Legal Representation
Attorney
Carrie Bader
USPTO Deadlines
Next Deadline
1334 days remaining
Section 8 Declaration Due (Principal Register) (Based on registration date 20230926)
Due Date
September 26, 2029
Grace Period Ends
March 26, 2030
Additional deadlines exist. Contact your attorney for complete deadline information.
Application History
16 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Sep 26, 2023 | NRCC | E | NOTICE OF REGISTRATION CONFIRMATION EMAILED | Loading... |
| Sep 26, 2023 | R.PR | A | REGISTERED-PRINCIPAL REGISTER | Loading... |
| Jul 11, 2023 | NPUB | E | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | Loading... |
| Jul 11, 2023 | PUBO | A | PUBLISHED FOR OPPOSITION | Loading... |
| Jun 21, 2023 | NONP | E | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | Loading... |
| Jun 7, 2023 | CNSA | O | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... |
| May 3, 2023 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| Apr 28, 2023 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Apr 28, 2023 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
| Apr 14, 2023 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Apr 14, 2023 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
| Apr 14, 2023 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Mar 31, 2023 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Jul 9, 2022 | MDSM | E | NOTICE OF DESIGN SEARCH CODE E-MAILED | Loading... |
| Jul 8, 2022 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| Jun 24, 2022 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 042
Computer security consulting; consulting in the field of information technology; Computer security and network security consulting, namely, consultation in the fields of protecting data and information from unauthorized access, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance and updating of computer software relating to computer and network security and prevention of computer risks; computer security consultancy for protecting data and information from unauthorized access, namely, developing plans for improving computer and network security and preventing criminal activity; cloud computing featuring software for detecting breaches for use in computer and network security; cloud computing services featuring software for authorizing access to databases in the field of computer and network security; computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; monitoring of computer systems for protecting data and information from unauthorized access; computer security consultancy for protecting data and information from unauthorized access; computer technology consulting in the field of systems for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; computer security consultancy for protecting data and information from unauthorized access in the field of endpoint protection software or curated cyberthreat data for computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints; software as a service (SAAS) services featuring software for ensuring the security of computers and computer networks; software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; application service provider (ASP) featuring non-downloadable computer software for ensuring the security of computers and computer networks; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; computer security consultancy in the field of administration of digital keys and digital certificates
First Use Anywhere:
Jul 26, 2020
First Use in Commerce:
Jul 26, 2020
Additional Information
Design Mark
The mark consists of a profile silhouette of a falcon above the word "CROWDSTRIKE" in bold, stylized font.
Color Claim
Color is not claimed as a feature of the mark.
Pseudo Mark
CROWD STRIKE
Classification
International Classes
042