Legal Representation
Attorney
Jonathan Agmon
USPTO Deadlines
Next Deadline
1885 days remaining
Section 8 (6-Year) Declaration Due (Based on registration date 2024-09-10)
Due Date
September 10, 2030
Grace Period Ends
March 10, 2031
Additional deadlines exist. Contact your attorney for complete deadline information.
Application History
35 eventsDate | Code | Type | Description |
---|---|---|---|
Sep 10, 2024 | NRCC | E | NOTICE OF REGISTRATION CONFIRMATION EMAILED |
Sep 10, 2024 | R.PR | A | REGISTERED-PRINCIPAL REGISTER |
Jun 25, 2024 | NPUB | E | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED |
Jun 25, 2024 | PUBO | A | PUBLISHED FOR OPPOSITION |
Jun 5, 2024 | NONP | E | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED |
May 20, 2024 | CNEA | R | EXAMINERS AMENDMENT -WRITTEN |
May 20, 2024 | XAEC | I | EXAMINER'S AMENDMENT ENTERED |
May 20, 2024 | CNSA | O | APPROVED FOR PUB - PRINCIPAL REGISTER |
May 20, 2024 | GNEA | F | EXAMINERS AMENDMENT E-MAILED |
May 20, 2024 | GNEN | O | NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED |
May 10, 2024 | ZZZX | Z | PREVIOUS ALLOWANCE COUNT WITHDRAWN |
Apr 23, 2024 | PBCR | Z | WITHDRAWN FROM PUB - OG REVIEW QUERY |
Apr 5, 2024 | CNSA | O | APPROVED FOR PUB - PRINCIPAL REGISTER |
Apr 5, 2024 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED |
Apr 5, 2024 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE |
Apr 5, 2024 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED |
Mar 1, 2024 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED |
Mar 1, 2024 | CNRT | R | NON-FINAL ACTION WRITTEN |
Mar 1, 2024 | GNRT | O | NON-FINAL ACTION E-MAILED |
Jan 29, 2024 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED |
Jan 29, 2024 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE |
Jan 26, 2024 | ALIE | A | ASSIGNED TO LIE |
Sep 7, 2023 | ERSI | I | TEAS RESPONSE TO SUSPENSION INQUIRY RECEIVED |
Aug 2, 2023 | GNS3 | O | NOTIFICATION OF LETTER OF SUSPENSION E-MAILED |
Aug 2, 2023 | GNSL | S | LETTER OF SUSPENSION E-MAILED |
Aug 2, 2023 | CNSL | R | SUSPENSION LETTER WRITTEN |
Jun 26, 2023 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED |
Jun 26, 2023 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE |
Jun 26, 2023 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED |
Mar 26, 2023 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED |
Mar 26, 2023 | GNRT | F | NON-FINAL ACTION E-MAILED |
Mar 26, 2023 | CNRT | R | NON-FINAL ACTION WRITTEN |
Mar 25, 2023 | DOCK | D | ASSIGNED TO EXAMINER |
Jun 23, 2022 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED |
Jun 15, 2022 | NWAP | I | NEW APPLICATION ENTERED |
Detailed Classifications
Class 042
Computer security consultancy services; data security consulting; data security services, namely, protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; internet security consultancy; computer services for securing computer data in the nature of protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; computer services for securing financial information in the nature of data encryption services; computer services for securing personal information in the nature of data encryption services; programming of Internet security programs; rental of Internet security software programs; technology services being computer services for securing computer data, namely, protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; computer and technology services for securing computer data, namely, protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; consultancy in the field of security software; design and development of Internet security computer programs; development of software for secure network operations; Computer services, namely, creating an online virtual environment for securities brokerage; professional consultancy relating to computer security; electronic security monitoring services in the nature of monitoring computer systems for data security purposes to detect unauthorized access or data breach; computer and Internet security consultancy and data encryption services; electronic monitoring services for computer security threat analysis for protecting data; maintenance of computer software relating to computer security and prevention of computer risks; updating of computer software relating to computer security and prevention of computer risks; Software as a service (SAAS) services featuring software for detecting computer security vulnerabilities for use in computer security consultancy services in the field of computer and network security; Software as a service (SAAS) services featuring software for detecting computer security vulnerabilities for use in data security consulting in the field of computer and network security; providing online non-downloadable software for data security services, namely, protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects in the field of computer and network security; Software as a service (SAAS) services featuring software for detecting computer security vulnerabilities for use in internet security consultancy, in the field of computer and network security; providing online non-downloadable software for computer services for securing computer data in the nature of protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects, in the field of computer and network security; providing online non-downloadable software for computer services for securing financial information, in the field of computer and network security; Software as a service (SAAS) services featuring software for computer services for securing personal information, in the field of computer and network security; Software as a service (SAAS) services featuring software for programming of Internet security programs, in the field of computer and network security; Software as a service (SAAS) services featuring software for rental of Internet security programs in the field of computer and network security; providing online non-downloadable software for securing computer data, namely, protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects, in the field of computer and network security; providing online non-downloadable software for computer and technology services for securing computer data, namely, protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects, in the field of computer and network security; Software as a service (SAAS) services featuring software for use in consultancy in the field of security software for detecting computer security vulnerabilities, in the field of computer and network security; Software as a service (SAAS) services featuring software for design and development of Internet security computer programs, in the field of computer and network security; Software as a service (SAAS) services featuring software for development of software for secure network operations, in the field of computer and network security; providing online non-downloadable software for creating an online virtual environment for securities brokerage, in the field of computer and network security; Software as a service (SAAS) services featuring software for detecting computer vulnerabilities and browser vulnerabilities for use in professional consultancy relating to computer security, in the field of computer and network security; Software as a service (SAAS) services featuring software for electronic security monitoring services in the nature of monitoring computer systems for data security purposes to detect unauthorized access or data breach in the field of computer and network security; providing online non-downloadable software in the field of internet security for use in computer and Internet security consultancy and data encryption services for detecting computer security vulnerabilities, in the field of computer and network security; Software as a service (SAAS) services featuring software for electronic monitoring featuring computer security threat analysis for protecting data, in the field of computer and network security; Software as a service (SAAS) services featuring software for maintenance of computer software relating to computer security and prevention of computer risks, in the field of computer and network security; Software as a service (SAAS) services featuring software for updating of computer software relating to computer security and prevention of computer risks in the field of computer and network security; Software as a service (SAAS) services featuring software for advanced browser privacy settings, bandwidth monitoring, weak password notification, user session management, extensions management, transparent proxy server, customizing new page behaviour, shadow IT discovery, safe browsing, zero trust security framework, privileged user account securitization, end-of-life support, and relating to software extensions management, all in the field of computer and network security; Software as a service (SAAS) services featuring software for secure browsing, in the field of computer and network security; Software as a service (SAAS) services featuring software to prevent against spear-phishing attacks in the field of computer and network security; Software as a service (SAAS) services featuring software for preventing against exploitation of web vulnerabilities exploitation (CSRF/XSS) and providing unique runtime telemetry enabling advanced government and policy enforcement capabilities in the field of computer and network security; providing online non-downloadable software for browser protection via the browser rendering engine, in the field of computer and network security; Software as a service (SAAS) services featuring software for protection and governance of unmanaged or third party devices in the field of computer and network security; Software as a service (SAAS) services featuring software for protection of computer operating systems in the field of computer and network security; Software as a service (SAAS) services featuring software for protecting and enforcing policy on add-ons and for providing protection from attacks generated through aforesaid add-ons in the field of computer and network security; Software as a service (SAAS) services featuring software for securing remote access in the field of computer and network security; Software as a service (SAAS) services featuring software for endpoint detection protection in the field of computer and network security; Software as a service (SAAS) services featuring software for protecting unsecured browsers, for providing non-downloadable cloud-based software for protecting and securing web access and web browsing, in the field of computer and network security; providing non-downloadable cloud-based software for administering and monitoring computer programs' user activities, in the field of computer and network security
Classification
International Classes
042
USPTO Documents
Click to view cached USPTO documents for this trademark
Only administrators can request new documents from USPTO