Legal Representation
Attorney
Thomas G. Berry
USPTO Deadlines
Application History
17 eventsDate | Code | Type | Description | Documents |
---|---|---|---|---|
Apr 17, 2017 | ABN2 | O | ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE | Loading... |
Apr 17, 2017 | MAB2 | O | ABANDONMENT NOTICE MAILED - FAILURE TO RESPOND | Loading... |
Oct 19, 2016 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
Sep 19, 2016 | CNFR | R | FINAL REFUSAL WRITTEN | Loading... |
Sep 19, 2016 | GNFR | O | FINAL REFUSAL E-MAILED | Loading... |
Sep 19, 2016 | GNFN | O | NOTIFICATION OF FINAL REFUSAL EMAILED | Loading... |
Aug 27, 2016 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
Aug 26, 2016 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
Aug 26, 2016 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Aug 26, 2016 | TCCA | I | TEAS CHANGE OF CORRESPONDENCE RECEIVED | Loading... |
Aug 26, 2016 | TCCA | I | TEAS CHANGE OF CORRESPONDENCE RECEIVED | Loading... |
Feb 26, 2016 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
Feb 26, 2016 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
Feb 26, 2016 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
Feb 21, 2016 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
Nov 4, 2015 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
Nov 3, 2015 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
Computer software and hardware, namely, software and hardware for centralized identification, acquisition, storage, encryption, management, manipulation, joining, analysis and reporting of computer data, computer network data, mobile device data, metadata, files, information and security breach incidents, as well as collection, analysis and monitoring of network traffic, for use in fields of cybersecurity, analytics, computer forensics, e-discovery and litigation; computer software and hardware for detecting, reporting, analyzing and eliminating cyber incidents, such as malware, unauthorized software and network attacks; computer software and hardware system for identification, acquisition, storage, encryption, management, manipulation, analysis and reporting of computer data and computer network data, metadata, files, information and security breach incidents, for use in security and system intrusion assessment, investigation of damage to or unauthorized use of computer data and files, diagnostics, forensic data investigation, electronic evidence discovery and business loss valuation; computer hardware and software for creating searchable databases of information and data and managing storage devices in a networked environment; computer hardware and downloadable software for litigation support, namely, collecting, storing, sharing, reviewing, searching, managing, categorizing and coding documents
First Use Anywhere:
Mar 31, 2006
First Use in Commerce:
Mar 31, 2006
Classification
International Classes
009