ELIGMA

Serial Number 97356325
606

Registration Progress

Application Filed
Apr 11, 2022
Under Examination
Jun 27, 2023
Approved for Publication
May 2, 2023
Published for Opposition
May 2, 2023
Registered

Re-Apply for This Trademark

This trademark is no longer active. You may be able to file a new application for the same or similar mark.
Mark: ELIGMA
Previous Owner: Apolyta Inc.
Classes: 009, 042

Trademark Image

ELIGMA

Basic Information

Serial Number
97356325
Filing Date
April 11, 2022
Published for Opposition
May 2, 2023
Abandonment Date
January 29, 2024
Drawing Code
4

Status Summary

Current Status
Inactive
Status Code
606
Status Date
Jan 29, 2024
Classes
009 042

Rights Holder

Apolyta Inc.

03
Address
651 N Broad St, Ste 205 #4859
Middletown, DE 19709

Ownership History

Apolyta Inc.

Original Applicant
03
Middletown, DE

Apolyta Inc.

Owner at Publication
03
Middletown, DE

Legal Representation

Attorney
Alon Hilu

USPTO Deadlines

No Upcoming Deadlines

No upcoming deadlines found for this trademark.

Application History

16 events
Date Code Type Description Documents
Jan 29, 2024 MAB6 E ABANDONMENT NOTICE E-MAILED - NO USE STATEMENT FILED Loading...
Jan 29, 2024 ABN6 S ABANDONMENT - NO USE STATEMENT FILED Loading...
Jun 27, 2023 NOAM E NOA E-MAILED - SOU REQUIRED FROM APPLICANT Loading...
May 2, 2023 NPUB E OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED Loading...
May 2, 2023 PUBO A PUBLISHED FOR OPPOSITION Loading...
Apr 12, 2023 NONP E NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED Loading...
Mar 30, 2023 CNSA P APPROVED FOR PUB - PRINCIPAL REGISTER Loading...
Mar 15, 2023 TEME I TEAS/EMAIL CORRESPONDENCE ENTERED Loading...
Mar 14, 2023 CRFA I CORRESPONDENCE RECEIVED IN LAW OFFICE Loading...
Mar 14, 2023 TROA I TEAS RESPONSE TO OFFICE ACTION RECEIVED Loading...
Feb 7, 2023 GNRN O NOTIFICATION OF NON-FINAL ACTION E-MAILED Loading...
Feb 7, 2023 GNRT F NON-FINAL ACTION E-MAILED Loading...
Feb 7, 2023 CNRT R NON-FINAL ACTION WRITTEN Loading...
Jan 24, 2023 DOCK D ASSIGNED TO EXAMINER Loading...
Apr 15, 2022 NWOS I NEW APPLICATION OFFICE SUPPLIED DATA ENTERED Loading...
Apr 14, 2022 NWAP I NEW APPLICATION ENTERED Loading...

Detailed Classifications

Class 009
Downloadable computer security software; downloadable computer software for validating security controls of computer terminals, servers, endpoints and networks through simulating cyber-attacks in real world scenarios; Downloadable software for measuring the security maturity level and improving security controls' efficacy of personal computers, servers, mobile, or IoT device through adaptive cyberattack simulations and emulations; downloadable software for measuring the security maturity level and improving security controls' efficacy of computer networks or entire organizations through adaptive cyberattack simulations and emulations; Downloadable computer software for conducting adaptive penetration tests for computer terminals, servers, endpoints and networks for determining and identifying information security weaknesses, assessing security gaps and recommending plans for preventing cybersecurity attacks; Downloadable software for proactively assuring security controls' effectiveness and preparedness against different types of cyber threats; downloadable software for continuously simulating adaptive cyber-security attacks and recommending practical mitigation strategies; downloadable software for predicting and preventing computer and electronics security issues prior to their occurring; downloadable software for adaptive attack emulation and/or simulation; downloadable software for measuring security controls' efficacy; downloadable software for security benchmarking; downloadable software for automated remediation of detected gaps; downloadable software for adaptive security validation
Class 042
Providing online non-downloadable cloud-based security software; providing online non-downloadable cloud-based software for validating security controls of computer terminals, servers, endpoints and networks through simulating cyber-attacks in real world scenarios; providing online non-downloadable cloud-based software for measuring the security maturity level and improving security controls' efficacy of a given system, namely, personal computer, server, mobile, or IoT device through adaptive cyberattack simulations and emulations; providing online non-downloadable cloud-based software for measuring the security maturity level and improving security controls' efficacy of a group of systems, namely, a network or multiple networks, or entire organizations through adaptive cyberattack simulations and emulations; providing online non-downloadable cloud-based computer software for conducting adaptive penetration tests for computer terminals, servers, endpoints and networks for determining and identifying information security weaknesses, assessing security gaps and recommending plans for preventing cybersecurity attacks; providing online non-downloadable cloud-based software for proactively assuring security controls' effectiveness and preparedness against different types of cyber threats; providing online non-downloadable cloud-based software for continuously simulating adaptive cyber-security attacks and recommending practical mitigation strategies; providing online non-downloadable cloud-based software for predicting and preventing computer and electronics security issues prior to their occurring; providing online non-downloadable cloud-based software for adaptive attack emulation and/or simulation; providing online non-downloadable cloud-based software for measuring security controls' efficacy; providing online non-downloadable cloud-based software for security benchmarking; providing online non-downloadable cloud-based software for automated remediation of detected gaps; providing online non-downloadable cloud-based software for adaptive security validation; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security weaknesses, gaps, and security maturity level; computer security services for protecting data and information from unauthorized access, namely, monitoring computer terminals, servers, endpoints and networks directed toward the prevention, detection or other action with respect to security threats and malicious activities

Classification

International Classes
009 042