Legal Representation
Attorney
Stewart L. Gitler
USPTO Deadlines
Application History
14 eventsDate | Code | Type | Description |
---|---|---|---|
May 19, 2008 | MAB2 | O | ABANDONMENT NOTICE MAILED - FAILURE TO RESPOND |
May 18, 2008 | ABN2 | O | ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE |
Oct 20, 2007 | CNFR | R | FINAL REFUSAL WRITTEN |
Oct 20, 2007 | GNFR | O | FINAL REFUSAL E-MAILED |
Oct 20, 2007 | GNFN | O | NOTIFICATION OF FINAL REFUSAL EMAILED |
Sep 18, 2007 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED |
Sep 18, 2007 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE |
Sep 18, 2007 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED |
Aug 30, 2007 | CNRT | R | NON-FINAL ACTION WRITTEN |
Aug 30, 2007 | GNRT | F | NON-FINAL ACTION E-MAILED |
Aug 30, 2007 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED |
Aug 29, 2007 | DOCK | D | ASSIGNED TO EXAMINER |
May 23, 2007 | MPMK | O | NOTICE OF PSEUDO MARK MAILED |
May 22, 2007 | NWAP | I | NEW APPLICATION ENTERED |
Detailed Classifications
Class 009
Computer programs for use in encryption of credit card and other data in point of sale systems in the device log files and in the payment gateway database(s) with the ability to update the software at scheduled intervals; Point of Sale computer software in the field of cryptographic network security and cryptographic data security functions; computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over wireless networks, the Internet and other computer networks; computer software, namely encryption software and/or protocols to enable secure transmission of digital information, namely, confidential, financial and credit card information over wireless networks, the Internet as well as over other modes of communication between point of sale and/or computing devices; point of sale computer software to integrate managed security services, namely private and public key infrastructure (PKI) services, digital certificate issuance, verification, and management, data security compliance updates and enterprise software integration, with new and/or existing communications networks, software, and services, in the field of point of sale financial information technology
First Use Anywhere:
0
First Use in Commerce:
0
Additional Information
Pseudo Mark
CARD CRYPT
Classification
International Classes
009
USPTO Documents
Click to view cached USPTO documents for this trademark
Only administrators can request new documents from USPTO