ZERO TRUST API - Trademark Details
Status: 602 - Abandoned-Failure To Respond Or Late Response
Image for trademark with serial number 90024740
Serial Number
90024740
Word Mark
ZERO TRUST API
Status
602 - Abandoned-Failure To Respond Or Late Response
Status Date
2021-04-27
Filing Date
2020-06-28
Mark Drawing
4000 - Standard character mark Typeset
Law Office Assigned Location Code
M60
Employee Name
ATTANG, UDEME U
Statements
Goods and Services
Application service provider (ASP) featuring application-to-person (A2P) software for use in one-way text message communication from automated, cybersecurity threat detection systems; Application service provider (ASP) featuring software for use in protection of users, data and network assets; Application service provider (ASP) featuring software using artificial intelligence for detection and collaborative and automated mitigation of cybersecurity risks and threats; Application service provider featuring application programming interface (API) software; Application service provider featuring application programming interface (API) software for detection and collaborative and automated mitigation of cybersecurity risks and threats; Application service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software and web sites of others in the fields of cybersecurity; Cloud computing featuring software for use in protection of users, data and network assets; Computer network design and computer software design for the protection of users, data and network assets; Computer programming services for detection and collaborative and automated mitigation of cybersecurity risks and threats; Computer programming services, namely, detection and collaborative and automated mitigation of cybersecurity risks and threats; Computer security services, namely, restricting unauthorized access to users, devices, network, applications, data and IT infrastructure; Computer security services, namely, restricting unauthorized network access by users, machines, devices and applications; Computer services, namely, remote management of information technology (IT) systems of others comprised of network assets, data, users and devices; Computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for the purpose of protection of users, data and network assets; Computer services, namely, creating an on-line community for registered users to participate in discussions, get feedback from their peers, form virtual communities, and engage in social networking services in the field of collaborative network risk and threat mitigation; Computer services, namely, creating an on-line community for registered users to review and mitigate network cybersecurity threats and risks; Computer services, namely, creating an on-line virtual environment for collaborative mitigation of cybersecurity risks and threats; Computer services, namely, designing and implementing protection of users, data and network assets for others; Computer services, namely, hosting an interactive web site that allows mitigation of cybersecurity risks and threats; Computer services, namely, monitoring and reporting on the performance, availability, and errors of web sites of others; Computer services, namely, monitoring the web sites of others to improve their scalability and performance; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the web sites of others; Computer services, namely, on-site management of information technology (IT) systems of others comprised of network assets, data, users and devices; Computer services, namely, providing search engines for obtaining network and internet threats and risks on a global computer network; Computer services, namely, providing search platforms to allow users to collaboratively detect and mitigate cybersecurity threats and risks; Computer services, namely, providing internet security servers to others; Computer software development in the field of cybersecurity and internet security; Design and development of computer software for protecting data and services; Design of computer networks and software for others for the protection of users, data and network assets; Design, development, and implementation of software for protection of users, data and network assets; Electronic monitoring and reporting of network threat and risk using computers or sensors; Platform as a service (PAAS) featuring computer software platforms for operating secure applications and workflows; Providing a web site featuring temporary use of non-downloadable software for protection of users, data and network assets; Providing a website featuring non-downloadable software using artificial intelligence for detection and collaborative and automated mitigation of cybersecurity risks and threats; Providing a website featuring on-line non-downloadable software that enables users to detect and collaboratively and automatically mitigate cybersecurity risks and threats; Providing a website featuring resources, namely, non-downloadable software for protection of users, data and network assets ; Providing a website featuring technology that enables users to detect and mitigate network and internet risks; Providing an online non-downloadable Internet-based system application featuring technology enabling users to leverage software for network and internet security; Providing on-line non-downloadable software for protection of users, data and network assets; Providing on-line non-downloadable software using artificial intelligence for detection and collaborative and automated mitigation of cybersecurity risks and threats; Providing temporary use of a non-downloadable web application for protection of users, data and network assets; Providing temporary use of a web-based software application for protection of users, data and network assets; Providing temporary use of non-downloadable web-based decentralized applications (DApps) for distributed risk detection and mitigation; Providing temporary use of on-line non-downloadable cloud computing software for protection of users, data and network assets; Providing temporary use of on-line non-downloadable cloud computing software using artificial intelligence for detection and collaborative and automated mitigation of cybersecurity risks and threats; Providing temporary use of on-line non-downloadable software and applications for protection of users, data and network assets; Providing temporary use of on-line non-downloadable software and applications using artificial intelligence for detection and collaborative and automated mitigation of cybersecurity risks and threats; Providing temporary use of on-line non-downloadable software development tools for building secure applications and workflows; Providing temporary use of on-line non-downloadable software for detection and collaborative and automated mitigation of cybersecurity risks and threats; Providing temporary use of online non-downloadable middleware for providing an interface between applications and cyber threat and risk detection intelligence; Providing temporary use of online non-downloadable simulation software for modeling network and internet behavior of users, devices, computers, servers, applications and data; Providing temporary use of online, non-downloadable enterprise software for detection and collaborative and automated mitigation of cybersecurity risks and threats; Providing user authentication services using artificial intelligence powered behavior profiling and risk determination for e-commerce transactions; Software as a service (SAAS) services featuring software for protection of users, data and network assets; Software as a service (SAAS) services featuring software for detection and collaborative and automated mitigation of cybersecurity risks and threats; Software as a service (SAAS) services featuring software using artificial intelligence for detection and collaborative and automated mitigation of cybersecurity risks and threats; Software as a service (SAAS) services, namely, hosting software for use by others for use in protection of users, data and network assets
Pseudo Mark
ZERO TRUST APPLICATION PROGRAMMING INTERFACE
Classification Information
International Class
042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software; legal services. - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software; legal services.
US Class Codes
100, 101
Class Status Code
6 - Active
Class Status Date
2020-07-24
Primary Code
042
Correspondences
Name
SRIVASTAVA, KUMAR S
Address
Please log in with your Justia account to see this address.
Trademark Events
Event DateEvent Description
2020-07-01NEW APPLICATION ENTERED IN TRAM
2020-07-24NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM
2020-09-29ASSIGNED TO EXAMINER
2020-10-09NON-FINAL ACTION WRITTEN
2020-10-09NON-FINAL ACTION E-MAILED
2020-10-09NOTIFICATION OF NON-FINAL ACTION E-MAILED
2021-04-27ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE
2021-04-27ABANDONMENT NOTICE E-MAILED - FAILURE TO RESPOND