Legal Representation
Attorney
Raymond A. Kurz
USPTO Deadlines
Application History
35 eventsDate | Code | Type | Description | Documents |
---|---|---|---|---|
Jan 14, 2013 | ABN6 | S | ABANDONMENT - NO USE STATEMENT FILED | Loading... |
Jan 14, 2013 | MAB6 | O | ABANDONMENT NOTICE MAILED - NO USE STATEMENT FILED | Loading... |
Jul 4, 2012 | EXRA | E | NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED | Loading... |
Jul 3, 2012 | EX1G | S | SOU EXTENSION 1 GRANTED | Loading... |
Jun 29, 2012 | AITU | A | CASE ASSIGNED TO INTENT TO USE PARALEGAL | Loading... |
Jun 12, 2012 | EEXT | I | SOU TEAS EXTENSION RECEIVED | Loading... |
Jun 12, 2012 | EXT1 | S | SOU EXTENSION 1 FILED | Loading... |
Apr 16, 2012 | REAP | I | TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED | Loading... |
Apr 16, 2012 | ARAA | I | ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED | Loading... |
Dec 20, 2011 | COAR | I | TEAS CHANGE OF OWNER ADDRESS RECEIVED | Loading... |
Dec 20, 2011 | CHAN | I | APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED | Loading... |
Dec 13, 2011 | NOAM | E | NOA E-MAILED - SOU REQUIRED FROM APPLICANT | Loading... |
Oct 18, 2011 | PUBO | A | PUBLISHED FOR OPPOSITION | Loading... |
Oct 18, 2011 | NPUB | E | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | Loading... |
Sep 13, 2011 | CNSA | P | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... |
Sep 13, 2011 | PREV | O | LAW OFFICE PUBLICATION REVIEW COMPLETED | Loading... |
Sep 10, 2011 | REAP | I | TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED | Loading... |
Sep 10, 2011 | ARAA | I | ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED | Loading... |
Aug 24, 2011 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Aug 24, 2011 | ACEC | I | AMENDMENT FROM APPLICANT ENTERED | Loading... |
Aug 18, 2011 | I | PAPER RECEIVED | Loading... | |
Feb 22, 2011 | CNFR | R | FINAL REFUSAL WRITTEN | Loading... |
Feb 22, 2011 | GNFR | O | FINAL REFUSAL E-MAILED | Loading... |
Feb 22, 2011 | GNFN | O | NOTIFICATION OF FINAL REFUSAL EMAILED | Loading... |
Jan 31, 2011 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Jan 31, 2011 | ACEC | I | AMENDMENT FROM APPLICANT ENTERED | Loading... |
Jan 28, 2011 | ALIE | A | ASSIGNED TO LIE | Loading... |
Jan 18, 2011 | I | PAPER RECEIVED | Loading... | |
Jul 16, 2010 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
Jul 16, 2010 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
Jul 16, 2010 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
Jul 14, 2010 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
May 20, 2010 | MDSM | O | NOTICE OF DESIGN SEARCH CODE MAILED | Loading... |
May 19, 2010 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
May 17, 2010 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
Computer software for database management in the field of cryptographic network security and data security functions; computer software for integration of information logic and data between computer networks; computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, and management, and enterprise software integration, with existing communications networks, software, and services, downloadable electronic publications in the nature of a newsletter in the field of information technology; computer software for use in analysis and reporting of firewall log data; computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; computer software for encrypting and authenticating data; computer software for encryption; computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files
First Use Anywhere:
0
First Use in Commerce:
0
Class 042
Technical and customer support services, namely, troubleshooting of computer software for use in issuance and management of digital certificates or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; development, integration and operation of computer systems to support issuance and management of digital certificates; creation and implementation of procedures and practices for issuance and management of digital certificates; enterprise software integration; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; scanning, detection and removal of viruses, worms, Trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites
First Use Anywhere:
0
First Use in Commerce:
0
Class 045
Authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; personal background investigation services in order to authenticate identity; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure ("PKI") verification, authentication, distribution and management, digital certificate issuance, verification and management
First Use Anywhere:
0
First Use in Commerce:
0
Additional Information
Design Mark
The mark consists of a checkmark in a circle next to the words "VeriSign Trusted" in a half oval shape.
Color Claim
Color is not claimed as a feature of the mark.
Pseudo Mark
VERIFY SIGN TRUSTED
Classification
International Classes
009
042
045