TREND

USPTO USPTO 2006 ABANDONED - NO STATEMENT OF USE FILED

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The US trademark TREND was filed as Word mark on 10/03/2006 at the U.S. Patent and Trademark Office. The current status of the mark is "ABANDONED - NO STATEMENT OF USE FILED".

Trademark Details Last update: May 24, 2018

Trademark form Word mark
File reference 77013017
Application date October 3, 2006
Publication date April 1, 2008

Trademark owner

Shinjuku MAYNDS Tower 27F, 2-1-1 Yoyogi
151-0053 Tokyo
JP

Trademark representatives

goods and services

9 computer security software; computer antivirus software; malicious code and malicious content screening software; firewall software; software for monitoring, filtering and modifying messages, files, programs and data retrieved or received from computer and communication networks; computer software for use in scanning, detecting, quarantining and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; computer software for use in repairing damage from viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; computer software for network security and network management; computer software for securing wireless computer networks; anti-spam, anti-fraud, and anti-phishing computer software; computer software for enforcing content policies for electronic mail, instant messaging, and web usage; computer utility software; electronic software updates, namely, downloadable computer software and associated data files for updating computer software in the fields of computer and network security, provided via computer and communication networks; computer hardware, not including ethernet cards or ethernet hubs; computer network security appliances not including ethernet cards or ethernet hubs, namely computer hardware preinstalled with security software, in Class 9
16 data sheets, quick start guides, installation instructions, troubleshooting guides, technical reference manuals, pamphlets, books, booklets, training manuals, instructional manuals, all in the fields of computers, computer hardware, computer software, information technology, computer programs, computer security, and information security
38 electronic mail management services for others
42 computer services, namely, online scanning, detecting, quarantining and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; providing temporary use of non-downloadable software for scanning, detecting, quarantining and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; computer virus protection services; providing online computer databases in the fields of computer software, computer and data security and computer system management; providing information relating to computer software, computer and data security and computer system management via the Internet and other computer and communications networks; provision of information relating to viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices via the Internet and other computer and communications networks; technical consultation in the field of computers, computer systems, computer software, and computer and communication networks; technical support services, namely, troubleshooting of computer hardware and software problems via telephone and electronic mail; computer programming for others; filtering electronic mail for others; provision of electronic mail security services for others, namely blocking, rejecting or quarantining spam and other unwanted messages, and cleaning messages of viruses, trojans, and malware; providing reputation services, namely information and databases regarding the association of sender identity information with network abuse, including the sending of spam electronic mail
45 scanning and monitoring of computer systems for security purposes; providing information in the fields of global computer network and local area network security, preventing computer viruses, computer hardware and software applications in security; providing enterprise security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computers, computer data, software products and computer networks; computer security services, namely, intrusion detection services, intrusion prevention services, vulnerability assessment services; computer security services, namely services in the nature of detecting and removing computer viruses worms, trojans, spyware, adware, malware and unauthorized data and programs and threats

ID: 1377013017