Legal Representation
Attorney
Heather Fogle Nehila, Esq.
USPTO Deadlines
Application History
13 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Jul 21, 2014 | MAB2 | O | ABANDONMENT NOTICE MAILED - FAILURE TO RESPOND | Loading... |
| Jul 21, 2014 | ABN2 | O | ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE | Loading... |
| Dec 19, 2013 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Dec 19, 2013 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
| Dec 19, 2013 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Dec 19, 2013 | RFTP | Z | REMOVED FROM TEAS PLUS | Loading... |
| Dec 17, 2013 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Sep 24, 2013 | AMPX | O | PRELIMINARY/VOLUNTARY AMENDMENT - ENTERED | Loading... |
| Sep 20, 2013 | ALIE | A | ASSIGNED TO LIE | Loading... |
| Sep 15, 2013 | PARI | I | TEAS VOLUNTARY AMENDMENT RECEIVED | Loading... |
| Sep 13, 2013 | MDSM | E | NOTICE OF DESIGN SEARCH CODE E-MAILED | Loading... |
| Sep 12, 2013 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| Sep 9, 2013 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 042
Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer virus protection services; Consulting services in the field of cloud computing; Design and development of software and hardware for namely, Computer virus protection services; Computer consultation in the field of computer security; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability diagnostic services; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Online computer services, namely, providing spam filtering services to protect websites and online applications from receiving unsolicited messages; Computer security service, namely, providing firewall protection; Computer security service that looks for missing patches, malwares, trojans, open ports, non-secured directories, exposed data, misconfigured services, and crawls the website for vulnerabilities; Computer security service providing protection from hackers; Computer information security solutions provider utilizing cloud-based scan capabilities to search for vulnerabilities
First Use Anywhere:
Mar 1, 2012
First Use in Commerce:
Mar 1, 2012
Additional Information
Design Mark
The mark consists of blue circular ring with yellow letter "V" within ring and yellow "T" extending through the upper right portion of the ring above the letter "V" followed by the wording "VAMPIRETECH".
Color Claim
Color is not claimed as a feature of the mark.
Pseudo Mark
VT VAMPIRE TECH
Classification
International Classes
042