Legal Representation
Attorney
Heather Fogle Nehila, Esq.
USPTO Deadlines
Application History
12 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Jul 21, 2014 | MAB2 | O | ABANDONMENT NOTICE MAILED - FAILURE TO RESPOND | Loading... |
| Jul 21, 2014 | ABN2 | O | ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE | Loading... |
| Dec 19, 2013 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Dec 19, 2013 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
| Dec 19, 2013 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Dec 19, 2013 | RFTP | Z | REMOVED FROM TEAS PLUS | Loading... |
| Dec 17, 2013 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Sep 15, 2013 | TAEA | I | TEAS AMENDMENT ENTERED BEFORE ATTORNEY ASSIGNED | Loading... |
| Sep 15, 2013 | PARI | I | TEAS VOLUNTARY AMENDMENT RECEIVED | Loading... |
| Sep 13, 2013 | MPMK | E | NOTICE OF PSEUDO MARK E-MAILED | Loading... |
| Sep 12, 2013 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| Sep 9, 2013 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 042
Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer virus protection services; Consulting services in the field of cloud computing; Design and development of software and hardware for namely, Computer virus protection services; Computer consultation in the field of computer security; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability diagnostic services; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Online computer services, namely, providing spam filtering services to protect websites and online applications from receiving unsolicited messages; Computer security service, namely, providing firewall protection; Computer security service that looks for missing patches, malwares, trojans, open ports, non-secured directories, exposed data, misconfigured services, and crawls the website for vulnerabilities; Computer security service providing protection from hackers; Computer information security solutions provider utilizing cloud-based scan capabilities to search for vulnerabilities
First Use Anywhere:
Mar 1, 2013
First Use in Commerce:
Mar 1, 2013
Additional Information
Pseudo Mark
VAMPIRE SEAL
Classification
International Classes
042