
| Serial Number | 79429017 |
| Word Mark | Z ZYNAP |
| Filing Date | Thursday, January 23, 2025 |
| Status | 681 - PUBLICATION/ISSUE REVIEW COMPLETE |
| Status Date | Thursday, March 5, 2026 |
| Registration Number | 0000000 |
| Registration Date | NOT AVAILABLE |
| Mark Drawing | 3 - Illustration: Drawing or design which also includes word(s) / letter(s) / number(s) |
| Published for Opposition Date | Tuesday, March 24, 2026 |
| Indication of Colors claimed | The color(s) dark blue is/are claimed as a feature of the mark. |
| Pseudo Mark | ZYNAP ZYNAP |
| Description of Mark | The mark consists of geometric figures forming the letter "Z" to the left of the wording "ZYNAP" in lower case letters, all in the color dark blue. |
| Goods and Services | Research, development and design of computer programs intended for computer security and cyber security; digital forensic research in the field of cyber crime; software design; development of software; rental of Internet security computer programs for preventing, detecting and responding to cybersecurity threats, automating responses to security incidents and vulnerability analysis; data security consultancy; internet security consultancy; consultancy in the field of computer security, namely, in the field of threat detection and prevention software, automated incident response systems, cybersecurity architectures and implementation of artificial intelligence-based security systems; electronic data back-up services; product safety testing; IT security, protection and restoration, namely, computer virus protection computer virus protection services; consultancy with respect to the design and development of computer hardware; design and development of information security, threat detection and response systems and security analysis platforms hardware architecture; computer science research, namely, technical project studies in the field of computer hardware and software; testing of computer hardware; engineering services; establishing of technical expert opinions in the field of engineering; engineering services, namely, technical project planning; data decoding in the nature of data decryption services; encryption, decryption and authentication of information, messages and data; development and testing of calculation methods, algorithms and software; web server rental; hosting of web portals in the nature of web site hosting services; computer website design; anti-virus software design and development; anti-spamming services in the nature of online computer services, namely, providing spam filtering services to protect websites and online applications from receiving unsolicited messages; electronic monitoring of personal identification information for detecting identity theft on the Internet; hosting of servers; cloud storage services for electronic data; providing virtual computer systems through cloud computing; writing of computer code; all of the foregoing belonging to the field of information technology security and cybersecurity, and none of the foregoing is related to human-machine interface (HMI) hardware or software products or services |
| Goods and Services | Downloadable and recorded computer software and programs intended for the field of computer security and cybersecurity for the detection and prevention of cybersecurity threats, automated analysis of security incidents, orchestration and automation of incident response, real-time monitoring of computer networks and systems, detection of security anomalies using artificial intelligence, and tracking of user access to computer systems; downloadable and recorded utility, security and cryptography software for detecting, preventing and responding to cybersecurity threats, tracking and analyzing user access to computer systems, managing identities and access, and correlating security events; downloadable and recorded antivirus computer software; downloadable and recorded planning software in the field of cybersecurity architectures, security incident response and security operations management; downloadable and recorded training software in the field of cybersecurity, security incident response and information security best practices; downloadable dynamic data banks in the field of cybersecurity threats, security incidents, computer vulnerabilities and security audit logs; smart gateways for real-time data analysis; data processors; data networks in the nature of network servers; downloadable and recorded} computer software for managing data and computer files and database software for the creation, management and analysis of security event logs; data input terminals in the nature of computers; data processing equipment; downloadable publications, namely electronic books, digital magazines, digital brochures, technical guides and manuals in the field of information security, cybersecurity, incident response and security best practices; downloadable interactive electronic publications, namely, electronic books, digital magazines, interactive guides and tutorials in the field of information security, cybersecurity and threat prevention; downloadable and recorded mobile application software for verifying the identities of users of computer networks, real-time security monitoring and security incident management; multimedia content, namely, pre-recorded electronic media featuring information security instructions, downloadable image files featuring security architecture diagrams, downloadable video files featuring cybersecurity training; downloadable cloud computing software for deploying and managing security infrastructures on cloud computing platforms, managing detection and response systems in cloud environments, and orchestrating automated responses to security incidents; downloadable and recorded virtual assistant software using artificial intelligence (AI) for automate responses to cybersecurity incidents, analyze and correlate security events, provide vulnerability remediation recommendations, and proactively detect and prevent threats; all of the foregoing belonging to the field of information technology security and cyber security and none of the foregoing consists of human-machine interface (HMI) hardware or software products, nor is it related to them |
| International Class | 009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus. |
| US Class Codes | 021, 023, 026, 036, 038 |
| Class Status Code | 6 - Active |
| Class Status Date | Friday, August 8, 2025 |
| Primary Code | 009 |
| First Use Anywhere Date | NOT AVAILABLE |
| First Use In Commerce Date | NOT AVAILABLE |
| International Class | 042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software. |
| US Class Codes | 100, 101 |
| Class Status Code | 6 - Active |
| Class Status Date | Friday, August 8, 2025 |
| Primary Code | 042 |
| First Use Anywhere Date | NOT AVAILABLE |
| First Use In Commerce Date | NOT AVAILABLE |
| Party Name | SYNAPSYS CYBERSECURITY, S.L. |
| Party Type | 10 - Original Applicant |
| Legal Entity Type | 99 - Other |
| Address | E-08021 Barcelona ES |
| Event Date | Event Description |
| Thursday, July 31, 2025 | SN ASSIGNED FOR SECT 66A APPL FROM IB |
| Friday, August 8, 2025 | LIMITATION FROM ORIGINAL APPLICATION ENTERED |
| Friday, August 8, 2025 | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED |
| Friday, August 8, 2025 | APPLICATION FILING RECEIPT MAILED |
| Saturday, August 9, 2025 | ASSIGNED TO EXAMINER |
| Monday, September 15, 2025 | NON-FINAL ACTION WRITTEN |
| Tuesday, September 16, 2025 | NON-FINAL ACTION (IB REFUSAL) PREPARED FOR REVIEW |
| Friday, September 26, 2025 | LIMITATION OF GOODS RECEIVED FROM IB |
| Wednesday, November 5, 2025 | NON-FINAL ACTION (IB REFUSAL) WITHDRAWN FOR REVIEW |
| Wednesday, November 19, 2025 | NON-FINAL ACTION WRITTEN |
| Thursday, November 20, 2025 | NON-FINAL ACTION (IB REFUSAL) PREPARED FOR REVIEW |
| Friday, November 21, 2025 | LIMITATION FROM THE IB - REQUEST EXAM REVIEW |
| Friday, November 21, 2025 | REFUSAL PROCESSED BY MPU |
| Friday, November 21, 2025 | NON-FINAL ACTION MAILED - REFUSAL SENT TO IB |
| Wednesday, December 10, 2025 | TEAS RESPONSE TO OFFICE ACTION RECEIVED |
| Wednesday, December 10, 2025 | CORRESPONDENCE RECEIVED IN LAW OFFICE |
| Thursday, December 11, 2025 | TEAS/EMAIL CORRESPONDENCE ENTERED |
| Thursday, December 11, 2025 | REFUSAL PROCESSED BY IB |
| Friday, January 16, 2026 | ATTORNEY REVIEW COMPLETED |
| Wednesday, January 28, 2026 | NON-FINAL ACTION WRITTEN |
| Wednesday, January 28, 2026 | NON-FINAL ACTION E-MAILED |
| Wednesday, January 28, 2026 | NOTIFICATION OF NON-FINAL ACTION E-MAILED |
| Tuesday, February 24, 2026 | TEAS RESPONSE TO OFFICE ACTION RECEIVED |
| Tuesday, February 24, 2026 | CORRESPONDENCE RECEIVED IN LAW OFFICE |
| Tuesday, February 24, 2026 | TEAS/EMAIL CORRESPONDENCE ENTERED |
| Thursday, February 26, 2026 | REFUSAL PROCESSED BY IB |
| Tuesday, March 3, 2026 | APPROVED FOR PUB - PRINCIPAL REGISTER |