TSUNAMI BUOY Trademark

Trademark Overview


On Tuesday, May 14, 2019, a trademark application was filed for TSUNAMI BUOY with the United States Patent and Trademark Office. The USPTO has given the TSUNAMI BUOY trademark a serial number of 88429666. The federal status of this trademark filing is REGISTERED as of Tuesday, February 18, 2020. This trademark is owned by X Cyber Group Ltd. The TSUNAMI BUOY trademark is filed in the Computer & Software Products & Electrical & Scientific Products, Paper & Printed Material Products, Advertising, Business and Retail Services, Insurance & Financial Services, Education & Entertainment Services, and Computer & Software Services & Scientific Services categories with the following description:

Downloadable computer hardware; Downloadable computer software for use in cyber security, cyber intelligence and cyber risk assessment; Downloadable computer security software; Downloadable computer software that combines security telemetry data received from control points within an enterprise's information technology environment and global cyber security threat data into a single unified platform; Computer hardware and downloadable software, namely, network security appliances, email security appliances, digital data and media security appliances, security software applications, and management stations related to the foregoing; Downloadable computer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer malware, cyber-attacks, malicious attacks, and advanced persistent threats; Downloadable computer software and hardware for digital security; Downloadable computer software and hardware providing secure networks, virtual computer s...

Publications, namely, reports and articles in the field of computer software, computer hardware and cyber security

Business risk assessment services; Business consultancy relating to the administration of information technology; Computer file management; computer data entry services, namely, computerized updating of business data; Computerized file management; Data management services, namely, information and data compiling and analyzing relating to business management; Data processing services; Database management; Compilation of information into computer databases relating to information technology

Insurance risk management and assessment services

Education services, namely, providing classes, lectures, seminars and workshops, in the fields of cyber security, cyber intelligence and cyber risk assessment; training services in the field of cyber security, cyber intelligence and cyber risk assessment; Publication of printed matter, namely, pamphlets, prospectuses, books, publications, periodicals, posters, printed forms, directives, guidelines and fact sheets

Computer consultation services, namely, information technology security, protection and restoration; computer security consultation services, namely, cyber security services; technology advisory services relating to computer hardware and software; Application service provider (ASP), namely, hosting computer software applications of others; Application service provider (asp) featuring software for use for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; Application service provider (asp) featuring software that provides secure virtual computer systems and virtual computing environments; Cloud computing hosting services featuring software and databases for use in computer security and prevention and mitigation of computer risks; Information technology consulting servic...
tsunami buoy

General Information


Serial Number88429666
Word MarkTSUNAMI BUOY
Filing DateTuesday, May 14, 2019
Status700 - REGISTERED
Status DateTuesday, February 18, 2020
Registration Number5988316
Registration DateTuesday, February 18, 2020
Mark Drawing4000 - Illustration: Drawing with word(s) / letter(s) / number(s) in Block form
Published for Opposition DateTuesday, December 3, 2019

Trademark Statements


Goods and ServicesDownloadable computer hardware; Downloadable computer software for use in cyber security, cyber intelligence and cyber risk assessment; Downloadable computer security software; Downloadable computer software that combines security telemetry data received from control points within an enterprise's information technology environment and global cyber security threat data into a single unified platform; Computer hardware and downloadable software, namely, network security appliances, email security appliances, digital data and media security appliances, security software applications, and management stations related to the foregoing; Downloadable computer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer malware, cyber-attacks, malicious attacks, and advanced persistent threats; Downloadable computer software and hardware for digital security; Downloadable computer software and hardware providing secure networks, virtual computer systems and virtual computer environments; Downloadable computer software applications for mobile telephones, smartphones, tablet computers, notebook computers, computers and media players, namely, for cyber security, cyber intelligence and cyber risk assessment; Downloadable computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; downloadable software applications that provides Internet users with information on data collection practices and the ability to view and block the tracking settings, web bugs, web trackers, widgets and advertising services associated with websites visited; downloadable software for use in accessing computer networks and global communications networks; downloadable security analytics software for monitoring network security and identifying threats and vulnerabilities; Downloadable electronic publications in the nature of books, bulletins, booklets, blogs, flyers, leaflets, journals, newsletters and pamphlets in the field of computer software, computer hardware and cyber security; downloadable computer software for use in Application Programming Interface
Goods and ServicesPublications, namely, reports and articles in the field of computer software, computer hardware and cyber security
Goods and ServicesBusiness risk assessment services; Business consultancy relating to the administration of information technology; Computer file management; computer data entry services, namely, computerized updating of business data; Computerized file management; Data management services, namely, information and data compiling and analyzing relating to business management; Data processing services; Database management; Compilation of information into computer databases relating to information technology
Goods and ServicesInsurance risk management and assessment services
Goods and ServicesEducation services, namely, providing classes, lectures, seminars and workshops, in the fields of cyber security, cyber intelligence and cyber risk assessment; training services in the field of cyber security, cyber intelligence and cyber risk assessment; Publication of printed matter, namely, pamphlets, prospectuses, books, publications, periodicals, posters, printed forms, directives, guidelines and fact sheets
Goods and ServicesComputer consultation services, namely, information technology security, protection and restoration; computer security consultation services, namely, cyber security services; technology advisory services relating to computer hardware and software; Application service provider (ASP), namely, hosting computer software applications of others; Application service provider (asp) featuring software for use for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; Application service provider (asp) featuring software that provides secure virtual computer systems and virtual computing environments; Cloud computing hosting services featuring software and databases for use in computer security and prevention and mitigation of computer risks; Information technology consulting services; Computer consultation and research in the field of computer hardware, computer software and network security; Computer security consultation; Computer consulting services in the field of analyzing security intelligence data to uncover threats and prioritize, prevent against future attacks, simplify management of security data; Computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security consultation; Computer security services, namely, provision of firewalls; Computer programming services; Computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; Computer security consultancy; Computer security system monitoring services; technology services, namely, computer systems evaluation; Computer virus protection services; Computerized and technical data analysis services, in particular computerised technical data analysis, in particular for assessing causes of damage and damaging events; computer technology consulting services, namely, conducting of inspections, tests, certifications, authorisations and revisions, in particular for products, installations, devices, operations and businesses, technical or digital systems, monitoring systems, protection systems, safety devices; computer technology consulting services, namely, conducting of technical examinations, inspections and tests, in particular for products, installations, devices, operations and businesses, technical or digital systems, monitoring systems, protection systems, safety devices; Computer security consultancy; Computer programming consultancy services in the fields of digital media, data encryption, computer security, communication security and computer software; Consultancy services relating to information technology; electronic data storage of web pages for online services and the internet; Data security consultancy services; Design and development of computer hardware and software; Design of electronic data storage systems; Design, testing, technical consultancy and research relating to computer programming and computers; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Authentication, issuance and validation of digital certificates for products, installations, devices, operations and businesses, technical or digital systems, monitoring systems, protection systems, safety devices, security systems, documents, procedures or processes, professionals and experts or the like; Development, updating and maintenance of software for networks and standalone computers in the fields of security, database management, and anti-virus protection and monitoring security systems; Electronic document and email archiving services; Encryption and decryption of data and communications; Industrial analysis and research services in the field of computer systems; Providing information relating to information technology; Information technology consultancy and support services, namely, help desk services; Information technology security services in the nature of providing a website that features technology that enables the secure exchange of information by users to view cyber-threat intelligence, to cyber-attack verification, and to security analysis of network traffic, emails, files, media computer software, and mobile applications; Internet security services, namely, globally monitoring and collecting cyber security intelligence; Issuing of information relating to information technology; information technology security, protection, restoration and monitoring, namely, computer virus protection services; Maintenance of computer software; Monitoring of computer systems for security purposes for protecting data and information from unauthorized access; Monitoring of secure computer systems for protecting data and information from unauthorized access; Network and Internet security services for protecting data and information from unauthorized access; Planning, design and management of information technology systems and computer security consultancy; Preparation of technical reports and analyses in conjunction with computer system analysis; Professional computer security consultancy; Providing and creation of information systems and services, namely, planning, design and management of information technology systems; Providing information in the field of computer systems and online security services, via computer networks, wireless networks and the Internet; Providing information in the field of network and Internet security; Providing information in the fields of global computer network and electronic network security; Providing security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the Internet, and computer networks; Providing services in the field of unified security analytics, mainly, to measure, track and reduce cyber security risks, uncover targeted attack campaigns, investigate past or current attacks, and identify anomalous activity across computer networks; Providing technical information in the field of big data analytics; Providing technical information in the field of computer software applications; Development of data processing programs by order of third parties; Provision of information relating to information technology; Conversion of software and computer data; Remote or on-site monitoring of computer systems to ensure proper functioning; Research and consultancy relating to information technology security, protection and monitoring; computer technological consultation in the technology fields of providing security systems, documents, procedures or processes, professionals and experts; Security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analysing global computer information network and internal computer network vulnerability; consultancy services, namely, software implementation; Computer monitoring service which tracks application software performance, performs periodic maintenance and provides reports and alerts concerning such performance; computer technology consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security systems for others; computer technology professional consultancy; Technical consultancy services relating to information technology; Information technology consultation in connection with data and information security, network security, computer security, information technology system security; Information technology consulting services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; Technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; Technical support services, namely, troubleshooting of computer software problems; Updating and maintaining computer software for others; Updating of computer software; Web content categorization and filtering services, namely, providing spam filtering services to protect websites and online applications from receiving unsolicited messages; hosting an internet portal in the fields of technology, cyber security and software development; software as a services, namely, Application Programming Interface software for integration of data content into websites

Classification Information


International Class009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus.
US Class Codes021, 023, 026, 036, 038
Class Status Code6 - Active
Class Status DateThursday, May 30, 2019
Primary Code009
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class016 - Paper, cardboard and goods made from these materials, not included in other classes; printed matter; bookbinding material; photographs; stationery; adhesives for stationery or household purposes; artists' materials; paint brushes; typewriters and office requisites (except furniture); instructional and teaching material (except apparatus); plastic materials for packaging (not included in other classes); printers' type; printing blocks.
US Class Codes002, 005, 022, 023, 029, 037, 038, 050
Class Status Code6 - Active
Class Status DateThursday, May 30, 2019
Primary Code016
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class035 - Advertising; business management; business administration; office functions.
US Class Codes100, 101, 102
Class Status Code6 - Active
Class Status DateThursday, May 30, 2019
Primary Code035
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class036 - Insurance; financial affairs; monetary affairs; real estate affairs.
US Class Codes100, 101, 102
Class Status Code6 - Active
Class Status DateThursday, May 30, 2019
Primary Code036
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class041 - Education; providing of training; entertainment; sporting and cultural activities.
US Class Codes100, 101, 107
Class Status Code6 - Active
Class Status DateThursday, May 30, 2019
Primary Code041
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateThursday, May 30, 2019
Primary Code042
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

Trademark Owner History


Party NameX Cyber Group Ltd
Party Type30 - Original Registrant
Legal Entity Type99 - Other
AddressGloucester GL31JZ
GB

Party NameX Cyber Group Ltd
Party Type20 - Owner at Publication
Legal Entity Type99 - Other
AddressGloucester GL31JZ
GB

Party NameX Cyber Group Ltd
Party Type10 - Original Applicant
Legal Entity Type99 - Other
AddressGloucester GL31JZ
GB

Trademark Events


Event DateEvent Description
Tuesday, February 18, 2020REGISTERED-PRINCIPAL REGISTER
Tuesday, December 3, 2019OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
Tuesday, December 3, 2019PUBLISHED FOR OPPOSITION
Wednesday, November 13, 2019NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
Thursday, October 31, 2019ELECTRONIC RECORD REVIEW COMPLETE
Friday, October 25, 2019ON HOLD - ELECTRONIC RECORD REVIEW REQUIRED
Wednesday, October 23, 2019ASSIGNED TO LIE
Wednesday, October 16, 2019APPROVED FOR PUB - PRINCIPAL REGISTER
Tuesday, October 15, 2019TEAS/EMAIL CORRESPONDENCE ENTERED
Tuesday, October 15, 2019CORRESPONDENCE RECEIVED IN LAW OFFICE
Tuesday, October 15, 2019TEAS RESPONSE TO OFFICE ACTION RECEIVED
Wednesday, August 7, 2019NOTIFICATION OF NON-FINAL ACTION E-MAILED
Wednesday, August 7, 2019NON-FINAL ACTION E-MAILED
Wednesday, August 7, 2019NON-FINAL ACTION WRITTEN
Tuesday, July 30, 2019ASSIGNED TO EXAMINER
Thursday, May 30, 2019NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM
Friday, May 17, 2019NEW APPLICATION ENTERED IN TRAM