Legal Representation
Attorney
Joshua Jarvis, Esq.
USPTO Deadlines
Next Deadline
1045 days remaining
Section 8 (6-Year) Declaration Due (Based on registration date 2022-06-07)
Due Date
June 07, 2028
Grace Period Ends
December 07, 2028
Additional deadlines exist. Contact your attorney for complete deadline information.
Application History
28 eventsDate | Code | Type | Description | Documents |
---|---|---|---|---|
Jun 7, 2022 | R.PR | A | REGISTERED-PRINCIPAL REGISTER | Loading... |
Jun 7, 2022 | NRCC | E | NOTICE OF REGISTRATION CONFIRMATION EMAILED | Loading... |
Mar 22, 2022 | PUBO | A | PUBLISHED FOR OPPOSITION | Loading... |
Mar 22, 2022 | NPUB | E | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | Loading... |
Mar 2, 2022 | NONP | E | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | Loading... |
Feb 17, 2022 | CNSA | O | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... |
Jan 25, 2022 | ERFR | I | TEAS REQUEST FOR RECONSIDERATION RECEIVED | Loading... |
Jan 25, 2022 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Jan 25, 2022 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
Jan 7, 2022 | CNFR | R | FINAL REFUSAL WRITTEN | Loading... |
Jan 7, 2022 | GNFR | O | FINAL REFUSAL E-MAILED | Loading... |
Jan 7, 2022 | GNFN | O | NOTIFICATION OF FINAL REFUSAL EMAILED | Loading... |
Nov 4, 2021 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Nov 4, 2021 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
Nov 3, 2021 | ALIE | A | ASSIGNED TO LIE | Loading... |
Nov 1, 2021 | ERSI | I | TEAS RESPONSE TO SUSPENSION INQUIRY RECEIVED | Loading... |
Aug 13, 2021 | CNSL | R | SUSPENSION LETTER WRITTEN | Loading... |
Aug 13, 2021 | GNSL | S | LETTER OF SUSPENSION E-MAILED | Loading... |
Aug 13, 2021 | GNS3 | O | NOTIFICATION OF LETTER OF SUSPENSION E-MAILED | Loading... |
Jul 12, 2021 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
Jul 12, 2021 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Jul 12, 2021 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
Apr 26, 2021 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
Apr 26, 2021 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
Apr 26, 2021 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
Apr 13, 2021 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
Jan 5, 2021 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
Nov 9, 2020 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
Downloadable computer software for managing access control settings for Information Technology infrastructure; downloadable computer software for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies; downloadable computer software for adaptive risk-based decision making; downloadable computer software for auditing and monitoring computer systems, computer system resources, human and non-human user activity; downloadable computer software for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance; downloadable computer software for monitoring computer systems, networks, software, and cloud environments to ensure proper functioning, detect and prevent unauthorized access, and detect and prevent data breaches; downloadable computer software for providing visibility into permissions and entitlements in computer networks and cloud infrastructure; downloadable computer software for managing network and cloud permissions and detecting, mapping, visualizing, configuring, elevating and reducing of excessive, redundant, hidden, unused and/or misconfigured permissions assigned to computer networks and cloud identities; downloadable computer software for implementing least privilege access across computer networks network and cloud environments; downloadable computer software for utilizing Artificial-Intelligence powered detection and remediation of excessive, redundant, hidden, unused and/or misconfigured permissions across an organization's network and cloud environment; downloadable computer software for integrating with privileged access management solutions and for securing computer networks and cloud resources; downloadable computer manuals for use in connection with downloadable computer software for managing access control settings for Information Technology infrastructure, downloadable computer software for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies, for adaptive risk-based decision making, downloadable computer software for auditing and monitoring computer systems, computer system resources, human and non-human user activity, downloadable computer software for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance, downloadable computer software for monitoring computer systems, networks, software, and cloud environments to ensure proper functioning, detect and prevent unauthorized access, and detect and prevent data breaches, downloadable computer software for providing visibility into permissions and entitlements in computer networks and cloud infrastructure, downloadable computer software for managing network and cloud permissions and detecting, mapping, visualizing, configuring, elevating and reducing of excessive, redundant, hidden, unused and/or misconfigured permissions assigned to computer networks and cloud identities, downloadable computer software for implementing least privilege access across computer networks network and cloud environments, downloadable computer software for utilizing Artificial-Intelligence powered detection and remediation of excessive, redundant, hidden, unused and/or misconfigured permissions across an organization's network and cloud environment, and downloadable computer software for integrating with privileged access management solutions and for securing computer networks and cloud resources
First Use Anywhere:
0
First Use in Commerce:
0
Class 042
Software as a service (SAAS) services featuring software for managing access control settings for Information Technology infrastructure; software as a service (SAAS) services featuring software for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies, for adaptive risk-based decision making; software as a service (SAAS) services featuring software for auditing and monitoring computer systems, computer system resources, human and non-human user activity; software as a service (SAAS) services featuring software for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance; software as a service (SAAS) services featuring software for monitoring computer systems, networks, software, and cloud environments to ensure proper functioning, detect and prevent unauthorized access, and detect and prevent data breaches; software as a service (SAAS) services featuring software for providing visibility into permissions and entitlements in computer networks and cloud infrastructure; software as a service (SAAS) services featuring software for managing network and cloud permissions and detecting, mapping, visualizing, configuring, elevating and reducing of excessive, redundant, hidden, unused and/or misconfigured permissions assigned to computer networks and cloud identities; software as a service (SAAS) services featuring software for implementing least privilege access across computer networks network and cloud environments; software as a service (SAAS) services featuring software for utilizing Artificial-Intelligence powered detection and remediation of excessive, redundant, hidden, unused and/or misconfigured permissions across an organization's network and cloud environment; software as a service (SAAS) services featuring software for integrating with privileged access management solutions and for securing computer networks and cloud resources
First Use Anywhere:
0
First Use in Commerce:
0
Classification
International Classes
009
042
Disclaimers
The following terms have been disclaimed and are not claimed as part of the trademark:
General Disclaimer
"CLOUD ENTITLEMENTS MANAGER"