INDICATORS OF FUTURE ATTACK

Serial Number 98654511
645

Registration Progress

Application Filed
Jul 18, 2024
Under Examination
Approved for Publication
Published for Opposition
Registered

Attorney Assistance

Final Refusal E-Mailed - 3-Month Extension Granted (XELG on 2025-10-06)
Due: Apr 08, 2026 84 days

Trademark Image

INDICATORS OF FUTURE ATTACK

Basic Information

Serial Number
98654511
Filing Date
July 18, 2024
Drawing Code
4

Status Summary

Current Status
Active
Status Code
645
Status Date
Jul 8, 2025
Application
Pending
Classes
042 045

Rights Holder

Silent Push, Inc.

03
Address
12020 Sunrise Valley Drive, Suite 100
Reston, VA 20191

Ownership History

Silent Push, Inc.

Original Applicant
03
Reston, VA

Legal Representation

Attorney
Jonathan L. Hood

USPTO Deadlines

Next Deadline
84 days remaining
Final Refusal E-Mailed - 3-Month Extension Granted (XELG on 2025-10-06)
Due Date
April 08, 2026

Application History

21 events
Date Code Type Description Documents
Jan 7, 2026 TEME I TEAS/EMAIL CORRESPONDENCE ENTERED Loading...
Jan 7, 2026 CRFA I CORRESPONDENCE RECEIVED IN LAW OFFICE Loading...
Jan 7, 2026 ERFR I TEAS REQUEST FOR RECONSIDERATION RECEIVED Loading...
Oct 28, 2025 IUAA P USE AMENDMENT ACCEPTED Loading...
Oct 9, 2025 AUPC I AMENDMENT TO USE PROCESSING COMPLETE Loading...
Oct 9, 2025 IUAF S USE AMENDMENT FILED Loading...
Oct 9, 2025 EAAU I TEAS AMENDMENT OF USE RECEIVED Loading...
Oct 6, 2025 XELG O APPLICATION EXTENSION GRANTED/RECEIPT PROVIDED Loading...
Oct 6, 2025 XELR I APPLICATION EXTENSION TO RESPONSE PERIOD - RECEIVED Loading...
Jul 8, 2025 GNFN O NOTIFICATION OF FINAL REFUSAL EMAILED Loading...
Jul 8, 2025 GNFR O FINAL REFUSAL E-MAILED Loading...
Jul 8, 2025 CNFR R FINAL REFUSAL WRITTEN Loading...
May 19, 2025 TEME I TEAS/EMAIL CORRESPONDENCE ENTERED Loading...
May 19, 2025 CRFA I CORRESPONDENCE RECEIVED IN LAW OFFICE Loading...
May 19, 2025 TROA I TEAS RESPONSE TO OFFICE ACTION RECEIVED Loading...
Feb 19, 2025 GNRN O NOTIFICATION OF NON-FINAL ACTION E-MAILED Loading...
Feb 19, 2025 GNRT F NON-FINAL ACTION E-MAILED Loading...
Feb 19, 2025 CNRT R NON-FINAL ACTION WRITTEN Loading...
Feb 7, 2025 DOCK D ASSIGNED TO EXAMINER Loading...
Feb 6, 2025 NWOS I NEW APPLICATION OFFICE SUPPLIED DATA ENTERED Loading...
Jul 18, 2024 NWAP I NEW APPLICATION ENTERED Loading...

Detailed Classifications

Class 042
Software as a service (SAAS) services featuring software for computer and network security; Software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; Application service provider (ASP) featuring non-downloadable computer software for use in computer and network security; Computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; Computer security consultancy in the field of administration of digital keys and digital certificates; Computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; Computer security consultation; Consulting in the field of information technology relating to installation, maintenance and repair of computer software; Computer consultation in the field of computer and network security in the nature of computer and network software security; Computer security consultancy in the field of scanning and penetration testing computers and networks to assess information security vulnerability; Maintenance and updating of computer software relating to computer and network security and prevention of computer risks; Computer security consultancy, namely, developing plans for improving computer and network security for businesses and governmental agencies; Computer security consultancy, namely, developing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies; Cloud computing featuring online non-downloadable software for use in computer and network security; Cloud computing services in the field of computer and network security in the nature of computer security threat analysis for protecting data; Computer systems analysis; Computer security consultancy in the nature of implementing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies, namely, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; Computer security consultancy, namely, identifying malware on computer systems; Computer security consultancy, namely, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; Consultation for protecting data and information from unauthorized access in the field of computer and network security; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy for protecting data and information from unauthorized access, namely, developing plans for improving computer and network security and preventing criminal activity; Computer security consultancy for protecting data and information from unauthorized access; Computer security consultancy for protecting data and information from unauthorized access in the field of endpoint protection software or curated cyberthreat data for computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints; Computer technology consulting of systems for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; Monitoring of computer systems for protecting data and information from unauthorized access; Provision of systems in the nature of software as a service (SAAS) for the management of computer and network threats, namely, surveillance and monitoring of vulnerability and security problems in computer software and software for computer networks; Provision of systems in the nature of software as a service (SAAS) for the management of computer and network threats, namely, surveillance and monitoring of vulnerability and security problems in computer hardware for computer network security purposes; Computer security consultancy in the nature of implementing plans for improving computer hardware and hardware for network security for businesses and governmental agencies, namely, computer security assurance, administration of digital keys and digital certificates; Electronic monitoring of bank activity and electronic funds transfer, and credit and debit card and electronic check transactions to detect fraud via a global computer network
First Use Anywhere: Jun 5, 2024
First Use in Commerce: Jun 5, 2024
Class 045
Monitoring of computer systems for security purposes in the nature of surveillance services relating to the physical safety of persons and security of tangible property
First Use Anywhere: Jun 5, 2024
First Use in Commerce: Jun 5, 2024

Classification

International Classes
042 045