AMAZON GUARDDUTY - Trademark Details
Status: 700 - Registered
Image for trademark with serial number 87699380
Serial Number
87699380
Registration Number
5698605
Word Mark
AMAZON GUARDDUTY
Status
700 - Registered
Status Date
2019-03-12
Filing Date
2017-11-28
Registration Number
5698605
Registration Date
2019-03-12
Mark Drawing
4000 - Standard character mark Typeset
Published for Opposition Date
2018-06-12
Law Office Assigned Location Code
L50
Employee Name
BUTTON, JENNIFER JO
Statements
Goods and Services
Computer software, namely, software for monitoring, detecting, identifying, tracking, logging, analyzing and reporting in the field security monitoring and threat and intrusion detection; computer software for continuous security monitoring and threat and intrusion detection for cloud-based applications and services; network threat detection software; computer network security software; network access management and monitoring software; computer software development tools; computer software for allowing users to access, query, analyze, and quarantine cloud-based information and applications; computer software for data processing; computer hardware; computer software for the collection, editing, organizing, modifying, transmission, storage and sharing of data and information; computer software for IT security; computer software for data protection; computer software for data security; computer software for preventing attacks on networks, data, applications and services; computer software for insider threat detection and prevention; computer software for security and threat detection, monitoring, prevention and remediation; computer software for protecting user accounts, networks and applications from compromise; computer software for reading and analyzing computer event logs; computer software for monitoring computer network access and activity; computer software for detecting third party reconnaissance actions by potential attackers; computer software for automated remediation of security threats; computer software for identifying unauthorized, malicious or unexpected activity that present threats to user accounts, applications and services running in the cloud; computer software that uses machine learning for threat detection, threat intelligence and anomaly detection to proactively identify, alert and remediate malicious or unauthorized activity; computer software that provides detailed security findings on potential and actual unauthorized, malicious, or unexpected activity related to user accounts, applications or services
Goods and Services
Providing access to hosted operating systems and computer applications through the Internet; providing access to databases; providing multiple-user access to data on the Internet in the fields of computer network security, security monitoring, threat detection and remediation; providing temporary access to remote computers for the purpose of running software programs
Goods and Services
Consultation in the field of cloud computing; research and development in the field of network security; research and development in the field of software; research and development in the field of information technology; computer systems analysis; computer systems, software and hardware consulting; computer technology consulting; computer security consulting; IT consulting; computer network security consulting; consulting in the field of security monitoring and threat detection; software as a service (SaaS) featuring software for network security; application service provider (ASP) services featuring software for network security; platform as a service (PaaS) services featuring software for network security, security monitoring, threat and intrusion detection and remediation; providing temporary use of non-downloadable software featuring software for network security, security monitoring, threat detection and remediation; software rental; software as a service (SaaS) featuring software for monitoring, detecting, identifying, tracking, logging, analyzing and reporting in the field security monitoring and threat and intrusion detection; software as a service (SaaS) featuring software for continuous security monitoring and threat and intrusion detection for cloud-based applications and services; software as a service (SaaS) featuring software for allowing users to access, query, analyze and quarantine cloud-based information and applications; software as a service (SaaS) services featuring software in the fields of computer security, security monitoring, threat detection and remediation; software as a service (SaaS) featuring software for the collection, editing, organizing, modifying, transmission, storage and sharing of data and information; software as a service (SaaS) featuring software for IT security; software as a service (SaaS) featuring software for data protection; software as a service (SaaS) featuring software for data security; software as a service (SaaS) featuring software for preventing attacks on networks, data, applications and services; software as a service (SaaS) featuring software for insider threat detection and prevention; software as a service (SaaS) featuring software for security and threat detection, monitoring, prevention and remediation; software as a service (SaaS) featuring software for protecting user accounts, networks and applications from compromise; software as a service (SaaS) featuring software for reading and analyzing computer event logs; software as a service (SaaS) featuring software for monitoring computer network access and activity; software as a service (SaaS) featuring software for detecting third party reconnaissance actions by potential attackers; software as a service (SaaS) featuring software for automated remediation of security threats; software as a service (SaaS) featuring software for identifying unauthorized, malicious or unexpected activity that present threats to user accounts, applications and services running in the cloud; software as a service (SaaS) featuring software that uses machine learning for threat detection, threat intelligence and anomaly detection to proactively identify, alert and remediate malicious or unauthorized activity; software as a service (SaaS) featuring software that provides detailed security findings on potential and actual unauthorized, malicious, or unexpected activity related to user accounts, applications or services; monitoring of computer systems and databases for unauthorized access or data breach; computerized security services, namely, electronically monitoring, identifying, detecting and reporting on unauthorized, malicious or unexpected access activity related to user accounts, applications or services
Goods and Services
Monitoring of computer systems and databases for security purposes; computerized security services, namely, electronically monitoring, identifying, detecting and reporting on unauthorized, malicious or unexpected activity related to user accounts, applications or services
Classification Information
International Class
038 - Telecommunications. - Telecommunications.
US Class Codes
100, 101, 104
Class Status Code
6 - Active
Class Status Date
2017-12-07
Primary Code
038
First Use Anywhere Date
2017-11-28
First Use In Commerce Date
2017-11-28
International Class
042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software; legal services. - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software; legal services.
US Class Codes
100, 101
Class Status Code
6 - Active
Class Status Date
2017-12-07
Primary Code
042
First Use Anywhere Date
2017-11-28
First Use In Commerce Date
2017-11-28
Current Trademark Owners
Party Type
30 - Original Registrant
Address
Please log in with your Justia account to see this address.
Trademark Owner History
Party Type
30 - Original Registrant
Address
Please log in with your Justia account to see this address.
Party Type
20 - Owner at Publication
Address
Please log in with your Justia account to see this address.
Party Type
10 - Original Applicant
Address
Please log in with your Justia account to see this address.
Correspondences
Name
Michelle Mancino Marsh
Address
Please log in with your Justia account to see this address.
Trademark Events
Event DateEvent Description
2017-12-01NEW APPLICATION ENTERED IN TRAM
2017-12-07NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM
2018-02-23ASSIGNED TO EXAMINER
2018-03-07PRIORITY ACTION WRITTEN
2018-03-07PRIORITY ACTION E-MAILED
2018-03-07NOTIFICATION OF PRIORITY ACTION E-MAILED
2018-05-07TEAS RESPONSE TO OFFICE ACTION RECEIVED
2018-05-07CORRESPONDENCE RECEIVED IN LAW OFFICE
2018-05-08TEAS/EMAIL CORRESPONDENCE ENTERED
2018-05-09APPROVED FOR PUB - PRINCIPAL REGISTER
2018-05-23NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
2018-06-12PUBLISHED FOR OPPOSITION
2018-06-12OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
2018-08-07NOA E-MAILED - SOU REQUIRED FROM APPLICANT
2018-08-09TEAS CHANGE OF CORRESPONDENCE RECEIVED
2018-08-09TEAS STATEMENT OF USE RECEIVED
2018-09-07CASE ASSIGNED TO INTENT TO USE PARALEGAL
2018-08-09USE AMENDMENT FILED
2018-09-07STATEMENT OF USE PROCESSING COMPLETE
2018-09-28SU - NON-FINAL ACTION - WRITTEN
2018-09-28NON-FINAL ACTION E-MAILED
2018-09-28NOTIFICATION OF NON-FINAL ACTION E-MAILED
2019-01-15TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED
2019-01-15ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED
2019-02-04TEAS RESPONSE TO OFFICE ACTION RECEIVED
2019-02-04CORRESPONDENCE RECEIVED IN LAW OFFICE
2019-02-04TEAS/EMAIL CORRESPONDENCE ENTERED
2019-02-05ALLOWED PRINCIPAL REGISTER - SOU ACCEPTED
2019-02-06NOTICE OF ACCEPTANCE OF STATEMENT OF USE E-MAILED
2019-03-12REGISTERED-PRINCIPAL REGISTER
2021-01-05TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED
2021-01-05ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED
2021-01-05TEAS CHANGE OF CORRESPONDENCE RECEIVED