Silent Push, Inc. logo

Silent Push, Inc.

6 Marks
Corp.
First Filed:Aug 21, 2023Latest Filed:Jan 8, 2026Address:12020 Sunrise Valley Drive, Reston, VA 20191

Portfolio Overview

Registered
3(50%)
Pending
2(33%)
Dead
1(17%)

Top Classes

Class 42
Software, IT Services & Scientific Research
6(100%)
Class 45
Personal services
5(83%)

TTAB Proceedings

No litigation activity

Top Firms

HOOD VENTURE COUNSEL, P.C.(Jan 2026)
6

Trademark Portfolio

6 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
TRAFFIC ORIGIN
TRAFFIC ORIGIN
Service Mark
Word
ITU
PENDING
Owner:
Serial:99584153
Filed:Jan 8, 2026
Classes:42
Goods & Services
Class 042: Software as a service (SAAS) services featuring software for determining the origin of traffic passing through a proxy IP address
INDICATOR OF FUTURE ATTACK
ABANDONED
Owner:
Serial:98659184
Filed:Jul 21, 2024
Classes:42, 45
Goods & Services
Monitoring of computer systems for security purposes in the nature of surveillance services relating to the physical safety of persons and security of tangible property; Provision of systems for the management of computer and network threats, namely, surveillance and monitoring of vulnerability and security problems in computer hardware; Implementing plans for improving computer hardware and hardware for network security for businesses and governmental agencies, namely, computer security assurance, administration of digital keys and digital certificates, providing fraud detection services for electronic funds transfer, and credit and debit card and electronic check transactions via a global computer network; Software as a service (SAAS) services featuring software for computer and network security; Software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; Application service provider (ASP) featuring non-downloadable computer software for use in computer and network security; Computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; Computer security consultancy in the field of administration of digital keys and digital certificates; Computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; Computer security consultation; Consulting in the field of information technology relating to installation, maintenance and repair of computer software; Computer consultation in the field of computer and network security in the nature of computer and network software security; Computer security consultancy in the field of scanning and penetration testing computers and networks to assess information security vulnerability; Maintenance and updating of computer software relating to computer and network security and prevention of computer risks; Computer security consultancy, namely, developing plans for improving computer and network security for businesses and governmental agencies; Computer security consultancy, namely, developing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies; Cloud computing featuring software for use in computer and network security; Cloud computing services in the field of computer and network security; Computer systems analysis; Computer security consultancy in the nature of implementing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies, namely, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; Computer security consultancy, namely, identifying malware on computer systems; Computer security consultancy, namely, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; Consultation for protecting data and information from unauthorized access in the field of computer and network security; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy for protecting data and information from unauthorized access, namely, developing plans for improving computer and network security and preventing criminal activity; Computer security consultancy for protecting data and information from unauthorized access; Computer security consultancy for protecting data and information from unauthorized access in the field of endpoint protection software or curated cyberthreat data for computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints; Computer technology consulting of systems for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; Monitoring of computer systems for protecting data and information from unauthorized access; Provision of systems for the management of computer and network threats, namely, surveillance and monitoring of vulnerability and security problems in computer software and software for computer networks
INDICATORS OF FUTURE ATTACK
REGISTERED
Owner:
Serial:98654511
Filed:Jul 18, 2024
Classes:42, 45
Registration:8171384
Registered:Mar 10, 2026
Goods & Services
Monitoring of computer systems for security purposes in the nature of surveillance services relating to the physical safety of persons and security of tangible property; Software as a service (SAAS) services featuring software for computer and network security; Software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; Application service provider (ASP) featuring non-downloadable computer software for use in computer and network security; Computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; Computer security consultancy in the field of administration of digital keys and digital certificates; Computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; Computer security consultation; Consulting in the field of information technology relating to installation, maintenance and repair of computer software; Computer consultation in the field of computer and network security in the nature of computer and network software security; Computer security consultancy in the field of scanning and penetration testing computers and networks to assess information security vulnerability; Maintenance and updating of computer software relating to computer and network security and prevention of computer risks; Computer security consultancy, namely, developing plans for improving computer and network security for businesses and governmental agencies; Computer security consultancy, namely, developing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies; Cloud computing featuring online non-downloadable software for use in computer and network security; Cloud computing services in the field of computer and network security in the nature of computer security threat analysis for protecting data; Computer systems analysis; Computer security consultancy in the nature of implementing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies, namely, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; Computer security consultancy, namely, identifying malware on computer systems; Computer security consultancy, namely, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; Consultation for protecting data and information from unauthorized access in the field of computer and network security; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy for protecting data and information from unauthorized access, namely, developing plans for improving computer and network security and preventing criminal activity; Computer security consultancy for protecting data and information from unauthorized access; Computer security consultancy for protecting data and information from unauthorized access in the field of endpoint protection software or curated cyberthreat data for computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints; Computer technology consulting of systems for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; Monitoring of computer systems for protecting data and information from unauthorized access; Provision of systems in the nature of software as a service (SAAS) for the management of computer and network threats, namely, surveillance and monitoring of vulnerability and security problems in computer software and software for computer networks; Provision of systems in the nature of software as a service (SAAS) for the management of computer and network threats, namely, surveillance and monitoring of vulnerability and security problems in computer hardware for computer network security purposes; Computer security consultancy in the nature of implementing plans for improving computer hardware and hardware for network security for businesses and governmental agencies, namely, computer security assurance, administration of digital keys and digital certificates; Electronic monitoring of bank activity and electronic funds transfer, and credit and debit card and electronic check transactions to detect fraud via a global computer network
IOFA
IOFA
Service Mark
Word
ITU
PENDING
Owner:
Serial:98654515
Filed:Jul 18, 2024
Classes:42, 45
Goods & Services
Monitoring of computer systems for security purposes in the nature of surveillance services relating to the physical safety of persons and security of tangible property; Software as a service (SAAS) services featuring software for computer and network security; Software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; Application service provider (ASP) featuring non-downloadable computer software for use in computer and network security; Computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; Computer security consultancy in the field of administration of digital keys and digital certificates; Computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; Computer security consultation; Consulting in the field of information technology relating to installation, maintenance and repair of computer software; Computer consultation in the field of computer and network security in the nature of computer and network software security; Computer security consultancy in the field of scanning and penetration testing computers and networks to assess information security vulnerability; Maintenance and updating of computer software relating to computer and network security and prevention of computer risks; Computer security consultancy, namely, developing plans for improving computer and network security for businesses and governmental agencies; Computer security consultancy, namely, developing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies; Cloud computing featuring online non-downloadable software for use in computer and network security; Cloud computing services in the field of computer and network security in the nature of computer security threat analysis for protecting data; Computer systems analysis; Computer security consultancy in the nature of implementing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies, namely, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; Computer security consultancy, namely, identifying malware on computer systems; Computer security consultancy, namely, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; Consultation for protecting data and information from unauthorized access in the field of computer and network security; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy for protecting data and information from unauthorized access, namely, developing plans for improving computer and network security and preventing criminal activity; Computer security consultancy for protecting data and information from unauthorized access; Computer security consultancy for protecting data and information from unauthorized access in the field of endpoint protection software or curated cyberthreat data for computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints; Computer technology consulting of systems for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; Monitoring of computer systems for protecting data and information from unauthorized access; Provision of systems in the nature of software as a service (SAAS) for the management of computer and network threats, namely, surveillance and monitoring of vulnerability and security problems in computer software and software for computer networks; Provision of systems in the nature of software as a service (SAAS) for the management of computer and network threats, namely, surveillance and monitoring of vulnerability and security problems in computer hardware for computer network security purposes; Computer security consultancy in the nature of implementing plans for improving computer hardware and hardware for network security for businesses and governmental agencies, namely, computer security assurance, administration of digital keys and digital certificates; Electronic monitoring of bank activity and electronic funds transfer, and credit and debit card and electronic check transactions to detect fraud via a global computer network
98142718
98142718
Service Mark
Design
REGISTERED
Owner:
Serial:98142718
Filed:Aug 21, 2023
Classes:42, 45
Registration:7648008
Registered:Jan 14, 2025
Goods & Services
Monitoring of computer systems for security purposes in the nature of surveillance services relating to the physical safety of persons and security of tangible property; Provision of systems for the management of computer and network threats, namely, surveillance and monitoring of vulnerability and security problems in computer hardware; Implementing plans for improving computer hardware and hardware for network security for businesses and governmental agencies, namely, computer security assurance, administration of digital keys and digital certificates, providing fraud detection services for electronic funds transfer, and credit and debit card and electronic check transactions via a global computer network; Software as a service (SAAS) services featuring software for computer and network security; Software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; Application service provider (ASP) featuring non-downloadable computer software for use in computer and network security; Computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; Computer security consultancy in the field of administration of digital keys and digital certificates; Computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; Computer security consultation; Consulting in the field of information technology relating to installation, maintenance and repair of computer software; Computer consultation in the field of computer and network security in the nature of computer and network software security; Computer security consultancy in the field of scanning and penetration testing computers and networks to assess information security vulnerability; Maintenance and updating of computer software relating to computer and network security and prevention of computer risks; Computer security consultancy, namely, developing plans for improving computer and network security for businesses and governmental agencies; Computer security consultancy, namely, developing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies; Cloud computing featuring software for use in computer and network security; Cloud computing services in the field of computer and network security; Computer systems analysis; Computer security consultancy in the nature of implementing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies, namely, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; Computer security consultancy, namely, identifying malware on computer systems; Computer security consultancy, namely, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; Consultation for protecting data and information from unauthorized access in the field of computer and network security; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy for protecting data and information from unauthorized access, namely, developing plans for improving computer and network security and preventing criminal activity; Computer security consultancy for protecting data and information from unauthorized access; Computer security consultancy for protecting data and information from unauthorized access in the field of endpoint protection software or curated cyberthreat data for computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints; Computer technology consulting of systems for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; Monitoring of computer systems for protecting data and information from unauthorized access; Provision of systems for the management of computer and network threats, namely, surveillance and monitoring of vulnerability and security problems in computer software and software for computer networks
SILENT PUSH
SILENT PUSH
Service Mark
Word
REGISTERED
Owner:
Serial:98142711
Filed:Aug 21, 2023
Classes:42, 45
Registration:7648007
Registered:Jan 14, 2025
Goods & Services
Monitoring of computer systems for security purposes in the nature of surveillance services relating to the physical safety of persons and security of tangible property; Provision of systems for the management of computer and network threats, namely, surveillance and monitoring of vulnerability and security problems in computer hardware; Implementing plans for improving computer hardware and hardware for network security for businesses and governmental agencies, namely, computer security assurance, administration of digital keys and digital certificates, providing fraud detection services for electronic funds transfer, and credit and debit card and electronic check transactions via a global computer network; Software as a service (SAAS) services featuring software for computer and network security; Software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; Application service provider (ASP) featuring non-downloadable computer software for use in computer and network security; Computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; Computer security consultancy in the field of administration of digital keys and digital certificates; Computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; Computer security consultation; Consulting in the field of information technology relating to installation, maintenance and repair of computer software; Computer consultation in the field of computer and network security in the nature of computer and network software security; Computer security consultancy in the field of scanning and penetration testing computers and networks to assess information security vulnerability; Maintenance and updating of computer software relating to computer and network security and prevention of computer risks; Computer security consultancy, namely, developing plans for improving computer and network security for businesses and governmental agencies; Computer security consultancy, namely, developing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies; Cloud computing featuring software for use in computer and network security; Cloud computing services in the field of computer and network security; Computer systems analysis; Computer security consultancy in the nature of implementing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies, namely, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; Computer security consultancy, namely, identifying malware on computer systems; Computer security consultancy, namely, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; Consultation for protecting data and information from unauthorized access in the field of computer and network security; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy for protecting data and information from unauthorized access, namely, developing plans for improving computer and network security and preventing criminal activity; Computer security consultancy for protecting data and information from unauthorized access; Computer security consultancy for protecting data and information from unauthorized access in the field of endpoint protection software or curated cyberthreat data for computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints; Computer technology consulting of systems for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; Monitoring of computer systems for protecting data and information from unauthorized access; Provision of systems for the management of computer and network threats, namely, surveillance and monitoring of vulnerability and security problems in computer software and software for computer networks

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.