Legal Representation
Attorney
Matthew H. Swyers
USPTO Deadlines
Application History
15 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Oct 6, 2016 | MAB2 | O | ABANDONMENT NOTICE MAILED - FAILURE TO RESPOND | Loading... |
| Oct 6, 2016 | ABN2 | O | ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE | Loading... |
| Mar 2, 2016 | GNFN | O | NOTIFICATION OF FINAL REFUSAL EMAILED | Loading... |
| Mar 2, 2016 | GNFR | O | FINAL REFUSAL E-MAILED | Loading... |
| Mar 2, 2016 | CNFR | R | FINAL REFUSAL WRITTEN | Loading... |
| Feb 25, 2016 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| Feb 25, 2016 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Feb 25, 2016 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
| Sep 26, 2015 | GPRN | O | NOTIFICATION OF PRIORITY ACTION E-MAILED | Loading... |
| Sep 26, 2015 | GPRA | F | PRIORITY ACTION E-MAILED | Loading... |
| Sep 26, 2015 | CPRA | R | PRIORITY ACTION WRITTEN | Loading... |
| Sep 21, 2015 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Sep 2, 2015 | MPMK | E | NOTICE OF PSEUDO MARK E-MAILED | Loading... |
| Sep 1, 2015 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| Sep 1, 2015 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
Computer software platforms for monitoring the Internet for indicators of potential network compromise or unsanctioned activities indicative of a breach, and that alerts network users to potential security threats and blocks potential threats online, and for packet modification, for users of computer networks, and a point-in-time targeted threat intelligence product and service delivered on a one-time basis; provides notices and alerts, for use in the field of cyber defense by users of computer networks
First Use Anywhere:
Jul 6, 2015
First Use in Commerce:
Jul 6, 2015
Class 042
Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer virus protection services; Consulting services in the field of software as a service (SAAS); Design and development of electronic data security systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Platform as a service (PAAS) featuring computer software platforms for computer network security
First Use Anywhere:
Jul 6, 2015
First Use in Commerce:
Jul 6, 2015
Additional Information
Pseudo Mark
BITVOYANT SNAP SHOT
Classification
International Classes
009
042
Disclaimers
The following terms have been disclaimed and are not claimed as part of the trademark:
General Disclaimer
"SNAPSHOT"