Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Trademark Information

Application ID
Status
Sub Status
Date of Application
04 October 2022
Classes
9,38,42
Proprietor
One Microsoft Way Redmond, Washington 98052 6399 United States Of America
Attorney
Pooja Dodd[6710]
113, Uday Park, New Delhi 110049.
Type
Word
State
Delhi
Country
Filing Mode
e-Filing
IP Office
DELHI
Used Since
21 March 2019
Valid / Upto
04 October 2032
Description
[Class : 9] Downloadable Computer Software, Namely, Downloadable Computer Security Software For Computer, Applications, Cloud, And Computer Network Security, Automated Domain Threat Protection And Prevention, Analysis, Management And Integration Of Threat Data, Security Information And Event Management, Detection, Investigation And Elimination Of Computer Threats, Cyberattacks And Data Breaches, Threat And Intrusion Detection And Prevention, Exploit Protection And Prevention, And Automated Remediation And Restoration Of Compromised Computer Software And Hardware, Downloadable Computer Software Using Artificial Intelligence (Ai) Processing And Machine Learning For Computer, Applications, Cloud, And Computer Network Security, Downloadable Computer Anti Virus, Anti Malware, And Privacy Control Software, Downloadable Computer Software For Developing Custom Security Threat Detection, Investigation, And Response Tools, Downloadable Computer Software For Monitoring Applications Installed And Running On A Computer, Computer Security Audits And Performance Diagnostics, And For Scanning, Removing And Blocking Computer Applications And Files, Downloadable Computer Software For Securing, Scanning, Authenticating, And Encrypting Email, Documents, Website Links, And Data, And Controlled Folder Access, Downloadable Computer Software For Securing, Scanning, Regulating Access, And Authenticating Software Tools, Role Based Access, Ip Addresses, Domains, Computer Peripherals, And Endpoints, Downloadable Computer Security Software For The Collection, Editing, Organizing, Modifying, Transmission, Processing, Storage, Analysis, And Sharing Of Data And Information, Downloadable Computer Security Software For The Creation, Monitoring, And Enforcement Of Security Protocols, Credentials, And Policies, Downloadable Computer Software For Detecting, Analyzing, Monitoring, Displaying, And Countering Computer Security Threats, Generating Security Reports, Providing Security Alerts, And For Security Compliance, Downloadable Computer Software For Identity And Access Management, Privilege And Permissions Access Management, Cloud Infrastructure Entitlements Management, Cloud Security, Internet Of Things (Io T) Security, Protection Of Cloud Based Information And Access, Database Management, Data Security, And Risk Assessment And Monitoring Of Cloud Systems, Downloadable Computer Software For Cloud Security Posture Management, Cloud And Hybrid Environment Security Assessment And Management, And Cloud Workload Protection, Downloadable Computer Software For Monitoring And Identifying Cloud Configuration Vulnerabilities And Strengthening Cloud Security Posture, Downloadable Computer Software For Automating Security Administration For Cloud And Hybrid Environments, Downloadable Computer Software For Collecting And Processing User Behavioral Signals And Providing Insights, Analyzing Network Traffic, Endpoint Detections And Remediation, Attack Surfaces Reduction, Firewall Creation, And Responses To Security Threats, Downloadable Computer Software For Online Scanning, Detecting, Quarantining, And Eliminating Of Viruses, Worms, Trojans, Spyware, Adware, Malware, Ransomware, Grayware, Phishing Attempts, And Unauthorized Data And Programs On Computers, Networks, And Electronic Devices; None Of The Aforementioned Goods For Use In Or In Relation To Vehicles, Residential And Commercial Security Systems, Home Automation Systems, And Security For Physical Premises, And Protective Covers, Cases, Casings, Carrying Cases, And Chargers For Electronic Devices.[Class : 38] Telecommunication Services, Namely, Electronic Transmission, Delivery, And Retrieval Of Data, Messages, Images, Digital Files, Documents, And Other Data Among Users Of Computers, Telecommunication Services, Namely, Electronic Transmission, Delivery, And Retrieval Of Data, Messages, Images, Digital Files, Documents, And Other Data By Telecommunications Networks, Wireless Communication Networks, Global Communications Networks, Global Computer Networks, Cloud Based Computer Networks, And The Internet, Telecommunication Services, Namely, Information Transmission Via Electronic Communications Networks, Telecommunication Services, Namely, Transmission Of Electronic Mail And Messaging Services, Telecommunication Services, Namely, Providing Access To Databases And Telecommunications Access Services, Telecommunication Services, Namely, Telecommunications Access Services For The Collection And Supply Of Information, Telecommunication Services, Namely, Providing User Access To Local Area Computer Networks, Global Computer Networks, Computer Databases, Cloud Based Computer Networks, And The Internet, Telecommunication Services, Namely, Electronic Transmission Of Geolocation Data From Mobile Devices, Telecommunication Services, Namely, Electronic Bulletin Board Services, Telecommunication Services, Namely, Provision Of Online Electronic Communication Links Which Transfer The Website User To Other Local And Global Webpages, Telecommunication Services, Namely, Information, Advice, And Consultancy Services In The Field Of Telecommunications Services, Namely, Transmission Of Data, Messages, Images, Digital Files, Documents, And Other Data Via Telecommunications Network; None Of The Aforementioned Services For Use In Or In Relation To Vehicles, And Residential And Commercial Security Systems, Home Automation Systems, And Security For Physical Premises.[Class : 42] Scientific Services, Namely, Scientific Research In The Field Of Computer, Applications, Cloud, And Computer Network Security, And Product Research And Design Related Thereto; Design, Maintenance, Development, And Updating Of Computer Security Software; Providing A Website Featuring Information In The Fields Of Computer, Applications, Cloud, Electronic Device, And Computer Network Security; Computer Security Threat Analysis For Protecting Data; Computer Virus And Malware Protection Services; Technical Support Services, Namely, Troubleshooting Of Computer Software And Computer Security Problems; Consulting Services In The Field Of Software As A Service (Saas), Computer Security Software, And Cloud Security Software; Software As A Service (Saa S) Services, Namely, Providing Temporary Use Of Online Non Downloadable Computer Security Software For Computer, Applications, Cloud And Computer Network Security, Automated Domain Threat Protection And Prevention, Analysis, Management And Integration Of Threat Data, Security Information And Event Management, Detection, Investigation And Elimination Of Computer Threats, Cyberattacks And Data Breaches, Threat And Intrusion Detection And Prevention, Exploit Protection And Prevention, And Automated Remediation And Restoration Of Compromised Computer Software And Hardware, Software As A Service (Saa S) Services, Namely, Providing Temporary Use Of Online Non Downloadable Computer Software Using Artificial Intelligence (Ai) Processing And Machine Learning For Computer, Applications, Cloud, And Computer Network Security, Software As A Service (Saa S) Services, Namely, Providing Temporary Use Of Online Non Downloadable Computer Software For Anti Virus, Anti Malware, And Privacy Protection, Software As A Service (Saa S) Services, Namely, Providing Temporary Use Of Online Non Downloadable Computer Software For Developing Custom Security Threat Detection, Investigation, And Response Tools, Software As A Service (Saa S) Services, Namely, Providing Temporary Use Of Online Non Downloadable Computer Software For Monitoring Applications Installed And Running On A Computer, Computer Security Audits And Performance Diagnostics, And For Removing And Blocking Computer Applications And Files, Software As A Service (Saa S) Services, Namely, Providing Temporary Use Of Online Non Downloadable Computer Software For Securing, Scanning, Authenticating, And Encrypting Email, Documents, Website Links, And Data, And Controlled Folder Access, Software As A Service (Saa S) Services, Namely, Providing Temporary Use Of Online Non Downloadable Computer Software For Securing, Scanning, Regulating Access, And Authenticating Software Tools, Role Based Access, Ip Addresses, Domains, Computer Peripherals, And Endpoints, Software As A Service (Saa S) Services, Namely, Providing Temporary Use Of Online Non Downloadable Computer Security Software For The Collection, Editing, Organizing, Modifying, Transmission, Processing, Storage, Analysis, And Sharing Of Data And Information, Software As A Service (Saa S) Services, Namely, Providing Temporary Use Of Online Non Downloadable Computer Security Software For The Creation, Monitoring, And Enforcement Of Security Protocols, Credentials, And Policies, Software As A Service (Saa S) Services, Namely, Providing Temporary Use Of Online Non Downloadable Computer Software For Detecting, Analyzing, Monitoring, Displaying, And Countering Computer Security Threats, Generating Security Reports, Providing Security Alerts, And For Security Compliance, Software As A Service (Saa S) Services, Namely, Providing Temporary Use Of Online Non Downloadable Computer Software For Identity And Access Management, Privilege And Permissions Access Management, Cloud Infrastructure Entitlements Management, Cloud Security, Internet Of Things (Io T) Security, Protection Of Cloud Based Information And Access, Database Management, Data Security, And Risk Assessment And Monitoring Of Cloud Systems, Software As A Service (Saa S) Services, Namely, Providing Temporary Use Of Online Non Downloadable Computer Software For Cloud Security Posture Management, Cloud And Hybrid Environment Security Assessment And Management, And Cloud Workload Protection, Software As A Service (Saa S) Services, Namely, Providing Temporary Use Of Online Non Downloadable Computer Software For Monitoring And Identifying Cloud Configuration Vulnerabilities And Strengthening Cloud Security Posture, Software As A Service (Saa S) Services, Namely, Providing Temporary Use Of Online Non Downloadable Computer Software For Automating Security Administration For Cloud And Hybrid Environments, Software As A Service (Saa S) Services, Namely, Providing Temporary Use Of Online Non Downloadable Computer Software For Collecting And Processing User Behavioral Signals And Providing Insights, Analyzing Network Traffic, Endpoint Detections And Remediation, Attack Surfaces Reduction, Firewall Creation, And Responses To Security Threats, Software As A Service (Saa S) Services, Namely, Providing Temporary Use Of Online Non Downloadable Software For Online Scanning, Detecting, Quarantining, And Eliminating Of Viruses, Worms, Trojans, Spyware, Adware, Malware, Ransomware, Grayware, Phishing Attempts, And Unauthorized Data And Programs On Computers, Networks, And Electronic Devices; Consulting, Advisory, And Information Services Relating To The Aforesaid Services; None Of The Aforementioned Services For Use In Or In Relation To Vehicles, And Residential And Commercial Security Systems, Home Automation Systems, And Security For Physical Premises.
PR Details
Microsoft Corporation, One Microsoft Way Redmond, Washington 98052 6399 United States Of America, A Corporation Organized And Existing Under The Laws Of The State Of Washington, Usa, (Body Incorporate)
Sign In to Follow Application
All Documents & Correspondence

Uploaded Documents

1 TM-A(MULTICLASS) 04 Oct 2022
2 Evedence Affidavit on use of Trade Mark (TLA) 28 Oct 2022
3 Journal Copy 07 Nov 2023
4 Certificate 14 Nov 2023

Frequently Asked Questions

Date on which the trademark application was filed with TMO?
Pop-pop was applied on 04 October 2022.
Who is the trademark proprietor?
Trademark application was filed by Microsoft Corporation.
Trademark application is filed under which trademark class?
Trademark application has been filed under classes 9,38,42.
Trademark application is at what stage of trademark process?
As per IP India, trademark application status is Registered.
What is the Listed Application ID of the Trademark?
Listed application Id of Pop-pop is 5635510.
Who filed the trademark on behalf of the proprietor?
Trademark attorney of the Pop-pop is Pooja Dodd.