Legal Representation
Attorney
Miguel C. Danielson
USPTO Deadlines
Application History
9 eventsDate | Code | Type | Description | Documents |
---|---|---|---|---|
Sep 25, 2023 | MAB2 | E | ABANDONMENT NOTICE E-MAILED - FAILURE TO RESPOND | Loading... |
Sep 23, 2023 | ABN2 | O | ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE | Loading... |
Sep 23, 2023 | MAB2 | O | ABANDONMENT NOTICE MAILED - FAILURE TO RESPOND | Loading... |
Mar 31, 2023 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
Mar 31, 2023 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
Mar 31, 2023 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
Mar 4, 2023 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
May 23, 2022 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
May 19, 2022 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
Downloadable software for detecting, investigating, resolving, and automating response to computer security and computer network security threats, and for analyzing and reporting associated electronic data; Downloadable software for digital forensics; Downloadable computer software for collecting, monitoring, tagging, analyzing, decoding, viewing, reporting, visualizing, storing electronic data regarding, and detecting variations in, computer and computer network activity; Downloadable software for computer and computer network security information and event management; Downloadable software for collecting, managing, monitoring, analyzing, reporting, and storing computer log data; Downloadable software for supporting computer and computer network security policy compliance and regulatory compliance; Downloadable software for monitoring for, detecting, and responding to electronic threats to computer network endpoints; Downloadable software using artificial intelligence and behavioral analytics to detect, report, and analyze threats to computer and computer network security; Downloadable software for orchestrating manual and automated workflows and responses to computer and computer network security threats; Downloadable software for collaboration and case management in the fields of detecting, investigating, analyzing, reporting and resolving computer and computer network security threats; Downloadable computer software for detecting and responding to cybersecurity threats, namely, software for security information and event management (SIEM), extended detection and response (XDR), security analytics, security monitoring, security operations, computer network endpoint security, cybersecurity incident response, and cloud security
First Use Anywhere:
0
First Use in Commerce:
0
Class 042
Software as a service (SaaS), namely, a cloud-based computer software for detecting, investigating, resolving, and automating response to computer security and computer network security threats, and for analyzing and reporting associated electronic data; Cloud computing featuring software for digital forensics; Cloud computing featuring software for computer and computer network security information and event management; Cloud computing featuring software for collecting, managing, monitoring, analyzing, reporting, and storing computer log data; Cloud computing featuring software for supporting computer and computer network security policy compliance and regulatory compliance; Cloud computing featuring software for monitoring for, detecting and responding to electronic threats to computer network endpoints; Cloud computing featuring software using artificial intelligence and behavioral analytics to detect, report, and analyze threats to computer and computer network security; Cloud computing featuring software for orchestrating manual and automated workflows and responses to computer and computer network security threats; Cloud computing featuring software for collaboration and case management in the fields of detecting, investigating, analyzing, reporting and resolving computer and computer network security threats; Cloud computing featuring software for detecting and responding to cybersecurity threats, namely, security information and event management (SIEM), extended detection and response (XDR), security analytics, security monitoring, security operations, computer network endpoint security, cybersecurity incident response, and cloud security; Cloud computing featuring software for collecting, monitoring, tagging, analyzing, decoding, viewing, reporting, visualizing, storing electronic data regarding, and detecting variations in, computer and computer network activity
First Use Anywhere:
0
First Use in Commerce:
0
Additional Information
Pseudo Mark
NET WITNESS VISION XDR
Classification
International Classes
009
042