Legal Representation
Attorney
Joi A. White
USPTO Deadlines
Next Deadline
3323 days remaining
Section 8 & 9 (20-Year) Renewal Due (Based on registration date 2014-09-02)
Due Date
September 02, 2034
Grace Period Ends
March 02, 2035
Application History
37 eventsDate | Code | Type | Description | Documents |
---|---|---|---|---|
Dec 20, 2024 | NA89 | E | NOTICE OF ACCEPTANCE OF SEC. 8 & 9 - E-MAILED | Loading... |
Dec 20, 2024 | RNL1 | Q | REGISTERED AND RENEWED (FIRST RENEWAL - 10 YRS) | Loading... |
Dec 20, 2024 | 89AG | O | REGISTERED - SEC. 8 (10-YR) ACCEPTED/SEC. 9 GRANTED | Loading... |
Dec 19, 2024 | APRE | A | CASE ASSIGNED TO POST REGISTRATION PARALEGAL | Loading... |
Sep 9, 2024 | E89R | I | TEAS SECTION 8 & 9 RECEIVED | Loading... |
Feb 2, 2024 | REAP | I | TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED | Loading... |
Feb 2, 2024 | TCCA | I | TEAS CHANGE OF CORRESPONDENCE RECEIVED | Loading... |
Feb 2, 2024 | ARAA | I | ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED | Loading... |
Feb 2, 2024 | CHAN | I | APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED | Loading... |
Feb 2, 2024 | COAR | I | TEAS CHANGE OF OWNER ADDRESS RECEIVED | Loading... |
Sep 2, 2023 | REM2 | E | COURTESY REMINDER - SEC. 8 (10-YR)/SEC. 9 E-MAILED | Loading... |
Aug 29, 2022 | TCCA | I | TEAS CHANGE OF CORRESPONDENCE RECEIVED | Loading... |
Aug 29, 2022 | ARAA | I | ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED | Loading... |
Aug 29, 2022 | REAP | I | TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED | Loading... |
Oct 19, 2020 | NA85 | E | NOTICE OF ACCEPTANCE OF SEC. 8 & 15 - E-MAILED | Loading... |
Oct 19, 2020 | C15A | O | REGISTERED - SEC. 8 (6-YR) ACCEPTED & SEC. 15 ACK. | Loading... |
Oct 19, 2020 | APRE | A | CASE ASSIGNED TO POST REGISTRATION PARALEGAL | Loading... |
Aug 31, 2020 | E815 | I | TEAS SECTION 8 & 15 RECEIVED | Loading... |
Sep 2, 2014 | R.PR | A | REGISTERED-PRINCIPAL REGISTER | Loading... |
Jun 17, 2014 | PUBO | A | PUBLISHED FOR OPPOSITION | Loading... |
May 28, 2014 | NPUB | O | NOTICE OF PUBLICATION | Loading... |
May 12, 2014 | PREV | O | LAW OFFICE PUBLICATION REVIEW COMPLETED | Loading... |
May 12, 2014 | ALIE | A | ASSIGNED TO LIE | Loading... |
Apr 29, 2014 | CNSA | O | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... |
Apr 7, 2014 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
Apr 6, 2014 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Apr 6, 2014 | ERFR | I | TEAS REQUEST FOR RECONSIDERATION RECEIVED | Loading... |
Mar 10, 2014 | CNFR | O | FINAL REFUSAL MAILED | Loading... |
Mar 9, 2014 | CNFR | R | FINAL REFUSAL WRITTEN | Loading... |
Feb 4, 2014 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
Feb 3, 2014 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Feb 3, 2014 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
Sep 30, 2013 | CNRT | F | NON-FINAL ACTION MAILED | Loading... |
Sep 28, 2013 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
Sep 23, 2013 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
Jul 17, 2013 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
Jul 11, 2013 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
computer security software for use in detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer networks, and mobile devices; computer network and data security software for use in protecting computers, computer networks, and mobile devices; computer software for use in monitoring, inspecting, analyzing and reporting on data traffic on computer networks; computer software for identifying, tracking, simulating and analyzing potential security threats to computers, computer data and computer systems; computer software for identifying malicious content, communications and computer and network behavior threatening computers and computer networks; computer software for detecting and responding to advanced persistent threats and targeted security attacks; computer hardware; computer security appliances, network security appliances, and unified threat management (UTM) appliances, namely, computer hardware and software for detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer data, computer networks, and mobile devices; virtual computer security appliances and virtual network security appliances, namely, virtual machine images emulating computer hardware and software for detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer data, computer networks, and mobile devices
First Use Anywhere:
Mar 30, 2012
First Use in Commerce:
Mar 30, 2012
Classification
International Classes
009