Legal Representation
Attorney
Howard F. Mandelbaum
USPTO Deadlines
Application History
9 eventsDate | Code | Type | Description | Documents |
---|---|---|---|---|
Apr 13, 2020 | ABN2 | O | ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE | Loading... |
Apr 13, 2020 | MAB2 | O | ABANDONMENT NOTICE MAILED - FAILURE TO RESPOND | Loading... |
Apr 13, 2020 | MAB2 | E | ABANDONMENT NOTICE E-MAILED - FAILURE TO RESPOND | Loading... |
Sep 25, 2019 | CPRA | R | PRIORITY ACTION WRITTEN | Loading... |
Sep 25, 2019 | GPRA | F | PRIORITY ACTION E-MAILED | Loading... |
Sep 25, 2019 | GPRN | O | NOTIFICATION OF PRIORITY ACTION E-MAILED | Loading... |
Sep 24, 2019 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
Jul 16, 2019 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
Jul 11, 2019 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
security software, namely, anti-malware, anti-phishing, and anti-hacking software, security and antivirus software for use in detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer networks, and mobile devices; computer and network security software for identifying, managing and resolving cyber security incidents, data breaches and malware; Downloadable computer software for use in computer security, namely, end-point control, device management, malware detection and response, threat detection and response, virus detection and response; honeypots, namely, computer software for setting traps to detect, deflect, and/or counteract attempts of unauthorized use of information systems; downloadable privileged access management computer software for use in controlling, monitoring and managing user access to computer systems and software, computer software for managing and securing passwords and sensitive information; computer software for managing software encryption keys; computer software for managing digital public key identity certificates that allow secure exchange of data over the Internet; software for blocking detected phishing sites in email links and web browsing; Downloadable computer software for use in initiating, monitoring and recording privileged sessions between users and computer hardware and software systems, initiating privileged sessions between users and computer hardware and software systems without revealing passwords to the end user, and recording usage of administrative and privileged accounts and activities performed by users during privileged sessions and including a playback feature of such recordings
First Use Anywhere:
0
First Use in Commerce:
0
Class 042
non-downloadable security software, namely, anti-malware, anti-phishing, and anti-hacking software, non-downloadable security and antivirus software for use in detecting, protecting against, and blocking attacks on and unauthorized access to computers, computer networks, and mobile devices; non-downloadable computer and network security software for identifying, managing and resolving cyber security incidents, data breaches and malware; non-downloadable computer software for use in computer security, namely, end-point control, device management, malware detection and response, threat detection and response, virus detection and response; non-downloadable training simulation software in the field of analyzing, detecting and preventing digital and online threats consisting of computer virus, malware and phishing attacks
First Use Anywhere:
0
First Use in Commerce:
0
Additional Information
Pseudo Mark
CYBER DOME
Classification
International Classes
009
042