Legal Representation
Attorney
Lucy Soyinka
USPTO Deadlines
Next Deadline
459 days remaining
Section 8 & 9 (10-Year) Renewal Due (Based on registration date 2016-11-01)
Due Date
November 01, 2026
Grace Period Ends
May 01, 2027
Application History
27 eventsDate | Code | Type | Description | Documents |
---|---|---|---|---|
May 10, 2023 | NA85 | E | NOTICE OF ACCEPTANCE OF SEC. 8 & 15 - E-MAILED | Loading... |
May 10, 2023 | C15A | O | REGISTERED - SEC. 8 (6-YR) ACCEPTED & SEC. 15 ACK. | Loading... |
May 10, 2023 | APRE | A | CASE ASSIGNED TO POST REGISTRATION PARALEGAL | Loading... |
Oct 31, 2022 | E815 | I | TEAS SECTION 8 & 15 RECEIVED | Loading... |
Nov 1, 2021 | REM1 | E | COURTESY REMINDER - SEC. 8 (6-YR) E-MAILED | Loading... |
Nov 1, 2016 | R.PR | A | REGISTERED-PRINCIPAL REGISTER | Loading... |
Sep 24, 2016 | SUNA | E | NOTICE OF ACCEPTANCE OF STATEMENT OF USE E-MAILED | Loading... |
Sep 23, 2016 | CNPR | P | ALLOWED PRINCIPAL REGISTER - SOU ACCEPTED | Loading... |
Sep 21, 2016 | SUPC | I | STATEMENT OF USE PROCESSING COMPLETE | Loading... |
Sep 21, 2016 | AITU | A | CASE ASSIGNED TO INTENT TO USE PARALEGAL | Loading... |
Aug 30, 2016 | IUAF | S | USE AMENDMENT FILED | Loading... |
Aug 30, 2016 | EISU | I | TEAS STATEMENT OF USE RECEIVED | Loading... |
Jul 19, 2016 | NOAM | E | NOA E-MAILED - SOU REQUIRED FROM APPLICANT | Loading... |
May 24, 2016 | NPUB | E | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | Loading... |
May 24, 2016 | PUBO | A | PUBLISHED FOR OPPOSITION | Loading... |
May 4, 2016 | NONP | E | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | Loading... |
Apr 15, 2016 | CNSA | P | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... |
Apr 14, 2016 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
Apr 13, 2016 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Apr 13, 2016 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
Jan 4, 2016 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
Jan 4, 2016 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
Jan 4, 2016 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
Dec 30, 2015 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
Sep 23, 2015 | MPMK | E | NOTICE OF PSEUDO MARK E-MAILED | Loading... |
Sep 22, 2015 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
Sep 21, 2015 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
Computer software for the detection of known software vulnerabilities residing/hidden within an IT Infrastructure, software or software applications; Computer software for identifying remedial action needed to eliminate detected vulnerabilities in software residing on an IT environment; Computer software for use in computer, data, and mobile device security, namely, software for scanning and detecting known software vulnerabilities residing/hidden within an IT environment, reporting detailed information about the known vulnerabilities and the vulnerabilities' criticality, identifying remedial action necessary to eliminate such vulnerabilities, and prioritizing the order in which the vulnerabilities ought to be eliminated; Computer software for use in cloud security, namely, software for scanning and detecting known software vulnerabilities residing/hidden within an IT environment, reporting detailed information about the known vulnerabilities and the vulnerabilities' criticality, identifying remedial action necessary to eliminate such vulnerabilities, and prioritizing the order in which the vulnerabilities ought to be eliminated; Cybersecurity software, namely, software for detecting known software vulnerabilities residing/hidden within an IT environment, reporting detailed information about the known vulnerabilities and the vulnerabilities' criticality, identifying remedial action necessary to eliminate such vulnerabilities and prioritizing the order in which the vulnerabilities ought to be eliminated; Computer programs for detecting known software vulnerabilities residing/hidden within an IT environment, reporting detailed information about the known vulnerabilities, and the vulnerabilities' criticality, identifying remedial action necessary to eliminate such vulnerabilities, and prioritizing the order in which the vulnerabilities ought to be eliminated; Downloadable reports featuring information regarding cybersecurity; Downloadable reports featuring information regarding computer, data, and mobile device security; Downloadable reports featuring information regarding cloud security; Downloadable reports concerning the detection of software vulnerabilities in an IT environment, information regarding the vulnerabilities and their criticality, the remedial action necessary to eliminate such vulnerabilities, recommendations regarding the order in which to eliminate the vulnerabilities and information regarding potential cyberattacks
First Use Anywhere:
Jul 19, 2016
First Use in Commerce:
Jul 19, 2016
Additional Information
Pseudo Mark
ASSURED SCAN DKV
Classification
International Classes
009