THREATINTEL Trademark

Trademark Overview


On Monday, June 18, 2018, a trademark application was filed for THREATINTEL with the United States Patent and Trademark Office. The USPTO has given the THREATINTEL trademark a serial number of 88005190. The federal status of this trademark filing is ABANDONED - FAILURE TO RESPOND OR LATE RESPONSE as of Thursday, May 2, 2019. This trademark is owned by ProSOC, Inc.. The THREATINTEL trademark is filed in the Computer & Software Services & Scientific Services category with the following description:

Hardware and software in the fields of computer security; computer security consultancy; computer security consultancy providing technical recommendations and advice in the fields of Internet website, network, and computer data security; computer security policy assessment; computer software and services which provide real-time information security intelligence in the fields of computer, data, internet website, and network security; computer software and services for protecting and securing computer networks and applications; computer software and services for providing real-time security audits of an online application, network, and host; computer support services; computer vulnerability assessments; cybersecurity diagnostic services; cybersecurity maintenance services; cybersecurity; cybersecurity policy assessment; cybersecurity support services; cybersecurity vulnerability assessments; data security diagnostic services; data security maintenance services; data security; data securi...
threatintel

General Information


Serial Number88005190
Word MarkTHREATINTEL
Filing DateMonday, June 18, 2018
Status602 - ABANDONED - FAILURE TO RESPOND OR LATE RESPONSE
Status DateThursday, May 2, 2019
Registration Number0000000
Registration DateNOT AVAILABLE
Mark Drawing4000 - Illustration: Drawing with word(s) / letter(s) / number(s) in Block form
Published for Opposition DateNOT AVAILABLE

Trademark Statements


Goods and ServicesHardware and software in the fields of computer security; computer security consultancy; computer security consultancy providing technical recommendations and advice in the fields of Internet website, network, and computer data security; computer security policy assessment; computer software and services which provide real-time information security intelligence in the fields of computer, data, internet website, and network security; computer software and services for protecting and securing computer networks and applications; computer software and services for providing real-time security audits of an online application, network, and host; computer support services; computer vulnerability assessments; cybersecurity diagnostic services; cybersecurity maintenance services; cybersecurity; cybersecurity policy assessment; cybersecurity support services; cybersecurity vulnerability assessments; data security diagnostic services; data security maintenance services; data security; data security policy assessment; data security support services; data security vulnerability assessments; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; endpoint detection and response; firewall security assessments; firewall security diagnostic services; firewall security maintenance services; firewall security; firewall security policy assessment; firewall security support services; firewall security vulnerability assessments; hardware diagnostic services; hardware maintenance services; hardware security; hardware security policy assessment; hardware support services; hardware vulnerability assessments; information technology diagnostic services; information technology maintenance services; information technology security; information technology security policy assessment; information technology support services; information technology vulnerability assessments; maintenance of computer software relating to computer security and prevention of computer risks; managed detection and response; managed security service provider; network diagnostic services; network maintenance services; network security; network security policy assessment; network support services; network vulnerability assessments; password diagnostic services; password maintenance services; password security; password security policy assessment; password support services; password vulnerability assessments; security; security policy assessment; support services; testing of security systems; vulnerability assessments; penetration testing; security operations center management; software diagnostic services; software maintenance services; software security policy assessments; software support services; software vulnerability assessments; vulnerability assessments;Education and training in the fields of computer security; computer security consultancy; computer security consultancy providing technical recommendations and advice in the fields of Internet website, network, and computer data security; computer security policy assessment; computer software and services which provide real-time information security intelligence in the fields of computer, data, internet website, and network security; computer software and services for protecting and securing computer networks and applications; computer software and services for providing real-time security audits of an online application, network, and host; computer support services; computer vulnerability assessments; cybersecurity diagnostic services; cybersecurity maintenance services; cybersecurity; cybersecurity policy assessment; cybersecurity support services; cybersecurity vulnerability assessments; data security diagnostic services; data security maintenance services; data security; data security policy assessment; data security support services; data security vulnerability assessments; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; endpoint detection and response; firewall security assessments; firewall security diagnostic services; firewall security maintenance services; firewall security; firewall security policy assessment; firewall security support services; firewall security vulnerability assessments; hardware diagnostic services; hardware maintenance services; hardware security; hardware security policy assessment; hardware support services; hardware vulnerability assessments; information technology diagnostic services; information technology maintenance services; information technology security; information technology security policy assessment; information technology support services; information technology vulnerability assessments; maintenance of computer software relating to computer security and prevention of computer risks; managed detection and response; managed security service provider; network diagnostic services; network maintenance services; network security; network security policy assessment; network support services; network vulnerability assessments; password diagnostic services; password maintenance services; password security; password security policy assessment; password support services; password vulnerability assessments; security; security policy assessment; support services; testing of security systems; vulnerability assessments; penetration testing; security operations center management; software diagnostic services; software maintenance services; software security policy assessments; software support services; software vulnerability assessments; vulnerability assessments; Computer services in the fields of computer security; computer security consultancy; computer security consultancy providing technical recommendations and advice in the fields of Internet website, network, and computer data security; computer security policy assessment; computer software and services which provide real-time information security intelligence in the fields of computer, data, internet website, and network security; computer software and services for protecting and securing computer networks and applications; computer software and services for providing real-time security audits of an online application, network, and host; computer support services; computer vulnerability assessments; cybersecurity diagnostic services; cybersecurity maintenance services; cybersecurity; cybersecurity policy assessment; cybersecurity support services; cybersecurity vulnerability assessments; data security diagnostic services; data security maintenance services; data security; data security policy assessment; data security support services; data security vulnerability assessments; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; endpoint detection and response; firewall security assessments; firewall security diagnostic services; firewall security maintenance services; firewall security; firewall security policy assessment; firewall security support services; firewall security vulnerability assessments; hardware diagnostic services; hardware maintenance services; hardware security; hardware security policy assessment; hardware support services; hardware vulnerability assessments; information technology diagnostic services; information technology maintenance services; information technology security; information technology security policy assessment; information technology support services; information technology vulnerability assessments; maintenance of computer software relating to computer security and prevention of computer risks; managed detection and response; managed security service provider; network diagnostic services; network maintenance services; network security; network security policy assessment; network support services; network vulnerability assessments; password diagnostic services; password maintenance services; password security; password security policy assessment; password support services; password vulnerability assessments; security; security policy assessment; support services; testing of security systems; vulnerability assessments; penetration testing; security operations center management; software diagnostic services; software maintenance services; software security policy assessments; software support services; software vulnerability assessments; vulnerability assessments; Security services in the fields of computer security; computer security consultancy; computer security consultancy providing technical recommendations and advice in the fields of Internet website, network, and computer data security; computer security policy assessment; computer software and services which provide real-time information security intelligence in the fields of computer, data, internet website, and network security; computer software and services for protecting and securing computer networks and applications; computer software and services for providing real-time security audits of an online application, network, and host; computer support services; computer vulnerability assessments; cybersecurity diagnostic services; cybersecurity maintenance services; cybersecurity; cybersecurity policy assessment; cybersecurity support services; cybersecurity vulnerability assessments; data security diagnostic services; data security maintenance services; data security; data security policy assessment; data security support services; data security vulnerability assessments; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; endpoint detection and response; firewall security assessments; firewall security diagnostic services; firewall security maintenance services; firewall security; firewall security policy assessment; firewall security support services; firewall security vulnerability assessments; hardware diagnostic services; hardware maintenance services; hardware security; hardware security policy assessment; hardware support services; hardware vulnerability assessments; information technology diagnostic services; information technology maintenance services; information technology security; information technology security policy assessment; information technology support services; information technology vulnerability assessments; maintenance of computer software relating to computer security and prevention of computer risks; managed detection and response; managed security service provider; network diagnostic services; network maintenance services; network security; network security policy assessment; network support services; network vulnerability assessments; password diagnostic services; password maintenance services; password security; password security policy assessment; password support services; password vulnerability assessments; security; security policy assessment; support services; testing of security systems; vulnerability assessments; penetration testing; security operations center management; software diagnostic services; software maintenance services; software security policy assessments; software support services; software vulnerability assessments; vulnerability assessments

Classification Information


International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateSaturday, June 23, 2018
Primary Code042
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

Trademark Owner History


Party NameProSOC, Inc.
Party Type10 - Original Applicant
Legal Entity Type03 - Corporation
AddressCarlsbad, CA 92008

Trademark Events


Event DateEvent Description
Wednesday, May 8, 2019TEAS CHANGE OF CORRESPONDENCE RECEIVED
Thursday, May 2, 2019ABANDONMENT NOTICE E-MAILED - FAILURE TO RESPOND
Thursday, May 2, 2019ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE
Thursday, October 4, 2018NOTIFICATION OF NON-FINAL ACTION E-MAILED
Thursday, October 4, 2018NON-FINAL ACTION E-MAILED
Thursday, October 4, 2018NON-FINAL ACTION WRITTEN
Thursday, October 4, 2018ASSIGNED TO EXAMINER
Saturday, June 23, 2018NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM