Legal Representation
Attorney
James E. O'Connor
USPTO Deadlines
Application History
14 eventsDate | Code | Type | Description | Documents |
---|---|---|---|---|
Apr 5, 2004 | ABN6 | S | ABANDONMENT - NO USE STATEMENT FILED | Loading... |
Nov 2, 2002 | DPCC | D | DIVISIONAL PROCESSING COMPLETE | Loading... |
Oct 2, 2002 | I | PAPER RECEIVED | Loading... | |
Sep 3, 2002 | I | PAPER RECEIVED | Loading... | |
Sep 3, 2002 | DRRR | I | DIVISIONAL REQUEST RECEIVED | Loading... |
Jul 9, 2002 | NOAM | O | NOA MAILED - SOU REQUIRED FROM APPLICANT | Loading... |
Apr 16, 2002 | PUBO | A | PUBLISHED FOR OPPOSITION | Loading... |
Mar 27, 2002 | NPUB | O | NOTICE OF PUBLICATION | Loading... |
Jan 4, 2002 | CNSA | P | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... |
Jan 3, 2002 | CNEA | O | EXAMINERS AMENDMENT MAILED | Loading... |
Oct 9, 2001 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Oct 9, 2001 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Jul 10, 2001 | CNRT | F | NON-FINAL ACTION MAILED | Loading... |
Jul 6, 2001 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
Detailed Classifications
Class 009
Computer software applications for direct use or use in a service bureau environment, namely, computer software programs used to provide for computer network, system and application security assessments and analysis; computer software programs used for computer network, system and application security protection and security management; computer software for monitoring data communications on computer networks and systems; computer software used for surveillance of computer networks' and systems' user traffic; computer software used to protect the privacy of data communications and transactions conducted on computer networks and systems; computer software used for computer network, system and application intrusion detection, disablement, alerts and response; and computer software used for the management of secure computer networks, systems and applications; and computer software programs which monitor and assist companies with virus detection and removal and encryption and authentication of data
First Use Anywhere:
0
First Use in Commerce:
0
Additional Information
Pseudo Mark
ITS EASIER TO DESTROY THAN TO BUILD WE PROTECT WHAT YOU BUILD; IT IS EASIER TO DESTROY THAN TO BUILD WE PROTECT WHAT YOU BUILD
Classification
International Classes
009