ATTACK PATH SCENARIO

Serial Number 87281557
602

Registration Progress

Application Filed
Dec 27, 2016
Under Examination
Approved for Publication
Published for Opposition
Registered

Trademark Image

ATTACK PATH SCENARIO

Basic Information

Serial Number
87281557
Filing Date
December 27, 2016
Abandonment Date
May 28, 2019
Drawing Code
4

Status Summary

Current Status
Inactive
Status Code
602
Status Date
Jul 1, 2019
Classes
009

Rights Holder

Cronus Cyber Technologies ltd.

16
Address
10 Markoni Street
Haifa 32951
IL

Ownership History

Cronus Cyber Technologies ltd.

Original Applicant
16
Haifa IL

Legal Representation

Attorney
William H. Dippert

USPTO Deadlines

All Deadlines Cleared

All 6 deadline(s) have been cleared by subsequent events. No active deadlines at this time.

Application History

30 events
Date Code Type Description Documents
Jul 1, 2019 MAB2 E ABANDONMENT NOTICE E-MAILED - FAILURE TO RESPOND Loading...
Jul 1, 2019 ABN2 O ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE Loading...
Nov 26, 2018 GNRN O NOTIFICATION OF NON-FINAL ACTION E-MAILED Loading...
Nov 26, 2018 GNRT O NON-FINAL ACTION E-MAILED Loading...
Nov 26, 2018 CNRT R NON-FINAL ACTION WRITTEN Loading...
Nov 6, 2018 TEME I TEAS/EMAIL CORRESPONDENCE ENTERED Loading...
Nov 5, 2018 CRFA I CORRESPONDENCE RECEIVED IN LAW OFFICE Loading...
Nov 5, 2018 ERFR I TEAS REQUEST FOR RECONSIDERATION RECEIVED Loading...
Nov 2, 2018 IUAF S USE AMENDMENT FILED Loading...
Nov 2, 2018 AUPC I AMENDMENT TO USE PROCESSING COMPLETE Loading...
Nov 1, 2018 EAAU I TEAS AMENDMENT OF USE RECEIVED Loading...
May 3, 2018 GNFN O NOTIFICATION OF FINAL REFUSAL EMAILED Loading...
May 3, 2018 GNFR O FINAL REFUSAL E-MAILED Loading...
May 3, 2018 CNFR R FINAL REFUSAL WRITTEN Loading...
Apr 26, 2018 TEME I TEAS/EMAIL CORRESPONDENCE ENTERED Loading...
Apr 25, 2018 CRFA I CORRESPONDENCE RECEIVED IN LAW OFFICE Loading...
Apr 25, 2018 TROA I TEAS RESPONSE TO OFFICE ACTION RECEIVED Loading...
Oct 25, 2017 GNRT O NON-FINAL ACTION E-MAILED Loading...
Oct 25, 2017 GNRN O NOTIFICATION OF NON-FINAL ACTION E-MAILED Loading...
Oct 25, 2017 CNRT R NON-FINAL ACTION WRITTEN Loading...
Oct 17, 2017 CRFA I CORRESPONDENCE RECEIVED IN LAW OFFICE Loading...
Oct 17, 2017 TEME I TEAS/EMAIL CORRESPONDENCE ENTERED Loading...
Oct 12, 2017 ALIE A ASSIGNED TO LIE Loading...
Sep 29, 2017 TROA I TEAS RESPONSE TO OFFICE ACTION RECEIVED Loading...
Mar 29, 2017 CNRT R NON-FINAL ACTION WRITTEN Loading...
Mar 29, 2017 GNRT F NON-FINAL ACTION E-MAILED Loading...
Mar 29, 2017 GNRN O NOTIFICATION OF NON-FINAL ACTION E-MAILED Loading...
Mar 24, 2017 DOCK D ASSIGNED TO EXAMINER Loading...
Jan 9, 2017 NWOS I NEW APPLICATION OFFICE SUPPLIED DATA ENTERED Loading...
Dec 30, 2016 NWAP I NEW APPLICATION ENTERED Loading...

Detailed Classifications

Class 009
Cyber security systems, namely, information security systems comprised of computer software and software for mobile devices for detecting cyberattacks in computer networks; Cyber security systems, namely, monitoring and controlling systems for computing systems comprised of computer software and software for mobile devices for detecting cyberattacks in computer networks and computer software and hardware for controlling computer problems and managing, automating, and monitoring information security; Cyber security systems, namely, encryption systems comprised of computer software and software for mobile devices for encrypting data, encrypting information; Cyber security systems, namely, vulnerability and exploit assessment systems comprised of computer software and software for mobile devices for testing computer system vulnerabilities; Cyber security systems, comprised of software for conducting penetration tests in the nature of locating vulnerabilities of a computer system or computer network; Cyber security systems, namely, automatic systems of artificial intelligence comprised of computer software and hardware for monitoring and blocking unusual computer activity and for controlling computer problems and managing, automating, monitoring information security; Cyber security systems, namely, artificial intelligence systems comprised of computer hardware and software risk management and risk assessment systems comprised of computer software and software for mobile devices for testing computer systems for vulnerability to cyberattacks; Cyber security systems comprised of firewall software, anti-virus software, and systems comprising software and computer hardware for monitoring and blocking unusual computer and software activity, and systems comprising computer hardware and software for events monitoring, hardening and scanning systems for computers and computer networks; fingerprint scanners; computer operating systems
First Use Anywhere: Mar 2, 2015
First Use in Commerce: Jun 15, 2018

Classification

International Classes
009