Legal Representation
Attorney
Anne H. Peck
USPTO Deadlines
Application History
9 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| May 30, 2019 | MAB1 | E | ABANDONMENT NOTICE E-MAILED - EXPRESS ABANDONMENT | Loading... |
| May 30, 2019 | ABN1 | O | ABANDONMENT - EXPRESS MAILED | Loading... |
| May 29, 2019 | EXAR | I | TEAS EXPRESS ABANDONMENT RECEIVED | Loading... |
| Feb 28, 2019 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Feb 28, 2019 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
| Feb 28, 2019 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Feb 25, 2019 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Dec 11, 2018 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| Nov 24, 2018 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 042
Software as Service (SAAS) services featuring software to implement a standard architecture as a platform for integration of security operations and network access control; computer software for network access control; Software as Service (SAAS) services featuring software for network security, system security, file security, user security, and data security; Software as Service (SAAS) services featuring software for management and monitoring of computer networks, systems, files, users, and data; Software as Service (SAAS) services featuring software for detection, analysis, reporting, and restoration of changes to computer networks, systems, applications, files, users, and data; Software as Service (SAAS) services featuring software for managing and optimizing hardware and software in an information technology environment; Software as Service (SAAS) services featuring software for monitoring and improving the security of, and detecting and protecting against cyber-attacks and threats directed at, computers, computer systems, networks, hardware, software applications, digital devices, digital data, users, and mobile devices; Software as Service (SAAS) services featuring software for policy monitoring, management, orchestration, action, response, and adherence for protecting against cyber-attacks and threats; Software as Service (SAAS) services featuring software for identity management information security; Software as Service (SAAS) services featuring software for maintaining access control and identity management for protecting against cyber-attacks and threats; Software as Service (SAAS) services featuring software for maintaining appropriate risk, audit and compliance posture for protecting against cyber-attacks and threats; Software as Service (SAAS) services featuring software for implementing zero-trust networks and managing boundaries for network users, systems, and processes for protecting against cyber-attacks and threats; technical support services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; Computer software development in the field of cyber security
Classification
International Classes
042