Legal Representation
Attorney
Joshua L. Simmons
USPTO Deadlines
Next Deadline
1631 days remaining
Section 8 (6-Year) Declaration Due (Based on registration date 2023-12-26)
Due Date
December 26, 2029
Grace Period Ends
June 26, 2030
Additional deadlines exist. Contact your attorney for complete deadline information.
Application History
25 eventsDate | Code | Type | Description |
---|---|---|---|
Dec 26, 2023 | NRCC | E | NOTICE OF REGISTRATION CONFIRMATION EMAILED |
Dec 26, 2023 | R.PR | A | REGISTERED-PRINCIPAL REGISTER |
Nov 21, 2023 | SUNA | E | NOTICE OF ACCEPTANCE OF STATEMENT OF USE E-MAILED |
Nov 20, 2023 | CNPR | P | ALLOWED PRINCIPAL REGISTER - SOU ACCEPTED |
Nov 2, 2023 | SUPC | I | STATEMENT OF USE PROCESSING COMPLETE |
Nov 1, 2023 | AITU | A | CASE ASSIGNED TO INTENT TO USE PARALEGAL |
Oct 19, 2023 | EISU | I | TEAS STATEMENT OF USE RECEIVED |
Oct 19, 2023 | IUAF | S | USE AMENDMENT FILED |
Sep 19, 2023 | NOAM | E | NOA E-MAILED - SOU REQUIRED FROM APPLICANT |
Aug 6, 2023 | ETOP | T | EXTENSION OF TIME TO OPPOSE PROCESS - TERMINATED |
May 12, 2023 | CHPB | I | POST PUBLICATION AMENDMENT - ENTERED |
May 9, 2023 | APET | A | ASSIGNED TO PETITION STAFF |
Apr 19, 2023 | EPPA | I | TEAS POST PUBLICATION AMENDMENT RECEIVED |
Apr 18, 2023 | ETOF | T | EXTENSION OF TIME TO OPPOSE RECEIVED |
Mar 28, 2023 | NPUB | E | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED |
Mar 28, 2023 | PUBO | A | PUBLISHED FOR OPPOSITION |
Mar 8, 2023 | NONP | E | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED |
Feb 21, 2023 | CNSA | P | APPROVED FOR PUB - PRINCIPAL REGISTER |
Feb 21, 2023 | XAEC | I | EXAMINER'S AMENDMENT ENTERED |
Feb 21, 2023 | GNEN | O | NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED |
Feb 21, 2023 | GNEA | F | EXAMINERS AMENDMENT E-MAILED |
Feb 21, 2023 | CNEA | R | EXAMINERS AMENDMENT -WRITTEN |
Feb 14, 2023 | DOCK | D | ASSIGNED TO EXAMINER |
Jun 30, 2022 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED |
Jun 20, 2022 | NWAP | I | NEW APPLICATION ENTERED |
Detailed Classifications
Class 042
Providing temporary use of non-downloadable software for autonomous threat detection, collection, monitoring, and analysis of patterns for identifying cyber threats to network and cloud security; providing temporary use of non-downloadable cloud computing software using artificial intelligence for telemetry monitoring, and threat detection, intelligence, and response; providing temporary use of non-downloadable software and applications for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; providing temporary use of non-downloadable software and applications for autonomous management of security operations and incident response; providing temporary use of non-downloadable software for data mining, connecting with internet protocol addresses, identifying internet protocol addresses, securing network operations, and identifying network security risks; providing temporary use of non-downloadable software for use in monitoring of computer systems all to, namely, allow users to aggregate, model, and analyze data from their machines and infrastructure for security purposes; software as a service (SAAS) services featuring software using cloud-based technology and artificial intelligence for network security, end point security and cloud security; software as a service (saas) services featuring software for providing descriptive analytics, diagnostic analytics, predictive analytics, prescriptive analytics and analytics against data, namely, computer systems analysis, computer systems security analysis, computer network security analysis, computer network management and optimization, information technology management and optimization; software as a service (saas) services featuring software for use in data science, asset optimization, and optimization of infrastructure management and/or information security processes for information technology security, governance, and compliance, namely, testing, analysis, identification, evaluation and reporting on computer assets and systems on the internet or in the cloud of others to facilitate identification, remediation, and management of security vulnerabilities; monitoring of computer systems for cybersecurity purposes, namely, for detecting unauthorized access and data breach; monitoring of computer systems' operation utilizing data associated with the configuration and behavior of networked computing systems; computer security and information technology consultancy in the field of data collection, attack surface and vulnerability enumeration and remediation, and penetration testing of computers and networks to assess information security vulnerability and IT operations; data automation and collection service using proprietary software to evaluate, analyze and collect service data; all excluding licensing of intellectual property relating to integrated circuits, microprocessors, and microprocessor cores
First Use Anywhere:
20220200
First Use in Commerce:
20220200
Classification
International Classes
042