Legal Representation
Attorney
Jonathan L. Hood
USPTO Deadlines
Next Deadline
1826 days remaining
Section 8 Declaration Due (Principal Register) (Based on registration date 20250114)
Due Date
January 14, 2031
Grace Period Ends
July 14, 2031
Additional deadlines exist. Contact your attorney for complete deadline information.
Application History
22 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Jan 14, 2025 | NRCC | E | NOTICE OF REGISTRATION CONFIRMATION EMAILED | Loading... |
| Jan 14, 2025 | R.PR | A | REGISTERED-PRINCIPAL REGISTER | Loading... |
| Nov 26, 2024 | NPUB | E | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | Loading... |
| Nov 26, 2024 | PUBO | A | PUBLISHED FOR OPPOSITION | Loading... |
| Nov 20, 2024 | NONP | E | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | Loading... |
| Oct 19, 2024 | CNSA | O | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... |
| Oct 15, 2024 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| Oct 14, 2024 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Oct 14, 2024 | ERFR | I | TEAS REQUEST FOR RECONSIDERATION RECEIVED | Loading... |
| Jul 17, 2024 | GNFN | O | NOTIFICATION OF FINAL REFUSAL EMAILED | Loading... |
| Jul 17, 2024 | GNFR | O | FINAL REFUSAL E-MAILED | Loading... |
| Jul 17, 2024 | CNFR | R | FINAL REFUSAL WRITTEN | Loading... |
| Jun 23, 2024 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| Jun 23, 2024 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Jun 23, 2024 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
| May 3, 2024 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| May 3, 2024 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
| May 3, 2024 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Apr 19, 2024 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Sep 21, 2023 | MDSC | E | NOTICE OF DESIGN SEARCH CODE E-MAILED | Loading... |
| Sep 20, 2023 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| Aug 25, 2023 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 042
Software as a service (SAAS) services featuring software for computer and network security; Software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; Application service provider (ASP) featuring non-downloadable computer software for use in computer and network security; Computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; Computer security consultancy in the field of administration of digital keys and digital certificates; Computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; Computer security consultation; Consulting in the field of information technology relating to installation, maintenance and repair of computer software; Computer consultation in the field of computer and network security in the nature of computer and network software security; Computer security consultancy in the field of scanning and penetration testing computers and networks to assess information security vulnerability; Maintenance and updating of computer software relating to computer and network security and prevention of computer risks; Computer security consultancy, namely, developing plans for improving computer and network security for businesses and governmental agencies; Computer security consultancy, namely, developing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies; Cloud computing featuring software for use in computer and network security; Cloud computing services in the field of computer and network security; Computer systems analysis; Computer security consultancy in the nature of implementing plans for improving computer and network security and preventing criminal activity for businesses and governmental agencies, namely, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; Computer security consultancy, namely, identifying malware on computer systems; Computer security consultancy, namely, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; Consultation for protecting data and information from unauthorized access in the field of computer and network security; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy for protecting data and information from unauthorized access, namely, developing plans for improving computer and network security and preventing criminal activity; Computer security consultancy for protecting data and information from unauthorized access; Computer security consultancy for protecting data and information from unauthorized access in the field of endpoint protection software or curated cyberthreat data for computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints; Computer technology consulting of systems for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; Monitoring of computer systems for protecting data and information from unauthorized access; Provision of systems for the management of computer and network threats, namely, surveillance and monitoring of vulnerability and security problems in computer software and software for computer networks
First Use Anywhere:
Mar 19, 2020
First Use in Commerce:
Mar 19, 2020
Class 045
Monitoring of computer systems for security purposes in the nature of surveillance services relating to the physical safety of persons and security of tangible property; Provision of systems for the management of computer and network threats, namely, surveillance and monitoring of vulnerability and security problems in computer hardware; Implementing plans for improving computer hardware and hardware for network security for businesses and governmental agencies, namely, computer security assurance, administration of digital keys and digital certificates, providing fraud detection services for electronic funds transfer, and credit and debit card and electronic check transactions via a global computer network
First Use Anywhere:
Mar 19, 2020
First Use in Commerce:
Mar 19, 2020
Additional Information
Design Mark
The mark consists of a double chevron, with the bottom shape thicker than the top shape.
Color Claim
Color is not claimed as a feature of the mark.
Classification
International Classes
042
045