ALTER CISO SECURITY trademark

ALTER CISO SECURITY - Trademark Information

Trademark by Ge, Jiayi

The ALTER CISO SECURITY trademark was assigned a Serial Number #97681155 – by the United States Patent and Trademark Office (USPTO). Trademark Serial Number is a unique ID to identify the ALTER CISO SECURITY mark in USPTO. The ALTER CISO SECURITY mark is filed in the category of Computers, Scientific Service. The legal correspondent for ALTER CISO SECURITY trademark is GE, JIAYI, 2803 PHILADELPHIA PIKE, SUITE B PMB 7015, CLAYMONT, DELAWARE UNITED STATES 19703. The current status of the ALTER CISO SECURITY filing is Abandoned because the applicant failed to respond or filed a late response to an Office action.

Based on Ge, Jiayi, the ALTER CISO SECURITY trademark is used in the following business: Consultancy and information services relating to information technology architecture and infrastructure; Consultancy in the field of artificial intelligence technology; Consultancy in the field of quantum computing; Consultancy in the field of software design; Consultation and research in the field of aerospace engineering; Consulting in the field of engineering; Consulting in the field of information technology; Consulting in the field of IT project management; Consulting in the field of telecommunications technology; Consulting in the field of virtualization technologies for enterprises and businesses; Consulting in the fields of engineering and architecture; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of cloud computing; Consulting services in the field of design and development of engineering processes; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the field of hosting computer software applications; Consulting services in the field of product design and development; Consulting services in the fields of selection, implementation and use of computer hardware and software systems for others; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Computer security consultancy; Computer security service, namely, hard drive erasure; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services in the nature of administering digital certificates; Computer security services in the nature of administering digital keys; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security services, namely, restricting unauthorized network access by identity and access management controls; Computer security threat analysis for protecting data; Computer network security consultancy; Computer programming consultancy in the field of cybersecurity and privacy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer software consultation; Computer software consulting; Data security consultancy; Data encryption services for providing security and anonymity for electronically transmitted credit card transactions; Development of security systems and contingency planning for information systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Hosting an online community website featuring shared communications between community members interested in personal and small business computer information security; Innovation consulting services, namely, advising others in the areas of product development; Internet security consultancy; IT consulting services; Maintenance of computer software relating to computer security and prevention of computer risks; Outsource service provider in the field of information technology consulting; Providing technology information updates for home security systems via the global computer network; Recording software protection programs and security programs onto magnetic media; Rental of computers relating to computer security and prevention of computer risks; Technological consulting services for digital transformation; Technology consultation in the field of cybersecurity; Telecommunication network security consultancy; Testing of security systems; Updating of computer software relating to computer security and prevention of computer risks.

LegalHoop is the largest free online trademark search, trademark monitoring, and tracking platform. We provide online software to streamline the process, helping clients do trademark & patent searches, applications, and monitoring more automatically and efficiently. You can create a free account on LegalHoop.com and monitor all of your trademarks from one convenient dashboard, and receive free status updates any time when the status is changed.

Have a Name, Slogan, or Logo to protect? LegalHoop, an Experienced IP Agent Made It Easy - Trademark Registration in 200 Countries.

Set up your brands for success! The United States is the most difficult country in the world to register a trademark. The trademark process in the United States takes approximately one year and is fraught with pitfalls. Approximately 60% of all applications receive a refusal. Many of these refusals can be overcome by strategic work of an experienced IP consultant, but DIY-applications generally are NOT successful.

We have extensive expertise in intellectual property law, including but not limited to trademark, copyright, and patent matters in multiple countries. You can count on our vast experience in filing trademark applications and trademark maintenance to help get your trademark protected properly, cost-effectively and efficiently.

Select the Filing Country:

Trademark Registration in USA

$199

$199 + Govt Fee* (1 class)

STANDARD PACKAGE

Basic Direct-Hit Searchto help avoid obvious duplications of pre-existing marks.
Professional Preparationof your trademark application.
Electronic Deliveryof your trademark application with no need to wait for mail or dealing with paper files. This will qualify you the reduced government filing fee.
Free Search & Evaluation on Alternative Mark if Your Attorney Thinks There's an Issue with Your First Choice.

* The Trademark government fee will be charged when we submit your mark(s) to the Government Trademark Office, which is usually in the next few business days.

SERIAL NUMBER
97681155
WORD MARK
ALTER CISO SECURITY
CURRENT STATUS
Abandoned because the applicant failed to respond or filed a late response to an Office action.
STATUS DATE
Thursday, December 21, 2023
FILING DATE
Thursday, November 17, 2022
PRIORITY-CLAIM INTERNATIONAL FILING DEADLINE:

May 17, 2023
(PRIORITY CLAIM MUST BE FILED WITHIN SIX MONTHS OF FOREIGN FILING)
Trademarks are territorial. US trademark registration will not protect your trademark in a foreign country. If you have plan to protect your trademark internationally, see more options below :
REGISTRATION NUMBER
N/A
REGISTER TYPE
Principal
TRADEMARK OWNER
2803 Philadelphia Pike, Suite B PMB 7015, Claymont, DELAWARE, UNITED STATES, 19703
Owner Type: LIMITED LIABILITY COMPANY
TRADEMARK CORRESPONDENT
2803 PHILADELPHIA PIKE, SUITE B PMB 7015, CLAYMONT, DELAWARE UNITED STATES 19703
Trademark Classification Information
CLASS INFO
Class 042 - Computers, Scientific Service

First Use Anywhere:
First Use in Commerce:
Trademark Goods and Services Description
DESCRIPTION
Class 042 - Consultancy and information services relating to information technology architecture and infrastructure; Consultancy in the field of artificial intelligence technology; Consultancy in the field of quantum computing; Consultancy in the field of software design; Consultation and research in the field of aerospace engineering; Consulting in the field of engineering; Consulting in the field of information technology; Consulting in the field of IT project management; Consulting in the field of telecommunications technology; Consulting in the field of virtualization technologies for enterprises and businesses; Consulting in the fields of engineering and architecture; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of cloud computing; Consulting services in the field of design and development of engineering processes; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the field of hosting computer software applications; Consulting services in the field of product design and development; Consulting services in the fields of selection, implementation and use of computer hardware and software systems for others; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Computer security consultancy; Computer security service, namely, hard drive erasure; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services in the nature of administering digital certificates; Computer security services in the nature of administering digital keys; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security services, namely, restricting unauthorized network access by identity and access management controls; Computer security threat analysis for protecting data; Computer network security consultancy; Computer programming consultancy in the field of cybersecurity and privacy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer software consultation; Computer software consulting; Data security consultancy; Data encryption services for providing security and anonymity for electronically transmitted credit card transactions; Development of security systems and contingency planning for information systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Hosting an online community website featuring shared communications between community members interested in personal and small business computer information security; Innovation consulting services, namely, advising others in the areas of product development; Internet security consultancy; IT consulting services; Maintenance of computer software relating to computer security and prevention of computer risks; Outsource service provider in the field of information technology consulting; Providing technology information updates for home security systems via the global computer network; Recording software protection programs and security programs onto magnetic media; Rental of computers relating to computer security and prevention of computer risks; Technological consulting services for digital transformation; Technology consultation in the field of cybersecurity; Telecommunication network security consultancy; Testing of security systems; Updating of computer software relating to computer security and prevention of computer risks

Start Trademark Search

Search Now

Current Status:

Abandoned because the applicant failed to respond or filed a late response to an Office action.

12/21/2023