Legal Representation
Attorney
Tracy-Gene G. Durkin
USPTO Deadlines
Next Deadline
In Grace Period
Section 8 Declaration Due (Principal Register) (Based on registration date 20191217)
Due Date
December 17, 2025
Grace Period Ends
June 17, 2026
Additional deadlines exist. Contact your attorney for complete deadline information.
Application History
31 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Sep 26, 2025 | E815 | I | TEAS SECTION 8 & 15 RECEIVED | Loading... |
| Dec 17, 2024 | REM1 | E | COURTESY REMINDER - SEC. 8 (6-YR) E-MAILED | Loading... |
| Dec 17, 2019 | R.PR | A | REGISTERED-PRINCIPAL REGISTER | Loading... |
| Nov 13, 2019 | SUNA | E | NOTICE OF ACCEPTANCE OF STATEMENT OF USE E-MAILED | Loading... |
| Nov 12, 2019 | CNPR | P | ALLOWED PRINCIPAL REGISTER - SOU ACCEPTED | Loading... |
| Nov 8, 2019 | SUPC | I | STATEMENT OF USE PROCESSING COMPLETE | Loading... |
| Oct 27, 2019 | IUAF | S | USE AMENDMENT FILED | Loading... |
| Nov 8, 2019 | AITU | A | CASE ASSIGNED TO INTENT TO USE PARALEGAL | Loading... |
| Oct 27, 2019 | EISU | I | TEAS STATEMENT OF USE RECEIVED | Loading... |
| May 2, 2019 | EXRA | E | NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED | Loading... |
| Apr 30, 2019 | EX1G | S | SOU EXTENSION 1 GRANTED | Loading... |
| Apr 30, 2019 | EXT1 | S | SOU EXTENSION 1 FILED | Loading... |
| Apr 30, 2019 | EEXT | I | SOU TEAS EXTENSION RECEIVED | Loading... |
| Oct 30, 2018 | NOAM | E | NOA E-MAILED - SOU REQUIRED FROM APPLICANT | Loading... |
| Sep 4, 2018 | NPUB | E | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | Loading... |
| Sep 4, 2018 | PUBO | A | PUBLISHED FOR OPPOSITION | Loading... |
| Aug 15, 2018 | NONP | E | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | Loading... |
| Jul 25, 2018 | CNSA | P | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... |
| Jul 25, 2018 | XAEC | I | EXAMINER'S AMENDMENT ENTERED | Loading... |
| Jul 25, 2018 | GNEN | O | NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED | Loading... |
| Jul 25, 2018 | GNEA | O | EXAMINERS AMENDMENT E-MAILED | Loading... |
| Jul 25, 2018 | CNEA | R | EXAMINERS AMENDMENT -WRITTEN | Loading... |
| Jul 24, 2018 | TCCA | I | TEAS CHANGE OF CORRESPONDENCE RECEIVED | Loading... |
| Jul 24, 2018 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| Jul 24, 2018 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Jul 24, 2018 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
| Jan 24, 2018 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Jan 24, 2018 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
| Jan 24, 2018 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Jan 23, 2018 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Oct 25, 2017 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
Detailed Classifications
Class 042
Providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise and preparing related reports and technical documentation; providing information on the tactics and techniques employed by adversaries to exploit or compromise, operate within, and cause impacts to computer networks across all industries; providing a website featuring technology that allows users to describe the actions an adversary might take while operating within an enterprise network for the purpose of characterizing and describing post-compromise adversary behavior; providing information and advice to assist in developing computer and network system detection defenses for compromise, pre-, and post-compromise; providing information and advice to assist in network defense and to assist in prioritizing computer network defense by detailing compromise, pre-, and post-compromise tactics, techniques, and procedures used by adversaries to execute their objectives; providing information and advice to assist in adversary emulation and red teaming to test and measure the effectiveness of computer network defenses; computer security consultation, namely, providing a collection of information on the tactics and techniques employed by cyber adversaries; computer security consultation, namely, providing a collection of information characterizing the post-compromise activities of cyber adversaries to describe what might occur during an intrusion after an adversary has acquired access to a computer network; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in technologies and applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these systems and preparing related reports and technical documentation; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in applications including mobile devices, enterprise networks, medical devices, embedded devices, network devices, cloud systems, control systems, and the connections between these systems and preparing related reports and technical documentation
First Use Anywhere:
20150500
First Use in Commerce:
20150500
Additional Information
Pseudo Mark
MITRE ATT AND CK; MITRE ATTACK
Classification
International Classes
042