WIDE ANGLE Trademark

Trademark Overview


On Friday, September 6, 2013, a trademark application was filed for WIDE ANGLE with the United States Patent and Trademark Office. The USPTO has given the WIDE ANGLE trademark a serial number of 79142574. The federal status of this trademark filing is IR CANCELLED - US REGISTRATION CANCELLED as of Wednesday, September 6, 2023. This trademark is owned by NTT Com Security AG. The WIDE ANGLE trademark is filed in the Computer & Software Products & Electrical & Scientific Products, Advertising, Business and Retail Services, Construction & Repair Services, Communication Services, Education & Entertainment Services, and Computer & Software Services & Scientific Services categories with the following description:

Education, namely, providing classes, seminars, workshops, in the fields of computers, computer networks, IT-platforms, IT-infrastructures, computer databases, internet, computer software, computer hardware, computer peripheral devices, computer firmware, computer systems, the design of computer software, IT security and information risk management; teaching in the fields of computers, computer networks, IT-platforms, IT-infrastructures, computer databases, internet, computer software, computer hardware, computer peripheral devices, computer firmware, computer systems, the design of computer software, IT security and information risk management; providing of training in the fields of computers, computer networks, IT-platforms, IT-infrastructures, computer databases, internet, computer software, computer hardware, computer peripheral devices, computer firmware, computer systems, the design of computer software, IT security and information risk management; educational services, namely, a...

Computers, data processing apparatus; computer firmware for information risk management, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention, authentication user identification, decryption and encryption of data; IT-platforms, namely, computer software platforms for information risk management, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention, authentication user identification, decryption and encryption of data and computer hardware platforms; computer hardware, computer software for IT-infrastructures for information risk management, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention, authentication user identification, decryption and encryption of data; computer hardware and computer peripheral devices for IT-securit...

Telecommunications services, namely, electronic data transmission; providing user access to computer and telecommunication networks, IT-infrastructure, data and information on the internet, databases, and computer software in data networks; providing secure internet access; message sending; providing access to interactive communication networks and internet data processing systems for the transmission of data and information; electronic transmission of data and information; providing on-line communications links which transfer the web site user to other local and global web pages; telecommunications routing and junction services; communications by telephone and computer terminals; providing telephone communication services and electronic data transmission services through interactive electronic media; all of the aforementioned services in this class in the fields of information technology (IT), IT-security, information risk management, IT-security-technology, IT-security-systems, IT-se...

Installation services, namely, installation of computer hardware, computer hardware systems and computer peripheral devices; repair services, namely, repair of computer hardware, computer hardware systems and computer peripheral devices; installation and repair of computer and telecommunication network hardware, apparatus and instruments, IT-platform hardware, apparatus and instruments, IT-infrastructure hardware, apparatus and instruments and computer hardware; installation and repair of apparatus and devices, namely, information technology (IT), IT-security-technology, information risk management technology, IT-security-system, and IT-security apparatus and devices; providing information in the field of repair of computer and telecommunication networking hardware, computer hardware, computer hardware systems, computer peripheral devices, IT-platform and IT-infrastructure hardware, apparatus and instruments; all of the aforementioned services in this class in the fields of information...

Advertising; business management; business administration; providing office functions; retail store and online retail store services in the fields of computer and telecommunication networks hardware and software, IT-platform hardware and software, IT-infrastructure hardware and software, computer hardware, computer software, IT-security hardware and software, information risk management hardware and software, IT-security-systems hardware and software; business inquiries; business management and organization consultancy; commercial information and advice for consumers; advisory services for business management; procurement services for others, namely, purchasing computer hardware and software; professional business consultancy; business investigations, information, and research; compilation of statistics; business appraisals; business management assistance; commercial administration of the licensing of the goods and services of others; business research; computerized file management; sy...

Scientific and technological services, namely, development of security systems, contingency planning for information and telecommunications technology systems; research and industrial analysis in the fields of information and telecommunications technology concerning computer hardware, computer software, IT-security, information risk management, IT-security technology, IT-security systems, IT-security solutions, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention and authentication; design of computer hardware, computer software and computer peripheral devices in the fields of information technology (IT), IT-security, information risk management, IT-security technology, IT-security systems, IT-security solutions, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention and authentication; engineering in the fields of...
wide angle

General Information


Serial Number79142574
Word MarkWIDE ANGLE
Filing DateFriday, September 6, 2013
Status404 - IR CANCELLED - US REGISTRATION CANCELLED
Status DateWednesday, September 6, 2023
Registration Number4787782
Registration DateTuesday, August 11, 2015
Mark Drawing3000 - Illustration: Drawing or design which also includes word(s) / letter(s) / number(s)
Published for Opposition DateTuesday, May 26, 2015

Trademark Statements


Goods and ServicesEducation, namely, providing classes, seminars, workshops, in the fields of computers, computer networks, IT-platforms, IT-infrastructures, computer databases, internet, computer software, computer hardware, computer peripheral devices, computer firmware, computer systems, the design of computer software, IT security and information risk management; teaching in the fields of computers, computer networks, IT-platforms, IT-infrastructures, computer databases, internet, computer software, computer hardware, computer peripheral devices, computer firmware, computer systems, the design of computer software, IT security and information risk management; providing of training in the fields of computers, computer networks, IT-platforms, IT-infrastructures, computer databases, internet, computer software, computer hardware, computer peripheral devices, computer firmware, computer systems, the design of computer software, IT security and information risk management; educational services, namely, arranging and conducting of seminars, symposiums, trainings, workshops, congresses, conferences, colloquiums, in particular in connection with computers, computer networks, IT-platforms, IT-infrastructures, computer databases, internet, computer software, computer hardware, computer peripheral devices, computer firmware, computer systems, the design of computer software, IT security and information risk management; publication of books, magazines, manuals, texts other than publicity texts, journals; all of the aforementioned services in this class in the fields of information technology (IT), IT-security, information risk management, IT-security-technology, IT-security-systems, IT-security-solutions, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention, authentication, in particular in the field of virus protection, spam protection, spyware protection, computer security, network security, internet security, data protection, decryption and encryption of data, protection of unauthorized intrusions, system monitoring, protection of mobile devices, identity and/or access management, policy compliance, e-mail management, vulnerability and threat management, risk management, content and managed perimeter infrastructure security, Virtual Private Network (VPN), remote access, secure communication links, firewall systems
Description of MarkThe mark consists of the words "WIDE ANGLE" where the words are separated by a design of two triangles that intersect to form a diamond.
Goods and ServicesComputers, data processing apparatus; computer firmware for information risk management, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention, authentication user identification, decryption and encryption of data; IT-platforms, namely, computer software platforms for information risk management, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention, authentication user identification, decryption and encryption of data and computer hardware platforms; computer hardware, computer software for IT-infrastructures for information risk management, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention, authentication user identification, decryption and encryption of data; computer hardware and computer peripheral devices for IT-security, excluding audio equipment; computer hardware and computer peripheral devices for information risk management, excluding audio equipment; computer programs for information risk management, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention, authentication user identification, decryption and encryption of data; computer software for information risk management, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention, authentication user identification, decryption and encryption of data; recorded computer operating programs, downloadable computer operating programs, computer operating programs as updates; recorded data media, namely, recorded electronic storage media in the field of information technology security; interfaces for computers; cards with integrated circuits; all of the aforementioned goods in this class in the fields of information technology (IT), IT-security, information risk management, IT-security-technology, IT-security-systems, IT-security-solutions, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention, authentication, in particular in the field of virus protection, spam protection, spyware protection, computer security, network security, internet security, data protection, decryption and encryption of data, protection of unauthorized intrusions, system monitoring, protection of mobile devices, identity and/or access management, policy compliance, e-mail management, vulnerability and threat management, risk management, content and managed perimeter infrastructure security, Virtual Private Network (VPN), remote access, secure communication links, firewall systems
Goods and ServicesTelecommunications services, namely, electronic data transmission; providing user access to computer and telecommunication networks, IT-infrastructure, data and information on the internet, databases, and computer software in data networks; providing secure internet access; message sending; providing access to interactive communication networks and internet data processing systems for the transmission of data and information; electronic transmission of data and information; providing on-line communications links which transfer the web site user to other local and global web pages; telecommunications routing and junction services; communications by telephone and computer terminals; providing telephone communication services and electronic data transmission services through interactive electronic media; all of the aforementioned services in this class in the fields of information technology (IT), IT-security, information risk management, IT-security-technology, IT-security-systems, IT-security-solutions, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention, authentication, in particular in the field of virus protection, spam protection, spyware protection, computer security, network security, internet security, data protection, decryption and encryption of data, protection of unauthorized intrusions, system monitoring, protection of mobile devices, identity and/or access management, policy compliance, e-mail management, vulnerability and threat management, risk management, content and managed perimeter infrastructure security, Virtual Private Network (VPN), remote access, secure communication links, firewall systems
Goods and ServicesInstallation services, namely, installation of computer hardware, computer hardware systems and computer peripheral devices; repair services, namely, repair of computer hardware, computer hardware systems and computer peripheral devices; installation and repair of computer and telecommunication network hardware, apparatus and instruments, IT-platform hardware, apparatus and instruments, IT-infrastructure hardware, apparatus and instruments and computer hardware; installation and repair of apparatus and devices, namely, information technology (IT), IT-security-technology, information risk management technology, IT-security-system, and IT-security apparatus and devices; providing information in the field of repair of computer and telecommunication networking hardware, computer hardware, computer hardware systems, computer peripheral devices, IT-platform and IT-infrastructure hardware, apparatus and instruments; all of the aforementioned services in this class in the fields of information technology (IT), IT-security, information risk management, IT-security-technology, IT-security-systems, IT-security-solutions, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention, authentication, in particular in the field of virus protection, spam protection, spyware protection, computer security, network security, internet security, data protection, decryption and encryption of data, protection of unauthorized intrusions, system monitoring, protection of mobile devices, identity and/or access management, policy compliance, e-mail management, vulnerability and threat management, risk management, content and managed perimeter infrastructure security, Virtual Private Network (VPN), remote access, secure communication links, firewall systems
Indication of Colors claimedColor is not claimed as a feature of the mark.
Goods and ServicesAdvertising; business management; business administration; providing office functions; retail store and online retail store services in the fields of computer and telecommunication networks hardware and software, IT-platform hardware and software, IT-infrastructure hardware and software, computer hardware, computer software, IT-security hardware and software, information risk management hardware and software, IT-security-systems hardware and software; business inquiries; business management and organization consultancy; commercial information and advice for consumers; advisory services for business management; procurement services for others, namely, purchasing computer hardware and software; professional business consultancy; business investigations, information, and research; compilation of statistics; business appraisals; business management assistance; commercial administration of the licensing of the goods and services of others; business research; computerized file management; systemization and compilation of information into computer databases; publicity bureau services; publication of publicity texts; all of the aforementioned services in this class in the fields of information technology (IT), IT-security, information risk management, IT-security-technology, IT-security-systems, IT-security-solutions, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention, authentication, in particular in the field of virus protection, spam protection, spyware protection, computer security, network security, internet security, data protection, decryption and encryption of data, protection of unauthorized intrusions, system monitoring, protection of mobile devices, identity and/or access management, policy compliance, e-mail management, vulnerability and threat management, risk management, content and managed perimeter infrastructure security, Virtual Private Network (VPN), remote access, secure communication links, firewall systems
Disclaimer with Predetermined Text"WIDE ANGLE" AS TO COMPUTER PERIPHERAL DEVICES FOR IT-SECURITY AND COMPUTER PERIPHERAL DEVICES FOR INFORMATION RISK MANAGEMENT
Goods and ServicesScientific and technological services, namely, development of security systems, contingency planning for information and telecommunications technology systems; research and industrial analysis in the fields of information and telecommunications technology concerning computer hardware, computer software, IT-security, information risk management, IT-security technology, IT-security systems, IT-security solutions, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention and authentication; design of computer hardware, computer software and computer peripheral devices in the fields of information technology (IT), IT-security, information risk management, IT-security technology, IT-security systems, IT-security solutions, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention and authentication; engineering in the fields of information and telecommunications technology concerning computer hardware, computer software, information technology (IT), IT-security, information risk management, IT-security technology, IT-security systems, IT-security solutions, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention and authentication; technical consultancy in the fields of information and telecommunications technology concerning computer hardware, computer software, information technology (IT), IT-security, information risk management, IT-security technology, IT-security systems, IT-security solutions, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention and authentication; technical surveys, namely, conducting engineering surveys; technical project studies, namely, conducting feasibility studies in the fields of information and telecommunications technology; technical project management in the fields of information and telecommunications technology; technical evaluations, namely, engineering evaluation services; services of a physicist, namely, physics research and consulting; services of a software engineer, namely, software engineering; security consulting, in particular in the fields of computer security threats and vulnerabilities, computer technical architecture, computer programs and computer project management; computer security consulting, in particular in the fields of design, configuration and deployment of computer networks, and audits and risk assessments of computers and networks to assess information security vulnerability; computer software consultancy; consultancy in the field of design and development of computer hardware; computer system design; computer software design; computer programming; computer virus and intrusion protection services using computer programming; computer systems analysis; recovery of computer data; design, development, installation, configuration, updating, implementation, integration, maintenance, and modification of computer software, computer software updates, downloadable computer software, database systems, computer operating software systems and computer software networks; design, development and configuration of computer hardware; cloud deployment services, namely, providing virtual computer systems and virtual computer environments though cloud computing; computer software and hardware technical support services, including via hotline or telephone, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; managed security services, namely, remote computer backup services in the fields of computer hardware, computer software, computer software updates, downloadable computer software, databases, computer operation systems, computer and telecommunication networks, IT-platforms, IT-infrastructures; off-site data backup services; electronic data storage services; technical administration of access to computer networks, namely, computer security services in the nature of restricting access to computer networks by undesired web sites, media and individuals and facilities; provision of technical security directives, namely, computer security consultancy; information technology consulting services, namely, inspection of information technology guidelines and processes; all of the aforementioned services in this class in the fields of information technology (IT), IT-security, information risk management, IT-security-technology, IT-security-systems, IT-security-solutions, perimeter security, content security, web application security, network security, mobile security, intrusion detection, intrusion prevention, authentication, in particular in the field of virus protection, spam protection, spyware protection, computer security, network security, internet security, data protection, decryption and encryption of data, protection of unauthorized intrusions, system monitoring, protection of mobile devices, identity and/or access management, policy compliance, e-mail management, vulnerability and threat management, risk management, content and managed perimeter infrastructure security, Virtual Private Network (VPN), remote access, secure communication links, firewall systems

Classification Information


International Class009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus.
US Class Codes021, 023, 026, 036, 038
Class Status CodeF - NOT AVAILABLE
Class Status DateFriday, February 25, 2022
Primary Code009
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class035 - Advertising; business management; business administration; office functions.
US Class Codes100, 101, 102
Class Status CodeF - NOT AVAILABLE
Class Status DateFriday, February 25, 2022
Primary Code035
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class037 - Building construction; repair; installation services.
US Class Codes100, 103, 106
Class Status CodeF - NOT AVAILABLE
Class Status DateFriday, February 25, 2022
Primary Code037
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class038 - Services allowing people to communicate with another by a sensory means.
US Class Codes100, 101, 104
Class Status CodeF - NOT AVAILABLE
Class Status DateFriday, February 25, 2022
Primary Code038
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class041 - Education; providing of training; entertainment; sporting and cultural activities.
US Class Codes100, 101, 107
Class Status CodeF - NOT AVAILABLE
Class Status DateFriday, February 25, 2022
Primary Code041
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status CodeF - NOT AVAILABLE
Class Status DateFriday, February 25, 2022
Primary Code042
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

Trademark Owner History


Party NameNTT Com Security AG
Party Type30 - Original Registrant
Legal Entity Type03 - Corporation
AddressIsmaning 85737
DE

Party NameNTT Com Security AG
Party Type20 - Owner at Publication
Legal Entity Type03 - Corporation
AddressIsmaning 85737
DE

Party NameNTT Com Security AG
Party Type10 - Original Applicant
Legal Entity Type03 - Corporation
AddressIsmaning 85737
DE

Trademark Events


Event DateEvent Description
Thursday, March 28, 2024NOTIFICATION OF EFFECT OF CANCELLATION OF INTL REG E-MAILED
Thursday, March 28, 2024NOTIFICATION OF EFFECT OF CANCELLATION OF INTL REG E-MAILED
Thursday, March 28, 2024DEATH OF INTERNATIONAL REGISTRATION
Tuesday, December 27, 2022TOTAL INVALIDATION PROCESSED BY THE IB
Monday, November 28, 2022TOTAL INVALIDATION OF REG EXT PROTECTION SENT TO IB
Monday, November 28, 2022INVALIDATION PROCESSED
Tuesday, October 25, 2022TOTAL INVALIDATION OF REG EXT PROTECTION CREATED
Friday, February 25, 2022CANCELLED SECTION 71
Tuesday, August 11, 2020COURTESY REMINDER - SEC. 71 (6-YR) E-MAILED
Friday, February 5, 2016FINAL DECISION TRANSACTION PROCESSED BY IB
Wednesday, January 20, 2016FINAL DISPOSITION NOTICE SENT TO IB
Wednesday, January 20, 2016FINAL DISPOSITION PROCESSED
Wednesday, November 11, 2015FINAL DISPOSITION NOTICE CREATED, TO BE SENT TO IB
Tuesday, August 11, 2015REGISTERED-PRINCIPAL REGISTER
Tuesday, May 26, 2015OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
Tuesday, May 26, 2015PUBLISHED FOR OPPOSITION
Friday, May 22, 2015NOTIFICATION PROCESSED BY IB
Wednesday, May 6, 2015NOTIFICATION OF POSSIBLE OPPOSITION SENT TO IB
Wednesday, May 6, 2015NOTICE OF START OF OPPOSITION PERIOD CREATED, TO BE SENT TO IB
Wednesday, May 6, 2015NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
Monday, April 20, 2015LAW OFFICE PUBLICATION REVIEW COMPLETED
Thursday, April 16, 2015EXPARTE APPEAL TERMINATED
Thursday, April 16, 2015APPROVED FOR PUB - PRINCIPAL REGISTER
Thursday, April 16, 2015EXAMINER'S AMENDMENT ENTERED
Thursday, April 16, 2015NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED
Thursday, April 16, 2015EXAMINERS AMENDMENT E-MAILED
Thursday, April 16, 2015EXAMINERS AMENDMENT -WRITTEN
Thursday, April 2, 2015TEAS/EMAIL CORRESPONDENCE ENTERED
Thursday, April 2, 2015CORRESPONDENCE RECEIVED IN LAW OFFICE
Wednesday, April 1, 2015ASSIGNED TO LIE
Thursday, March 26, 2015TEAS REQUEST FOR RECONSIDERATION RECEIVED
Thursday, March 26, 2015EX PARTE APPEAL-INSTITUTED
Thursday, March 26, 2015JURISDICTION RESTORED TO EXAMINING ATTORNEY
Thursday, March 26, 2015EXPARTE APPEAL RECEIVED AT TTAB
Friday, September 26, 2014NOTIFICATION OF FINAL REFUSAL EMAILED
Friday, September 26, 2014FINAL REFUSAL E-MAILED
Friday, September 26, 2014FINAL REFUSAL WRITTEN
Friday, September 5, 2014TEAS/EMAIL CORRESPONDENCE ENTERED
Friday, September 5, 2014CORRESPONDENCE RECEIVED IN LAW OFFICE
Thursday, August 28, 2014ASSIGNED TO LIE
Tuesday, August 26, 2014TEAS RESPONSE TO OFFICE ACTION RECEIVED
Wednesday, July 16, 2014ATTORNEY REVIEW COMPLETED
Wednesday, July 16, 2014CORRECTION FROM IB ENTERED - ATTORNEY REVIEW REQUIRED
Saturday, July 12, 2014CORRECTION TRANSACTION RECEIVED FROM IB
Friday, March 28, 2014REFUSAL PROCESSED BY IB
Thursday, February 27, 2014NON-FINAL ACTION MAILED - REFUSAL SENT TO IB
Thursday, February 27, 2014REFUSAL PROCESSED BY MPU
Tuesday, February 25, 2014NON-FINAL ACTION (IB REFUSAL) PREPARED FOR REVIEW
Tuesday, February 25, 2014APPLICATION FILING RECEIPT MAILED
Monday, February 24, 2014NON-FINAL ACTION WRITTEN
Wednesday, February 19, 2014ASSIGNED TO EXAMINER
Wednesday, February 19, 2014NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Monday, February 17, 2014SN ASSIGNED FOR SECT 66A APPL FROM IB