Legal Representation
Attorney
Philip J. Foret
USPTO Deadlines
Application History
21 eventsDate | Code | Type | Description | Documents |
---|---|---|---|---|
Dec 21, 2015 | ABN6 | S | ABANDONMENT - NO USE STATEMENT FILED | Loading... |
Dec 21, 2015 | MAB6 | O | ABANDONMENT NOTICE MAILED - NO USE STATEMENT FILED | Loading... |
May 20, 2015 | EXRA | O | NOTICE OF APPROVAL OF EXTENSION REQUEST MAILED | Loading... |
May 18, 2015 | EEXT | I | SOU TEAS EXTENSION RECEIVED | Loading... |
May 18, 2015 | EXT1 | S | SOU EXTENSION 1 FILED | Loading... |
May 18, 2015 | EX1G | S | SOU EXTENSION 1 GRANTED | Loading... |
Nov 18, 2014 | NOAM | O | NOA MAILED - SOU REQUIRED FROM APPLICANT | Loading... |
Sep 23, 2014 | PUBO | A | PUBLISHED FOR OPPOSITION | Loading... |
Sep 3, 2014 | NPUB | O | NOTICE OF PUBLICATION | Loading... |
Aug 19, 2014 | ALIE | A | ASSIGNED TO LIE | Loading... |
Aug 19, 2014 | PREV | O | LAW OFFICE PUBLICATION REVIEW COMPLETED | Loading... |
Aug 11, 2014 | CNSA | P | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... |
Jul 31, 2014 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
Jul 31, 2014 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Jul 31, 2014 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
Jan 31, 2014 | CNRT | F | NON-FINAL ACTION MAILED | Loading... |
Jan 30, 2014 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
Jan 29, 2014 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
Oct 22, 2013 | MPMK | O | NOTICE OF PSEUDO MARK MAILED | Loading... |
Oct 21, 2013 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
Oct 17, 2013 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
DOWNLOADABLE SOFTWARE FOR SECURE INTEGRATION OF THE MANAGEMENT, ADMINISTRATION, MODIFICATION AND CONTROL OF END USER REMOTE ACCESS TO AN ENTERPRISE SYSTEM; DOWNLOADABLE SOFTWARE FOR PROVIDING SECURE INTEGRATION OF REMOTE ACCESS SERVICES, NAMELY, MANAGING, ADMINISTERING, MODIFYING AND CONTROLLING END USER COMPUTER AND MOBILE DEVICES, DATA AND SOFTWARE APPLICATIONS; DOWNLOADABLE SOFTWARE FOR SECURELY INTEGRATING END USER REMOTE CONNECTIVITY TO AN ENTERPRISE SYSTEM SO THAT COMPUTER SOFTWARE APPLICATIONS, COMPUTER NETWORK-BASED SERVICES, FILE SHARING SERVICES, E-MAIL SERVICES AND INTRANET SERVICES CAN BE SECURELY ACCESSED BY AN END-USER CONNECTING REMOTELY WITH COMPUTER AND MOBILE DEVICES TO THE ENTERPRISE SYSTEM LOCAL AREA NETWORK AND FOR USE IN MANAGING, ADMINISTERING, MODIFYING AND CONTROLLING END USER COMPUTER AND MOBILE DEVICES, DATA AND SOFTWARE APPLICATIONS; DOWNLOADABLE COMPUTER SOFTWARE, NAMELY, MOBILE SOLUTIONS FOR SECURE, REMOTE WORKPLACE ACCESSIBILITY WITH EMPLOYEE-OWNED MOBILE AND COMPUTER DEVICES; DOWNLOADABLE COMPUTER SOFTWARE, NAMELY, CROSS-PLATFORM, CLOUD-BASED SOLUTIONS TO ISOLATE AND CONTAIN WORK DATA ON MOBILE DEVICES; DOWNLOADABLE COMPUTER SOFTWARE, NAMELY, CLOUD-BASED SOLUTION FOR MOBILE DEVICES FOR ENABLING EMPLOYEES TO SECURELY ACCESS CORPORATE DATA WHILE PRESERVING THE MOBILE EXPERIENCE ON PERSONAL MOBILE DEVICES; DOWNLOADABLE COMPUTER SOFTWARE FOR SINGLE LOCATION DUAL MANAGEMENT OF EMAILS, CONTACTS, CALENDAR, APPLICATIONS, DOCUMENTS AND INTERNET ACCESS USING A MOBILE DEVICE; DOWNLOADABLE COMPUTER SOFTWARE, NAMELY, CYBER SECURITY CONTROLS FOR CLOUD COMPUTING THROUGH MOBILE DEVICES; DOWNLOADABLE COMPUTER SOFTWARE APPLICATIONS FOR SECURELY ACCESSING EMAIL, CALENDAR, AND CONTACTS; COMPUTER SOFTWARE IN THE NATURE OF MOBILE APPLICATION CONTAINER SOLUTIONS WITH OPERATIONAL AND SECURITY MANAGEMENT TO PROTECT DATA AGAINST DATA LEAKS; COMPUTER SECURITY SOFTWARE IN THE NATURE OF SECURE DOCUMENT CONTAINER SOLUTION WITH EXPANDED USER SUPPORT FOR CONTENT EDITING; COMPUTER SOFTWARE IN THE NATURE OF A WEB BROWSER TO CONTROL AND ENFORCE COMPLIANCE WITH CORPORATE SECURITY AND HR POLICIES AND PROVIDE SECURE ACCESS TO CORPORATE INTRANET SITES; DOWNLOADABLE COMPUTER SOFTWARE IN THE NATURE OF CLOUD-BASED SOLUTIONS FOR USE ON A SINGLE DEVICE TO PROVIDE PERSONAL AND CORPORATE DATA ACCESS AND USE; COMPUTER SOFTWARE IN THE NATURE OF A REMOTE MOBILE DEVICE WIPE SOLUTION TO REMOTELY WIPE DATA FROM MOBILE DEVICES FOR SUITE CONTAINER, APPLICATION CONTAINER, ENTERPRISE PROFILES, OR WHOLE DEVICE; COMPUTER SOFTWARE FOR IMPLEMENTING ADMINISTRATOR CONTROLS AND INTERACTIVE GRAPHICAL REPORTS FOR MOBILE DEVICE ACCESS AND SECURITY; COMPUTER SOFTWARE FOR EMAIL SECURITY; COMPUTER SOFTWARE FOR PROVIDING MOBILE APPLICATION SECURITY; COMPUTER SOFTWARE APPLICATIONS FOR SECURE DOCUMENT SHARING; COMPUTER SOFTWARE APPLICATIONS FOR SECURE AND CONTROLLED INTERNET BROWSING
First Use Anywhere:
0
First Use in Commerce:
0
Class 038
PROVIDING SECURE, GENERAL-PURPOSE WIRED AND WIRELESS TELECOMMUNICATIONS CONNECTIVITY FOR TRANSFER AND DATA SO THAT COMPUTER SOFTWARE APPLICATIONS AND COMPUTER NETWORK-BASED SERVICES, FILE SHARING SERVICES, E-MAIL SERVICES, AND INTRANET SERVICES CAN BE SECURELY ACCESSED BY A USER CONNECTING REMOTELY TO THE ENTERPRISE SYSTEM LOCAL AREA NETWORK WITH AN END-USER COMPUTER OR MOBILE DEVICE
First Use Anywhere:
0
First Use in Commerce:
0
Class 042
PROVIDING TEMPORARY USE OF A WEB-BASED SOFTWARE APPLICATION FOR OTHERS TO MANAGE, ADMINISTER, MODIFY AND CONTROL THEIR END USERS' SECURE ACCESS TO AN ENTERPRISE SYSTEM THROUGH AN ONLINE PORTAL, THEIR END-USER COMPUTER AND MOBILE DEVICES, NAMELY, LAPTOPS, NOTEBOOKS, SMART PHONES, TABLETS, PDAS, THEIR END USER DATA AND THEIR END USER SOFTWARE APPLICATIONS RUNNING ON THE END-USER COMPUTERS AND MOBILE DEVICES CONNECTING REMOTELY TO ENTERPRISE LOCAL AREA NETWORKS; PROVIDING NON-DOWNLOADABLE COMPUTER APPLICATION SOFTWARE ON A COMPUTER SERVER ACCESSIBLE OVER THE INTERNET THAT ENABLES OTHERS TO MANAGE, ADMINISTER, MODIFY, CONTROL AND GENERATE REPORTS ON THE STATUS OF THEIR END-USER COMPUTER AND MOBILE DEVICES, NAMELY, LAPTOPS, NOTEBOOKS, SMART PHONES, TABLETS, PDAS, THEIR END USER DATA AND THEIR END USER SOFTWARE APPLICATIONS RUNNING ON THE END-USER COMPUTER AND MOBILE DEVICES CONNECTING REMOTELY TO LOCAL AREA NETWORKS, AND THAT ENABLES OTHERS TO SECURELY ACCESS TO THE ENTERPRISE LOCAL AREA NETWORK; PROVIDING TEMPORARY USE OF NON-DOWNLOADABLE INTEGRATION SOFTWARE FOR OTHERS TO MANAGE, ADMINISTER, MODIFY AND CONTROL THEIR END USERS' SECURE ACCESS TO AN ENTERPRISE SYSTEM THROUGH AN ONLINE PORTAL, THEIR END-USER COMPUTER AND MOBILE DEVICES, THEIR END USER DATA AND THEIR END USER SOFTWARE APPLICATIONS RUNNING ON THE END-USER COMPUTER AND MOBILE DEVICES CONNECTING REMOTELY TO ENTERPRISE LOCAL AREA NETWORKS
First Use Anywhere:
0
First Use in Commerce:
0
Additional Information
Pseudo Mark
MCM 360
Classification
International Classes
009
038
042