REDHOUND

Serial Number 99225466
641

Registration Progress

Application Filed
Jun 9, 2025
Under Examination
Approved for Publication
Published for Opposition
Registered

Attorney Assistance

Non-Final Action E-Mailed
Due: Feb 03, 2026 39 days

Trademark Image

REDHOUND

Basic Information

Serial Number
99225466
Filing Date
June 9, 2025
Drawing Code
4

Status Summary

Current Status
Active
Status Code
641
Status Date
Dec 4, 2025
Application
Pending
Classes
009 041 042

Rights Holder

Omni Fed LLC

16
Address
7528 Rio Grande Way
Gainesville, VA 20155

Ownership History

Omni Fed LLC

Original Applicant
16
Gainesville, VA

Legal Representation

Attorney
Sean F. Mellino

USPTO Deadlines

Next Deadline
39 days remaining
Non-Final Action E-Mailed
Due Date
February 03, 2026
Extension Available
Until May 03, 2026
Additional deadlines exist. Contact your attorney for complete deadline information.

Application History

10 events
Date Code Type Description Documents
Dec 4, 2025 GNRN O NOTIFICATION OF NON-FINAL ACTION E-MAILED Loading...
Dec 4, 2025 GNRT F NON-FINAL ACTION E-MAILED Loading...
Dec 4, 2025 CNRT R NON-FINAL ACTION WRITTEN Loading...
Nov 3, 2025 GNRN O NOTIFICATION OF NON-FINAL ACTION E-MAILED Loading...
Nov 3, 2025 GNRT F NON-FINAL ACTION E-MAILED Loading...
Nov 3, 2025 CNRT R NON-FINAL ACTION WRITTEN Loading...
Oct 29, 2025 DOCK D ASSIGNED TO EXAMINER Loading...
Oct 15, 2025 NWOS I NEW APPLICATION OFFICE SUPPLIED DATA ENTERED Loading...
Jun 9, 2025 MAFR O APPLICATION FILING RECEIPT MAILED Loading...
Jun 9, 2025 NWAP I NEW APPLICATION ENTERED Loading...

Detailed Classifications

Class 009
Apparatus, hardware and devices featuring software and firmware for cybersecurity, threat detection, network analysis, threat intelligence integration, investigation tools, incident response, behavioral monitoring, mobile cybersecurity, network defense; Wireless communication devices featuring software and firmware for cybersecurity, threat detection, network analysis, threat intelligence integration, investigation tools, incident response, behavioral monitoring, mobile cybersecurity, network defense; Apparatus, hardware and devices featuring LAN (local area network) operating software and firmware for cybersecurity, threat detection, network analysis, threat intelligence integration, investigation tools, incident response, behavioral monitoring, mobile cybersecurity, network defense; Wireless communication devices featuring LAN (local area network) operating software and firmware for cybersecurity, threat detection, network analysis, threat intelligence integration, investigation tools, incident response, behavioral monitoring, mobile cybersecurity, network defense; LAN (local area network) hardware; Downloadable software in the nature of a mobile application for use in cybersecurity; Downloadable computer software for use in cybersecurity
Class 041
Technical consulting in the field of cybersecurity risk management training; Technical consulting in the field of cybersecurity, threat detection, network analysis, threat intelligence integration, investigation tools, incident response, behavioral monitoring, mobile cybersecurity, network defense
Class 042
Technology consultation in the field of cybersecurity; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Internet security consultancy; Data security consultancy; Computer security consultancy; Computer network security consultancy; Computer security consultancy in the field of cybersecurity, threat detection, network analysis, threat intelligence integration, investigation tools, incident response, behavioral monitoring, mobile cybersecurity, network defense; Computer software consulting services in the field of critical incident response to information, computer, network, and internet security breaches; Consultation in the field of data security for assessing and protecting critical assets, identifying compliance issues, incident response support, and identifying technical and non-technical solutions; Monitoring of computer systems for the purpose of data breach discovery and protected-data discovery by reviewing, extracting and mining of files, documents, and data; Providing on-line non-downloadable software connected to a local network for use in cybersecurity, assessing and protecting critical assets, identifying compliance issues, incident response support, identifying technical and non-technical solutions, threat detection, network analysis, threat intelligence integration, investigation tools, incident response, behavioral monitoring, mobile cybersecurity, network defense; Providing non-downloadable software for use in cybersecurity, assessing and protecting critical assets, identifying compliance issues, incident response support, identifying technical and non-technical solutions, threat detection, network analysis, threat intelligence integration, investigation tools, incident response, behavioral monitoring, mobile cybersecurity, network defense; Software as a service (SAAS) services featuring software for cybersecurity, assessing and protecting critical assets, identifying compliance issues, incident response support, identifying technical and non-technical solutions, threat detection, network analysis, threat intelligence integration, investigation tools, incident response, behavioral monitoring, mobile cybersecurity, network defense; Platform as a service (PAAS) featuring computer software platforms for use in cybersecurity, assessing and protecting critical assets, identifying compliance issues, incident response support, identifying technical and non-technical solutions, threat detection, network analysis, threat intelligence integration, investigation tools, incident response, behavioral monitoring, mobile cybersecurity, network defense; Software as a service (SAAS) services featuring software for managing, coordinating, and streamlining cybersecurity incident response activities, communicating and collaborating among incident response teams; collecting and sharing incident data; Consulting in the field of cybersecurity, threat detection, network analysis, threat intelligence integration, investigation tools, incident response, behavioral monitoring, mobile cybersecurity, network defense

Additional Information

Pseudo Mark
RED HOUND

Classification

International Classes
009 041 042