Image Trademark of Gen Digital Inc. Trademark Details
Status | Alive Registered 700 — Registered |
---|
Serial Number | 85154143 |
---|---|
Registration Number | 4354348 |
Status Date | Tuesday, June 18, 2013 |
Filing Date | Tuesday, June 18, 2013 |
Registration Date | Tuesday, June 18, 2013 |
Attorney | Sally M. Abel, Esq. |
Correspondent
SALLY M. ABEL, ESQ.
FENWICK & WEST LLP
801 CALIFORNIA ST
MOUNTAIN VIEW, CA 94041-1990
FENWICK & WEST LLP
801 CALIFORNIA ST
MOUNTAIN VIEW, CA 94041-1990
Case File Statements
Indication of Colors | Color is not claimed as a feature of the mark. |
---|---|
Description of Mark | The mark consists of a circle with a checkmark in the center of the circle. |
Goods & Services | Computer antivirus software; computer software for providing network, Internet, and computer security; computer software for providing online identity protection and parental control; computer software for providing intrusion detection and prevention; computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Internet security software, including computer software for use in the monitoring and control of computer and online activity; computer software for providing online transaction security; fraud protection software; computer optimization software; computer software to prevent, diagnose, and repair computer problems; computer maintenance software; computer software for the back-up, storage, restoration and recovery of data, folders, and files; enterprise security software; fire wall software; privacy control software; content filtering software; cloning software, namely, software for cloning computer hard drives, software for cloning computer operating systems, software for cloning data files, software reconfiguring personal computers; computer software for the creation of virtual private network; computer utility software; computer utility software for removal of computer applications and software; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software, namely, middleware for interfacing client applications and networked or host based databases; computer software for use in updating other computer software; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software for telecommuting, namely, for connecting to and use of a remote computer network, a remote computer and mobile devices; computer software for use with a home or remote office for connecting computer network users to global networks; computer software and recorded databases for use in diagnosis, repair and configuration of computers, computer software and computer peripherals; computer software, hardware, firmware and peripherals for network and Internet security data and system protection, and storage, server, client, and application performance management; computer hardware; computer hardware appliances that provide firewall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions and file serving storage management; computer software for use in file, disk and systems management; computer software for use in data storage management and storage area networks; computer software for backing up and restoring computer data; computer software for use in disaster recovery; computer software for use in removable storage media management; computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; computer software for use in the field of enterprise information management; computer software for use in the field of online analytical processing (OLAP); computer software for generating reports from databases; computer software for scheduling automated processes; computer software for use in the central management of computer attached to a computer network; computer software for replicating and archiving files from one data store to another; computer software for metering the use of the other computer software; computer software for use in developing data analysis applications and other computer software; computer programs for data security for use with data communications applications, and for the encryption and authentication of electronic information; computer programs for use in the field of computer system administration, namely, programs for the administration and management of computer programs and electronic data about computer systems; computer programs for managing the software configurations of computer systems and computer networks; computer programs for the sending and receiving of computer software across a computer network to accomplish software distribution and computer programs for installing and upgrading other computer software without manual user intervention; computer programs for copying data from one electronic storage medium to another electronic storage medium; computer programs for remotely monitoring, evaluating, demonstrating and controlling other computer programs or computer processes; computer programs for locking-down one or more computers on a computer network; computer hardware and software for authenticating users and maintaining and managing access to computer data, computer content, electronic communications, and computer networks; embedded software for network monitoring and security; embedded software for authenticating users and maintaining and managing access to computer data, computer content, electronic communications, and computer networks; computer software, namely, content management software which filters, monitors, reports on and controls use of and access to locations on computer systems and networks and on global communication networks; electronic mail and news group filtering software which prevents or shunts delivery of defined categories or origins of electronic mail messages and news postings; protection software which detects electronic inquiries for information from computer systems or of users of computer systems and organizes, monitors, controls and prevents provision of such information; privacy management software which prevents, monitors, certifies, aggregates and reports on the distribution and use of personal identification information on computer systems and networks and on global communications networks; file transfer filtering software which prevents, monitors, reports on or shunts delivery of defined categories, origins, volumes, or timeframes of electronic files; and chat filtering software which prevents, monitors, reports on, analyzes, or shunts delivery of defined categories, senders, recipients, origins, volumes or timeframes of conversations transmitted or stored electronically; downloadable electronic publications in the nature of reference, user, technical and instructional manuals and data sheets for use with computer software, hardware, peripherals and firmware and downloadable electronic publications in the nature of manuals, blogs, instructional materials, teaching materials, newsletters, magazines, newspapers, books and pamphlets in the fields of computer software and computer and on-line security |
Goods & Services | Computer user manuals in the field of computers, computer software, computer peripherals, computer security, computer services, and computer networks; printed matter and publications, namely, magazines and conference materials in the field of computers, computer software, computer peripherals, and computer networks; paper labels and paper printed hologram labels |
Goods & Services | Transmittal of anti-virus scanning and other network security software via a global computer network; information and consultancy with regard to aforementioned services |
Goods & Services | Electronic storage of data files for clients to store and retrieve data via a global computer network; electronic document and email archiving services |
Goods & Services | Development of software for network and Internet security and data encryption; computer consultation; computer consultation in the field of computer security; computer diagnostic services; computer services, namely, filtering of unwanted and unsolicited email; computer services, namely, data recovery services; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; technical support services, namely, providing back-up computer programs and facilities; computer virus protection services; computer software installation services; technical consultation in the field of computer software installation and maintenance; development, updating, publishing and maintenance of software for networks and standalone computers in the fields of security, database management, and anti-virus protection and monitoring security systems; providing information in the field of computer network and Internet security; providing technical information in the field of computer software applications; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; updating computer software; providing information in the field of computer database, software, hardware, and network operation, design and development; computer monitoring services in the nature of tracking hardware and software performance and processes and sending reports thereof; monitoring the computer systems of others for technical purposes and providing back-up computer programs and facilities; integration of computer systems and networks; computer services, namely, providing information concerning the encryption and authentication of electronic data for website and ecommerce transaction security; computer and software consultancy services in the fields of digital media, data encryption, computer security, communication security and computer software; encryption and decryption of data and communications; creating indexes of information available on websites and filtering unwanted electronic transmissions from websites; providing security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the Internet, and computer networks; providing information about accessing computer security, preventing computer threats and design and development of computer security hardware and software applications |
Goods & Services | Monitoring of computer systems for security purposes; monitoring computer networks for security purposes; providing user authentication services in e-commerce transactions; providing information about computer and Internet security in the nature of administering digital keys and certificates |
Classifications
International Class Codes |
009
|
---|---|
U.S. Class Codes | 021, 023, 026, 036, 038 |
Status | 6 — Active |
Status Date | Thursday, October 21, 2010 |
First Use Anywhere | Friday, October 1, 2010 |
First Use In Commerce | Friday, October 1, 2010 |
Primary Code | 009 |
International Class Codes |
016
|
---|---|
U.S. Class Codes | 002, 005, 022, 023, 029, 037, 038, 050 |
Status | 6 — Active |
Status Date | Thursday, October 21, 2010 |
First Use Anywhere | Friday, October 1, 2010 |
First Use In Commerce | Friday, October 1, 2010 |
Primary Code | 016 |
International Class Codes |
038
|
---|---|
U.S. Class Codes | 100, 101, 104 |
Status | 6 — Active |
Status Date | Thursday, October 21, 2010 |
First Use Anywhere | Friday, October 1, 2010 |
First Use In Commerce | Friday, October 1, 2010 |
Primary Code | 038 |
International Class Codes |
039
|
---|---|
U.S. Class Codes | 100, 105 |
Status | 6 — Active |
Status Date | Thursday, October 21, 2010 |
First Use Anywhere | Friday, October 1, 2010 |
First Use In Commerce | Friday, October 1, 2010 |
Primary Code | 039 |
International Class Codes |
042
|
---|---|
U.S. Class Codes | 100, 101 |
Status | 6 — Active |
Status Date | Thursday, October 21, 2010 |
First Use Anywhere | Friday, October 1, 2010 |
First Use In Commerce | Friday, October 1, 2010 |
Primary Code | 042 |
International Class Codes |
045
|
---|---|
U.S. Class Codes | 100, 101 |
Status | 6 — Active |
Status Date | Thursday, October 21, 2010 |
First Use Anywhere | Friday, October 1, 2010 |
First Use In Commerce | Friday, October 1, 2010 |
Primary Code | 045 |
Trademark Timeline
-
Oct 01 2010First use anywhere for the mark
-
Oct 01 2010First use in commerce for the mark
-
Oct 01 2010First use anywhere for the mark
-
Oct 01 2010First use in commerce for the mark
-
Oct 01 2010First use anywhere for the mark
-
Oct 01 2010First use in commerce for the mark
-
Oct 01 2010First use anywhere for the mark
-
Oct 01 2010First use in commerce for the mark
-
Oct 01 2010First use anywhere for the mark
-
Oct 01 2010First use in commerce for the mark
-
Oct 01 2010First use anywhere for the mark
-
Oct 01 2010First use in commerce for the mark
-
Oct 15 2010Trademark application filed with USPTO
-
Oct 19 2010New Application Entered In Tram
-
Oct 21 2010New Application Office Supplied Data Entered In Tram
-
Oct 22 2010Notice of Design Search Code Mailed
-
Jan 12 2011Assigned To Examiner
-
Jan 19 2011Notification of Non-Final Action E-Mailed
-
Jan 19 2011Non-Final Action E-Mailed
-
Jan 19 2011Non-Final Action Written
-
Jul 19 2011Correspondence Received In Law Office
-
Jul 19 2011Teas Response To Office Action Received
-
Jul 20 2011Teas/email Correspondence Entered
-
Jul 27 2011Approved For Pub - Principal Register
-
Aug 09 2011Law Office Publication Review Completed
-
Aug 09 2011Assigned To Lie
-
Sep 13 2011Official Gazette Publication Confirmation E-Mailed
-
Sep 13 2011Published For Opposition
-
Nov 08 2011Noa E-Mailed - Sou Required From Applicant
-
May 08 2012Extension 1 Filed
-
May 08 2012Teas Extension Received
-
May 31 2012Extension 1 Granted
-
May 31 2012Case Assigned To Intent To Use Paralegal
-
Jun 01 2012Notice of Approval of Extension Request E-Mailed
-
Nov 08 2012Extension 2 Filed
-
Nov 08 2012Teas Extension Received
-
Nov 15 2012Extension 2 Granted
-
Nov 16 2012Notice of Approval of Extension Request E-Mailed
-
May 07 2013Use Amendment Filed
-
May 07 2013Teas Statement of Use Received
-
May 08 2013Statement of Use Processing Complete
-
May 10 2013Assigned To Lie
-
May 10 2013Allowed Principal Register - Sou Accepted
-
May 13 2013Law Office Registration Review Completed
-
May 14 2013Notice of Acceptance of Statement of Use E-Mailed
-
Jun 18 2013Registered-Principal Register
-
Jun 18 2013Trademark officially registered with the USPTO