Legal Representation
Attorney
Howard F. Mandelbaum
USPTO Deadlines
Application History
10 eventsDate | Code | Type | Description | Documents |
---|---|---|---|---|
Jun 2, 2020 | ABN2 | O | ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE | Loading... |
Jun 2, 2020 | MAB2 | O | ABANDONMENT NOTICE MAILED - FAILURE TO RESPOND | Loading... |
Jun 2, 2020 | MAB2 | E | ABANDONMENT NOTICE E-MAILED - FAILURE TO RESPOND | Loading... |
Oct 1, 2019 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
Oct 1, 2019 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
Oct 1, 2019 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
Sep 24, 2019 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
Jul 17, 2019 | MDSC | E | NOTICE OF DESIGN SEARCH CODE E-MAILED | Loading... |
Jul 16, 2019 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
Jul 11, 2019 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
security software, namely, anti-malware, anti-phishing, and anti-hacking software, security and antivirus software for use in detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer networks, and mobile devices; Computer and network security software for identifying, managing and resolving cyber security incidents, data breaches and malware; computer software for use in computer security, namely, end-point control, device management, malware detection and response, threat detection and response, virus detection and response
First Use Anywhere:
0
First Use in Commerce:
0
Class 042
non-downloadable security software, namely, anti-malware, anti-phishing, and anti-hacking software, non-downloadable security and antivirus software for use in detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer networks, and mobile devices; non-downloadable computer and network security software for identifying, managing and resolving cyber security incidents, data breaches and malware; non-downloadable computer software for use in computer security, namely, end-point control, device management, malware detection and response, threat detection and response, virus detection and response
First Use Anywhere:
0
First Use in Commerce:
0
Additional Information
Design Mark
The mark consists of an outline of the face of a person, there being two concentric arcs, the outer one having spaces, which meet at their ends forming a head covering, two vertical parallel lines extending between the head and head covering, and a broken arc below the person with two inwardly extending short lines.
Color Claim
Color is not claimed as a feature of the mark.
Classification
International Classes
009
042