Legal Representation
Attorney
Andrew T. Pettit
USPTO Deadlines
Application History
19 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Jul 2, 2024 | MAB1 | E | ABANDONMENT NOTICE E-MAILED - EXPRESS ABANDONMENT | Loading... |
| Jul 2, 2024 | ABN1 | O | ABANDONMENT - EXPRESS MAILED | Loading... |
| Jun 25, 2024 | EXAR | I | TEAS EXPRESS ABANDONMENT RECEIVED | Loading... |
| Jun 5, 2024 | XELG | O | APPLICATION EXTENSION GRANTED/RECEIPT PROVIDED | Loading... |
| Jun 5, 2024 | XELR | I | APPLICATION EXTENSION TO RESPONSE PERIOD - RECEIVED | Loading... |
| Mar 6, 2024 | GNFN | O | NOTIFICATION OF FINAL REFUSAL EMAILED | Loading... |
| Mar 6, 2024 | GNFR | O | FINAL REFUSAL E-MAILED | Loading... |
| Mar 6, 2024 | CNFR | R | FINAL REFUSAL WRITTEN | Loading... |
| Feb 12, 2024 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| Feb 12, 2024 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Feb 12, 2024 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
| Feb 2, 2024 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Feb 2, 2024 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
| Feb 2, 2024 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Feb 2, 2024 | LOPR | P | LETTER OF PROTEST EVIDENCE REVIEWED-NO FURTHER ACTION TAKEN | Loading... |
| Jan 8, 2024 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Oct 11, 2023 | LOPT | I | LETTER OF PROTEST EVIDENCE FORWARDED | Loading... |
| Apr 17, 2023 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| Apr 14, 2023 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 042
Providing online non-downloadable software for identifying, analyzing, and addressing security threats; providing online non-downloadable software for security professionals in discovering and remediating security threads discovered through analysis of digital activities; providing online non-downloadable software using machine learning for identifying and documenting threats in the field of cybersecurity; providing online non-downloadable software using machine learning to determine the normal communication behavior of individuals to identify unusual communication behavior; providing online non downloadable software using machine learning to discover instances of account takeover, document risk of unauthorized account access, and determine security of documentation; computer security services for analyzing digital activities to discover security threats and assisting users in documenting and addressing those security threats; computer security services for analyzing digital communications occurring across email and messaging platforms to discover security threats; computer security services for analyzing digital activities to discover instances of account takeover, document risk of unauthorized account access, and determine security of documentation; security services in the nature of cybersecurity, namely, automated discovering, judging, summarizing, and remediating of security threats to assist users in addressing those security threats; security services in the nature of cybersecurity, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; security services in the nature of cybersecurity namely, monitoring, detecting, and remediating instances of account takeover; software as a service (SaaS) services featuring software analyzing digital activities, communications, and accounts to identify security threats; platform as a service (PaaS) services featuring software-implemented platforms for the automated discovery, analysis, and remediation of security threats; computer security consultancy; computer security services for fully- or semi-automated analysis in the field of cybersecurity; computer security services for security professionals in monitoring for security threats and addressing those security threats
Additional Information
Pseudo Mark
SECURITY OPERATIONS CENTER COPILOT
Classification
International Classes
042
Disclaimers
The following terms have been disclaimed and are not claimed as part of the trademark:
Specific Disclaimer
SOC