Legal Representation
Attorney
Mary Dalton Baril
USPTO Deadlines
Application History
15 eventsDate | Code | Type | Description |
---|---|---|---|
Feb 14, 2014 | ABN2 | O | ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE |
Feb 14, 2014 | MAB2 | O | ABANDONMENT NOTICE MAILED - FAILURE TO RESPOND |
Jul 1, 2013 | CNRT | R | NON-FINAL ACTION WRITTEN |
Jul 1, 2013 | GNRT | O | NON-FINAL ACTION E-MAILED |
Jul 1, 2013 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED |
Jun 5, 2013 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED |
Jun 4, 2013 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED |
Jun 4, 2013 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE |
Dec 6, 2012 | CNRT | R | NON-FINAL ACTION WRITTEN |
Dec 6, 2012 | GNRT | F | NON-FINAL ACTION E-MAILED |
Dec 6, 2012 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED |
Nov 27, 2012 | DOCK | D | ASSIGNED TO EXAMINER |
Sep 13, 2012 | MPMK | O | NOTICE OF PSEUDO MARK MAILED |
Sep 12, 2012 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED |
Sep 10, 2012 | NWAP | I | NEW APPLICATION ENTERED |
Detailed Classifications
Class 038
Telecommunication services, namely, providing unified threat management and incidence response by telephone
First Use Anywhere:
0
First Use in Commerce:
0
Class 042
Updating of computer software relating to computer security and prevention of computer risks; Computer consultation in the field of computer security; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security service, namely, hard drive erasure
First Use Anywhere:
0
First Use in Commerce:
0
Class 045
Computer consulting services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; Computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of point of sale activity indicating theft, fraud, or other criminal activity; Consulting services in the field of maintaining the security and integrity of databases; Electronic monitoring of IT systems services for security purposes; Monitoring of computer systems for security purposes; Testing, analysis, and evaluation of IT systems for the purpose of certification and re-certification; Security threat analysis for protecting personal property, namely, computers
First Use Anywhere:
0
First Use in Commerce:
0
Additional Information
Pseudo Mark
TOTAL SECURITY
Classification
International Classes
038
042
045