Legal Representation
Attorney
William H. Dippert
USPTO Deadlines
Application History
30 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Jul 1, 2019 | MAB2 | E | ABANDONMENT NOTICE E-MAILED - FAILURE TO RESPOND | Loading... |
| Jul 1, 2019 | ABN2 | O | ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE | Loading... |
| Nov 26, 2018 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Nov 26, 2018 | GNRT | O | NON-FINAL ACTION E-MAILED | Loading... |
| Nov 26, 2018 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Nov 6, 2018 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| Nov 5, 2018 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Nov 5, 2018 | ERFR | I | TEAS REQUEST FOR RECONSIDERATION RECEIVED | Loading... |
| Nov 2, 2018 | IUAF | S | USE AMENDMENT FILED | Loading... |
| Nov 2, 2018 | AUPC | I | AMENDMENT TO USE PROCESSING COMPLETE | Loading... |
| Nov 1, 2018 | EAAU | I | TEAS AMENDMENT OF USE RECEIVED | Loading... |
| May 3, 2018 | GNFN | O | NOTIFICATION OF FINAL REFUSAL EMAILED | Loading... |
| May 3, 2018 | GNFR | O | FINAL REFUSAL E-MAILED | Loading... |
| May 3, 2018 | CNFR | R | FINAL REFUSAL WRITTEN | Loading... |
| Apr 26, 2018 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| Apr 25, 2018 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Apr 25, 2018 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
| Oct 25, 2017 | GNRT | O | NON-FINAL ACTION E-MAILED | Loading... |
| Oct 25, 2017 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Oct 25, 2017 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Oct 17, 2017 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Oct 17, 2017 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| Oct 12, 2017 | ALIE | A | ASSIGNED TO LIE | Loading... |
| Sep 29, 2017 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
| Mar 29, 2017 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Mar 29, 2017 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
| Mar 29, 2017 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Mar 24, 2017 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Jan 9, 2017 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| Dec 30, 2016 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
Cyber security systems, namely, information security systems comprised of computer software and software for mobile devices for detecting cyberattacks in computer networks; Cyber security systems, namely, monitoring and controlling systems for computing systems comprised of computer software and software for mobile devices for detecting cyberattacks in computer networks and computer software and hardware for controlling computer problems and managing, automating, and monitoring information security; Cyber security systems, namely, encryption systems comprised of computer software and software for mobile devices for encrypting data, encrypting information; Cyber security systems, namely, vulnerability and exploit assessment systems comprised of computer software and software for mobile devices for testing computer system vulnerabilities; Cyber security systems, comprised of software for conducting penetration tests in the nature of locating vulnerabilities of a computer system or computer network; Cyber security systems, namely, automatic systems of artificial intelligence comprised of computer software and hardware for monitoring and blocking unusual computer activity and for controlling computer problems and managing, automating, monitoring information security; Cyber security systems, namely, artificial intelligence systems comprised of computer hardware and software risk management and risk assessment systems comprised of computer software and software for mobile devices for testing computer systems for vulnerability to cyberattacks; Cyber security systems comprised of firewall software, anti-virus software, and systems comprising software and computer hardware for monitoring and blocking unusual computer and software activity, and systems comprising computer hardware and software for events monitoring, hardening and scanning systems for computers and computer networks; fingerprint scanners; computer operating systems
First Use Anywhere:
Mar 2, 2015
First Use in Commerce:
Jun 15, 2018
Classification
International Classes
009