STEALTHPOINT Trademark

Trademark Overview


On Monday, July 18, 2016, a trademark application was filed for STEALTHPOINT with the United States Patent and Trademark Office. The USPTO has given the STEALTHPOINT trademark a serial number of 87107290. The federal status of this trademark filing is ABANDONED - NO STATEMENT OF USE FILED as of Monday, September 25, 2017. This trademark is owned by StealthPath LLC. The STEALTHPOINT trademark is filed in the Computer & Software Products & Electrical & Scientific Products, Construction & Repair Services, Education & Entertainment Services, and Computer & Software Services & Scientific Services categories with the following description:

Computer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, bootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, worms, cyber-attacks, malicious attacks, and advanced persistent threats; computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in, computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer software and hardware providing secure networks over virtual computer systems and virtual computer environments; Industrial firewalls, namely, hardware and embedded software used for monitoring industrial network security; computer networks and platforms, comprising computer hardware, computer network adapters, switches, routers and hubs, and computer firmware and computer software, for enhancing industrial automation and for assessing and identifying vulnerabili...

Technical support services, namely, installation and troubleshooting of computer hardware, industrial firewalls, computer networks and platforms all in the field of cyber security

Training in the use and operation of computer software, hardware, industrial firewalls, computer networks and platforms all in the field of cyber security

Computer services, namely, designing and implementing cyber security and privacy requirements and protocols in information technology systems for others; Information technology consulting services; Maintenance of computer software relating to computer security and prevention of computer risks; Planning, design and implementation of computer technologies for others; Updating of computer software relating to computer security and prevention of computer risks; Software as a service (SAAS) services featuring software for use in detecting, reporting, analyzing and eliminating cyber incidents, namely, malware, unauthorized software and network attacks; Software as a service (SAAS) services featuring software for use in identification, acquisition, storage, encryption, management, manipulation, analysis and reporting of security breach events of computer and computer network data, metadata, data files, and information; Software as a service (SAAS) services featuring software for use in secure...
stealthpoint

General Information


Serial Number87107290
Word MarkSTEALTHPOINT
Filing DateMonday, July 18, 2016
Status606 - ABANDONED - NO STATEMENT OF USE FILED
Status DateMonday, September 25, 2017
Registration Number0000000
Registration DateNOT AVAILABLE
Mark Drawing4000 - Illustration: Drawing with word(s) / letter(s) / number(s) in Block form
Published for Opposition DateTuesday, December 27, 2016

Trademark Statements


Goods and ServicesComputer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, bootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, worms, cyber-attacks, malicious attacks, and advanced persistent threats; computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in, computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer software and hardware providing secure networks over virtual computer systems and virtual computer environments; Industrial firewalls, namely, hardware and embedded software used for monitoring industrial network security; computer networks and platforms, comprising computer hardware, computer network adapters, switches, routers and hubs, and computer firmware and computer software, for enhancing industrial automation and for assessing and identifying vulnerabilities and cyber security threats and risks in control system infrastructure, computer control systems, networks and devices, and for testing the effectiveness of cyber security applications, devices, and systems to achieve optimal network security, all in the field of cyber security vulnerability testing and prevention; Computer hardware with embedded software, namely, firmware, and software for assessing and identifying vulnerabilities and cyber security threats and risks in control system infrastructure, computer control systems, networks and devices, and testing the effectiveness of cyber security applications and devices and systems to achieve optimal device and network security, in the field of cyber security vulnerability testing and prevention of networked devices; Computer hardware in the field of cyber security vulnerability testing and prevention of networked devices
Goods and ServicesTechnical support services, namely, installation and troubleshooting of computer hardware, industrial firewalls, computer networks and platforms all in the field of cyber security
Goods and ServicesTraining in the use and operation of computer software, hardware, industrial firewalls, computer networks and platforms all in the field of cyber security
Goods and ServicesComputer services, namely, designing and implementing cyber security and privacy requirements and protocols in information technology systems for others; Information technology consulting services; Maintenance of computer software relating to computer security and prevention of computer risks; Planning, design and implementation of computer technologies for others; Updating of computer software relating to computer security and prevention of computer risks; Software as a service (SAAS) services featuring software for use in detecting, reporting, analyzing and eliminating cyber incidents, namely, malware, unauthorized software and network attacks; Software as a service (SAAS) services featuring software for use in identification, acquisition, storage, encryption, management, manipulation, analysis and reporting of security breach events of computer and computer network data, metadata, data files, and information; Software as a service (SAAS) services featuring software for use in secure cross-enterprise data collaboration, workflow auditing and reporting, data management and sharing, identity management, access control, and data backup and recovery in the field of cyber security; Computer consultation in the field of computer security; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Scientific and technological services, namely, research and design in the field of cyber security; Consulting services in the field of cyber security; Platform as a service (PAAS) featuring computer software platforms used for monitoring industrial network security in the field of cyber security; Consulting services in the field of testing and assessing networked devices for cyber security vulnerabilities and risks; Computer consultation in the field of cyber security, namely, providing approvals that minimum security levels have been achieved in the field of cyber security vulnerability testing of networked devices; technical support services, namely, installation, administration, and troubleshooting of computer software in the field of cyber security
Pseudo MarkSTEALTH POINT

Classification Information


International Class009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus.
US Class Codes021, 023, 026, 036, 038
Class Status Code6 - Active
Class Status DateThursday, July 21, 2016
Primary Code009
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class037 - Building construction; repair; installation services.
US Class Codes100, 103, 106
Class Status Code6 - Active
Class Status DateThursday, July 21, 2016
Primary Code037
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class041 - Education; providing of training; entertainment; sporting and cultural activities.
US Class Codes100, 101, 107
Class Status Code6 - Active
Class Status DateThursday, July 21, 2016
Primary Code041
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateThursday, July 21, 2016
Primary Code042
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

Trademark Owner History


Party NameSTEALTHPATH INC.
Party Type21 - New Owner After Publication
Legal Entity Type03 - Corporation
AddressRESTON, VA 20191

Party NameStealthPath LLC
Party Type20 - Owner at Publication
Legal Entity Type16 - Limited Liability Company
AddressAlexandria, VA 22315

Party NameStealthPath LLC
Party Type10 - Original Applicant
Legal Entity Type16 - Limited Liability Company
AddressAlexandria, VA 22315

Trademark Events


Event DateEvent Description
Monday, September 25, 2017ABANDONMENT NOTICE MAILED - NO USE STATEMENT FILED
Monday, September 25, 2017ABANDONMENT - NO USE STATEMENT FILED
Wednesday, July 19, 2017AUTOMATIC UPDATE OF ASSIGNMENT OF OWNERSHIP
Wednesday, May 3, 2017ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED
Wednesday, May 3, 2017TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED
Tuesday, February 21, 2017NOA E-MAILED - SOU REQUIRED FROM APPLICANT
Tuesday, December 27, 2016OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
Tuesday, December 27, 2016PUBLISHED FOR OPPOSITION
Wednesday, December 7, 2016NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
Saturday, November 19, 2016LAW OFFICE PUBLICATION REVIEW COMPLETED
Monday, November 14, 2016ASSIGNED TO LIE
Thursday, October 27, 2016APPROVED FOR PUB - PRINCIPAL REGISTER
Thursday, October 27, 2016EXAMINER'S AMENDMENT ENTERED
Thursday, October 27, 2016NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED
Thursday, October 27, 2016EXAMINERS AMENDMENT E-MAILED
Thursday, October 27, 2016EXAMINERS AMENDMENT -WRITTEN
Thursday, October 27, 2016ASSIGNED TO EXAMINER
Friday, July 22, 2016NOTICE OF PSEUDO MARK E-MAILED
Thursday, July 21, 2016NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM
Thursday, July 21, 2016NEW APPLICATION ENTERED IN TRAM