USPTO Deadlines
Application History
9 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Jul 19, 2025 | RFNT | P | REFUSAL PROCESSED BY IB | Loading... |
| Jul 3, 2025 | RFCS | P | NON-FINAL ACTION MAILED - REFUSAL SENT TO IB | Loading... |
| Jul 3, 2025 | RFRR | P | REFUSAL PROCESSED BY MPU | Loading... |
| May 2, 2025 | RFCR | E | NON-FINAL ACTION (IB REFUSAL) PREPARED FOR REVIEW | Loading... |
| May 1, 2025 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Apr 29, 2025 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Apr 25, 2025 | MAFR | O | APPLICATION FILING RECEIPT MAILED | Loading... |
| Apr 25, 2025 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| Apr 17, 2025 | REPR | M | SN ASSIGNED FOR SECT 66A APPL FROM IB | Loading... |
Detailed Classifications
Class 041
Education; training; providing training courses; educational and training services, namely, arranging and conducting, live and on-line, educational and training seminars, conferences, courses, tutorials, workshops, and practical educational demonstrations in the fields of cybersecurity, penetration-testing, data security, computer systems security and network security; training for certification in the fields of cybersecurity, penetration-testing, data security, computer systems security and network security; educational examination services in the fields of cybersecurity, penetration-testing, data security, computer systems security and network security; publication of on-line multimedia web content in the nature of online videos, documents, instructional and educational manuals, and articles in the fields of cybersecurity, penetration testing, data security, computer systems security and network security; publication of training and educational manuals in the field of cybersecurity, penetration-testing, data security, computer systems security and network security.
Class 042
Testing, authentication and quality control; science and technology services; design services; IT services; Software as a service [SaaS]; Software as a service [SaaS] featuring software platforms for training; Software as a service [SaaS] featuring platforms for design; computer and technology services for securing computer data and personal and financial information and for the detection of unauthorized access to data and information, for example, computer virus protection services, data encryption services, electronic monitoring of personally identifying information to detect identity theft via the internet; software development, programming and implementation; hosting services; IT security, protection and restoration services.
Additional Information
Pseudo Mark
HACK THE BOX
Classification
International Classes
041
042