Legal Representation
Attorney
David A.W. Wong
USPTO Deadlines
Next Deadline
1560 days remaining
Section 8 (6-Year) Declaration Due (Based on registration date 2023-10-17)
Due Date
October 17, 2029
Grace Period Ends
April 17, 2030
Additional deadlines exist. Contact your attorney for complete deadline information.
Application History
31 eventsDate | Code | Type | Description |
---|---|---|---|
Oct 17, 2023 | R.PR | A | REGISTERED-PRINCIPAL REGISTER |
Oct 17, 2023 | NRCC | E | NOTICE OF REGISTRATION CONFIRMATION EMAILED |
Sep 12, 2023 | SUNA | E | NOTICE OF ACCEPTANCE OF STATEMENT OF USE E-MAILED |
Sep 10, 2023 | CNPR | P | ALLOWED PRINCIPAL REGISTER - SOU ACCEPTED |
Sep 4, 2023 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED |
Sep 2, 2023 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED |
Sep 2, 2023 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE |
Jun 2, 2023 | CNRT | W | SU - NON-FINAL ACTION - WRITTEN |
Jun 2, 2023 | GNRT | O | NON-FINAL ACTION E-MAILED |
Jun 2, 2023 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED |
Jun 1, 2023 | SUPC | I | STATEMENT OF USE PROCESSING COMPLETE |
May 30, 2023 | AITU | A | CASE ASSIGNED TO INTENT TO USE PARALEGAL |
May 8, 2023 | EISU | I | TEAS STATEMENT OF USE RECEIVED |
May 8, 2023 | IUAF | S | USE AMENDMENT FILED |
Nov 8, 2022 | NOAM | E | NOA E-MAILED - SOU REQUIRED FROM APPLICANT |
Sep 13, 2022 | PUBO | A | PUBLISHED FOR OPPOSITION |
Sep 13, 2022 | NPUB | E | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED |
Aug 24, 2022 | NONP | E | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED |
Aug 10, 2022 | CNSA | P | APPROVED FOR PUB - PRINCIPAL REGISTER |
Aug 6, 2022 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED |
Aug 5, 2022 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED |
Aug 5, 2022 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE |
Feb 17, 2022 | CNRT | R | NON-FINAL ACTION WRITTEN |
Feb 17, 2022 | GNRT | F | NON-FINAL ACTION E-MAILED |
Feb 17, 2022 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED |
Feb 12, 2022 | DOCK | D | ASSIGNED TO EXAMINER |
Feb 9, 2022 | COAR | I | TEAS CHANGE OF OWNER ADDRESS RECEIVED |
Feb 9, 2022 | TCCA | I | TEAS CHANGE OF CORRESPONDENCE RECEIVED |
Feb 9, 2022 | CHAN | I | APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED |
Nov 9, 2021 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED |
Nov 1, 2021 | NWAP | I | NEW APPLICATION ENTERED |
Detailed Classifications
Class 042
software as a service (SaaS), namely, providing temporary use of non-downloadable and recorded software for providing computer security; software as a service (SaaS), namely, providing temporary use of non-downloadable and recorded software used to maintain security over or in computer networks, web applications and/or digital data; software as a service (SaaS), namely, providing temporary use of non-downloadable and recorded software for computer security risk and threat analysis, assessment, management, remediation, and elimination; software as a service (SaaS), namely, providing temporary use of non-downloadable and recorded anti-virus software; application service provider featuring software for providing anti-virus scanning, detection, identification, security, management, remediation, and elimination of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computer systems, servers and electronic devices; providing temporary use of non-downloadable and recorded software for computer security risk and threat analysis, assessment, management, remediation, and elimination for protecting computer hardware, systems, servers, data, and electronic devices; software as a service (SaaS), namely, providing temporary use of non-downloadable and recorded cybersecurity software tools for assessing the vulnerability of computer networks and for constant cybersecurity monitoring; software as a service (SaaS) services featuring software for calculating and simulating security breaches while providing suggestions to protect cybersecurity; software as a service (SaaS) services featuring software for collecting relevant configuration details through agents continuously monitoring the entire fleet of digital assets on a real-time basis; software as a service (SaaS) services featuring software for integrating employees' awareness, including employees' behavioral response patterns; software as a service (SaaS) services featuring software for providing real-time, on-demand comprehensive configuration and vulnerability assessments; software as a service (SaaS) services featuring software restricting unauthorized access to computer systems as part of information security management; software as a service (SaaS) services featuring software, configurations and controls for cybersecurity and computer security; software as a service (SaaS) services, featuring software, configurations and controls for use in preventing unauthorized access to and misuse of computer systems, identifying and detecting viruses, worms, trojans, spyware, adware, malware, and ransomware, authenticating domain-based email messages, and identifying malicious websites; software as a service (SaaS) services featuring software for cybersecurity monitoring and control of network activities on a computer; software as a service (SaaS) services featuring software for assessing and quantifying digital security risks, threats, hacks, and data leakage across networks for cybersecurity; computer services, namely, providing forensic services to recover lost and deleted data; computer services, namely, monitoring of computer systems for detecting unauthorized access or data breach; software as a service (SaaS) services featuring software for automated cybersecurity, digital forensics, cyber threat intelligence, and incident response; software as a service (SaaS) services featuring computer and information security software; software as a service (SaaS) services featuring software for managing security strategy and resources relating to the security risk industry; software as a service (SaaS) services featuring software for managing security strategy and resources for use in the security risk industry; software as a service (SaaS) services featuring predictive computer and network vulnerability management software; software as a service (SaaS) services featuring malware incident forensics software; software as a service (SaaS) services featuring cybersecurity incident response software; software as a service (SaaS) services featuring software for assessing vulnerability, preventing and addressing cybersecurity threats and attacks; software as a service (SaaS) services featuring computer and internet security software, computer antivirus software, and anti-malware software; software as a service (SaaS) services featuring software for computer, data and network security; software as a service (SaaS) services featuring computer security software for automatically identifying and sharing computer and network threat intelligence across computer and network security layers; software as a service (SaaS) featuring software for comprehensive network security, intrusion prevention, event alerting, log capture, log analysis, network reporting, backup and recovery of digital and electronic data, and cybersecurity management
First Use Anywhere:
Sep 21, 2021
First Use in Commerce:
Sep 21, 2021
Additional Information
Pseudo Mark
OUT SMART ANY ATTACKER
Classification
International Classes
042