Legal Representation
Attorney
TODD L. JUNEAU
USPTO Deadlines
Application History
38 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Aug 26, 2024 | MAB2 | E | ABANDONMENT NOTICE E-MAILED - FAILURE TO RESPOND | Loading... |
| Aug 26, 2024 | ABN2 | O | ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE | Loading... |
| May 11, 2024 | AAUA | E | NOTICE OF ACCEPTANCE OF AMENDMENT TO ALLEGE USE E-MAILED | Loading... |
| May 10, 2024 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| May 10, 2024 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
| May 10, 2024 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| May 10, 2024 | IUAA | P | USE AMENDMENT ACCEPTED | Loading... |
| Apr 11, 2024 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| Apr 11, 2024 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Aug 24, 2023 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
| Oct 10, 2023 | CHAN | I | APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED | Loading... |
| Oct 10, 2023 | AUPC | I | AMENDMENT TO USE PROCESSING COMPLETE | Loading... |
| Oct 5, 2023 | IUAF | S | USE AMENDMENT FILED | Loading... |
| Oct 5, 2023 | PARI | I | TEAS VOLUNTARY AMENDMENT RECEIVED | Loading... |
| Oct 5, 2023 | EAAU | I | TEAS AMENDMENT OF USE RECEIVED | Loading... |
| Oct 4, 2023 | NREV | E | NOTICE OF REVIVAL - E-MAILED | Loading... |
| Oct 4, 2023 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| Oct 4, 2023 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Oct 4, 2023 | ALIE | A | ASSIGNED TO LIE | Loading... |
| Oct 4, 2023 | PGRR | O | PETITION GRANTED - RESPONSE RECEIVED | Loading... |
| Oct 4, 2023 | APET | A | ASSIGNED TO PETITION STAFF | Loading... |
| Aug 24, 2023 | PROA | I | TEAS PETITION TO REVIVE RECEIVED | Loading... |
| Aug 17, 2023 | MAB2 | E | ABANDONMENT NOTICE E-MAILED - FAILURE TO RESPOND | Loading... |
| Aug 17, 2023 | MAB2 | O | ABANDONMENT NOTICE MAILED - FAILURE TO RESPOND | Loading... |
| Aug 17, 2023 | ABN2 | O | ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE | Loading... |
| May 3, 2023 | GNFN | O | NOTIFICATION OF FINAL REFUSAL EMAILED | Loading... |
| May 3, 2023 | GNFR | O | FINAL REFUSAL E-MAILED | Loading... |
| May 3, 2023 | CNFR | R | FINAL REFUSAL WRITTEN | Loading... |
| Apr 4, 2023 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| Apr 3, 2023 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Apr 3, 2023 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
| Apr 3, 2023 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Apr 3, 2023 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
| Apr 3, 2023 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Mar 13, 2023 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Jun 8, 2022 | MDSC | E | NOTICE OF DESIGN SEARCH CODE E-MAILED | Loading... |
| Jun 7, 2022 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| Jun 3, 2022 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 042
Computer security consultancy in the field of providing real-time enterprise and cloud application protection and security using a zero trust application security solution that analyzes network and server telemetry to establish baseline usage and to implement policy automation to protect against abnormal behavior and cyber security threats; real-time monitoring of enterprise and cloud applications for detecting unauthorized access or data breach, for detecting breakdowns, to ensure proper functioning; Software as a service (SAAS) services featuring software for generating automated responses to address abnormal behavior and cybersecurity threats on enterprise and cloud- based computer applications; and Software as a service (SAAS) services featuring software for generating reports on system status and application behavior for enterprise and cloud-based computer applications; Computer security services, namely, restricting unauthorized network access by users without credentials by providing real-time enterprise and cloud application protection and security using a zero trust application security solution that analyzes network and server telemetry to establish baseline usage and to implement policy automation to protect against abnormal behavior and cyber security threats; Computer network security consultancy; Data security consultancy; Design and development of electronic data security systems; Maintenance of computer software relating to computer security and prevention of computer risks; Telecommunication network security consultancy
First Use Anywhere:
May 25, 2022
First Use in Commerce:
May 25, 2022
Additional Information
Design Mark
The mark consists of a grid design which represents a castle gate or portcullis. The design has four horizontal stacked lines with the uppermost line being arched. Intersecting the horizontal lines are four vertical lines. The vertical lines extend past the lowest horizontal line and end in a downward triangular point.
Classification
International Classes
042