Legal Representation
Attorney
Hannah L. Cannom
USPTO Deadlines
Next Deadline
1907 days remaining
Section 8 (6-Year) Declaration Due (Based on registration date 2025-01-28)
Due Date
January 28, 2031
Grace Period Ends
July 28, 2031
Additional deadlines exist. Contact your attorney for complete deadline information.
Application History
43 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Aug 29, 2025 | FINO | P | FINAL DECISION TRANSACTION PROCESSED BY IB | Loading... |
| Aug 11, 2025 | FIMP | P | FINAL DISPOSITION PROCESSED | Loading... |
| Aug 11, 2025 | FICS | P | FINAL DISPOSITION NOTICE SENT TO IB | Loading... |
| Apr 28, 2025 | FICR | P | FINAL DISPOSITION NOTICE CREATED, TO BE SENT TO IB | Loading... |
| Jan 28, 2025 | R.PR | A | REGISTERED-PRINCIPAL REGISTER | Loading... |
| Jan 28, 2025 | NRCC | E | NOTICE OF REGISTRATION CONFIRMATION EMAILED | Loading... |
| Dec 10, 2024 | NPUB | E | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | Loading... |
| Dec 10, 2024 | PUBO | A | PUBLISHED FOR OPPOSITION | Loading... |
| Dec 4, 2024 | NONP | E | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | Loading... |
| Oct 16, 2024 | CNSA | O | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... |
| Oct 15, 2024 | ERFR | I | TEAS REQUEST FOR RECONSIDERATION RECEIVED | Loading... |
| Oct 15, 2024 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| Oct 15, 2024 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Jun 21, 2024 | ADCH | M | CHANGE OF NAME/ADDRESS REC'D FROM IB | Loading... |
| Jun 17, 2024 | OPNX | P | NOTIFICATION OF POSSIBLE OPPOSITION - PROCESSED BY IB | Loading... |
| Jun 14, 2024 | GNFR | O | FINAL REFUSAL E-MAILED | Loading... |
| Jun 14, 2024 | CNFR | R | FINAL REFUSAL WRITTEN | Loading... |
| Jun 14, 2024 | GNFN | O | NOTIFICATION OF FINAL REFUSAL EMAILED | Loading... |
| Jun 13, 2024 | ALIE | A | ASSIGNED TO LIE | Loading... |
| Jun 13, 2024 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Jun 13, 2024 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| May 8, 2024 | OPNS | P | NOTIFICATION OF POSSIBLE OPPOSITION SENT TO IB | Loading... |
| May 8, 2024 | OPNR | P | NOTIFICATION OF POSSIBLE OPPOSITION CREATED, TO BE SENT TO IB | Loading... |
| Apr 11, 2024 | NREV | E | NOTICE OF REVIVAL - E-MAILED | Loading... |
| Apr 11, 2024 | PETG | O | PETITION TO REVIVE-GRANTED | Loading... |
| Apr 11, 2024 | PROA | I | TEAS PETITION TO REVIVE RECEIVED | Loading... |
| Apr 11, 2024 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
| Mar 4, 2024 | MAB2 | E | ABANDONMENT NOTICE E-MAILED - FAILURE TO RESPOND | Loading... |
| Mar 4, 2024 | ABN2 | O | ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE | Loading... |
| Dec 12, 2023 | TCCA | I | TEAS CHANGE OF CORRESPONDENCE RECEIVED | Loading... |
| Dec 12, 2023 | ARAA | I | ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED | Loading... |
| Dec 12, 2023 | REAP | I | TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED | Loading... |
| Dec 12, 2023 | CHAN | I | APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED | Loading... |
| Dec 12, 2023 | COAR | I | TEAS CHANGE OF OWNER ADDRESS RECEIVED | Loading... |
| Sep 13, 2023 | RFNT | P | REFUSAL PROCESSED BY IB | Loading... |
| Aug 20, 2023 | RFCS | P | NON-FINAL ACTION MAILED - REFUSAL SENT TO IB | Loading... |
| Aug 20, 2023 | RFRR | P | REFUSAL PROCESSED BY MPU | Loading... |
| Jul 22, 2023 | RFCR | E | NON-FINAL ACTION (IB REFUSAL) PREPARED FOR REVIEW | Loading... |
| Jul 21, 2023 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Jul 19, 2023 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Dec 13, 2022 | MAFR | O | APPLICATION FILING RECEIPT MAILED | Loading... |
| Dec 9, 2022 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| Dec 8, 2022 | REPR | M | SN ASSIGNED FOR SECT 66A APPL FROM IB | Loading... |
Detailed Classifications
Class 009
Downloadable and recorded computer software for use in performing computer network vulnerability assessment and penetration testing; Downloadable and recorded computer software for use in identifying computer and database vulnerabilities for use in preventing hackers or unauthorised users from accessing telecommunications and computer networks; Security software, namely, downloadable and recorded software for the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Software for network and device security, namely, downloadable and recorded software for identifying vulnerabilities by performing computer network vulnerability assessment and penetration testing; Computer software, namely, downloadable and recorded anti-spyware and anti-piracy software; Downloadable electronic articles in the field of data security and computer technology and downloadable electronic reports in the field of data security, threat assessment, and computer technology
Class 042
Software as a service (SaaS) services featuring software for use in performing computer network vulnerability assessment and penetration testing; Software as a service SaaS) services featuring software for use in identifying computer and database vulnerabilities for use in preventing hackers or unauthorised users from accessing telecommunications and computer networks; IT security services relating to vulnerability assessment and penetration testing, namely, testing of computer security systems; IT security services relating to preventing hackers or unauthorised users from accessing telecommunications and computer networks, namely, computer security threat analysis for protecting data and cybersecurity services in the nature of restricting unauthorized access to computer systems; Design, development, maintenance and updating of computer software; Computer security services, namely, Internet security consultancy; Computer security services for protection against illegal network access in the nature of providing authentication, issuance, validation and revocation of digital certificates; Data security services; Computer security system monitoring services, namely, monitoring of computer systems for detecting unauthorized access or data breach; IT security services in the nature of recovery of computer data; Computer security threat analysis for protecting data; Design and development of electronic data security systems; and consultancy, Information, research and advisory services relating to all of the aforesaid services
Additional Information
Pseudo Mark
COVERT SWARM
Classification
International Classes
009
042