Legal Representation
Attorney
Michael J. Bevilacqua,
USPTO Deadlines
Application History
23 eventsDate | Code | Type | Description | Documents |
---|---|---|---|---|
Dec 3, 2018 | ABN2 | O | ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE | Loading... |
Dec 3, 2018 | MAB2 | O | ABANDONMENT NOTICE MAILED - FAILURE TO RESPOND | Loading... |
May 4, 2018 | CNFR | R | FINAL REFUSAL WRITTEN | Loading... |
May 4, 2018 | GNFR | O | FINAL REFUSAL E-MAILED | Loading... |
May 4, 2018 | GNFN | O | NOTIFICATION OF FINAL REFUSAL EMAILED | Loading... |
Jan 30, 2018 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
Jan 29, 2018 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
Jan 29, 2018 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Jul 27, 2017 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
Jul 27, 2017 | GNRT | O | NON-FINAL ACTION E-MAILED | Loading... |
Jul 27, 2017 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
Jul 3, 2017 | ZZZX | Z | PREVIOUS ALLOWANCE COUNT WITHDRAWN | Loading... |
Jun 20, 2017 | PBCR | Z | WITHDRAWN FROM PUB - OG REVIEW QUERY | Loading... |
Jun 1, 2017 | CNSA | P | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... |
May 26, 2017 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
May 25, 2017 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
May 25, 2017 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Feb 21, 2017 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
Feb 21, 2017 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
Feb 21, 2017 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
Feb 13, 2017 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
Nov 8, 2016 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Nov 8, 2016 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
Detailed Classifications
Class 045
Remote security monitoring services in the nature of providing real-time threat assessment, detection, and updates of unlawful activity, behavioral modelling of network systems for tracking network security threats, electronic data analytics, namely, analyzing data in computer databases for unlawful activity, and generating proactive incident responses in connection with all of the foregoing; providing cybersecurity consulting and threat assessments
First Use Anywhere:
0
First Use in Commerce:
0
Classification
International Classes
045
Disclaimers
The following terms have been disclaimed and are not claimed as part of the trademark:
General Disclaimer
"DEFENSE"