Legal Representation
Attorney
Michael J. Colitz, III
USPTO Deadlines
Application History
17 eventsDate | Code | Type | Description | Documents |
---|---|---|---|---|
May 6, 2024 | MAB6 | E | ABANDONMENT NOTICE E-MAILED - NO USE STATEMENT FILED | Loading... |
May 6, 2024 | ABN6 | S | ABANDONMENT - NO USE STATEMENT FILED | Loading... |
Oct 3, 2023 | NOAM | E | NOA E-MAILED - SOU REQUIRED FROM APPLICANT | Loading... |
Aug 8, 2023 | NPUB | E | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | Loading... |
Aug 8, 2023 | PUBO | A | PUBLISHED FOR OPPOSITION | Loading... |
Jul 19, 2023 | NONP | E | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | Loading... |
Jul 5, 2023 | CNSA | P | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... |
Jun 15, 2023 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
Jun 14, 2023 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Jun 14, 2023 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
May 15, 2023 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
May 15, 2023 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
May 15, 2023 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
May 15, 2023 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
Jan 6, 2023 | MDSM | E | NOTICE OF DESIGN SEARCH CODE E-MAILED | Loading... |
Jan 5, 2023 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
Dec 12, 2022 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 042
software as a service (SAAS) services featuring software to enable use of protected data on the cloud, using confidential computing to improve the protection of all the data in use by encrypting the data while in process of use and protecting the data in process utilizing an ephemeral idempotent environment consisting of a software defined infrastructure that is provisioned on demand, used, then deprovisioned on demand when use is no longer suitable and using confidential computing environments using zero trust principles a security and privacy-enhancing computational technique including secure enclaves, focused on protecting data in transit, at rest and in use; information technology consulting services relating to computer software design, architecture and infrastructure in the field of protecting high value data in processing; computer software consulting, namely, providing technical consulting and support services in the field of protecting high value data in processing; development of new technology for others in the field of information technology infrastructure solutions for the purpose of improving the protection of data for organizations and businesses
Additional Information
Design Mark
The mark consists of building blocks forming the letter "V".
Pseudo Mark
VECTOR
Classification
International Classes
042