Legal Representation
Attorney
David A.W. Wong
USPTO Deadlines
Next Deadline
1136 days remaining
Section 8 Declaration Due (Principal Register) (Based on registration date 20230314)
Due Date
March 14, 2029
Grace Period Ends
September 14, 2029
Additional deadlines exist. Contact your attorney for complete deadline information.
Application History
39 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Mar 14, 2023 | NRCC | E | NOTICE OF REGISTRATION CONFIRMATION EMAILED | Loading... |
| Mar 14, 2023 | R.PR | A | REGISTERED-PRINCIPAL REGISTER | Loading... |
| Feb 9, 2023 | SUNA | E | NOTICE OF ACCEPTANCE OF STATEMENT OF USE E-MAILED | Loading... |
| Feb 8, 2023 | CNPR | P | ALLOWED PRINCIPAL REGISTER - SOU ACCEPTED | Loading... |
| Jan 19, 2023 | SUPC | I | STATEMENT OF USE PROCESSING COMPLETE | Loading... |
| Dec 15, 2022 | IUAF | S | USE AMENDMENT FILED | Loading... |
| Jan 19, 2023 | AITU | A | CASE ASSIGNED TO INTENT TO USE PARALEGAL | Loading... |
| Dec 15, 2022 | EISU | I | TEAS STATEMENT OF USE RECEIVED | Loading... |
| Nov 29, 2022 | NOAM | E | NOA E-MAILED - SOU REQUIRED FROM APPLICANT | Loading... |
| Oct 17, 2022 | NEWN | I | NEW NOA TO ISSUE | Loading... |
| Jul 26, 2022 | IUCN | S | NOTICE OF ALLOWANCE CANCELLED | Loading... |
| Jul 28, 2022 | NOAM | E | NOA E-MAILED - SOU REQUIRED FROM APPLICANT | Loading... |
| May 31, 2022 | NPUB | E | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | Loading... |
| May 31, 2022 | PUBO | A | PUBLISHED FOR OPPOSITION | Loading... |
| May 11, 2022 | NONP | E | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | Loading... |
| Apr 26, 2022 | CNSA | P | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... |
| Apr 21, 2022 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| Apr 20, 2022 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Apr 20, 2022 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
| Apr 20, 2022 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Apr 20, 2022 | GNRT | O | NON-FINAL ACTION E-MAILED | Loading... |
| Apr 20, 2022 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Mar 21, 2022 | XAEC | I | EXAMINER'S AMENDMENT ENTERED | Loading... |
| Mar 21, 2022 | GNEN | O | NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED | Loading... |
| Mar 21, 2022 | GNEA | O | EXAMINERS AMENDMENT E-MAILED | Loading... |
| Mar 21, 2022 | CNEA | R | EXAMINERS AMENDMENT -WRITTEN | Loading... |
| Feb 15, 2022 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| Feb 15, 2022 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Feb 15, 2022 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
| Feb 9, 2022 | CHAN | I | APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED | Loading... |
| Feb 9, 2022 | TCCA | I | TEAS CHANGE OF CORRESPONDENCE RECEIVED | Loading... |
| Feb 9, 2022 | COAR | I | TEAS CHANGE OF OWNER ADDRESS RECEIVED | Loading... |
| Aug 16, 2021 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Aug 16, 2021 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
| Aug 16, 2021 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Aug 11, 2021 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Apr 27, 2021 | MDSC | E | NOTICE OF DESIGN SEARCH CODE E-MAILED | Loading... |
| Apr 26, 2021 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| Jan 28, 2021 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
downloadable and recorded computer software for providing computer security; downloadable and recorded computer software used to maintain security over or in computer networks, web applications and/or digital data; downloadable and recorded computer software for computer security risk and threat analysis, assessment, management, remediation, and elimination; downloadable and recorded computer anti-virus software; downloadable and recorded computer software for providing anti-virus scanning, detection, identification, security, management, remediation, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers, and electronic devices; downloadable and recorded computer software for computer security risk and threat analysis, assessment, management, remediation, and elimination for protecting computer hardware, systems, servers, data, and electronic devices; downloadable and recorded computer software in the nature of cybersecurity software tools for assessing the vulnerability of computer networks and for constant cybersecurity monitoring; downloadable and recorded computer software for calculating and simulating security breaches while providing suggestions to protect cybersecurity; downloadable and recorded computer software for collecting relevant configuration details through agents continuously monitoring the entire fleet of digital assets on a real-time basis; downloadable and recorded computer software for integrating employees' awareness, including employees' behavioral response patterns; downloadable and recorded computer software for providing real-time, on-demand comprehensive configuration and vulnerability assessments; downloadable and recorded computer software restricting unauthorized access to computer systems as part of information security management downloadable and recorded computer software for cybersecurity and computer security; downloadable and recorded computer software for use in preventing unauthorized access to and misuse of computer systems, identifying and detecting viruses, worms, trojans, spyware, adware, malware, and ransomware, authenticating domain-based email messages, and identifying malicious websites; downloadable and recorded computer security software, namely, software for cybersecurity monitoring and control of network activities on a computer; downloadable and recorded computer security software for assessing and quantifying digital security risks, threats, hacks, and data leakage across networks for cybersecurity; downloadable and recorded computer software, namely, software for data gathering, storage, manipulation, management and encryption, and management of security breach incidents and responses, for use in the fields of security, forensic, diagnostic, incident response, and education pertaining to information, computer and internet security; downloadable and recorded computer software for automated cybersecurity, digital forensics, cyber threat intelligence, and incident response; downloadable and recorded computer security software and downloadable and recorded information security software; downloadable and recorded computer software for managing security strategy and resources relating to the security risk industry; downloadable and recorded computer programs for managing security strategy and resources for use in the security risk industry; downloadable and recorded predictive computer and network vulnerability management software; downloadable and recorded computer malware incident forensics software; downloadable and recorded cybersecurity incident response software; downloadable and recorded computer software for assessing vulnerability, preventing and addressing cybersecurity threats and attacks; downloadable and recorded computer software for monitoring of computer systems for detecting unauthorized access or data breach; downloadable and recorded computer anti-virus and anti-malware software; downloadable and recorded internet security software; downloadable and recorded computer software for detection and prevention of viruses and malware; downloadable and recorded computer software for computer, data and network security; downloadable and recorded computer security software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers; downloadable and recorded computer software for comprehensive network security, intrusion prevention, event alerting, log capture, log analysis, network reporting, backup and recovery of digital and electronic data, and cybersecurity management
First Use Anywhere:
Jun 22, 2021
First Use in Commerce:
Jun 22, 2021
Class 042
software as a service (SaaS) services featuring software for providing computer security; software as a service (SaaS) services featuring software used to maintain security over or in computer networks, web applications and/or digital data; software as a service (SaaS) services featuring software for computer security risk and threat analysis, assessment, management, remediation, and elimination; software as a service (SaaS) services featuring anti-virus software; application service provider featuring software for providing anti-virus scanning, detection, identification, security, management, remediation, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers and electronic devices; providing temporary use of non-downloadable software for computer security risk and threat analysis, assessment, management, remediation, and elimination for protecting computer hardware, systems, servers, data, and electronic devices; software as a service (SaaS) services featuring cybersecurity software for assessing the vulnerability of computer networks and for constant cybersecurity monitoring; software as a service (SaaS) services featuring software for calculating and simulating security breaches while providing suggestions to protect cybersecurity; software as a service (SaaS) services featuring software for collecting relevant configuration details through agents continuously monitoring the entire fleet of digital assets on a real-time basis; software as a service (SaaS) services featuring software for integrating employees' awareness, including employees' behavioral response patterns; software as a service (SaaS) services featuring software for providing real-time, on-demand comprehensive configuration and vulnerability assessments; software as a service (SaaS) services featuring software restricting unauthorized access to computer systems as part of information security management; software as a service (SaaS) services featuring software for cybersecurity and computer security; software as a service (SaaS) services, featuring software for use in preventing unauthorized access to and misuse of computer systems, identifying and detecting viruses, worms, trojans, spyware, adware, malware, and ransomware, authenticating domain-based email messages, and identifying malicious websites; software as a service (SaaS) services featuring software for cybersecurity monitoring and control of network activities on a computer; software as a service (SaaS) services featuring software for assessing and quantifying digital security risks, threats, hacks, and data leakage across networks for cybersecurity; computer services, namely, providing forensic services to recover lost and deleted data; computer services, namely, monitoring of computer systems for detecting unauthorized access or data breach; software as a service (SaaS) services featuring software for automated cybersecurity, digital forensics, cyber threat intelligence, and incident response; software as a service (SaaS) services featuring computer security software and information security software; software as a service (SaaS) services featuring software for managing security strategy and resources relating to the security risk industry; software as a service (SaaS) services featuring software for managing security strategy and resources for use in the security risk industry; software as a service (SaaS) services featuring predictive computer and network vulnerability management software; software as a service (SaaS) services featuring malware incident forensics software; software as a service (SaaS) services featuring cybersecurity incident response software; software as a service (SaaS) services featuring software for assessing vulnerability, preventing and addressing cybersecurity threats and attacks; software as a service (SaaS) services featuring computer and internet security software, computer antivirus software, and anti-malware software; software as a service (SaaS) services featuring software for computer, data and network security; software as a service (SaaS) services featuring computer security software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers; software as a service (SaaS) featuring software for comprehensive network security, intrusion prevention, event alerting, log capture, log analysis, network reporting, backup and recovery of digital and electronic data, and cybersecurity management
First Use Anywhere:
Feb 12, 2021
First Use in Commerce:
Feb 12, 2021
Additional Information
Design Mark
The mark consists of a swirl design superimposed over a vertical line.
Classification
International Classes
009
042