KAMIND IT, INC. logo

KAMIND IT, INC.

7 Marks
Corp.
First Filed:Dec 20, 2019Latest Filed:May 13, 2024Address:5200 Meadows Road, Lake Oswego, OR 97035

Portfolio Overview

Registered
3(43%)
Pending
1(14%)
Dead
3(43%)

Top Classes

Class 42
Software, IT Services & Scientific Research
7(100%)
Class 45
Personal services
3(43%)
Class 37
Construction and Repair
1(14%)

TTAB Proceedings

Total Proceedings
1
As Plaintiff
0(0%)
As Defendant
1(100%)

Top Firms

Chernoff Vilhauer LLP(May 2024)
6
KAMIND IT, INC.(Dec 2019)
1

Trademark Portfolio

7 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
KAMIND GUARD
KAMIND GUARD
Service Mark
Word
ITU
PENDING
Owner:
Serial:98548051
Filed:May 13, 2024
Classes:37, 42, 45
Goods & Services
Software licensing services; compliance services, namely, regulatory compliance consulting in the field of cyber security regulations and internet legal regulations; "GUARD"; Information technology services, namely, technical support services consisting of troubleshooting in the nature of diagnosing of computer software problems; IT consulting services relating to the installation, maintenance and repair of IT infrastructure in the nature of computer software; design and development of computer hardware and software; computer programming services, maintenance and updating of computer software; computer consulting services, namely, computer software consulting, consulting services in the field of computer security consultancy, computer technology consultancy; cloud computing services, namely, computer services, in the nature of the integration of private and public cloud computing environments, and remote and on-site management of the information technology (IT) cloud computing systems of others; managed computer and software services, namely, remote and on-site management of information technology (IT) systems of others, and computer file management; security services, namely, computer security threat analysis for protecting data, maintenance of computer software relating to computer security and prevention of computer risks, computer security services in the nature of restricting unauthorized access to hard drives, computer networks and websites; cyber security services, namely restricting unauthorized access to computer systems; compliance services, namely, testing, analysis, and evaluation of services to assure compliance with computer construction, defense contractors industry standards; device protection services, namely, computer security services in the nature of restricting authorized access to stored data on hard drives; proactive computer security attack prevention services and management, namely, restricting unauthorized access to hard drives, computer networks and websites, restricting access to and by computer networks to and of undesired web sites, media and individuals, providing authentication, issuance, and validation of digital certificates, restricting unauthorized network access by users without credentials, hard drive erasure, and threat analysis for protecting data; Information technology services, namely, technical support services consisting of IT consulting services relating to the installation, maintenance, and repair of IT infrastructure in the nature of computer software
GUARD
GUARD
Service Mark
Word
ABANDONED
Owner:
Serial:98028320
Filed:Jun 5, 2023
Classes:42
QB IN THE CLOUD
QB IN THE CLOUD
Service Mark
Word
ABANDONED
Owner:
Serial:97225147
Filed:Jan 18, 2022
Classes:42
ARMOR
ARMOR
Service Mark
Word
ABANDONED
Owner:
Serial:88742302
Filed:Dec 30, 2019
Classes:42
FORTRESS
FORTRESS
Service Mark
Word
REGISTERED
Owner:
Serial:88742544
Filed:Dec 30, 2019
Classes:42
Registration:6604783
Registered:Jan 4, 2022
Goods & Services
Information technology services, namely, technical support services consisting of troubleshooting in the nature of diagnosing computer hardware and software problems, IT infrastructure consulting; Design and development of computer hardware and software; Computer programming services, maintenance and updating of computer software; Computer software consulting services; Computer security consulting services; Computer programming consulting services; Cloud computing services, namely, providing temporary use of on-line non-downloadable cloud computing software for use in productivity management, user identity verification and authentication and artificial intelligence for accesses, searches and integrates various enterprise software programs and databases to answer questions, automate tasks, and improve user productivity, for use in software development, machine learning, and facial and speech recognition; Managed application software service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software and web sites of others in the fields of cyber security; Computer cyber security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Identity information services in the nature of electronic signature verification services using technology to authenticate user identity; Proactive computer security attack prevention services and management, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials | Computer software licensing services; Security services, namely, providing executive protection; Security guard services; Compliance services, in the nature of regulatory compliance consulting in the field of cyber security regulations, and internet legal regulations; Compliance services, namely, legal compliance auditing and regulatory compliance auditing; Identity information services in the nature of verification of personal identity as part of personal background investigations; Device protection services, namely, monitoring of cloud security monitoring, cloud breach detection and computer systems monitoring both cloud and on-premises for protecting personal property
SHIELD
SHIELD
Service Mark
Word
REGISTERED
Owner:
Serial:88742238
Filed:Dec 30, 2019
Classes:42, 45
Registration:6242893
Registered:Jan 12, 2021
Goods & Services
Computer software licensing services; [ Security services, namely, providing executive protection; Security guard services; ] Compliance services, in the nature of regulatory compliance consulting in the field of cyber security regulations and internet legal regulations; Compliance services, namely, legal compliance auditing and regulatory compliance auditing; Identity information services in the nature of verification of personal identity as part of personal background investigations; Device protection services, namely, monitoring of cloud security monitoring, cloud breach detection and computer systems monitoring both cloud and on-premises for protecting personal property; Information technology services, namely, technical support services consisting of troubleshooting in the nature of diagnosing computer hardware and software problems, IT infrastructure consulting; Design and development of computer hardware and software; Computer programming services, maintenance and updating of computer software; Computer software consulting services; Computer security consulting services; Computer programming consulting services; Cloud computing services, namely, providing temporary use of on-line nondownloadable cloud computing software for use in productivity management, use in user identity, use in Cyber Range Simulation, and use in artificial intelligence; Managed application software service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software and web sites of others in the fields of cyber security; Computer cyber security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Identity information services in the nature of electronic signature verification services using technology to authenticate user identity; Proactive computer security attack prevention services and management namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials
KAMIND
KAMIND
Service Mark
Word
REGISTERED
Owner:
Serial:88735282
Filed:Dec 20, 2019
Classes:42, 45
Registration:6242861
Registered:Jan 12, 2021
Goods & Services
Information technology services, namely, technical support services consisting of troubleshooting in the nature of diagnosing computer hardware and software problems, IT infrastructure consulting; Design and development of computer hardware and software; Computer programming services, maintenance and updating of computer software; Computer software consulting services; Computer security consulting services; Computer programming consulting services; Cloud computing services, namely, providing temporary use of on-line nondownloadable cloud computing software for use in productivity management, use in user identity, use in Cyber Range Simulation, and use in artificial intelligence; Managed application software service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software and web sites of others in the fields of cyber security; Computer cyber security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Identity information services in the nature of electronic signature verification services using technology to authenticate user identity; Proactive computer security attack prevention services and management namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials | Computer software licensing services; Security services, namely, providing executive protection; Security guard services; Compliance services, in the nature of regulatory compliance consulting in the field of cyber security regulations and internet legal regulations; Compliance services, namely, legal compliance auditing and regulatory compliance auditing; Identity information services in the nature of verification of personal identity as part of personal background investigations; Device protection services, namely, monitoring of cloud security monitoring, cloud breach detection and computer systems monitoring both cloud and on-premises for protecting personal property

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.