Serial Number | 86275209 |
Word Mark | STRIXUS |
Filing Date | Thursday, May 8, 2014 |
Status | 602 - ABANDONED - FAILURE TO RESPOND OR LATE RESPONSE |
Status Date | Saturday, April 4, 2015 |
Registration Number | 0000000 |
Registration Date | NOT AVAILABLE |
Mark Drawing | 4000 - Illustration: Drawing with word(s) / letter(s) / number(s) in Block form |
Published for Opposition Date | NOT AVAILABLE |
Goods and Services | (Based on 44(d) Priority Application) Computer consultation in the field of computer security; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, hard drive erasure; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Design and development of electronic data security systems; Design and development of home security systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of security systems and contingency planning for information systems; Development of software for secure network operations; Inserting software protection programs and security programs onto magnetic media; Maintenance of computer software relating to computer security and prevention of computer risks; On-line security services, namely, providing security and anonymity for electronically transmitted credit card transactions; Research in the field of intelligence and security technology(Based on 44(e)) Computer consultation in the field of computer security; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, hard drive erasure; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Design and development of electronic data security systems; Design and development of home security systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of security systems and contingency planning for information systems; Development of software for secure network operations; Inserting software protection programs and security programs onto magnetic media; Maintenance of computer software relating to computer security and prevention of computer risks; On-line security services, namely, providing security and anonymity for electronically transmitted credit card transactions; Research in the field of intelligence and security technology |
Goods and Services | (Based on 44(d) Priority Application) Computer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of point of sale activity indicating theft, fraud, or other criminal activity; Consulting and legal services in the field of privacy and security laws, regulations, and requirements; Consulting services in the field of maintaining the security and integrity of databases; Monitoring of computer systems for security purposes; Monitoring of security systems; Providing a web site featuring information in the field of security(Based on 44(e)) Computer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of point of sale activity indicating theft, fraud, or other criminal activity; Consulting and legal services in the field of privacy and security laws, regulations, and requirements; Consulting services in the field of maintaining the security and integrity of databases; Monitoring of computer systems for security purposes; Monitoring of security systems; Providing a web site featuring information in the field of security |
International Class | 042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software. |
US Class Codes | 100, 101 |
Class Status Code | 6 - Active |
Class Status Date | Tuesday, May 20, 2014 |
Primary Code | 042 |
First Use Anywhere Date | NOT AVAILABLE |
First Use In Commerce Date | NOT AVAILABLE |
International Class | 045 - Legal services; security services for the protection of property and individuals; personal and social services rendered by others to meet the needs of individuals. |
US Class Codes | 100, 101 |
Class Status Code | 6 - Active |
Class Status Date | Tuesday, May 20, 2014 |
Primary Code | 045 |
First Use Anywhere Date | NOT AVAILABLE |
First Use In Commerce Date | NOT AVAILABLE |
Party Name | Massive Pr International Ltd |
Party Type | 10 - Original Applicant |
Legal Entity Type | 03 - Corporation |
Address | Forest Row RH185AH GB |
Event Date | Event Description |
Monday, April 6, 2015 | ABANDONMENT NOTICE MAILED - FAILURE TO RESPOND |
Saturday, April 4, 2015 | ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE |
Tuesday, September 2, 2014 | NOTIFICATION OF NON-FINAL ACTION E-MAILED |
Tuesday, September 2, 2014 | NON-FINAL ACTION E-MAILED |
Tuesday, September 2, 2014 | NON-FINAL ACTION WRITTEN |
Saturday, August 23, 2014 | ASSIGNED TO EXAMINER |
Tuesday, May 20, 2014 | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM |
Monday, May 12, 2014 | NEW APPLICATION ENTERED IN TRAM |