USPTO Deadlines
Application History
19 eventsDate | Code | Type | Description | Documents |
---|---|---|---|---|
Aug 23, 2018 | CHLD | M | CHANGE OF OWNER RECEIVED FROM IB | Loading... |
Aug 16, 2018 | ADCH | M | CHANGE OF NAME/ADDRESS REC'D FROM IB | Loading... |
Dec 15, 2017 | FINT | P | FINAL DECISION TRANSACTION PROCESSED BY IB | Loading... |
Nov 27, 2017 | FICS | P | FINAL DISPOSITION NOTICE SENT TO IB | Loading... |
Nov 25, 2017 | FICR | P | FINAL DISPOSITION NOTICE CREATED, TO BE SENT TO IB | Loading... |
Oct 6, 2017 | OPNX | P | NOTIFICATION OF POSSIBLE OPPOSITION - PROCESSED BY IB | Loading... |
Sep 20, 2017 | OPNR | P | NOTIFICATION OF POSSIBLE OPPOSITION CREATED, TO BE SENT TO IB | Loading... |
Sep 20, 2017 | OPNS | P | NOTIFICATION OF POSSIBLE OPPOSITION SENT TO IB | Loading... |
Nov 28, 2016 | MAB2 | O | ABANDONMENT NOTICE MAILED - FAILURE TO RESPOND | Loading... |
Nov 25, 2016 | ABN2 | O | ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE | Loading... |
May 14, 2016 | RFNT | P | REFUSAL PROCESSED BY IB | Loading... |
Apr 28, 2016 | RFRR | P | REFUSAL PROCESSED BY MPU | Loading... |
Apr 28, 2016 | RFCS | P | NON-FINAL ACTION MAILED - REFUSAL SENT TO IB | Loading... |
Apr 27, 2016 | RFCR | E | NON-FINAL ACTION (IB REFUSAL) PREPARED FOR REVIEW | Loading... |
Apr 26, 2016 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
Apr 20, 2016 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
Apr 19, 2016 | MAFR | O | APPLICATION FILING RECEIPT MAILED | Loading... |
Apr 15, 2016 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
Apr 14, 2016 | REPR | M | SN ASSIGNED FOR SECT 66A APPL FROM IB | Loading... |
Detailed Classifications
Class 009
Cyber security systems comprising computer hardware and software for network-wide detecting, preventing, blocking, mitigating and fighting harmful consequences of cyber information and attacks on computer controlled enterprises, organizations, infrastructures installations and networks, devising response solutions, handling a stream of alerts, ensuring consistent performance by teams, linking and learning previous incidents, managing multiple incidents, managing cross-organization and continuous cyber-attacks, ensuring privacy control, providing access to past incidents and events, facilitating wider cyber intelligence and analysis and providing advanced cyber security, defense, response and attack; cyber collection systems comprising hardware and software for collecting and intercepting communications and information, namely, web pages, text, video, voice and data; intelligence computer hardware and software for detecting voice, video, email, message, media interaction and text, using access to worldwide web, intranet, wireless network, and other multimedia communication transmitted over telecommunication equipment and networks; computerized hardware and software used to capture video, voice, data, text, signal and alarm; computer software for data management, analysis, interpretation, identification, reporting, and decision support; telecommunication surveillance hardware and software for interception, filtering and analyzing data and voice communications; telecommunication surveillance hardware and software for interception, filtering and analyzing communications on networks, mobile applications, chat applications and webmail services; integrated and modular cyber security systems for the protection of national infrastructures and enterprises, property and individuals from cyber threats including terrorism, crime, fraud, and theft, comprising computer software and hardware for cyber security situation management enabling situation planning, mitigation, response and handling; computer software for investigating and analyzing potential cyber security threats; training and simulation software for training cyber professionals against advanced cyber-attacks
First Use Anywhere:
0
First Use in Commerce:
0
Additional Information
Pseudo Mark
CYBER SHIELD MNR
Classification
International Classes
009