Legal Representation
Attorney
Kevin J. McDevitt
USPTO Deadlines
Application History
22 eventsDate | Code | Type | Description | Documents |
---|---|---|---|---|
Jul 23, 2025 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
Jul 23, 2025 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
Jul 23, 2025 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Apr 28, 2025 | XELR | I | APPLICATION EXTENSION TO RESPONSE PERIOD - RECEIVED | Loading... |
Apr 28, 2025 | XELG | O | APPLICATION EXTENSION GRANTED/RECEIPT PROVIDED | Loading... |
Jan 27, 2025 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
Jan 27, 2025 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
Jan 27, 2025 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
Sep 4, 2024 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
Sep 4, 2024 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
Sep 4, 2024 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Sep 3, 2024 | CHAN | I | APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED | Loading... |
Sep 3, 2024 | COAR | I | TEAS CHANGE OF OWNER ADDRESS RECEIVED | Loading... |
Sep 3, 2024 | REAP | I | TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED | Loading... |
Sep 3, 2024 | TCCA | I | TEAS CHANGE OF CORRESPONDENCE RECEIVED | Loading... |
Sep 3, 2024 | ARAA | I | ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED | Loading... |
Jun 4, 2024 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
Jun 4, 2024 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
Jun 4, 2024 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
May 30, 2024 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
Oct 16, 2023 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
Oct 16, 2023 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
Cryptographically secure random number generators in the nature of hardware random number generators, such as true random number generator (TRNG) systems, or quantum-based hardware or software-based security token devices, used in gateways, routers, and endpoint devices used to authenticate device and user identity; one time password and one time pad (OTP) pre-loaded OTP key and key management systems software and computer hardware for providing computer, digital appliance and digital device user identity authentication; pre-loaded or downloadable computer software for use in analyzing and benchmarking cybersecurity risk; pre-loaded or downloadable computer software for use in the detection, analysis, mitigation and resolution of threats in the field of cybersecurity; pre-loaded or downloadable computer software for data security; electronic encryption units; pre-loaded or downloadable system software for use in the encryption and decryption of digital files; secure microprocessors; secure terminals for electronic transactions; pre-loaded or downloadable software for ensuring the security of electronic communications over the local or public internet; computers; computer network adaptors; network routers; wireless routers; downloadable vendor supplied software development kits for securing intranet and internet network communications
Class 035
Business consultancy in the field of cybersecurity; cybersecurity risk assessment and analysis services for business purposes; procurement of information technology systems including network infrastructure, operational technology systems, industrial control systems, and related hardware and software network devices, hardware and software for the implementation of secure networks and electronic communications
Class 042
Providing one time password and one time pad (OTP) pre-loaded or downloadable software and provision of secure access devices via managed services, enterprise sale, or lease models for providing computer, digital appliance and digital device and user identity authentication across computing platforms; operational technology systems, and digital communication environments; Software-as-a-service (SaaS) services featuring one time pad (OTP) software for providing user identity authentication on computer information systems, endpoint devices and connected platforms; data security consulting in the field of using encryption, information system components and software to ensure that data cannot be accessed by unauthorized parties; data security services in the nature of network management and information security monitoring, threat detection and mitigation services including for IT and OT environments; design and development of computer security risk management computer programs; design and development of electronic data and electronic communication security systems; design and development of Internet security programs and applications for diverse digital systems; development of software for secure network operations; internet security consultancy; software as a service (SaaS) services featuring non-downloadable computer security software; software as a service (SaaS) services featuring non-downloadable software for computer network security; software as a service (SaaS) services featuring non-downloadable software for computer security; software as a service (SaaS) services featuring non-downloadable software for data security; data encryption and decoding services; software as a service (SaaS) services featuring non-downloadable software for encrypting data; testing, analysis and evaluation of information systems and communications security of others to determine conformity with the latest quantum-safe and cybersecurity standards; data security consultancy; testing, analysis and evaluation of electronic and digital devices, communications platforms and appliances of others as being protected from cyber threats to determine conformity with the latest quantum-safe and cybersecurity standards; testing, analysis and evaluation of electronic communication security systems of others to determine conformity with the latest quantum-safe and cybersecurity standards; software as a service (SaaS) services featuring non-downloadable software for automated cybersecurity monitoring and cybersecurity breach remediation; software as a service (SaaS) services featuring non-downloadable software for use in the detection, analysis, mitigation and resolution of threats in the field of cybersecurity; software as a service (SaaS) services featuring software for enabling others to access and use a virtual cybersecurity expert software platform for assessing and mitigating information security vulnerabilities; technical consultancy in the field of cybersecurity; cryptographic security systems and software engineering; providing on-line non-downloadable software for generating cryptographic keys; assessing information technology security and vulnerability of endpoints, network devices, and industrial systems, namely, security auditing and cybersecurity consulting services; authentication services for authenticating digital credentials, certificates, and encrypted identifiers, for system security; network and digital infrastructure security consultancy; computer security consultancy; computer security services in the nature of administering digital certificates; computer security services in the nature of administering digital keys; computer security services, namely, enforcing, restricting and controlling access privileges of users of digital systems and cloud, network, mobile or edge resources based on assigned credentials; cybersecurity threat analysis for protecting data and electronic communications; consultancy in the field of computer data security; consultancy services in the field of security for digital systems, network platforms, and electronic devices
Additional Information
Pseudo Mark
QUANTUM DEFENSE QD FIVE
Classification
International Classes
009
035
042
Disclaimers
The following terms have been disclaimed and are not claimed as part of the trademark:
Specific Disclaimer
"QUANTUM"