PHISHINSIGHT

Serial Number 87418315
Registration 5318847
702

Registration Progress

Application Filed
Apr 20, 2017
Under Examination
Aug 22, 2017
Approved for Publication
Jun 27, 2017
Published for Opposition
Jun 27, 2017
Registered
Oct 24, 2017

Trademark Image

PHISHINSIGHT

Basic Information

Serial Number
87418315
Registration Number
5318847
Filing Date
April 20, 2017
Registration Date
October 24, 2017
Published for Opposition
June 27, 2017
Drawing Code
3000

Status Summary

Current Status
Active
Status Code
702
Status Date
Apr 9, 2024
Registration
Registered
Classes
042

Rights Holder

Trend Micro Kabushiki Kaisha

03
Address
4-1-6 Shinjuku, Shinjuku-ku
JR Shinjuku Miraina Tower 20F
Tokyo 160-0022
JP

Ownership History

Trend Micro Kabushiki Kaisha

Original Applicant
03
Tokyo JP

Trend Micro Kabushiki Kaisha

Owner at Publication
03
Tokyo JP

Trend Micro Kabushiki Kaisha

Original Registrant
03
Tokyo JP

Legal Representation

Attorney
Joi A. White

USPTO Deadlines

Next Deadline
818 days remaining
Section 8 & 9 (10-Year) Renewal Due (Based on registration date 2017-10-24)
Due Date
October 24, 2027
Grace Period Ends
April 24, 2028

Application History

29 events
Date Code Type Description Documents
Apr 9, 2024 APRE A CASE ASSIGNED TO POST REGISTRATION PARALEGAL Loading...
Apr 9, 2024 C15A O REGISTERED - SEC. 8 (6-YR) ACCEPTED & SEC. 15 ACK. Loading...
Apr 9, 2024 NA85 E NOTICE OF ACCEPTANCE OF SEC. 8 & 15 - E-MAILED Loading...
Feb 2, 2024 COAR I TEAS CHANGE OF OWNER ADDRESS RECEIVED Loading...
Feb 2, 2024 CHAN I APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED Loading...
Feb 2, 2024 REAP I TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED Loading...
Feb 2, 2024 ARAA I ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED Loading...
Feb 2, 2024 TCCA I TEAS CHANGE OF CORRESPONDENCE RECEIVED Loading...
Oct 12, 2023 E815 I TEAS SECTION 8 & 15 RECEIVED Loading...
Oct 24, 2022 REM1 E COURTESY REMINDER - SEC. 8 (6-YR) E-MAILED Loading...
Aug 29, 2022 REAP I TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED Loading...
Aug 29, 2022 ARAA I ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED Loading...
Aug 29, 2022 TCCA I TEAS CHANGE OF CORRESPONDENCE RECEIVED Loading...
Oct 24, 2017 R.PR A REGISTERED-PRINCIPAL REGISTER Loading...
Sep 22, 2017 SUNA E NOTICE OF ACCEPTANCE OF STATEMENT OF USE E-MAILED Loading...
Sep 21, 2017 CNPR P ALLOWED PRINCIPAL REGISTER - SOU ACCEPTED Loading...
Sep 19, 2017 SUPC I STATEMENT OF USE PROCESSING COMPLETE Loading...
Sep 18, 2017 AITU A CASE ASSIGNED TO INTENT TO USE PARALEGAL Loading...
Sep 1, 2017 EISU I TEAS STATEMENT OF USE RECEIVED Loading...
Sep 1, 2017 IUAF S USE AMENDMENT FILED Loading...
Aug 22, 2017 NOAM E NOA E-MAILED - SOU REQUIRED FROM APPLICANT Loading...
Jun 27, 2017 PUBO A PUBLISHED FOR OPPOSITION Loading...
Jun 27, 2017 NPUB E OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED Loading...
Jun 7, 2017 NONP E NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED Loading...
May 15, 2017 CNSA P APPROVED FOR PUB - PRINCIPAL REGISTER Loading...
May 8, 2017 DOCK D ASSIGNED TO EXAMINER Loading...
Apr 27, 2017 MDSM E NOTICE OF DESIGN SEARCH CODE E-MAILED Loading...
Apr 26, 2017 NWOS I NEW APPLICATION OFFICE SUPPLIED DATA ENTERED Loading...
Apr 24, 2017 NWAP I NEW APPLICATION ENTERED Loading...

Detailed Classifications

Class 042
Software as a service (SAAS) services featuring software and applications for computer, data and network security; providing temporary use of online non-downloadable computer software and applications for computer, data and network security; software as a service (SAAS) services featuring computer security software, computer antivirus software, computer training software, anti-malware software and anti-ransomware software; providing temporary use of online non-downloadable computer security software, computer antivirus software, computer training software, anti-malware software and anti-ransomware software; software as a service (SAAS) services featuring computer software and applications for simulating and spoofing security threats, security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; providing temporary use of online non-downloadable computer software for simulating and spoofing security threats, security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; software as a service (SAAS) services featuring computer software and applications for reporting, monitoring and analyzing responses to security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; providing temporary use of online non-downloadable computer software and applications for reporting, monitoring and analyzing responses to security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; software as a service (SAAS) services featuring computer software and applications for educating, training and monitoring users in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities; providing temporary use of online non-downloadable computer software and applications for educating training and monitoring users in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities; software as a service (SAAS) services featuring computer software for raising awareness of unauthorized access to or disclosure of computer data, confidential business information, and digital trade secrets; providing temporary use of online non-downloadable computer software for raising awareness of unauthorized access to or disclosure of computer data, confidential business information, and digital trade secrets; software as a service (SAAS) services featuring computer software for raising awareness of threats to, and security vulnerabilities in, computers, computer networks, endpoints and mobile devices; providing temporary use of online non-downloadable computer software for raising awareness of threats to, and security vulnerabilities in, computers, computer networks, endpoints and mobile devices; software as a service (SAAS) services featuring software and applications for training and education in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities; providing temporary use of online non-downloadable computer software and applications for training and education in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities
First Use Anywhere: May 3, 2017
First Use in Commerce: May 3, 2017

Additional Information

Design Mark
The mark consists of the stylized wording "PHISHINSIGHT" with the top of the letters for "PHISH" interrupting a straight line that comes to an end at a circle over the "I". A thicker straight line appears above the "G" and "H" and curves down to form the right side of the "H" and curves into a left pointing arrow completing the horizontal elements of the "H" and "G" and piercing the left side of the "G".
Color Claim
Color is not claimed as a feature of the mark.
Pseudo Mark
PHISH INSIGHT

Classification

International Classes
042