Legal Representation
Attorney
David R. Schaffer
USPTO Deadlines
Application History
37 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Mar 7, 2022 | MAB6 | E | ABANDONMENT NOTICE E-MAILED - NO USE STATEMENT FILED | Loading... |
| Mar 7, 2022 | ABN6 | S | ABANDONMENT - NO USE STATEMENT FILED | Loading... |
| Aug 5, 2021 | EXRA | E | NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED | Loading... |
| Aug 4, 2021 | EX5G | S | SOU EXTENSION 5 GRANTED | Loading... |
| Jul 29, 2021 | EXT5 | S | SOU EXTENSION 5 FILED | Loading... |
| Aug 4, 2021 | AITU | A | CASE ASSIGNED TO INTENT TO USE PARALEGAL | Loading... |
| Jul 29, 2021 | EEXT | I | SOU TEAS EXTENSION RECEIVED | Loading... |
| Feb 2, 2021 | EXRA | E | NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED | Loading... |
| Jan 29, 2021 | EX4G | S | SOU EXTENSION 4 GRANTED | Loading... |
| Jan 29, 2021 | EXT4 | S | SOU EXTENSION 4 FILED | Loading... |
| Jan 29, 2021 | EEXT | I | SOU TEAS EXTENSION RECEIVED | Loading... |
| Jul 17, 2020 | EXRA | E | NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED | Loading... |
| Jul 15, 2020 | EX3G | S | SOU EXTENSION 3 GRANTED | Loading... |
| Jul 15, 2020 | EXT3 | S | SOU EXTENSION 3 FILED | Loading... |
| Jul 15, 2020 | EEXT | I | SOU TEAS EXTENSION RECEIVED | Loading... |
| Jan 31, 2020 | EXRA | E | NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED | Loading... |
| Jan 29, 2020 | EX2G | S | SOU EXTENSION 2 GRANTED | Loading... |
| Jan 29, 2020 | EXT2 | S | SOU EXTENSION 2 FILED | Loading... |
| Jan 29, 2020 | EEXT | I | SOU TEAS EXTENSION RECEIVED | Loading... |
| Jul 13, 2019 | EXRA | E | NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED | Loading... |
| Jul 11, 2019 | EX1G | S | SOU EXTENSION 1 GRANTED | Loading... |
| Jul 11, 2019 | EXT1 | S | SOU EXTENSION 1 FILED | Loading... |
| Jul 11, 2019 | EEXT | I | SOU TEAS EXTENSION RECEIVED | Loading... |
| Jan 29, 2019 | NOAM | E | NOA E-MAILED - SOU REQUIRED FROM APPLICANT | Loading... |
| Dec 4, 2018 | NPUB | E | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | Loading... |
| Dec 4, 2018 | PUBO | A | PUBLISHED FOR OPPOSITION | Loading... |
| Nov 14, 2018 | NONP | E | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | Loading... |
| Oct 21, 2018 | ALIE | A | ASSIGNED TO LIE | Loading... |
| Oct 5, 2018 | CNSA | P | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... |
| Oct 5, 2018 | XAEC | I | EXAMINER'S AMENDMENT ENTERED | Loading... |
| Oct 5, 2018 | GNEN | O | NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED | Loading... |
| Oct 5, 2018 | GNEA | F | EXAMINERS AMENDMENT E-MAILED | Loading... |
| Oct 5, 2018 | CNEA | R | EXAMINERS AMENDMENT -WRITTEN | Loading... |
| Oct 3, 2018 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Jun 21, 2018 | MDSC | E | NOTICE OF DESIGN SEARCH CODE E-MAILED | Loading... |
| Jun 20, 2018 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| Jun 19, 2018 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
Computer software and downloadable computer software for Information Technology (IT) asset management, namely, cataloging and managing of IT physical and logical business assets and cloud resources; computer software and downloadable computer software for IT risk management, namely, assessing and managing IT risks in context of the business, and presenting risk exposure thereto; computer software and downloadable computer software for IT vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical IT assets through integration into a security tools architecture; computer software and downloadable computer software for IT control management, namely, documenting, assessing, and providing an evidence trail of IT controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure LAN data integration, and organizational enterprise risk management relating to network security, communication security and data security
Class 042
Providing temporary use of non-downloadable software for Information Technology (IT) asset management, namely, cataloging and managing of IT physical and logical business assets and cloud resources; providing temporary use of non-downloadable software for IT risk management, namely, assessing and managing IT risks in context of the business, and presenting risk exposure thereto; providing temporary use of non-downloadable software for IT vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical IT assets through integration into a security tools architecture; providing temporary use of non-downloadable software for IT control management, namely, documenting, assessing, and providing an evidence trail of IT controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure LAN data integration, and organizational enterprise risk management relating to network security, communication security and data security; Software as a service (SAAS) services featuring software for Information Technology (IT) asset management, namely, cataloging and managing of IT physical and logical business assets; Software as a service (SAAS) services featuring software for IT risk management, namely, assessing and managing IT risks in context of the business, and presenting risk exposure thereto; Software as a service (SAAS) services featuring software for IT vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical IT assets through integration into a security tools architecture; Software as a service (SAAS) services featuring software for IT control management, namely, documenting, assessing, and providing an evidence trail of IT controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure LAN data integration, and organizational enterprise risk management relating to network security, communication security and data security
Additional Information
Design Mark
The mark consists of a set of three stacked curved broken lines next to a mirror image set of three stacked curved broken lines positioned above the words "XACTA.IO".
Color Claim
Color is not claimed as a feature of the mark.
Classification
International Classes
009
042