Legal Representation
Attorney
Zachary T. Gordon
USPTO Deadlines
Application History
10 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Apr 6, 2022 | MAB2 | E | ABANDONMENT NOTICE E-MAILED - FAILURE TO RESPOND | Loading... |
| Apr 6, 2022 | MAB2 | O | ABANDONMENT NOTICE MAILED - FAILURE TO RESPOND | Loading... |
| Apr 6, 2022 | ABN2 | O | ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE | Loading... |
| Sep 22, 2021 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Sep 22, 2021 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
| Sep 22, 2021 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Sep 21, 2021 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Jun 9, 2021 | MDSC | E | NOTICE OF DESIGN SEARCH CODE E-MAILED | Loading... |
| Jun 8, 2021 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| Mar 12, 2021 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 042
Cybersecurity services in the nature of restricting unauthorized access to computer systems; Computer security service, namely, restricting access to and by computer networks to and of undesired websites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security threat analysis for protecting data; Computer security consultancy; Technology consultation in the field of cybersecurity; Ethical hacking, namely, penetration testing and vulnerability scanning of computers and computer networks; Ethical hacking consultancy; Cybersecurity risk audit services
First Use Anywhere:
0
First Use in Commerce:
0
Additional Information
Design Mark
The mark consists of a hexagon containing a dot and a curved line to the left of the wording "DOT SECURITY".
Pseudo Mark
.SECURITY; DEFENSIVE OPERATION TECHNOLOGY SECURITY
Classification
International Classes
042