STEALTH-ISS GROUP - Trademark Details
Status: 700 - Registered
Image for trademark with serial number 88608619
Serial Number
88608619
Registration Number
6116716
Word Mark
STEALTH-ISS GROUP
Status
700 - Registered
Status Date
2020-08-04
Filing Date
2019-09-08
Registration Number
6116716
Registration Date
2020-08-04
Mark Drawing
3000 - Illustration: Drawing or design which also includes word(s)/ letter(s)/number(s) Typeset
Design Searches
031501, 031519, 031524, 260513, 260516, 260521, 260913, 260921, 261113, 261121 - Eagles. Birds or bats in flight or with outspread wings. Stylized birds and bats. Two Triangles. Triangles touching or intersecting. Triangles that are completely or partially shaded. Two squares. Squares that are completely or partially shaded. Two rectangles. Rectangles that are completely or partially shaded.
Published for Opposition Date
2020-05-19
Law Office Assigned Location Code
L50
Employee Name
GULIANO, ROBERT N
Statements
Indication of Colors claimed
The colors black, dark grey, and light grey are claimed as a feature of the mark.
Disclaimer with Predetermined Text
"GROUP"
Description of Mark
The mark consists of a black, dark grey, and light grey bald eagle with the body of a stealth fighter jet above the word "STEALTH" in dark grey above the wording "ISS GROUP" in light grey. The color white in the mark represents background or transparent areas and is not claimed as a feature of the mark.
Goods and Services
Cloud computing featuring software for use in managing cyber security in the field of cyber threats, network vulnerabilities, data privacy and regulatory compliance; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of in the field of cyber threats, network vulnerabilities, data privacy and regulatory compliance; Computer security service, namely, hard drive erasure; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services in the nature of administering digital certificates; Computer security services in the nature of administering digital keys; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security services, namely, restricting unauthorized access to sensitive or restricted data; Computer security services, namely, restricting unauthorized network access by unauthorized users through monitoring cyber threats, network vulnerabilities, data privacy and regulatory compliance; Computer security threat analysis for protecting data; Computer diagnostic services; Computer programming; Computer programming consultancy; Computer programming and computer system analysis; Computer programming and maintenance of computer programs; Computer programming and rental of computer programs; Computer simulation based on computer programs for others; Computer site design; Computer software consultancy; Computer software consultation; Computer software consulting; Computer software design, computer programming, and maintenance of computer software; Computer systems analysis; Computer technology consultancy; Computer technology consultancy in the field of cyber threats, network vulnerabilities, data privacy and regulatory compliance; Consultancy in the design and development of computer hardware; Consultation about the maintenance and updating of computer software; Consulting in the field of configuration management for computer hardware and software; Consulting services for others in the field of design, planning, and implementation project management of computer software testing in the field of cyber threats, network vulnerabilities, data privacy and regulatory compliance; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of cloud computing; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the field of hosting computer software applications; Consulting services in the fields of selection, implementation and use of computer hardware and software systems for others; Consulting services, namely, designing, creating, implementing and maintaining computer software for owners, managers and other personnel to set-up, open, operate and manage a commercial climbing facility; Application service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software, and web sites, of others in the fields of healthcare, benefits programs, employee productivity, risk management; Computer services, namely, cloud hosting provider services; Computer services, namely, encrypted data recovery services; Computer services, namely, integration of private and public cloud computing environments; Customizing computer software; Data encryption and decoding services; Data encryption services; Data security consultancy; Data encryption services for providing security and anonymity for electronically transmitted credit card transactions; Design and development of computer software for in the field of cyber threats, network vulnerabilities, data privacy and regulatory compliance; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Hosting an online community website featuring shared communications between community members interested in personal and small business computer information security; Internet security consultancy; Leasing of computer programs; Maintenance of computer software; Maintenance of computer software relating to computer security and prevention of computer risks; Providing a secure, web-based service featuring technology that enables individuals to remotely create and manage their own accounts so that whatever private content they upload now can be encrypted, then delivered to their intended recipients, at the time and in the manner requested; Providing technology information updates for home security systems via the global computer network; Providing temporary use of non-downloadable cloud-based software for cybersecurity management in the field of cyber threats, network vulnerabilities, data privacy and regulatory compliance; Providing temporary use of non-downloadable cloud-based software for connecting, operating, and managing networks in the field of cyber threats, network vulnerabilities, data privacy and regulatory compliance in the internet of things (IoT); Providing temporary use of on-line non-downloadable cloud computing software for cybersecurity testing in the field of cyber threats, network vulnerabilities, data privacy and regulatory compliance; Providing virtual computer systems and virtual computer environments through cloud computing; Recovery of computer data; Rental of computers relating to computer security and prevention of computer risks; Repair of computer software; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technological consultation in the technology field of cyber threats, network vulnerabilities, data privacy and regulatory compliance; Technological planning and consulting services in the field of cyber threats, network vulnerabilities, data privacy and regulatory compliance; Testing of security systems; Testing, analysis, and evaluation of cyber threats, network vulnerabilities, data privacy and regulatory compliance to assure compliance with technology industry standards; Updating and maintaining cloud-based computer software through in the field of cyber threats, network vulnerabilities, data privacy and regulatory compliance; Updating of computer software; Updating of computer software relating to computer security and prevention of computer risks
Classification Information
International Class
042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software; legal services. - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software; legal services.
US Class Codes
100, 101
Class Status Code
6 - Active
Class Status Date
2019-09-18
Primary Code
042
First Use Anywhere Date
2019-01-01
First Use In Commerce Date
2019-01-01
Current Trademark Owners
Party Type
30 - Original Registrant
Address
Please log in with your Justia account to see this address.
Trademark Owner History
Party Type
30 - Original Registrant
Address
Please log in with your Justia account to see this address.
Party Type
20 - Owner at Publication
Address
Please log in with your Justia account to see this address.
Party Type
10 - Original Applicant
Address
Please log in with your Justia account to see this address.
Correspondences
Name
STEALTH-ISS GROUP INC.
Address
Please log in with your Justia account to see this address.
Prior Registrations
Relationship TypeReel Number
Prior Registration5002203
Trademark Events
Event DateEvent Description
2019-09-11NEW APPLICATION ENTERED IN TRAM
2019-09-18NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM
2019-09-19NOTICE OF DESIGN SEARCH CODE E-MAILED
2019-12-10ASSIGNED TO EXAMINER
2019-12-10NON-FINAL ACTION WRITTEN
2019-12-10NON-FINAL ACTION E-MAILED
2019-12-10NOTIFICATION OF NON-FINAL ACTION E-MAILED
2019-12-10TEAS RESPONSE TO OFFICE ACTION RECEIVED
2019-12-10CORRESPONDENCE RECEIVED IN LAW OFFICE
2019-12-11TEAS/EMAIL CORRESPONDENCE ENTERED
2019-12-17NON-FINAL ACTION WRITTEN
2019-12-17NON-FINAL ACTION E-MAILED
2019-12-17NOTIFICATION OF NON-FINAL ACTION E-MAILED
2019-12-18TEAS RESPONSE TO OFFICE ACTION RECEIVED
2019-12-18CORRESPONDENCE RECEIVED IN LAW OFFICE
2019-12-18TEAS/EMAIL CORRESPONDENCE ENTERED
2019-12-19NON-FINAL ACTION WRITTEN
2019-12-19NON-FINAL ACTION E-MAILED
2019-12-19NOTIFICATION OF NON-FINAL ACTION E-MAILED
2019-12-21TEAS RESPONSE TO OFFICE ACTION RECEIVED
2020-01-09TEAS RESPONSE TO OFFICE ACTION RECEIVED
2020-01-09CORRESPONDENCE RECEIVED IN LAW OFFICE
2020-01-10TEAS/EMAIL CORRESPONDENCE ENTERED
2020-01-31FINAL REFUSAL WRITTEN
2020-01-31FINAL REFUSAL E-MAILED
2020-01-31NOTIFICATION OF FINAL REFUSAL EMAILED
2020-02-18TEAS CHANGE OF CORRESPONDENCE RECEIVED
2020-02-18TEAS REQUEST FOR RECONSIDERATION RECEIVED
2020-02-18CORRESPONDENCE RECEIVED IN LAW OFFICE
2020-02-21TEAS/EMAIL CORRESPONDENCE ENTERED
2020-03-12ACTION REQ FOR RECON DENIED NO APPEAL FILED COUNTED NOT MAILED
2020-03-12ACTION FOR REQ FOR RECON DENIED NO APPEAL FILED E-MAILED
2020-03-12NOTIFICATION FOR REQ FOR RECON DENIED NO APPEAL FILED
2020-03-24EXAMINERS AMENDMENT -WRITTEN
2020-03-24EXAMINERS AMENDMENT E-MAILED
2020-03-24NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED
2020-03-24EXAMINER'S AMENDMENT ENTERED
2020-04-01APPROVED FOR PUB - PRINCIPAL REGISTER
2020-04-01PREVIOUS ALLOWANCE COUNT WITHDRAWN
2020-04-01EXAMINERS AMENDMENT -WRITTEN
2020-04-01EXAMINERS AMENDMENT E-MAILED
2020-04-01NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED
2020-04-01EXAMINER'S AMENDMENT ENTERED
2020-04-01APPROVED FOR PUB - PRINCIPAL REGISTER
2020-04-09ASSIGNED TO LIE
2020-04-16LAW OFFICE PUBLICATION REVIEW COMPLETED
2020-04-29NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
2020-05-19PUBLISHED FOR OPPOSITION
2020-05-19OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
2020-08-04REGISTERED-PRINCIPAL REGISTER