SCINARY

Serial Number 99423702
630

Registration Progress

Application Filed
Oct 1, 2025
Under Examination
Approved for Publication
Published for Opposition
Registered

Trademark Image

SCINARY

Basic Information

Serial Number
99423702
Filing Date
October 1, 2025
Drawing Code
5

Status Summary

Current Status
Active
Status Code
630
Status Date
Oct 1, 2025
Application
Pending
Classes
042

Rights Holder

Scinary Cybersecurity, LLC

16
Address
PO Box 155632
Waco, TX 76715

Ownership History

Scinary Cybersecurity, LLC

Original Applicant
16
Waco, TX

Legal Representation

Attorney
John A. Powell

Application History

2 events
Date Code Type Description Documents
Oct 1, 2025 MAFR O APPLICATION FILING RECEIPT MAILED Loading...
Oct 1, 2025 NWAP I NEW APPLICATION ENTERED Loading...

Detailed Classifications

Class 042
Computer disaster recovery planning; Computer forensic services; Computer security threat analysis for protecting data; Computer technology consultancy; Computer technology consultancy in the field of cybersecurity, malware analysis, threat hunting, IT support, technology audits, disaster recovery, antivirus monitoring, and incident response and handling; Consultancy in the field of software design; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Design and development of software and hardware for cybersecurity, malware analysis, threat hunting, IT support, technology audits, disaster recovery, antivirus monitoring, and incident response and handling; Design and development of computer hardware and software; Design and development of computer software; Design and development of on-line computer software systems; Design, development, installation and maintenance of computer software; Design, development, and implementation of software for cybersecurity, malware analysis, threat hunting, IT support, technology audits, disaster recovery, antivirus monitoring, and incident response and handling; Design, development and implementation of software; Design, maintenance, development and updating of computer software; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of security systems and contingency planning for information systems; Information technology consulting relating to computer network design; Planning, design and management of information technology systems; Providing temporary use of non-downloadable computer anti-virus software; Software design and development; Software engineering services; Technological planning and consulting services in the field of cybersecurity, malware analysis, threat hunting, IT support, technology audits, disaster recovery, antivirus monitoring, and incident response and handling; Testing, analysis, and evaluation of computer software and computer hardware for cybersecurity, malware analysis, threat hunting, IT support, technology audits, disaster recovery, antivirus monitoring, and incident response and handling to assure compliance with industry standards; Computer software consultancy; Computer software consulting; Computer software design; Computer software design and updating; Computer software design for others; Design of computer software; Computer software design and development; Computer software design, computer programming, and maintenance of computer software; Computer software development and computer programming development for others; Computer software development, computer programming and maintenance of computer software for cybersecurity, malware analysis, threat hunting, IT support, technology audits, disaster recovery, antivirus monitoring, and incident response and handling; Computer software installation and maintenance; Computer programming and software design; Design and programming of computer software; Computer programming consultancy in the field of cybersecurity, malware analysis, threat hunting, IT support, technology audits, disaster recovery, antivirus monitoring, and incident response and handling; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer services, namely, on-site management of information technology (IT) systems of others; Computer services, namely, remote management of the information technology (IT) systems of others; Consultation services relating to computer software; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Creating, maintaining, and modernizing computer software; Custom design of computer software; Design and development of electronic data security systems; Design and writing of computer software; Design for others in the field of computer software; Developing and updating computer software; Developing computer software; Development of software for secure network operations; Installation and maintenance of computer software; Preparation, update, installation and maintenance of computer software; Installation, maintenance and repair of software for computer systems; Outsource service provider in the field of information technology consulting relating to installation, maintenance and repair of computer software; Providing a website that features technology that enables the secure exchange of information by users; Technology consultation in the field of cybersecurity; Updating of computer software; Maintenance and updating of computer software; Updating and design of computer software; Updating and maintenance of computer software; Installation, maintenance, and updating of computer software; Updating of computer software for others; Updating of computer software relating to computer security and prevention of computer risks; Monitoring of computer systems to detect cybersecurity incidents; Computer programming consultancy in the field of cybersecurity
First Use Anywhere: Dec 9, 2021
First Use in Commerce: Sep 9, 2022

Additional Information

Design Mark
The mark consists of the word SCiNARY in which the top "dot" for the letter "i" is in blue and there is a blue triangle underneath the letter "A", but wherein the rest of the lettering is in gray.
Color Claim
The color(s) blue and gray is/are claimed as a feature of the mark.

Classification

International Classes
042