SERAPHIC

Serial Number 97454393
Registration 7498207
700

Registration Progress

Application Filed
Jun 12, 2022
Under Examination
Approved for Publication
Jun 25, 2024
Published for Opposition
Jun 25, 2024
Registered
Sep 10, 2024

Trademark Image

SERAPHIC

Basic Information

Serial Number
97454393
Registration Number
7498207
Filing Date
June 12, 2022
Registration Date
September 10, 2024
Published for Opposition
June 25, 2024
Drawing Code
4

Status Summary

Current Status
Active
Status Code
700
Status Date
Sep 10, 2024
Registration
Registered
Classes
042

Rights Holder

SERAPHIC ALGORITHMS LTD.

16
Address
11 AHI-MEIR ST.
Tel-Aviv Yafo 6912611
IL

Ownership History

SERAPHIC ALGORITHMS LTD.

Original Applicant
16
Tel-Aviv Yafo IL

SERAPHIC ALGORITHMS LTD.

Owner at Publication
16
Tel-Aviv Yafo IL

SERAPHIC ALGORITHMS LTD.

Original Registrant
16
Tel-Aviv Yafo IL

Legal Representation

Attorney
Jonathan Agmon

USPTO Deadlines

Next Deadline
1885 days remaining
Section 8 (6-Year) Declaration Due (Based on registration date 2024-09-10)
Due Date
September 10, 2030
Grace Period Ends
March 10, 2031
Additional deadlines exist. Contact your attorney for complete deadline information.

Application History

35 events
Date Code Type Description
Sep 10, 2024 NRCC E NOTICE OF REGISTRATION CONFIRMATION EMAILED
Sep 10, 2024 R.PR A REGISTERED-PRINCIPAL REGISTER
Jun 25, 2024 NPUB E OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
Jun 25, 2024 PUBO A PUBLISHED FOR OPPOSITION
Jun 5, 2024 NONP E NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
May 20, 2024 CNEA R EXAMINERS AMENDMENT -WRITTEN
May 20, 2024 XAEC I EXAMINER'S AMENDMENT ENTERED
May 20, 2024 CNSA O APPROVED FOR PUB - PRINCIPAL REGISTER
May 20, 2024 GNEA F EXAMINERS AMENDMENT E-MAILED
May 20, 2024 GNEN O NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED
May 10, 2024 ZZZX Z PREVIOUS ALLOWANCE COUNT WITHDRAWN
Apr 23, 2024 PBCR Z WITHDRAWN FROM PUB - OG REVIEW QUERY
Apr 5, 2024 CNSA O APPROVED FOR PUB - PRINCIPAL REGISTER
Apr 5, 2024 TROA I TEAS RESPONSE TO OFFICE ACTION RECEIVED
Apr 5, 2024 CRFA I CORRESPONDENCE RECEIVED IN LAW OFFICE
Apr 5, 2024 TEME I TEAS/EMAIL CORRESPONDENCE ENTERED
Mar 1, 2024 GNRN O NOTIFICATION OF NON-FINAL ACTION E-MAILED
Mar 1, 2024 CNRT R NON-FINAL ACTION WRITTEN
Mar 1, 2024 GNRT O NON-FINAL ACTION E-MAILED
Jan 29, 2024 TEME I TEAS/EMAIL CORRESPONDENCE ENTERED
Jan 29, 2024 CRFA I CORRESPONDENCE RECEIVED IN LAW OFFICE
Jan 26, 2024 ALIE A ASSIGNED TO LIE
Sep 7, 2023 ERSI I TEAS RESPONSE TO SUSPENSION INQUIRY RECEIVED
Aug 2, 2023 GNS3 O NOTIFICATION OF LETTER OF SUSPENSION E-MAILED
Aug 2, 2023 GNSL S LETTER OF SUSPENSION E-MAILED
Aug 2, 2023 CNSL R SUSPENSION LETTER WRITTEN
Jun 26, 2023 TEME I TEAS/EMAIL CORRESPONDENCE ENTERED
Jun 26, 2023 CRFA I CORRESPONDENCE RECEIVED IN LAW OFFICE
Jun 26, 2023 TROA I TEAS RESPONSE TO OFFICE ACTION RECEIVED
Mar 26, 2023 GNRN O NOTIFICATION OF NON-FINAL ACTION E-MAILED
Mar 26, 2023 GNRT F NON-FINAL ACTION E-MAILED
Mar 26, 2023 CNRT R NON-FINAL ACTION WRITTEN
Mar 25, 2023 DOCK D ASSIGNED TO EXAMINER
Jun 23, 2022 NWOS I NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Jun 15, 2022 NWAP I NEW APPLICATION ENTERED

Detailed Classifications

Class 042
Computer security consultancy services; data security consulting; data security services, namely, protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; internet security consultancy; computer services for securing computer data in the nature of protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; computer services for securing financial information in the nature of data encryption services; computer services for securing personal information in the nature of data encryption services; programming of Internet security programs; rental of Internet security software programs; technology services being computer services for securing computer data, namely, protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; computer and technology services for securing computer data, namely, protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects; consultancy in the field of security software; design and development of Internet security computer programs; development of software for secure network operations; Computer services, namely, creating an online virtual environment for securities brokerage; professional consultancy relating to computer security; electronic security monitoring services in the nature of monitoring computer systems for data security purposes to detect unauthorized access or data breach; computer and Internet security consultancy and data encryption services; electronic monitoring services for computer security threat analysis for protecting data; maintenance of computer software relating to computer security and prevention of computer risks; updating of computer software relating to computer security and prevention of computer risks; Software as a service (SAAS) services featuring software for detecting computer security vulnerabilities for use in computer security consultancy services in the field of computer and network security; Software as a service (SAAS) services featuring software for detecting computer security vulnerabilities for use in data security consulting in the field of computer and network security; providing online non-downloadable software for data security services, namely, protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects in the field of computer and network security; Software as a service (SAAS) services featuring software for detecting computer security vulnerabilities for use in internet security consultancy, in the field of computer and network security; providing online non-downloadable software for computer services for securing computer data in the nature of protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects, in the field of computer and network security; providing online non-downloadable software for computer services for securing financial information, in the field of computer and network security; Software as a service (SAAS) services featuring software for computer services for securing personal information, in the field of computer and network security; Software as a service (SAAS) services featuring software for programming of Internet security programs, in the field of computer and network security; Software as a service (SAAS) services featuring software for rental of Internet security programs in the field of computer and network security; providing online non-downloadable software for securing computer data, namely, protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects, in the field of computer and network security; providing online non-downloadable software for computer and technology services for securing computer data, namely, protecting web sessions from web born attacks while enforcing company policy for all web session protection aspects, in the field of computer and network security; Software as a service (SAAS) services featuring software for use in consultancy in the field of security software for detecting computer security vulnerabilities, in the field of computer and network security; Software as a service (SAAS) services featuring software for design and development of Internet security computer programs, in the field of computer and network security; Software as a service (SAAS) services featuring software for development of software for secure network operations, in the field of computer and network security; providing online non-downloadable software for creating an online virtual environment for securities brokerage, in the field of computer and network security; Software as a service (SAAS) services featuring software for detecting computer vulnerabilities and browser vulnerabilities for use in professional consultancy relating to computer security, in the field of computer and network security; Software as a service (SAAS) services featuring software for electronic security monitoring services in the nature of monitoring computer systems for data security purposes to detect unauthorized access or data breach in the field of computer and network security; providing online non-downloadable software in the field of internet security for use in computer and Internet security consultancy and data encryption services for detecting computer security vulnerabilities, in the field of computer and network security; Software as a service (SAAS) services featuring software for electronic monitoring featuring computer security threat analysis for protecting data, in the field of computer and network security; Software as a service (SAAS) services featuring software for maintenance of computer software relating to computer security and prevention of computer risks, in the field of computer and network security; Software as a service (SAAS) services featuring software for updating of computer software relating to computer security and prevention of computer risks in the field of computer and network security; Software as a service (SAAS) services featuring software for advanced browser privacy settings, bandwidth monitoring, weak password notification, user session management, extensions management, transparent proxy server, customizing new page behaviour, shadow IT discovery, safe browsing, zero trust security framework, privileged user account securitization, end-of-life support, and relating to software extensions management, all in the field of computer and network security; Software as a service (SAAS) services featuring software for secure browsing, in the field of computer and network security; Software as a service (SAAS) services featuring software to prevent against spear-phishing attacks in the field of computer and network security; Software as a service (SAAS) services featuring software for preventing against exploitation of web vulnerabilities exploitation (CSRF/XSS) and providing unique runtime telemetry enabling advanced government and policy enforcement capabilities in the field of computer and network security; providing online non-downloadable software for browser protection via the browser rendering engine, in the field of computer and network security; Software as a service (SAAS) services featuring software for protection and governance of unmanaged or third party devices in the field of computer and network security; Software as a service (SAAS) services featuring software for protection of computer operating systems in the field of computer and network security; Software as a service (SAAS) services featuring software for protecting and enforcing policy on add-ons and for providing protection from attacks generated through aforesaid add-ons in the field of computer and network security; Software as a service (SAAS) services featuring software for securing remote access in the field of computer and network security; Software as a service (SAAS) services featuring software for endpoint detection protection in the field of computer and network security; Software as a service (SAAS) services featuring software for protecting unsecured browsers, for providing non-downloadable cloud-based software for protecting and securing web access and web browsing, in the field of computer and network security; providing non-downloadable cloud-based software for administering and monitoring computer programs' user activities, in the field of computer and network security

Classification

International Classes
042

USPTO Documents

Click to view cached USPTO documents for this trademark

Only administrators can request new documents from USPTO