Legal Representation
Attorney
Jonathan Agmon
USPTO Deadlines
Next Deadline
1885 days remaining
Section 8 (6-Year) Declaration Due (Based on registration date 2024-09-10)
Due Date
September 10, 2030
Grace Period Ends
March 10, 2031
Additional deadlines exist. Contact your attorney for complete deadline information.
Application History
36 eventsDate | Code | Type | Description |
---|---|---|---|
Sep 10, 2024 | NRCC | E | NOTICE OF REGISTRATION CONFIRMATION EMAILED |
Sep 10, 2024 | R.PR | A | REGISTERED-PRINCIPAL REGISTER |
Jun 25, 2024 | NPUB | E | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED |
Jun 25, 2024 | PUBO | A | PUBLISHED FOR OPPOSITION |
Jun 5, 2024 | NONP | E | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED |
May 20, 2024 | CNSA | O | APPROVED FOR PUB - PRINCIPAL REGISTER |
May 20, 2024 | XAEC | I | EXAMINER'S AMENDMENT ENTERED |
May 20, 2024 | CNEA | R | EXAMINERS AMENDMENT -WRITTEN |
May 20, 2024 | GNEN | O | NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED |
May 20, 2024 | GNEA | F | EXAMINERS AMENDMENT E-MAILED |
May 10, 2024 | ZZZX | Z | PREVIOUS ALLOWANCE COUNT WITHDRAWN |
Apr 23, 2024 | PBCR | Z | WITHDRAWN FROM PUB - OG REVIEW QUERY |
Apr 5, 2024 | CNSA | O | APPROVED FOR PUB - PRINCIPAL REGISTER |
Apr 5, 2024 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED |
Apr 5, 2024 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED |
Apr 5, 2024 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE |
Mar 1, 2024 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED |
Mar 1, 2024 | GNRT | O | NON-FINAL ACTION E-MAILED |
Mar 1, 2024 | CNRT | R | NON-FINAL ACTION WRITTEN |
Jan 26, 2024 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED |
Jan 26, 2024 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE |
Jan 26, 2024 | ALIE | A | ASSIGNED TO LIE |
Sep 7, 2023 | ERSI | I | TEAS RESPONSE TO SUSPENSION INQUIRY RECEIVED |
Aug 2, 2023 | GNS3 | O | NOTIFICATION OF LETTER OF SUSPENSION E-MAILED |
Aug 2, 2023 | GNSL | S | LETTER OF SUSPENSION E-MAILED |
Aug 2, 2023 | CNSL | R | SUSPENSION LETTER WRITTEN |
Jun 26, 2023 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED |
Jun 26, 2023 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE |
Jun 26, 2023 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED |
Mar 26, 2023 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED |
Mar 26, 2023 | GNRT | F | NON-FINAL ACTION E-MAILED |
Mar 26, 2023 | CNRT | R | NON-FINAL ACTION WRITTEN |
Mar 25, 2023 | DOCK | D | ASSIGNED TO EXAMINER |
Jun 24, 2022 | MDSC | E | NOTICE OF DESIGN SEARCH CODE E-MAILED |
Jun 23, 2022 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED |
Jun 15, 2022 | NWAP | I | NEW APPLICATION ENTERED |
Detailed Classifications
Class 042
Computer security consultancy services; data security consulting; data security services, namely, protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; internet security consultancy; computer services for securing computer data in the nature of protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; computer services for securing financial information in the nature of data encryption services; computer services for securing personal information in the nature of data encryption services; programming of Internet security programs; rental of Internet security software programs; technology services being computer services for securing computer data, namely, protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; computer and technology services for securing computer data, namely, protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; consultancy in the field of security software; design and development of Internet security computer programs; development of software for secure network operations; Computer services, namely, creating an online virtual environment for securities brokerage; professional consultancy relating to computer security; electronic security monitoring services in the nature of monitoring computer systems for data security purposes to detect unauthorized access or data breach; computer and Internet security consultancy and data encryption services; electronic monitoring services for computer security threat analysis for protecting data; maintenance of computer software relating to computer security and prevention of computer risks; updating of computer software relating to computer security and prevention of computer risks; Software as a service (SAAS) services featuring software for detecting computer security vulnerabilities for use in computer security consultancy services in the field of computer and network security; Software as a service (SAAS) services featuring software for detecting computer security vulnerabilities for use in data security consulting in the field of computer and network security; providing online non-downloadable software for data security services, namely, protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects, in the field of computer and network security; Software as a service (SAAS) services featuring software for detecting computer security vulnerabilities for use in internet security consultancy in the field of computer and network security; providing online non-downloadable software for computer services for securing computer data in the nature of protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects, in the field of computer and network security; providing online non-downloadable software for computer services for securing financial information in the field of computer and network security; Software as a service (SAAS) services featuring software for computer services for securing personal information in the field of computer and network security; Software as a service (SAAS) services featuring software for programming of Internet security programs in the field of computer and network security; Software as a service (SAAS) services featuring software for rental of Internet security programs in the field of computer and network security; providing online non-downloadable software for securing computer data, namely, protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects, in the field of computer and network security; providing online non-downloadable software for computer and technology services for securing computer data, namely, protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects, in the field of computer and network security; Software as a service (SAAS) services featuring software for use in consultancy for detecting computer security vulnerabilities in the field of computer and network security; Software as a service (SAAS) services featuring software for design and development of Internet security computer programs in the field of computer and network security; Software as a service (SAAS) services featuring software for development of software for secure network operations, in the field of computer and network security; providing online non-downloadable software for creating an online virtual environment for securities brokerage in the field of computer and network security; Software as a service (SAAS) services featuring software for detecting computer vulnerabilities and browser vulnerabilities for use in professional consultancy relating to computer security in the field of computer and network security; Software as a service (SAAS) services featuring software for electronic security monitoring in the nature of monitoring computer systems for data security purposes, to detect unauthorized access or data breach, in the field of computer and network security; providing online non-downloadable software in the field of Internet security for use in computer and Internet security consultancy and data encryption services for detecting computer security vulnerabilities, in the field of computer and network security; Software as a service (SAAS) services featuring software for electronic monitoring featuring computer security threat analysis for protecting data in the field of computer and network security; Software as a service (SAAS) services featuring software for maintenance of computer software relating to computer security and prevention of computer risks, in the field of computer and network security; Software as a service (SAAS) services featuring software for updating of computer software relating to computer security and prevention of computer risks in the field of computer and network security; Software as a service (SAAS) services featuring software for advanced browser privacy settings, bandwidth monitoring, weak password notification, user session management, extensions management, transparent proxy server, customizing new page behaviour, shadow IT discovery, safe browsing, zero trust security framework, privileged user account securitization, end-of-life support, and relating to software extensions management, all in the field of computer and network security; Software as a service (SAAS) services featuring software for secure browsing, in the field of computer and network security; Software as a service (SAAS) services featuring software to prevent against spear-phishing attacks in the field of computer and network security; Software as a service (SAAS) services featuring software for preventing against exploitation of web vulnerabilities exploitation (CSRF/XSS) and providing unique runtime telemetry enabling advanced government and policy enforcement capabilities in the field of computer and network security; providing online non-downloadable software for browser protection via the browser rendering engine, in the field of computer and network security; Software as a service (SAAS) services featuring software for protection and governance of unmanaged or third party devices in the field of computer and network security; Software as a service (SAAS) services featuring software for protection of computer operating systems in the field of computer and network security; Software as a service (SAAS) services featuring software for protecting and enforcing policy on add-ons and for providing protection from attacks generated through aforesaid add-ons in the field of computer and network security; Software as a service (SAAS) services featuring software for securing remote access in the field of computer and network security; Software as a service (SAAS) services featuring software for endpoint detection protection in the field of computer and network security; Software as a service (SAAS) services featuring software for protecting unsecured browsers, for providing non-downloadable cloud-based software for protecting and securing web access and web browsing, in the field of computer and network security; providing non-downloadable cloud-based software for administering and monitoring computer programs' user activities, in the field of computer and network security
Additional Information
Design Mark
The mark consists of a globe shape having a wing thereon, the globe has an outer circle in dark blue and latitude and longitude lines in light blue, the wing outer arm is in dark blue with feathered lines in a lighter shade of blue. The color white represents background, outlining, shading, and/or transparent areas and is not part of the mark.
Color Claim
The color(s) blue is/are claimed as a feature of the mark.
Classification
International Classes
042
USPTO Documents
Click to view cached USPTO documents for this trademark
Only administrators can request new documents from USPTO