A

Serial Number 97053007
688

Registration Progress

Application Filed
Sep 29, 2021
Under Examination
Feb 18, 2025
Approved for Publication
Dec 24, 2024
Published for Opposition
Dec 24, 2024
Registered

Trademark Image

A

Basic Information

Serial Number
97053007
Filing Date
September 29, 2021
Published for Opposition
December 24, 2024
Drawing Code
5

Status Summary

Current Status
Active
Status Code
688
Status Date
Feb 18, 2025
Application
Pending
Classes
042

Rights Holder

Abnormal Security Corporation

03
Address
185 Clara Street, Suite 100
San Francisco, CA 94107

Ownership History

Abnormal Security Corporation

Original Applicant
03
San Francisco, CA

Abnormal Security Corporation

Owner at Publication
03
San Francisco, CA

Legal Representation

Attorney
Michael A. Glenn

USPTO Deadlines

No Upcoming Deadlines

No upcoming deadlines found for this trademark.

Application History

37 events
Date Code Type Description Documents
Aug 15, 2025 EEXT I SOU TEAS EXTENSION RECEIVED Loading...
Apr 16, 2025 EISU I TEAS STATEMENT OF USE RECEIVED Loading...
Feb 18, 2025 NOAM E NOA E-MAILED - SOU REQUIRED FROM APPLICANT Loading...
Dec 24, 2024 NPUB E OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED Loading...
Dec 24, 2024 PUBO A PUBLISHED FOR OPPOSITION Loading...
Dec 18, 2024 NONP E NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED Loading...
Oct 18, 2024 CNSA P APPROVED FOR PUB - PRINCIPAL REGISTER Loading...
Oct 18, 2024 XAEC I EXAMINER'S AMENDMENT ENTERED Loading...
Oct 18, 2024 GNEN O NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED Loading...
Oct 18, 2024 GNEA F EXAMINERS AMENDMENT E-MAILED Loading...
Oct 18, 2024 CNEA R EXAMINERS AMENDMENT -WRITTEN Loading...
Oct 18, 2024 ZZZX Z PREVIOUS ALLOWANCE COUNT WITHDRAWN Loading...
Jul 2, 2024 PBCR Z WITHDRAWN FROM PUB - OG REVIEW QUERY Loading...
Jun 14, 2024 CNSA P APPROVED FOR PUB - PRINCIPAL REGISTER Loading...
Jun 13, 2024 TEME I TEAS/EMAIL CORRESPONDENCE ENTERED Loading...
Jun 13, 2024 CRFA I CORRESPONDENCE RECEIVED IN LAW OFFICE Loading...
Jun 13, 2024 TROA I TEAS RESPONSE TO OFFICE ACTION RECEIVED Loading...
Jun 10, 2024 GNRN O NOTIFICATION OF NON-FINAL ACTION E-MAILED Loading...
Jun 10, 2024 GNRT F NON-FINAL ACTION E-MAILED Loading...
Jun 10, 2024 CNRT R NON-FINAL ACTION WRITTEN Loading...
Jun 10, 2024 ZZZX Z PREVIOUS ALLOWANCE COUNT WITHDRAWN Loading...
Apr 4, 2023 PBCR Z WITHDRAWN FROM PUB - OG REVIEW QUERY Loading...
Mar 21, 2023 CNSA P APPROVED FOR PUB - PRINCIPAL REGISTER Loading...
Mar 21, 2023 XAEC I EXAMINER'S AMENDMENT ENTERED Loading...
Mar 21, 2023 GNEN O NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED Loading...
Mar 21, 2023 GNEA O EXAMINERS AMENDMENT E-MAILED Loading...
Mar 21, 2023 CNEA R EXAMINERS AMENDMENT -WRITTEN Loading...
Feb 27, 2023 DOCK D ASSIGNED TO EXAMINER Loading...
Feb 10, 2023 TEME I TEAS/EMAIL CORRESPONDENCE ENTERED Loading...
Feb 10, 2023 CRFA I CORRESPONDENCE RECEIVED IN LAW OFFICE Loading...
Feb 10, 2023 TROA I TEAS RESPONSE TO OFFICE ACTION RECEIVED Loading...
Aug 10, 2022 GNRN O NOTIFICATION OF NON-FINAL ACTION E-MAILED Loading...
Aug 10, 2022 GNRT F NON-FINAL ACTION E-MAILED Loading...
Aug 10, 2022 CNRT R NON-FINAL ACTION WRITTEN Loading...
Jun 28, 2022 DOCK D ASSIGNED TO EXAMINER Loading...
Oct 28, 2021 NWOS I NEW APPLICATION OFFICE SUPPLIED DATA ENTERED Loading...
Oct 2, 2021 NWAP I NEW APPLICATION ENTERED Loading...

Detailed Classifications

Class 042
Providing online non-downloadable software using artificial intelligence for machine learning in the field of cybersecurity; Providing online non-downloadable software that utilizes machine learning to determine the normal communication behavior of individuals to identify unusual communication behavior; Computer services for analyzing digital activities to discover security threats; Computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats; Computer security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; Computer security services, namely, remediating instances of account takeover by restricting unauthorized access to accounts for email and messaging management services; Computer security services, namely, monitoring of computer systems to detect instances of account takeover; Software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; Platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; Email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; Software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; Computer security consultancy; Computer services for evaluating emails to identify fraudulent individuals and entities, such as vendors, and then monitoring via computer conduct of those fraudulent individuals and entities on an ongoing basis; Computer services for recording behaviors of individuals and entities deemed to be fraudulent in a blacklist for security purposes, namely, identifying and examining digital communications involving individuals and entities to identify security threats; Computer services for tracking digital activities of individuals and entities determined to be fraudulent based on an analysis of emails sent by those individuals and entities, namely, monitoring digital communications involving individuals and entities determined to be fraudulent to identify security threats; Computer services for generating a federated collection of individuals and entities to prevent security threats, namely, identifying and cataloging individuals' and entities' behaviors through analysis of digital communications

Additional Information

Design Mark
The mark consists of a stylized letter "A" that does not include the horizontal bar that extends between its slanting sides, so as to appear as an inverted letter "V".
Pseudo Mark
ABNORMAL

Classification

International Classes
042