Legal Representation
Attorney
Tyler M. Beas
USPTO Deadlines
Application History
17 eventsDate | Code | Type | Description | Documents |
---|---|---|---|---|
Mar 4, 2024 | MAB6 | E | ABANDONMENT NOTICE E-MAILED - NO USE STATEMENT FILED | Loading... |
Mar 4, 2024 | ABN6 | S | ABANDONMENT - NO USE STATEMENT FILED | Loading... |
Aug 1, 2023 | NOAM | E | NOA E-MAILED - SOU REQUIRED FROM APPLICANT | Loading... |
Jun 6, 2023 | NPUB | E | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | Loading... |
Jun 6, 2023 | PUBO | A | PUBLISHED FOR OPPOSITION | Loading... |
May 17, 2023 | NONP | E | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | Loading... |
May 1, 2023 | CNSA | P | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... |
Apr 13, 2023 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
Apr 12, 2023 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
Apr 12, 2023 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Feb 22, 2023 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
Jan 12, 2023 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
Jan 12, 2023 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
Jan 12, 2023 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
Jan 5, 2023 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
Aug 31, 2022 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
Aug 15, 2022 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 035
Promoting the use of the security assurance best practices of others in the field of cloud computing; Business data analysis; Analyzing and compiling business data; Systemization of data into computer databases
Class 041
Technical consulting in the field of cybersecurity risk management training
Class 042
Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Technology consultation in the field of cybersecurity; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Computer programming consultancy in the field of cybersecurity; Computer network security consultancy; Telecommunication network security consultancy; Internet security consultancy; Data security consultancy; Computer security consultancy; Testing of security systems; Computer security services, namely, restricting unauthorized network access by users without credentials; Computer security threat analysis for protecting data; Computer security services, namely, enforcing, restricting, and controlling access privileges of users of computing resources for cloud, mobile, or network resources based on assigned credentials; Development of security systems and contingency planning for information systems; Computer security services in the nature of administering digital keys; Maintenance of computer software relating to computer security and prevention of computer risks; Updating of computer software relating to computer security and prevention of computer risks; Professional computer services, namely, network analysis, LAN/WAN design, wireless engineering, virtualization and computer project management; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Design and development of electronic data security systems; Computer security services, namely, restricting unauthorized access to computer networks; Data automation and collection service using proprietary software to evaluate, analyze, and collect service data; Data conversion of computer programs and data, not physical conversion; Recovery of computer data; Data conversion of electronic information; Implementation of Zero Trust architecture to Operational Technology networks; Development of Zero Trust Architecture Designs in Industrial Control Systems and Operational Technology Environments
Additional Information
Pseudo Mark
ZT FOUR OT
Classification
International Classes
035
041
042