Legal Representation
Attorney
Aaron D. Hendelman
USPTO Deadlines
Application History
11 eventsDate | Code | Type | Description | Documents |
---|---|---|---|---|
Dec 7, 2023 | ABN2 | O | ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE | Loading... |
Dec 7, 2023 | MAB2 | O | ABANDONMENT NOTICE MAILED - FAILURE TO RESPOND | Loading... |
Dec 7, 2023 | MAB2 | E | ABANDONMENT NOTICE E-MAILED - FAILURE TO RESPOND | Loading... |
Jul 21, 2023 | XELR | I | APPLICATION EXTENSION TO RESPONSE PERIOD - RECEIVED | Loading... |
Jul 21, 2023 | XELG | O | APPLICATION EXTENSION GRANTED/RECEIPT PROVIDED | Loading... |
May 4, 2023 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
May 4, 2023 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
May 4, 2023 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
Apr 19, 2023 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
Jul 25, 2022 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
Jul 9, 2022 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
Downloadable computer software featuring a computer browser environment for providing information security and cybersecurity; downloadable computer software featuring software for providing information security and cybersecurity; downloadable computer software featuring software for identifying cybersecurity threats, namely, security information and event management (siem), extended detection and response (xdr), security analytics, security monitoring, security operations, cybersecurity incident response, and cloud security; downloadable computer software for cybersecurity in the nature of detecting unauthorized access to computer systems and networks, computer network misconfigurations and suspicious activity in corporate and production environments; downloadable computer software to connect and secure remote workers; downloadable computer software featuring software for proving secure web-based and cloud-based usage; downloadable computer software featuring device security posture management software; downloadable computer software featuring cloud security posture management (cspm) software; downloadable computer software featuring software for adaptive access control management; downloadable computer software featuring software for connecting to secure remote servers; downloadable computer software featuring software for connecting computer to secure remote servers on a global communications network; downloadable computer software featuring software for providing visibility and control of application activity; downloadable computer software for user and entity data analytics; downloadable computer software for data security
First Use Anywhere:
0
First Use in Commerce:
0
Class 042
Providing temporary use of non-downloadable computer software featuring a computer browser environment for providing information security and cybersecurity; providing temporary use of non-downloadable computer software featuring software for providing information security and cybersecurity; providing temporary use of non-downloadable computer software featuring software for identifying cybersecurity threats, namely, security information and event management (siem), extended detection and response (xdr), security analytics, security monitoring, security operations, cybersecurity incident response, and cloud security; non-downloadable computer software for cybersecurity in the nature of detecting unauthorized access to computer systems and networks, computer network misconfigurations and suspicious activity in corporate and production environments; data encryption services for use in providing secure, web-based and remote transactions; providing temporary use of non-downloadable computer software to connect and secure remote workers; providing temporary use of non-downloadable computer software featuring software for proving secure web-based and cloud-based usage; software as a service (saas) services featuring device security posture management software; software as a service (saas) services featuring cloud security posture management (cspm) software; software as a service (saas) services featuring software for adaptive access control management; providing temporary use of non-downloadable computer software featuring software for connecting to secure remote servers; providing temporary use of non-downloadable computer software featuring software for connecting computer to secure remote servers on a global communications network; providing temporary use of non-downloadable computer software featuring software for providing visibility and control of application activity; providing temporary use of non-downloadable computer software for user and entity data analytics; providing temporary use of non-downloadable computer software for data security
First Use Anywhere:
0
First Use in Commerce:
0
Additional Information
Pseudo Mark
TALON WORK
Classification
International Classes
009
042