Legal Representation
Attorney
Lisa M. DuRoss
USPTO Deadlines
Next Deadline
93 days remaining
Statement of Use Due - Extension 2 Granted
Due Date
October 09, 2025
Extension Available
Until April 09, 2025
Application History
25 eventsDate | Code | Type | Description |
---|---|---|---|
Apr 4, 2025 | EXRA | E | NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED |
Apr 4, 2025 | EX2G | S | SOU EXTENSION 2 GRANTED |
Apr 3, 2025 | EXT2 | S | SOU EXTENSION 2 FILED |
Apr 3, 2025 | EEXT | I | SOU TEAS EXTENSION RECEIVED |
Oct 8, 2024 | EX1G | S | SOU EXTENSION 1 GRANTED |
Oct 8, 2024 | EXT1 | S | SOU EXTENSION 1 FILED |
Oct 8, 2024 | EXRA | E | NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED |
Oct 8, 2024 | EEXT | I | SOU TEAS EXTENSION RECEIVED |
Sep 25, 2024 | ASCK | I | ASSIGNMENT OF OWNERSHIP NOT UPDATED AUTOMATICALLY |
Apr 9, 2024 | NOAM | E | NOA E-MAILED - SOU REQUIRED FROM APPLICANT |
Feb 13, 2024 | NPUB | E | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED |
Feb 13, 2024 | PUBO | A | PUBLISHED FOR OPPOSITION |
Jan 24, 2024 | NONP | E | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED |
Jan 9, 2024 | CNSA | P | APPROVED FOR PUB - PRINCIPAL REGISTER |
Nov 22, 2023 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED |
Nov 21, 2023 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE |
Nov 21, 2023 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED |
Aug 10, 2023 | XELG | O | APPLICATION EXTENSION GRANTED/RECEIPT PROVIDED |
Aug 10, 2023 | XELR | I | APPLICATION EXTENSION TO RESPONSE PERIOD - RECEIVED |
May 25, 2023 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED |
May 25, 2023 | GNRT | F | NON-FINAL ACTION E-MAILED |
May 25, 2023 | CNRT | R | NON-FINAL ACTION WRITTEN |
May 25, 2023 | DOCK | D | ASSIGNED TO EXAMINER |
Aug 29, 2022 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED |
Aug 11, 2022 | NWAP | I | NEW APPLICATION ENTERED |
Detailed Classifications
Class 009
Computer hardware; electric sensors, namely, electronic devices for detecting and locating threats, enhancing perimeter protection, and preventing unauthorized intrusions using remote sensing systems; electronic devices composed primarily of sensors, microprocessors, and integrated communication transmitters and receivers installed in the field, affixed to equipment, or worn by personnel to transmit and receive geospatial, and location-intelligence data; integrated computerized system comprised of computer hardware and recorded computer software for the collection, editing, organizing, modifying, book marking, transmission, storage, and sharing of data and information related to threat discernment and analysis; downloadable computer management software to collect, organize, correlate, integrate, gather, capture, generate, analyze, and disseminate information, records, reports, and data, provide data sharing, access and integrate other databases, provide secure information exchange, facilitate project management, report and generate historical and geographic information system (GIS) mapping and geospatial mapping, track infrastructure capacity and capability, track and manage personnel, discern, track, and assess threats and damage, identify and track location and other geographic information, allocate and track inventory and vendors, and create, store, and organize documents, downloadable through electronic communications, the internet and mobile communications devices via a global computer network and portable and wireless networks and various platforms across multiple forms of media; downloadable computer software for use in public safety applications, threat discernment, emergencies, and crises, for database management, data analysis, and coordination of field personnel; downloadable computer software for sending distress notifications, geofencing, generating and receiving location-based notifications and personal proximity alerts, receiving news, alerts, updates and notifications on risks, crises, emergencies, and threats, and featuring tracking and locator functionality through GPS and geospatial and location-intelligence data; downloadable mobile application and associated downloadable data files for accessing and analyzing geospatial data; downloadable computer software and associated downloadable electronic data files featuring data for national and organizational security, security monitoring, asset identification, threat detection, threat intelligence, security integration, intrusion detection and prevention, and incident remediation for accessing and analyzing geospatial data; downloadable global positioning system (GPS) and geographic information system (GIS) software; downloadable computer software for locating, tracking, and monitoring threats; downloadable software for collecting, processing, transmitting, displaying, and analyzing geospatial data; downloadable computer software for digital modeling, data output, and data analysis in the field of threat detection; downloadable electronic data files featuring geospatial layers for geographical information system (GIS) use; downloadable geographic information system (GIS) software
Class 014
collectible coins; commemorative coins; non-monetary coins
Class 025
Headwear namely, hats, caps, and visors; clothing, namely, jackets; pants; shirts; shorts; sweat shirts; t-shirts; vests
Class 026
cloth patches for clothing; embroidered patches for clothing; ornamental cloth patches
Class 035
business project management; business risk management; business management of logistics for others; business consulting services relating to operations management, logistics, supply chain, and distribution solutions; business consulting services relating to product distribution; online retail store services featuring clothing, apparel, clothing accessories, coins, souvenirs, and miscellaneous gifts
Class 037
Installation of wiring in accessible geographical locations for distribution of electricity suitable for electric vehicle recharging stations
Class 041
Educational services, namely, conducting classes, courses, seminars, and workshops live and by means of electronic communications networks, and development and dissemination of printed educational materials for others, all in the fields of security and threat discernment and response
Class 042
Computer security threat analysis for protecting data; consulting in the field of artificial intelligence technology; geospatial analytics services for use in discerning, identifying, evaluating, and mitigating potential threats and risks; intelligence analysis consulting services, namely, public safety consulting services in the fields of national security, signals intelligence, human intelligence, open source intelligence, counterterrorism, cyber threats, counterintelligence, human terrain, all-source intelligence, geospatial intelligence, imagery intelligence, technical intelligence, metadata intelligence, and digital network intelligence; technical consultancy in the fields of situational awareness, risk management, and threat monitoring, assessment, and response; providing temporary use of online non-downloadable software for mapping geospatial data; providing temporary use of online non-downloadable software for use in public safety applications, threat discernment, emergencies, and crises, for database management, data analysis and coordination of field personnel; providing temporary use of online non-downloadable software for sending distress notifications, geofencing, generating and receiving location-based notifications and personal proximity alerts, receiving news, alerts, updates and notifications on risks, crises, emergencies, and threats, and featuring tracking and locator functionality through GPS and geospatial and location- intelligence data; providing temporary use of online non-downloadable global positioning system (GPS) and geographic information system (GIS) software; providing temporary use of online non- downloadable software for locating, tracking, and monitoring threats; providing temporary use of online non-downloadable software for collecting, processing, transmitting, displaying, and analyzing geospatial data; providing temporary use of online non-downloadable software for digital modeling, data output, and data analysis in the field of threat detection; providing temporary use of online non- downloadable geographic information system (GIS) software; site surveying for security assessments of physical locations; computer security consultation, namely, providing assessments of computer systems for security purposes; computer security threat analysis for protecting data
Class 045
Consulting services in the field of public safety; consulting services in the field of counter-terrorism; consulting in the field of security threat analysis for protecting public safety; Physical security consultation in the field of sustainable security measures and security program administration; surveillance; surveillance detection, namely, determining whether surveillance is being conducted; counter surveillance operations; security threat analysis for protecting public safety; security threat mitigation, namely, implementation of measures to mitigate security risk; security threat analysis for protecting personal safety; consulting services in the field of security threat analysis for protecting personal safety; security guard services, namely, providing and organizing advance teams for security of businesses and government agencies
Additional Information
Translation
The wording LEXSO has no meaning in a foreign language.
Classification
International Classes
009
014
025
026
035
037
041
042
045