Legal Representation
Attorney
Jeffrey Matson
USPTO Deadlines
Application History
12 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Jul 13, 2015 | MAB2 | O | ABANDONMENT NOTICE MAILED - FAILURE TO RESPOND | Loading... |
| Jul 13, 2015 | ABN2 | O | ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE | Loading... |
| Dec 15, 2014 | CNFR | O | FINAL REFUSAL MAILED | Loading... |
| Dec 12, 2014 | CNFR | R | FINAL REFUSAL WRITTEN | Loading... |
| Nov 14, 2014 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| Nov 14, 2014 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Nov 14, 2014 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
| Sep 23, 2014 | CNRT | F | NON-FINAL ACTION MAILED | Loading... |
| Sep 22, 2014 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Sep 16, 2014 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Jun 17, 2014 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| Jun 7, 2014 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 042
Providing computer network security services and managed security services in the field of computing, namely, providing security analysis, security consulting, security assessment, security program assessment, and vulnerability assessment; computer security consultancy, namely, detecting, analyzing, and providing detailed assessment of and countermeasures against the invasion of intruders into computer networks; computer security services in the nature of incident mitigation and response, namely, detecting, analyzing and responding to the invasion of intruders into computer networks by providing detailed assessment and countermeasures; computer security services in the form of firewall security management, namely, detecting, analyzing, and providing detailed assessment of and countermeasures against firewall intrusion; content security management, namely, detecting, analyzing, and providing detailed assessment of and countermeasures against viruses, spyware, malicious code and malicious content on computer networks; information security management, namely, implementation of systems and procedures to protect the integrity and security of data and information on computer networks; computer security services, namely, network security architecture review and design for information systems, communication systems, telecommunication systems and wireless networks
First Use Anywhere:
May 28, 2011
First Use in Commerce:
May 28, 2011
Class 045
Computer network security and managed security services in the field of computing, namely, firewall monitoring and monitoring of computer systems for security purposes; regulatory compliance and security consultancy in the field of payment card industry (PCI) data security laws and regulations for information systems, communication systems, telecommunication systems and wireless networks; intrusion detection management, namely, providing onsite and remote monitoring of network infrastructure and network activity for security purposes
First Use Anywhere:
May 28, 2011
First Use in Commerce:
May 28, 2011
Classification
International Classes
042
045
Disclaimers
The following terms have been disclaimed and are not claimed as part of the trademark:
General Disclaimer
"SECURE"