Legal Representation
Attorney
Alon Hilu
USPTO Deadlines
Application History
16 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Jan 29, 2024 | MAB6 | E | ABANDONMENT NOTICE E-MAILED - NO USE STATEMENT FILED | Loading... |
| Jan 29, 2024 | ABN6 | S | ABANDONMENT - NO USE STATEMENT FILED | Loading... |
| Jun 27, 2023 | NOAM | E | NOA E-MAILED - SOU REQUIRED FROM APPLICANT | Loading... |
| May 2, 2023 | NPUB | E | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | Loading... |
| May 2, 2023 | PUBO | A | PUBLISHED FOR OPPOSITION | Loading... |
| Apr 12, 2023 | NONP | E | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | Loading... |
| Mar 30, 2023 | CNSA | P | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... |
| Mar 15, 2023 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| Mar 14, 2023 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Mar 14, 2023 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
| Feb 7, 2023 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Feb 7, 2023 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
| Feb 7, 2023 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Jan 24, 2023 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Apr 15, 2022 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| Apr 14, 2022 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
Downloadable computer security software; downloadable computer software for validating security controls of computer terminals, servers, endpoints and networks through simulating cyber-attacks in real world scenarios; Downloadable software for measuring the security maturity level and improving security controls' efficacy of personal computers, servers, mobile, or IoT device through adaptive cyberattack simulations and emulations; downloadable software for measuring the security maturity level and improving security controls' efficacy of computer networks or entire organizations through adaptive cyberattack simulations and emulations; Downloadable computer software for conducting adaptive penetration tests for computer terminals, servers, endpoints and networks for determining and identifying information security weaknesses, assessing security gaps and recommending plans for preventing cybersecurity attacks; Downloadable software for proactively assuring security controls' effectiveness and preparedness against different types of cyber threats; downloadable software for continuously simulating adaptive cyber-security attacks and recommending practical mitigation strategies; downloadable software for predicting and preventing computer and electronics security issues prior to their occurring; downloadable software for adaptive attack emulation and/or simulation; downloadable software for measuring security controls' efficacy; downloadable software for security benchmarking; downloadable software for automated remediation of detected gaps; downloadable software for adaptive security validation
Class 042
Providing online non-downloadable cloud-based security software; providing online non-downloadable cloud-based software for validating security controls of computer terminals, servers, endpoints and networks through simulating cyber-attacks in real world scenarios; providing online non-downloadable cloud-based software for measuring the security maturity level and improving security controls' efficacy of a given system, namely, personal computer, server, mobile, or IoT device through adaptive cyberattack simulations and emulations; providing online non-downloadable cloud-based software for measuring the security maturity level and improving security controls' efficacy of a group of systems, namely, a network or multiple networks, or entire organizations through adaptive cyberattack simulations and emulations; providing online non-downloadable cloud-based computer software for conducting adaptive penetration tests for computer terminals, servers, endpoints and networks for determining and identifying information security weaknesses, assessing security gaps and recommending plans for preventing cybersecurity attacks; providing online non-downloadable cloud-based software for proactively assuring security controls' effectiveness and preparedness against different types of cyber threats; providing online non-downloadable cloud-based software for continuously simulating adaptive cyber-security attacks and recommending practical mitigation strategies; providing online non-downloadable cloud-based software for predicting and preventing computer and electronics security issues prior to their occurring; providing online non-downloadable cloud-based software for adaptive attack emulation and/or simulation; providing online non-downloadable cloud-based software for measuring security controls' efficacy; providing online non-downloadable cloud-based software for security benchmarking; providing online non-downloadable cloud-based software for automated remediation of detected gaps; providing online non-downloadable cloud-based software for adaptive security validation; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security weaknesses, gaps, and security maturity level; computer security services for protecting data and information from unauthorized access, namely, monitoring computer terminals, servers, endpoints and networks directed toward the prevention, detection or other action with respect to security threats and malicious activities
Classification
International Classes
009
042