Legal Representation
Attorney
Joi A. White
USPTO Deadlines
Application History
16 eventsDate | Code | Type | Description | Documents |
---|---|---|---|---|
Jul 7, 2010 | ABN2 | O | ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE | Loading... |
Jul 7, 2010 | MAB2 | O | ABANDONMENT NOTICE MAILED - FAILURE TO RESPOND | Loading... |
Dec 1, 2009 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
Dec 1, 2009 | CNRT | O | NON-FINAL ACTION MAILED | Loading... |
Nov 5, 2009 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
Nov 4, 2009 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
Nov 4, 2009 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Sep 23, 2009 | ALIE | A | ASSIGNED TO LIE | Loading... |
Sep 23, 2009 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Sep 23, 2009 | UNPR | I | UNRESPONSIVE/DUPLICATE PAPER RECEIVED | Loading... |
Sep 21, 2009 | I | PAPER RECEIVED | Loading... | |
May 4, 2009 | CNRT | F | NON-FINAL ACTION MAILED | Loading... |
May 1, 2009 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
Apr 16, 2009 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
Feb 3, 2009 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Feb 3, 2009 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
Detailed Classifications
Class 009
computer, data, and network security software; computer antivirus and content security software; computer utility software; malicious code and content screening software; firewall software; anti-spam, anti-fraud, and anti-phishing computer software; computer software for monitoring, filtering, reporting and modifying messages, files, programs and data retrieved or received from computer and communication networks; computer software for use in scanning, detecting, quarantining, eliminating, blocking and reporting on viruses, worms, trojans, spyware, adware, malware, security exploits, bots and unauthorized data and programs on computers, electronic devices, and handheld and mobile computing and communication devices; computer software for use in detecting and repairing damage from viruses, worms, trojans, spyware, adware, malware, security exploits, bots and unauthorized data and programs on computers and electronic devices; web browser security add-ons, namely, computer software for protecting web browser users from malicious, untrustworthy, or unwanted content or programs; computer software for securing wireless communications, including authentication of wi-fi hotspots; computer software for remotely securing data and files in the event of theft; electronic software updates, namely, downloadable computer software and associated data files for updating computer software in the fields of computer and network security; computer software for use in data backup and data restoration; computer hardware and computer software to protect the confidentiality of data and passwords; computer software to protect or restore the integrity of data, computers, computer hardware, computer software, and mobile computing and communication devices
First Use Anywhere:
0
First Use in Commerce:
0
Additional Information
Pseudo Mark
VISOR
Classification
International Classes
009