MODZERO
LIVE

Serial Number

98228783

Owner

modzero GmbH

Attorney

David A. Copland

Filing Date

Oct 18, 2023

Add to watchlist:

No watchlists yet
View on USPTO

MODZERO Trademark

Serial Number: 98228783 • Registration: 7821901

MODZERO is a trademark filed by modzero GmbH on October 18, 2023. The trademark is classified under Class 9 (Computers & Electronics), Class 41 (Education & Entertainment), Class 42 (Computer & Scientific). The application is currently registered and active.

Owner Contact Info

modzero GmbH (3 trademarks)

Marienstrasse 12
Berlin 10117 , DE

Entity Type: 99

Trademark Details

Filing Date

October 18, 2023

Registration Date

June 10, 2025

Published for Opposition

April 22, 2025

Goods & Services

Downloadable software for use in the identification, mitigation, prevention, analysis, and management of cybersecurity threats and vulnerabilities; downloadable software for network security testing, penetration testing, vulnerability scanning, risk assessment, and security auditing; downloadable software for monitoring, detecting, and responding to cyberattacks, data breaches, and unauthorized access; downloadable software for encryption, data protection, secure communications, malware detection, and incident response; downloadable software for reporting, visualizing, and analyzing cybersecurity metrics and trends; Downloadable authentication software for identity management, access control, and authorization for users, machines, devices, and objects; downloadable software for managing digital identities, verifying credentials, and securing access to networks, systems, applications, and connected devices; downloadable software for authentication processes, including multi-factor authentication, single sign-on (SSO), and certificate-based authentication; downloadable software for enforcing access policies, managing permissions, and securing sensitive data; downloadable software for credential management, password protection, and encryption for both user and machine identities in physical, virtual, and cloud environments; Downloadable computer software for security testing, vulnerability scanning, penetration testing, and risk assessment of IT systems, networks, and applications; downloadable software for monitoring, detecting, and analyzing cybersecurity threats, vulnerabilities, and malicious activity; downloadable software for identifying and mitigating risks associated with unauthorized access, data breaches, malware, ransomware, and other cyberattacks; downloadable software for auditing, reporting, and ensuring compliance with security policies and regulations; downloadable software for security configuration management, patch management, and continuous security monitoring; downloadable software for simulating cyberattacks to assess system defenses and response capabilities; downloadable software for managing incident response, forensic analysis, and recovery after security breaches; Downloadable debugging software for quality assurance, information security research, and performance optimization of software applications, systems, and networks; downloadable software for detecting, analyzing, and resolving software bugs, vulnerabilities, and security flaws; downloadable software for identifying and mitigating security risks through real-time debugging and code analysis; downloadable software for security testing, vulnerability assessment, and penetration testing during the development and deployment of IT infrastructure; downloadable software for ensuring compliance with security standards, secure coding practices, and system integrity; downloadable software for conducting forensic analysis, incident investigation, and post-breach debugging to identify the source of cybersecurity incidents; Downloadable embedded software for providing peripheral drivers, functional logic, and secure communication protocols to microcontrollers in the field of embedded device security and research; downloadable software for securing embedded systems and firmware against unauthorized access, tampering, and malware; downloadable software for encryption, secure boot, and authentication processes in embedded devices; downloadable software for real-time monitoring, threat detection, and vulnerability analysis of embedded systems and Internet of Things (IoT) devices; downloadable software for conducting security testing, penetration testing, and risk assessments specific to firmware and hardware interfaces; downloadable software for managing secure updates, patch management, and lifecycle maintenance of embedded device firmware and software; downloadable software for auditing and ensuring compliance with embedded system security standards and regulations; Downloadable software for computer security, security hardening, and implementing security patches and enhancements across IT systems, networks, and applications; downloadable software for identifying, mitigating, and remediating vulnerabilities, security flaws, and misconfigurations; downloadable software for deploying security patches, updates, and enhancements to prevent unauthorized access, malware, ransomware, and other cyber threats; downloadable software for enhancing system defenses through configuration management, encryption, and access control; downloadable software for automated vulnerability assessments, patch management, and real-time monitoring of security postures; downloadable software for strengthening security protocols, improving system resilience, and ensuring compliance with industry security standards and regulations; downloadable software for providing security hardening recommendations, enforcing security policies, and tracking the implementation of security improvements; Downloadable software for general use in security, operation, and monitoring of computer systems, networks, and applications; downloadable software for enhancing system performance, managing system operations, and ensuring secure and efficient operation of software and hardware; Downloadable privacy protection software for analyzing, modifying, and enhancing the configuration and behavior of other software with regard to information security and privacy; downloadable software for assessing and improving the security and privacy practices of applications, systems, and data management processes; downloadable software for identifying and mitigating privacy vulnerabilities, ensuring compliance with data protection regulations, and enforcing privacy policies; downloadable software for securing sensitive information, managing user consent, and protecting personal data from unauthorized access and breaches; downloadable software for auditing software behavior, securing communication channels, and implementing encryption and anonymization techniques; downloadable software for providing insights into privacy risks, generating compliance reports, and offering recommendations for enhancing overall privacy and data protection measures; Downloadable hardware testing software for quality assurance, information security research, and analysis of electronic and embedded systems; downloadable software for evaluating hardware performance, reliability, and compliance with industry standards; downloadable software for conducting security assessments, vulnerability scanning, and penetration testing on hardware components and embedded systems; downloadable software for analyzing and detecting potential security weaknesses, unauthorized access points, and susceptibility to cyber threats; downloadable software for stress testing hardware under various operational conditions, ensuring secure data handling, and verifying the integrity of hardware-software interfaces; downloadable software for auditing hardware configurations, managing firmware updates, and implementing security patches; downloadable software for generating detailed reports on hardware security posture, quality metrics, and compliance with regulatory requirements; Downloadable data processing software for the collection, manipulation, analysis, and visualization of data from various sources; downloadable software for managing and transforming large datasets, performing statistical analysis, and generating actionable insights; downloadable software for data cleansing, validation, and enrichment to ensure accuracy and reliability; downloadable software for integrating data from multiple sources, supporting data migration, and facilitating data warehousing; downloadable software for automating data workflows, including data extraction, transformation, and loading (ETL) processes; downloadable software for implementing data security measures, including encryption, access controls, and compliance with data protection regulations; downloadable software for real-time data monitoring, reporting, and decision-making support; downloadable software for creating and managing databases, performing data backups, and ensuring data integrity; Downloadable risk identification software for detecting, assessing, and managing potential risks across various domains, including IT systems, business operations, and project management; downloadable software for identifying security vulnerabilities, compliance gaps, and operational risks within systems and processes; downloadable software for analyzing risk factors, evaluating impact and likelihood, and prioritizing risk mitigation strategies; downloadable software for conducting risk assessments, generating risk reports, and providing actionable insights for risk management; downloadable software for integrating with other risk management tools and frameworks to enhance overall risk visibility and control; downloadable software for monitoring risk indicators, tracking risk mitigation efforts, and updating risk profiles in real-time; downloadable software for supporting decision-making processes by offering risk modeling, scenario analysis, and forecasting capabilities; downloadable software for ensuring compliance with industry regulations and standards related to risk management and security

Training in software systems development; Training in software systems design; Training services in the field of software, including secure design, security software, and secure programming; training programs on the design and implementation of security features in software applications, systems, and networks; Training in the field of the operation of software systems

Consulting in the field of software design; Consulting in the field of software as a service; Consulting services in the field of computers and software, including software usage, design, and architecture; consultation on designing and architecting software systems to meet specific business needs, scalability, and performance requirements; Consulting in the field of software, namely, evaluation and optimization of software design for efficiency, maintainability, and security; consulting on best practices for secure software development, including threat modeling, secure coding, and vulnerability management; Consulting in the field of software, namely, assistance with the selection, implementation, and customization of software applications to enhance operational efficiency; Consulting in the field of software, namely, advisory services on software lifecycle management, including upgrades, migrations, and end-of-life planning; expert analysis on emerging software technologies and trends to support innovation and competitive advantage; Consulting services in the field of computer networks with different software environments; Consulting services in the field of software in the field of e-commerce; Consulting services in the field of software for communication systems; Computer programming and software development; Consulting and advisory services in the field of computer software; Consulting in the field of software, namely, design, implementation, and optimization software solutions with a focus on security; Consulting in the field of software, namely, consulting on embedded system security; Consulting in the field of software, namely, identifying and managing vulnerabilities within software systems; Consulting in the field of software, namely, security assessments, threat modeling, and compliance with industry standards; Consulting in the field of software, namely, consulting on best practices for software design; Consulting in the field of software, namely, consulting on security considerations for software system integration; Design and development of software for retrieval of data; Computer software design; design of software for embedded devices; diagnosing computer hardware problems using software; conducting technical project studies in the field of new technologies of computer hardware and software; conducting project studies in the field of new technologies of software; Development and testing of software; Computer software development; Development of software for digital signal processing; Development of software for communication systems; Design, development and implementation of software; Creation of software; provide technical advice in the field of software development; troubleshooting in the nature of diagnosing computer hardware and software problems; scientific research in the field of computer programs and software; IT project management; Design of digital signal processing software; Custom design of software packages; Software consulting; software design; Software engineering; Software development; Security software consulting services; Internet security computer programming; Computer programming services for electronic data security; computer software security consultancy; Computer security threat analysis for data protection; Monitoring of computer systems to detect unauthorized access and data breaches; Monitoring of computer systems to detect failures

Filing History

TEAS WITHDRAWAL OF ATTORNEY RECEIVED-FIRM RETAINS
Feb 1, 2026 EWAF
TEAS CHANGE OF CORRESPONDENCE RECEIVED
Feb 1, 2026 TCCA
ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED
Feb 1, 2026 ARAA
TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED
Feb 1, 2026 REAP
APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED
Feb 1, 2026 CHAN
TEAS CHANGE OF OWNER ADDRESS RECEIVED
Feb 1, 2026 COAR
NOTICE OF REGISTRATION CONFIRMATION EMAILED
Jun 10, 2025 NRCC
REGISTERED-PRINCIPAL REGISTER
Jun 10, 2025 R.PR
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
Apr 22, 2025 NPUB
PUBLISHED FOR OPPOSITION
Apr 22, 2025 PUBO
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
Apr 16, 2025 NONP
APPROVED FOR PUB - PRINCIPAL REGISTER
Mar 24, 2025 CNSA
EXAMINER'S AMENDMENT ENTERED
Mar 6, 2025 XAEC
NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED
Mar 6, 2025 GNEN
EXAMINERS AMENDMENT E-MAILED
Mar 6, 2025 GNEA
EXAMINERS AMENDMENT -WRITTEN
Mar 6, 2025 CNEA
NOTIFICATION OF FINAL REFUSAL EMAILED
Dec 23, 2024 GNFN
FINAL REFUSAL E-MAILED
Dec 23, 2024 GNFR
FINAL REFUSAL WRITTEN
Dec 23, 2024 CNFR
TEAS/EMAIL CORRESPONDENCE ENTERED
Dec 5, 2024 TEME
CORRESPONDENCE RECEIVED IN LAW OFFICE
Dec 5, 2024 CRFA
TEAS RESPONSE TO OFFICE ACTION RECEIVED
Dec 5, 2024 TROA
APPLICATION EXTENSION GRANTED/RECEIPT PROVIDED
Sep 10, 2024 XELG
APPLICATION EXTENSION TO RESPONSE PERIOD - RECEIVED
Sep 10, 2024 XELR
NOTIFICATION OF NON-FINAL ACTION E-MAILED
Jun 11, 2024 GNRN
NON-FINAL ACTION E-MAILED
Jun 11, 2024 GNRT
NON-FINAL ACTION WRITTEN
Jun 11, 2024 CNRT
ASSIGNED TO EXAMINER
Jun 4, 2024 DOCK
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Oct 24, 2023 NWOS
NEW APPLICATION ENTERED
Oct 21, 2023 NWAP