Legal Representation
Attorney
Matthew H. Swyers
USPTO Deadlines
Application History
14 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Oct 6, 2016 | MAB2 | O | ABANDONMENT NOTICE MAILED - FAILURE TO RESPOND | Loading... |
| Oct 6, 2016 | ABN2 | O | ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE | Loading... |
| Mar 2, 2016 | GNFN | O | NOTIFICATION OF FINAL REFUSAL EMAILED | Loading... |
| Mar 2, 2016 | GNFR | O | FINAL REFUSAL E-MAILED | Loading... |
| Mar 2, 2016 | CNFR | R | FINAL REFUSAL WRITTEN | Loading... |
| Feb 25, 2016 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| Feb 25, 2016 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Feb 25, 2016 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
| Sep 26, 2015 | GPRN | O | NOTIFICATION OF PRIORITY ACTION E-MAILED | Loading... |
| Sep 26, 2015 | GPRA | F | PRIORITY ACTION E-MAILED | Loading... |
| Sep 26, 2015 | CPRA | R | PRIORITY ACTION WRITTEN | Loading... |
| Sep 21, 2015 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Sep 1, 2015 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| Sep 1, 2015 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
Computer software platforms for monitoring the Internet for indicators of potential network compromise or unsanctioned activities indicative of a breach, and that alerts network users to potential security threats and blocks potential threats online, and for packet modification, for users of computer networks, and a continuous targeted threat intelligence product and service delivered on a recurring basis; provides notices and alerts, for use in the field of cyber defense by users of computer networks
First Use Anywhere:
Jul 6, 2015
First Use in Commerce:
Jul 6, 2015
Class 042
Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer virus protection services; Consulting services in the field of software as a service (SAAS); Design and development of electronic data security systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Platform as a service (PAAS) for monitoring the Internet for indicators of potential network compromise or unsanctioned activities indicative of a breach, and that alerts network users to potential security threats and blocks potential threats online, and for packet modification, for users of computer networks, and a continuous targeted threat intelligence product and service delivered on a recurring basis; provides notices and alerts, for use in the field of computer network security
First Use Anywhere:
Jul 6, 2015
First Use in Commerce:
Jul 6, 2015
Classification
International Classes
009
042