Legal Representation
Attorney
Joi A. White
USPTO Deadlines
Application History
24 eventsDate | Code | Type | Description | Documents |
---|---|---|---|---|
Sep 21, 2020 | MAB6 | E | ABANDONMENT NOTICE E-MAILED - NO USE STATEMENT FILED | Loading... |
Sep 21, 2020 | ABN6 | S | ABANDONMENT - NO USE STATEMENT FILED | Loading... |
Feb 18, 2020 | NOAM | E | NOA E-MAILED - SOU REQUIRED FROM APPLICANT | Loading... |
Dec 24, 2019 | NPUB | E | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | Loading... |
Dec 24, 2019 | PUBO | A | PUBLISHED FOR OPPOSITION | Loading... |
Dec 4, 2019 | NONP | E | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | Loading... |
Nov 18, 2019 | ALIE | A | ASSIGNED TO LIE | Loading... |
Nov 14, 2019 | CNSA | P | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... |
Oct 26, 2019 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
Oct 25, 2019 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Oct 25, 2019 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
Jul 25, 2019 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
Apr 28, 2019 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
Apr 28, 2019 | GNRT | O | NON-FINAL ACTION E-MAILED | Loading... |
Apr 28, 2019 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
Mar 2, 2019 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
Mar 1, 2019 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Mar 1, 2019 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
Jan 17, 2019 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
Jan 17, 2019 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
Jan 17, 2019 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
Dec 23, 2018 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
Dec 17, 2018 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
Dec 1, 2018 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
computer security software; computer software for use in the development and deployment of other computer software, applications, and container instances; computer software for runtime application self-protection (RASP); computer software for securing web applications, web application users, and network-based servers; computer software for monitoring, detecting, and responding to malicious inputs and attempted security exploits; computer software for viewing and analyzing security event data related to web applications, web application users, and network-based servers; computer software for monitoring the operation, activity, and status of other computer software; computer software providing application programming interfaces (APIs) for securing web applications, web application users, and network-based servers; computer software providing application programming interfaces (APIs) for viewing, analyzing and reporting security event data related to web applications, web application users, and network-based servers
Class 042
computer security services, namely, restricting unauthorized access to computer networks; computer security services, namely, providing temporary use of non-downloadable computer security software; providing temporary use of non-downloadable computer software for use in the development and deployment of other computer software, applications, and container instances; providing temporary use of non-downloadable computer software for runtime application self-protection (RASP); providing temporary use of non-downloadable computer software for securing web applications, web application users, and network-based servers; providing temporary use of non-downloadable computer software for monitoring, detecting, and responding to malicious inputs and attempted security exploits; providing temporary use of non-downloadable computer software for viewing and analyzing security event data related to web applications, web application users, and network-based servers; providing temporary use of non-downloadable computer software for monitoring the operation, activity, and status of other computer software; providing temporary use of non-downloadable computer software, namely, providing application programming interfaces (APIs) via cloud-based software for securing web applications, web application users, and network-based servers; providing temporary use of non-downloadable computer software, namely, application programming interfaces (APIs) via cloud-based software for viewing, analyzing and reporting security event data related to web applications, web application users, and network-based servers
Additional Information
Pseudo Mark
DEEP SECURITY APPLICATION PROTECT
Classification
International Classes
009
042
Disclaimers
The following terms have been disclaimed and are not claimed as part of the trademark:
Specific Disclaimer
"SECURITY APP PROTECT"