Legal Representation
Attorney
                                            Christina M. Licursi
                                        USPTO Deadlines
Application History
19 events| Date | Code | Type | Description | Documents | 
|---|---|---|---|---|
| Sep 11, 2025 | EISU | I | TEAS STATEMENT OF USE RECEIVED | Loading... | 
| Mar 11, 2025 | NOAM | E | NOA E-MAILED - SOU REQUIRED FROM APPLICANT | Loading... | 
| Jan 14, 2025 | PUBO | A | PUBLISHED FOR OPPOSITION | Loading... | 
| Jan 14, 2025 | NPUB | E | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | Loading... | 
| Jan 8, 2025 | NONP | E | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | Loading... | 
| Dec 19, 2024 | CNSA | P | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... | 
| Dec 10, 2024 | XAEC | I | EXAMINER'S AMENDMENT ENTERED | Loading... | 
| Dec 10, 2024 | CNEA | R | EXAMINERS AMENDMENT -WRITTEN | Loading... | 
| Dec 10, 2024 | GNEN | O | NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED | Loading... | 
| Dec 10, 2024 | GNEA | F | EXAMINERS AMENDMENT E-MAILED | Loading... | 
| Nov 11, 2024 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... | 
| Nov 11, 2024 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... | 
| Nov 11, 2024 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... | 
| Oct 8, 2024 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... | 
| Oct 8, 2024 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... | 
| Oct 8, 2024 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... | 
| Oct 4, 2024 | DOCK | D | ASSIGNED TO EXAMINER | Loading... | 
| Aug 26, 2024 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... | 
| Mar 26, 2024 | NWAP | I | NEW APPLICATION ENTERED | Loading... | 
Detailed Classifications
                                                Class 042
                                            
                                        Installation of computer software for network and application security in the areas of network vulnerability exploitation, network vulnerability management and assessment, and network remediation management; computer consultation in the field of computer security risks, computer network security risks, and internet security risks; computer and internet security testing services to determine and identify information and network security vulnerabilities and risks and help to prioritize remediations; computer network security services, namely, assessing, auditing, and monitoring network vulnerabilities and security risks and reporting thereon; computer system analysis services for installation of computer systems; providing temporary use of online non-downloadable computer software for use in detecting, analyzing, and prioritizing cyber computer threats and vulnerabilities; Software as a Service (SAAS) services featuring software for use in detecting, analyzing, and prioritizing cyber computer threats and vulnerabilities; design and development of electronic data security systems; computer security threat analysis for protecting data; development of software for secure network operations; computer security consultancy, namely, scanning, auditing and monitoring computer systems and networks for vulnerabilities and other security risks; computer security consultancy, namely, scanning, auditing, analyzing, measuring, and monitoring computer systems and networks for vulnerabilities, security threats, and other cybersecurity risks; security risk assessment and response and managed security threat detection in on-premises, hosted, hybrid, and cloud computing environments; maintenance of computer software relating to computer security and prevention of computer risks; providing temporary use of non-downloadable software and applications for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; providing temporary use of non-downloadable software and applications for detecting fraudulent transactions and activities; providing temporary use of non-downloadable software and applications for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; providing temporary use of non-downloadable software and applications for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; providing temporary use of non-downloadable software and applications for use in analyzing and monitoring computer networks; providing temporary use of non-downloadable software and applications for diagnosing industrial and business performance issues; providing temporary use of non-downloadable software and applications in the field of application analytics; providing temporary use of non-downloadable software and applications for providing operational intelligence, business analytics, security information, and troubleshooting based on data; providing temporary use of non-downloadable data mining software; consulting in the field of information technology relating to installation, maintenance and repair of computer software; technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of information technology and services; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing and information technology systems
                                        Classification
                                            
                                            International Classes
                                        
                                        
                                                    042