Legal Representation
Attorney
Michael J. Bevilacqua,
USPTO Deadlines
Application History
18 eventsDate | Code | Type | Description | Documents |
---|---|---|---|---|
Aug 8, 2018 | MAB3 | O | ABANDONMENT NOTICE MAILED - AFTER EX PARTE APPEAL | Loading... |
Jul 19, 2018 | EXPT | T | EXPARTE APPEAL TERMINATED | Loading... |
Jul 19, 2018 | ABN3 | O | ABANDONMENT - AFTER EX PARTE APPEAL | Loading... |
Jun 7, 2018 | EXFB | T | EXPARTE APPEAL DISMISSED - FAILURE TO FILE BRIEF | Loading... |
Mar 19, 2018 | EXAF | T | EXPARTE APPEAL RECEIVED AT TTAB | Loading... |
Mar 19, 2018 | EXPI | T | EX PARTE APPEAL-INSTITUTED | Loading... |
Sep 19, 2017 | CNFR | R | FINAL REFUSAL WRITTEN | Loading... |
Sep 19, 2017 | GNFR | O | FINAL REFUSAL E-MAILED | Loading... |
Sep 19, 2017 | GNFN | O | NOTIFICATION OF FINAL REFUSAL EMAILED | Loading... |
Jul 31, 2017 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
Jul 31, 2017 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Jul 31, 2017 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
Feb 21, 2017 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
Feb 21, 2017 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
Feb 21, 2017 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
Feb 13, 2017 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
Nov 8, 2016 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Nov 8, 2016 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
Detailed Classifications
Class 009
Computer software, downloadable computer software, mobile device software for use in cybersecurity detection and prevention of malware, intrusions, and other cyber threats, for network defense and for monitoring, assessing and implementing improvements in the security of enterprise data, infrastructure, and networks; computer software, downloadable computer software, mobile device software for use in real-time threat assessment, detection, and updates, behavioral modeling, data analytics and proactive responses; computer software, downloadable computer software, mobile device software for assessing the status of enterprise data, infrastructure, and network traffic, and for identifying and assessing threats to the enterprise data, infrastructure, and network traffic, all for use in cybersecurity consulting, assessments, and training; computer software, downloadable computer software, mobile device software for simulating threats, and possible responses to those threats, to the security of enterprise data, infrastructure and networks, for use in cybersecurity consulting, assessments, and training
First Use Anywhere:
0
First Use in Commerce:
0
Classification
International Classes
009