Legal Representation
Attorney
Joi A. White
USPTO Deadlines
Next Deadline
818 days remaining
Section 8 & 9 (10-Year) Renewal Due (Based on registration date 2017-10-24)
Due Date
October 24, 2027
Grace Period Ends
April 24, 2028
Application History
29 eventsDate | Code | Type | Description | Documents |
---|---|---|---|---|
Apr 9, 2024 | APRE | A | CASE ASSIGNED TO POST REGISTRATION PARALEGAL | Loading... |
Apr 9, 2024 | C15A | O | REGISTERED - SEC. 8 (6-YR) ACCEPTED & SEC. 15 ACK. | Loading... |
Apr 9, 2024 | NA85 | E | NOTICE OF ACCEPTANCE OF SEC. 8 & 15 - E-MAILED | Loading... |
Feb 2, 2024 | COAR | I | TEAS CHANGE OF OWNER ADDRESS RECEIVED | Loading... |
Feb 2, 2024 | CHAN | I | APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED | Loading... |
Feb 2, 2024 | REAP | I | TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED | Loading... |
Feb 2, 2024 | ARAA | I | ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED | Loading... |
Feb 2, 2024 | TCCA | I | TEAS CHANGE OF CORRESPONDENCE RECEIVED | Loading... |
Oct 12, 2023 | E815 | I | TEAS SECTION 8 & 15 RECEIVED | Loading... |
Oct 24, 2022 | REM1 | E | COURTESY REMINDER - SEC. 8 (6-YR) E-MAILED | Loading... |
Aug 29, 2022 | REAP | I | TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED | Loading... |
Aug 29, 2022 | ARAA | I | ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED | Loading... |
Aug 29, 2022 | TCCA | I | TEAS CHANGE OF CORRESPONDENCE RECEIVED | Loading... |
Oct 24, 2017 | R.PR | A | REGISTERED-PRINCIPAL REGISTER | Loading... |
Sep 22, 2017 | SUNA | E | NOTICE OF ACCEPTANCE OF STATEMENT OF USE E-MAILED | Loading... |
Sep 21, 2017 | CNPR | P | ALLOWED PRINCIPAL REGISTER - SOU ACCEPTED | Loading... |
Sep 19, 2017 | SUPC | I | STATEMENT OF USE PROCESSING COMPLETE | Loading... |
Sep 18, 2017 | AITU | A | CASE ASSIGNED TO INTENT TO USE PARALEGAL | Loading... |
Sep 1, 2017 | EISU | I | TEAS STATEMENT OF USE RECEIVED | Loading... |
Sep 1, 2017 | IUAF | S | USE AMENDMENT FILED | Loading... |
Aug 22, 2017 | NOAM | E | NOA E-MAILED - SOU REQUIRED FROM APPLICANT | Loading... |
Jun 27, 2017 | PUBO | A | PUBLISHED FOR OPPOSITION | Loading... |
Jun 27, 2017 | NPUB | E | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | Loading... |
Jun 7, 2017 | NONP | E | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | Loading... |
May 15, 2017 | CNSA | P | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... |
May 8, 2017 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
Apr 27, 2017 | MDSM | E | NOTICE OF DESIGN SEARCH CODE E-MAILED | Loading... |
Apr 26, 2017 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
Apr 24, 2017 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 042
Software as a service (SAAS) services featuring software and applications for computer, data and network security; providing temporary use of online non-downloadable computer software and applications for computer, data and network security; software as a service (SAAS) services featuring computer security software, computer antivirus software, computer training software, anti-malware software and anti-ransomware software; providing temporary use of online non-downloadable computer security software, computer antivirus software, computer training software, anti-malware software and anti-ransomware software; software as a service (SAAS) services featuring computer software and applications for simulating and spoofing security threats, security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; providing temporary use of online non-downloadable computer software for simulating and spoofing security threats, security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; software as a service (SAAS) services featuring computer software and applications for reporting, monitoring and analyzing responses to security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; providing temporary use of online non-downloadable computer software and applications for reporting, monitoring and analyzing responses to security vulnerabilities, security attacks and unauthorized access to computers, computer networks, endpoints and mobile devices; software as a service (SAAS) services featuring computer software and applications for educating, training and monitoring users in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities; providing temporary use of online non-downloadable computer software and applications for educating training and monitoring users in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities; software as a service (SAAS) services featuring computer software for raising awareness of unauthorized access to or disclosure of computer data, confidential business information, and digital trade secrets; providing temporary use of online non-downloadable computer software for raising awareness of unauthorized access to or disclosure of computer data, confidential business information, and digital trade secrets; software as a service (SAAS) services featuring computer software for raising awareness of threats to, and security vulnerabilities in, computers, computer networks, endpoints and mobile devices; providing temporary use of online non-downloadable computer software for raising awareness of threats to, and security vulnerabilities in, computers, computer networks, endpoints and mobile devices; software as a service (SAAS) services featuring software and applications for training and education in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities; providing temporary use of online non-downloadable computer software and applications for training and education in the field of cybersecurity, computer, data and network security threats, attacks and vulnerabilities
First Use Anywhere:
May 3, 2017
First Use in Commerce:
May 3, 2017
Additional Information
Design Mark
The mark consists of the stylized wording "PHISHINSIGHT" with the top of the letters for "PHISH" interrupting a straight line that comes to an end at a circle over the "I". A thicker straight line appears above the "G" and "H" and curves down to form the right side of the "H" and curves into a left pointing arrow completing the horizontal elements of the "H" and "G" and piercing the left side of the "G".
Color Claim
Color is not claimed as a feature of the mark.
Pseudo Mark
PHISH INSIGHT
Classification
International Classes
042