Legal Representation
Attorney
Lev Ivan Gabriel Iwashko
USPTO Deadlines
Application History
26 eventsDate | Code | Type | Description | Documents |
---|---|---|---|---|
Jun 10, 2025 | NPUB | E | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | Loading... |
Jun 10, 2025 | PUBO | A | PUBLISHED FOR OPPOSITION | Loading... |
Jun 4, 2025 | NONP | E | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | Loading... |
May 8, 2025 | CNSA | O | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... |
May 8, 2025 | XAEC | I | EXAMINER'S AMENDMENT ENTERED | Loading... |
May 8, 2025 | GNEN | O | NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED | Loading... |
May 8, 2025 | CNEA | R | EXAMINERS AMENDMENT -WRITTEN | Loading... |
May 8, 2025 | GNEA | F | EXAMINERS AMENDMENT E-MAILED | Loading... |
May 7, 2025 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
May 7, 2025 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
May 7, 2025 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Feb 15, 2025 | RFNT | P | REFUSAL PROCESSED BY IB | Loading... |
Feb 1, 2025 | RFNT | P | REFUSAL PROCESSED BY IB | Loading... |
Dec 31, 2024 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
Nov 29, 2024 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Nov 29, 2024 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
Nov 29, 2024 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
Jul 28, 2024 | RFNT | P | REFUSAL PROCESSED BY IB | Loading... |
Jul 10, 2024 | RFRR | P | REFUSAL PROCESSED BY MPU | Loading... |
Jul 10, 2024 | RFCS | P | NON-FINAL ACTION MAILED - REFUSAL SENT TO IB | Loading... |
Jun 19, 2024 | RFCR | E | NON-FINAL ACTION (IB REFUSAL) PREPARED FOR REVIEW | Loading... |
Jun 18, 2024 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
Jun 13, 2024 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
May 9, 2024 | MAFR | O | APPLICATION FILING RECEIPT MAILED | Loading... |
May 9, 2024 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
May 2, 2024 | REPR | M | SN ASSIGNED FOR SECT 66A APPL FROM IB | Loading... |
Detailed Classifications
Class 009
Data processing equipment and computers, the aforesaid data processing apparatus in particular for securely storing data or transmitting data; authentication devices, in particular for computers, data transmission networks or mobile communication apparatus, namely, security token hardware; downloadable and recorded computer software, in particular for facilitating internet security, securely storing data, transmitting data, authentication of user identification, controlling access server applications, controlling devices in the nature of computers and computer hardware, data encryption management, data access governance, authenticating digital signatures, encryption of data, data encryption and decryption through cryptography, and continuous user identification authentication, authorization and validation; security token hardware used by an authorized user of a computer system, a data transmission network, or a mobile communication apparatus to facilitate authentication; integrated circuits, in particular for public key infrastructure security components; fingerprint recognition scanners; downloadable and recorded software, in particular data encryption software, application control software for controlling access server applications, device control software for controlling computer hardware, data encryption management software, data access governance software, cryptography software for data encryption and decryption, and zero trust platform software for continuous user identification authentication, authorization and validation
Class 038
Providing online forums, in particular for internet security, securely storing data, transmitting data, authentication purposes, application control, device control, data encryption management, data access governance, digital signatures, authentication, encryption, cryptography, or zero trust platforms
Class 041
Training and training courses in the field of information technology, in particular for securely storing data, transmitting data, authentication purposes, encryption, application control, device control, data encryption management, data access governance, encryption, cryptography, or zero trust platforms; security awareness training
Class 042
Advisory and consultancy services relating to the design of computer hardware; Advisory and consultancy services relating to computer software and computer programming; computer security consultancy; computer software design, the aforesaid software in particular for internet security, securely storing data, transmitting data, authentication purposes, application control, device control, data encryption management, data access governance, digital signatures, authentication, encryption or cryptography; computer software consultancy; updating of computer software; rental of computer software, in particular computer software for facilitating internet security, securely storing data, transmitting data, authentication of user identification, controlling access server applications, controlling devices in the nature of date processing equipment, computers, and computer hardware, data encryption management, data access governance, authenticating digital signatures, encryption of data, and data encryption and decryption through cryptography; maintenance of computer software; issuing, examining or administration of digital signatures, namely, authentication, issuance and validation of digital certificates; software development, the aforesaid software development in particular for internet security, securely storing data, transmitting data, authentication purposes, application control, device control, data encryption management, data access governance, digital signatures, authentication, encryption, cryptography, or zero trust platforms; software adaptation; design services relating to computer software; upgrading of computer software; programming of software, the aforesaid software in particular for internet security, securely storing data, transmitting data, authentication purposes, application control, device control, data encryption management, data access governance, digital signatures, authentication, encryption, cryptography, or zero trust platforms; hosting zero trust software platforms of others
Class 045
Licensing of software, the aforesaid software in particular for internet security, securely storing data, transmitting data, authentication purposes, application control, device control, data encryption management, data access governance, digital signatures, authentication, encryption, cryptography, or zero trust platforms
Additional Information
Design Mark
The mark consists of two concentric circles with each formed by four broken lines; the top right, top left, and bottom left lines forming the outer circle are blue while the bottom right line forming the outer circle is red; the top, right, and left lines forming the inner circle are blue while the bottom line forming the inner circle is red.
Color Claim
The colors red and blue are claimed as a feature of the mark.
Classification
International Classes
009
038
041
042
045