RIGOR
LIVE

Serial Number

99166303

Owner

Innowate Inc.

Attorney

Ava Shelby

Filing Date

May 1, 2025

Add to watchlist:

No watchlists yet
View on USPTO

RIGOR Trademark

Serial Number: 99166303

RIGOR is a trademark filed by Innowate Inc. on May 1, 2025. The trademark is classified under Class 9 (Computers & Electronics), Class 41 (Education & Entertainment), Class 42 (Computer & Scientific). The application is currently pending registration.

Owner Contact Info

Innowate Inc. (3 trademarks)

5201 Great America Pkwy, Suite 460
Santa Clara, CA 95054

Entity Type: 03

RIGOR AI INC. (3 trademarks)

5201 GREAT AMERICA PWKY STE 422
SANTA CLARA, CA 95054

Entity Type: 03

Rigor AI Inc.

5201 Great America Pwky
Santa Clara 95054

Entity Type: 03

Trademark Details

Filing Date

May 1, 2025

Registration Date

Not Registered

Published for Opposition

February 10, 2026

Goods & Services

Cybersecurity services in the nature of restricting unauthorized access to computer systems; technology consultation in the field of cybersecurity; computer network security consultancy; computer network security consultancy; computer security consultancy in the field of computer virus and malware scanning software; computer security services in the nature of analyzing, generating, validating and verifying the configuration of IT assets; computer security services in the nature of finding gaps and recommending mitigations and remediations for enterprise-wide risk, compliance, assurance, and security management;  computer security services in the nature of administering digital certificates; computer security services in the nature of administering digital keys; computer security services, namely, restricting unauthorized access to hard drives, computer networks, digital assets, and websites; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability;  software as a service (SAAS) services featuring computer security software; software as a service (SAAS) services featuring computer software for analyzing information security for the purpose of configuration management; software as a service (SAAS) services featuring computer software for analyzing, repairing, and restoring information security for the purpose of configuration management and information security controls; software as a service (SAAS) services featuring computer software for modifying computer network security, computer network device, and information security configurations for the purpose of configuration management; software as a service (SAAS) services featuring computer software for detecting information security configuration gaps and information security control gaps in the nature of computer and network vulnerabilities; software as a service (SAAS) services featuring computer software for rigorous mathematical analysis of information security configuration gaps and information security control gaps in the nature of computer and network vulnerabilities; software as a service (SAAS) services featuring computer software for repairing and restoring information security configuration gaps and information security control gaps in the nature of computer and network vulnerabilities;  software as a service (SAAS) services featuring computer software for automated repair and restoration of information security configuration gaps and information security control gaps in the nature of computer and network vulnerabilities; software as a service (SAAS) services featuring software for protecting businesses and customer data from malware and computer hackers; software as a service (SAAS) services featuring software for Internet security, computer security vulnerability assessment, information security awareness training, information security compliance monitoring, information security compliance tracking, and managed information security solutions;  software as a service (SAAS) services featuring software for use in collecting, , processing, and analyzing cybersecurity event data from computer systems, information security systems, computer applications, computer network devices, information security applications, and information security event data, namely, data from cybersecurity events; Software as a service (SAAS) services featuring software for use in transmitting and receiving cybersecurity event data from computer systems, computer network devices, information security systems, and information security applications,  all for detecting, monitoring, reporting, analyzing, and eliminating cybersecurity incidents, malware, unauthorized software, network security attacks, computer systems attacks, computer application attacks, computer network device attacks, information security application attacks and information security breaches; software as a service (SAAS) services featuring software for monitoring, analyzing, and reporting on information security event data, namely, data from cybersecurity events, from computers and computer networks for analysis and action by information security administrators or information security software; software as a service (SAAS) services featuring software for use in providing a secure electronic connection between computers, mobile devices, computer networks, and hosted security software for transmission of information security configurations, logs and information security event data, namely, data from cybersecurity events; software as a service (SAAS) services featuring software for use in retrieving and applying software configuration updates, retrieving and installing software updates, and suspending and resuming computer event transmission, namely, transmission of data from cybersecurity events; providing online non-downloadable computer security software; providing online non-downloadable software for protecting businesses and customer data from malware and computer hackers; providing online non-downloadable software for Internet security, computer vulnerability assessment, information security awareness training, information security compliance monitoring, information security compliance tracking, and managed information security solutions; providing online non-downloadable software for use in collecting, , processing, and analyzing cybersecurity event data from computer systems, computer applications, computer network devices, information security systems, and information security applications; providing online non-downloadable software for use in transmitting and receiving cybersecurity event data from computer systems, computer network devices, information security systems, and information security applications, all for detecting, monitoring, reporting, analyzing, and eliminating cybersecurity incidents, malware, unauthorized software, computer system attacks, computer application attacks, computer network device attacks, information security system attacks, and information security breaches; providing online non-downloadable software for monitoring, analyzing, and reporting on cybersecurity event data from computers and computer networks for information security analysis and action by information security administrators or security software; providing online non-downloadable software for use in providing a secure electronic connection between computers, mobile devices, computer networks, and hosted security software for transmission of information security logs and information security event data, namely, data from cybersecurity events; providing online non-downloadable software for use in retrieving and applying software configuration updates, retrieving and installing software updates, and suspending and resuming computer cybersecurity event transmission, namely, transmission of data from cybersecurity events; non-downloadable computer software for analyzing information security for the purpose of configuration management; non-downloadable computer software for analyzing, repairing, and restoring information security for the purpose of configuration management and information security controls;  non-downloadable computer software for modifying computer network security, computer network device, and information security for the purpose of configuration management; non-downloadable computer software for detecting information security configuration gaps and information security control gaps in the nature of computer and network vulnerabilities; non-downloadable computer software for rigorous mathematical analysis of information security configuration gaps and information security control gaps in the nature of computer and network vulnerabilities;  non-downloadable computer software for repairing and restoring  information security configuration gaps and information security control gaps in the nature of computer and network vulnerabilities; non-downloadable computer software for automated repairing and restoring information security configuration gaps and information security control gaps in the nature of computer and network vulnerabilities

Downloadable computer security software; downloadable computer software for analyzing information security for purposes of configuration management; downloadable computer software for analyzing, restoring, and repairing information security for purposes of configuration management and information security controls; downloadable computer software for modifying computer network security, computer network device, and information security for purposes of configuration management; downloadable computer software for detecting information security configuration and control gaps in the nature of computer and network vulnerabilities; downloadable computer software for detecting information security configuration and control gaps in the nature of computer and network vulnerabilities; downloadable computer software for rigorous mathematical analysis of information security configuration and control gaps in the nature of computer and network vulnerabilities; downloadable computer software for restoring and repairing information security configuration and control gaps in the nature of computer and network vulnerabilities; downloadable computer software for automated repair and restoration of information security configuration and control gaps in the nature of computer and network vulnerabilities; downloadable computer software that protects businesses and customer data from malware and computer hackers;  downloadable computer software for Internet security, computer security vulnerability assessment, information security awareness training, information security compliance monitoring, information security compliance tracking, and managed information security solutions; downloadable computer software for use in collecting, processing, and analyzing cybersecurity event data from computer systems, computer applications, computer network devices, and information security applications; downloadable computer software for use in transmitting and receiving cybersecurity event data from computer systems, computer network devices, information security systems and information security applications, all for detecting, monitoring, reporting, analyzing, and eliminating cybersecurity incidents, malware, unauthorized software, network security attacks, computer systems attacks, computer application attacks, computer network device attacks, information security systems attacks, information security application attacks and information security breaches; downloadable computer software for monitoring, analyzing, and reporting on cybersecurity event data from computers and computer networks for analysis and action by information security administrators or information security software;  downloadable computer software for use in providing a secure electronic connection between computers, mobile devices, computer networks, and hosted security software for collection of information security configurations, logs and cybersecurity event data ; downloadable computer software for use in retrieving and applying software configuration updates, retrieving and installing software updates, and suspending and resuming computer event transmission, namely, transmission of data from cybersecurity events

Technical consulting in the field of cybersecurity risk management training

Filing History

OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
Feb 10, 2026 NPUB
PUBLISHED FOR OPPOSITION
Feb 10, 2026 PUBO
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
Feb 4, 2026 NONP
APPROVED FOR PUB - PRINCIPAL REGISTER
Jan 16, 2026 CNSA
EXAMINER'S AMENDMENT ENTERED
Jan 16, 2026 XAEC
NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED
Jan 16, 2026 GNEN
EXAMINERS AMENDMENT E-MAILED
Jan 16, 2026 GNEA
EXAMINERS AMENDMENT -WRITTEN
Jan 16, 2026 CNEA
TEAS/EMAIL CORRESPONDENCE ENTERED
Dec 19, 2025 TEME
CORRESPONDENCE RECEIVED IN LAW OFFICE
Dec 19, 2025 CRFA
TEAS RESPONSE TO OFFICE ACTION RECEIVED
Dec 19, 2025 TROA
AUTOMATIC UPDATE OF ASSIGNMENT OF OWNERSHIP
Dec 10, 2025 ASGN
ASSIGNED TO PETITION STAFF
Nov 10, 2025 APET
NOTIFICATION OF NON-FINAL ACTION E-MAILED
Sep 22, 2025 GNRN
NON-FINAL ACTION E-MAILED
Sep 22, 2025 GNRT
NON-FINAL ACTION WRITTEN
Sep 22, 2025 CNRT
ASSIGNED TO EXAMINER
Sep 20, 2025 DOCK
APPLICATION FILING RECEIPT MAILED
May 1, 2025 MAFR
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
May 1, 2025 NWOS
NEW APPLICATION ENTERED
May 1, 2025 NWAP