 2 FILED
Friday, May 19, 2017CASE ASSIGNED TO INTENT TO USE PARALEGAL
Friday, May 12, 2017TEAS EXTENSION RECEIVED
Wednesday, May 3, 2017ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED
Wednesday, May 3, 2017TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED
Saturday, January 7, 2017NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED
Thursday, January 5, 2017EXTENSION 1 GRANTED
Thursday, January 5, 2017EXTENSION 1 FILED
Thursday, January 5, 2017TEAS EXTENSION RECEIVED
Tuesday, July 5, 2016NOA E-MAILED - SOU REQUIRED FROM APPLICANT
Tuesday, May 10, 2016OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
Tuesday, May 10, 2016PUBLISHED FOR OPPOSITION
Wednesday, April 20, 2016NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
Wednesday, April 6, 2016LAW OFFICE PUBLICATION REVIEW COMPLETED
Friday, April 1, 2016ASSIGNED TO LIE
Monday, March 14, 2016APPROVED FOR PUB - PRINCIPAL REGISTER
Thursday, March 10, 2016TEAS/EMAIL CORRESPONDENCE ENTERED
Wednesday, March 9, 2016CORRESPONDENCE RECEIVED IN LAW OFFICE
Wednesday, March 9, 2016TEAS RESPONSE TO OFFICE ACTION RECEIVED
Wednesday, February 24, 2016AUTOMATIC UPDATE OF ASSIGNMENT OF OWNERSHIP
Friday, January 29, 2016NOTIFICATION OF NON-FINAL ACTION E-MAILED
Friday, January 29, 2016NON-FINAL ACTION E-MAILED
Friday, January 29, 2016NON-FINAL ACTION WRITTEN
Friday, January 15, 2016ASSIGNED TO EXAMINER
Wednesday, November 25, 2015NOTICE OF PSEUDO MARK E-MAILED
Tuesday, November 24, 2015NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM
Monday, November 23, 2015NEW APPLICATION ENTERED IN TRAM