KAMIND IT, INC.
7 Marks
Corp.
First Filed:Dec 20, 2019Latest Filed:May 13, 2024Address:5200 Meadows Road, Lake Oswego, OR 97035
Portfolio Overview
Registered
3(43%)Pending
1(14%)Dead
3(43%)Top Classes
Class 42
Software, IT Services & Scientific ResearchClass 45
Personal servicesClass 37
Construction and RepairTTAB Proceedings
Total Proceedings
1As Plaintiff
0(0%)As Defendant
1(100%)Top Firms
Chernoff Vilhauer LLP(May 2024)
6
KAMIND IT, INC.(Dec 2019)
1
Trademark Portfolio
7 results
(current & previous marks)
Refine by Mark/Description🔽
Filed
Registered
Last Activity
Filters
Ownership
7
0
Status
3
1
0
3
0
Mark Type
7
0
0
0
0
1
7
3
Goods & Services
Software licensing services; compliance services, namely, regulatory compliance consulting in the field of cyber security regulations and internet legal regulations; "GUARD"; Information technology services, namely, technical support services consisting of troubleshooting in the nature of diagnosing of computer software problems; IT consulting services relating to the installation, maintenance and repair of IT infrastructure in the nature of computer software; design and development of computer hardware and software; computer programming services, maintenance and updating of computer software; computer consulting services, namely, computer software consulting, consulting services in the field of computer security consultancy, computer technology consultancy; cloud computing services, namely, computer services, in the nature of the integration of private and public cloud computing environments, and remote and on-site management of the information technology (IT) cloud computing systems of others; managed computer and software services, namely, remote and on-site management of information technology (IT) systems of others, and computer file management; security services, namely, computer security threat analysis for protecting data, maintenance of computer software relating to computer security and prevention of computer risks, computer security services in the nature of restricting unauthorized access to hard drives, computer networks and websites; cyber security services, namely restricting unauthorized access to computer systems; compliance services, namely, testing, analysis, and evaluation of services to assure compliance with computer construction, defense contractors industry standards; device protection services, namely, computer security services in the nature of restricting authorized access to stored data on hard drives; proactive computer security attack prevention services and management, namely, restricting unauthorized access to hard drives, computer networks and websites, restricting access to and by computer networks to and of undesired web sites, media and individuals, providing authentication, issuance, and validation of digital certificates, restricting unauthorized network access by users without credentials, hard drive erasure, and threat analysis for protecting data; Information technology services, namely, technical support services consisting of IT consulting services relating to the installation, maintenance, and repair of IT infrastructure in the nature of computer software
Goods & Services
Information technology services, namely, technical support services consisting of troubleshooting in the nature of diagnosing computer hardware and software problems, IT infrastructure consulting; Design and development of computer hardware and software; Computer programming services, maintenance and updating of computer software; Computer software consulting services; Computer security consulting services; Computer programming consulting services; Cloud computing services, namely, providing temporary use of on-line non-downloadable cloud computing software for use in productivity management, user identity verification and authentication and artificial intelligence for accesses, searches and integrates various enterprise software programs and databases to answer questions, automate tasks, and improve user productivity, for use in software development, machine learning, and facial and speech recognition; Managed application software service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software and web sites of others in the fields of cyber security; Computer cyber security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Identity information services in the nature of electronic signature verification services using technology to authenticate user identity; Proactive computer security attack prevention services and management, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials | Computer software licensing services; Security services, namely, providing executive protection; Security guard services; Compliance services, in the nature of regulatory compliance consulting in the field of cyber security regulations, and internet legal regulations; Compliance services, namely, legal compliance auditing and regulatory compliance auditing; Identity information services in the nature of verification of personal identity as part of personal background investigations; Device protection services, namely, monitoring of cloud security monitoring, cloud breach detection and computer systems monitoring both cloud and on-premises for protecting personal property
Goods & Services
Computer software licensing services; [ Security services, namely, providing executive protection; Security guard services; ] Compliance services, in the nature of regulatory compliance consulting in the field of cyber security regulations and internet legal regulations; Compliance services, namely, legal compliance auditing and regulatory compliance auditing; Identity information services in the nature of verification of personal identity as part of personal background investigations; Device protection services, namely, monitoring of cloud security monitoring, cloud breach detection and computer systems monitoring both cloud and on-premises for protecting personal property; Information technology services, namely, technical support services consisting of troubleshooting in the nature of diagnosing computer hardware and software problems, IT infrastructure consulting; Design and development of computer hardware and software; Computer programming services, maintenance and updating of computer software; Computer software consulting services; Computer security consulting services; Computer programming consulting services; Cloud computing services, namely, providing temporary use of on-line nondownloadable cloud computing software for use in productivity management, use in user identity, use in Cyber Range Simulation, and use in artificial intelligence; Managed application software service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software and web sites of others in the fields of cyber security; Computer cyber security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Identity information services in the nature of electronic signature verification services using technology to authenticate user identity; Proactive computer security attack prevention services and management namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials
Goods & Services
Information technology services, namely, technical support services consisting of troubleshooting in the nature of diagnosing computer hardware and software problems, IT infrastructure consulting; Design and development of computer hardware and software; Computer programming services, maintenance and updating of computer software; Computer software consulting services; Computer security consulting services; Computer programming consulting services; Cloud computing services, namely, providing temporary use of on-line nondownloadable cloud computing software for use in productivity management, use in user identity, use in Cyber Range Simulation, and use in artificial intelligence; Managed application software service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software and web sites of others in the fields of cyber security; Computer cyber security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Identity information services in the nature of electronic signature verification services using technology to authenticate user identity; Proactive computer security attack prevention services and management namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials | Computer software licensing services; Security services, namely, providing executive protection; Security guard services; Compliance services, in the nature of regulatory compliance consulting in the field of cyber security regulations and internet legal regulations; Compliance services, namely, legal compliance auditing and regulatory compliance auditing; Identity information services in the nature of verification of personal identity as part of personal background investigations; Device protection services, namely, monitoring of cloud security monitoring, cloud breach detection and computer systems monitoring both cloud and on-premises for protecting personal property