Legal Representation
Attorney
Nelson Blitz
USPTO Deadlines
Application History
9 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Mar 13, 2023 | MAB2 | E | ABANDONMENT NOTICE E-MAILED - FAILURE TO RESPOND | Loading... |
| Mar 11, 2023 | MAB2 | O | ABANDONMENT NOTICE MAILED - FAILURE TO RESPOND | Loading... |
| Mar 11, 2023 | ABN2 | O | ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE | Loading... |
| Jul 22, 2022 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Jul 22, 2022 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
| Jul 22, 2022 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Jun 18, 2022 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Oct 21, 2021 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| Sep 18, 2021 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
Computer Software for scanning and penetration testing of computers and networks to assess information security vulnerability; for restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; for enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer software to provide secure network operations, computer network security, and wireless network security; Computer Software for computer network security and software for control of access to and for analysis of security risks to computer systems, industrial control systems
First Use Anywhere:
0
First Use in Commerce:
0
Class 042
Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer software development in the field of software for secure network operations; Computer security consultancy in the field of computer network security, wireless network security; Development of security systems and contingency planning for information systems; Maintenance of computer software relating to computer security and prevention of computer risks; Providing temporary use of on-line non-downloadable software for control of access to and for analysis of security risks to computer systems, industrial control systems; Software as a service (SAAS) services featuring software for computer network security and software for control of access to and for analysis of security risks to computer systems, industrial control systems; Technical support, namely, monitoring technological functions of computer network systems; Updating of computer software relating to computer security and prevention of computer risks; Managed services and software as a service in the field of computer or telecommunications network security system for others, in the field of computer security, computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities
First Use Anywhere:
0
First Use in Commerce:
0
Classification
International Classes
009
042