USPTO Deadlines
Next Deadline
1983 days remaining
Section 8 (6-Year) Declaration Due (Based on registration date 2024-12-17)
Due Date
December 17, 2030
Grace Period Ends
June 17, 2031
Additional deadlines exist. Contact your attorney for complete deadline information.
Application History
14 eventsDate | Code | Type | Description |
---|---|---|---|
Jul 5, 2025 | OPNX | P | NOTIFICATION OF POSSIBLE OPPOSITION - PROCESSED BY IB |
Jun 17, 2025 | OPNS | P | NOTIFICATION OF POSSIBLE OPPOSITION SENT TO IB |
Jun 17, 2025 | OPNR | P | NOTIFICATION OF POSSIBLE OPPOSITION CREATED, TO BE SENT TO IB |
Dec 17, 2024 | R.PR | A | REGISTERED-PRINCIPAL REGISTER |
Sep 10, 2024 | PUBO | A | PUBLISHED FOR OPPOSITION |
Aug 21, 2024 | NPUB | O | NOTICE OF PUBLICATION |
Aug 1, 2024 | RFWR | P | NON-FINAL ACTION (IB REFUSAL) WITHDRAWN FOR REVIEW |
Aug 1, 2024 | CNSA | O | APPROVED FOR PUB - PRINCIPAL REGISTER |
Jul 11, 2024 | RFCR | E | NON-FINAL ACTION (IB REFUSAL) PREPARED FOR REVIEW |
Jul 10, 2024 | CNRT | R | NON-FINAL ACTION WRITTEN |
Jul 1, 2024 | DOCK | D | ASSIGNED TO EXAMINER |
Jan 23, 2024 | MAFR | O | APPLICATION FILING RECEIPT MAILED |
Jan 19, 2024 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED |
Jan 18, 2024 | REPR | M | SN ASSIGNED FOR SECT 66A APPL FROM IB |
Detailed Classifications
Class 009
Downloadable software for monitoring computer security; downloadable computer software for conducting penetration tests for computer terminals, servers, networks and end points for determining and identifying information security exploits, assessing information security vulnerability and recommending plans for preventing security exploits; downloadable computer software for validating security controls of computer terminals, servers, networks and end points through simulating cyber-attacks in real world environment; recorded software for monitoring computer security; recorded computer software for conducting penetration tests for computer terminals, servers, networks and end points for determining and identifying information security exploits, assessing information security vulnerability and recommending plans for preventing security exploits; recorded computer software for validating security controls of computer terminals, servers, networks and end points through simulating cyber-attacks in real world environment
Class 042
Update, installation and maintenance of computer security software; providing temporary use of online non-downloadable cloud-based security software; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; monitoring and testing of computer terminals, servers, networks and end points directed toward the detection or other action with respect to security exploits and information security vulnerability
Classification
International Classes
009
042
USPTO Documents
Click to view cached USPTO documents for this trademark
Only administrators can request new documents from USPTO