Legal Representation
Attorney
Jessica Bradley
USPTO Deadlines
Application History
16 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Jul 3, 2018 | MAB2 | O | ABANDONMENT NOTICE MAILED - FAILURE TO RESPOND | Loading... |
| Jul 3, 2018 | ABN2 | O | ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE | Loading... |
| Jul 3, 2018 | ZZZX | Z | PREVIOUS ALLOWANCE COUNT WITHDRAWN | Loading... |
| Jul 3, 2018 | CNSA | P | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... |
| Dec 5, 2017 | GNFN | O | NOTIFICATION OF FINAL REFUSAL EMAILED | Loading... |
| Dec 5, 2017 | GNFR | O | FINAL REFUSAL E-MAILED | Loading... |
| Dec 5, 2017 | CNFR | R | FINAL REFUSAL WRITTEN | Loading... |
| Oct 23, 2017 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| Oct 22, 2017 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Oct 22, 2017 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
| Apr 24, 2017 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Apr 24, 2017 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
| Apr 24, 2017 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Apr 18, 2017 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Jan 27, 2017 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| Jan 26, 2017 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 042
Providing a website featuring temporary use of on-line non-downloadable computer software for the detection of Internet threats, espionage and attacks, and for providing secure transmission of communications, data, sound and images via computer networks, the Internet, and Internet cloud computing; computer security consultancy in the field of risk assessment and information security, computer consultation in the field of computer security and internet security, and computer security consultancy in the field of cyber threat analysis, threat intelligence, security operations and incident response; providing temporary use of non-downloadable hosted computer software for the detection of Internet threats, espionage and attacks, and for providing secure transmission of communications, data, sound and images via computer networks, the Internet, and Internet cloud computing
First Use Anywhere:
0
First Use in Commerce:
0
Classification
International Classes
042