Legal Representation
Attorney
Amy Cohen Heller
USPTO Deadlines
Application History
16 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Oct 27, 2025 | MAB6 | E | ABANDONMENT NOTICE E-MAILED - NO USE STATEMENT FILED | Loading... |
| Oct 27, 2025 | ABN6 | S | ABANDONMENT - NO USE STATEMENT FILED | Loading... |
| Mar 25, 2025 | NOAM | E | NOA E-MAILED - SOU REQUIRED FROM APPLICANT | Loading... |
| Jan 28, 2025 | NPUB | E | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | Loading... |
| Jan 28, 2025 | PUBO | A | PUBLISHED FOR OPPOSITION | Loading... |
| Jan 22, 2025 | NONP | E | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | Loading... |
| Jan 4, 2025 | CNSA | P | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... |
| Nov 29, 2024 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| Nov 29, 2024 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Nov 29, 2024 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
| Nov 4, 2024 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Nov 4, 2024 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
| Nov 4, 2024 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Oct 19, 2024 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Sep 12, 2024 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| Apr 5, 2024 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
Downloadable computer software for cybersecurity analytics and for data analytics; Downloadable computer software for performing computer security information and event management (SIEM) operations; Downloadable computer software, namely downloadable security orchestration, automation and response (SOAR) software; Downloadable computer software for collecting, analyzing, evaluating, monitoring and transmitting data in the fields of cybersecurity, network security, enterprise security and enterprise maintenance; Downloadable computer software for advanced analytics to identify and monitor network access risks; Downloadable computer software for performing operations of big data ingestion; Downloadable computer software for creating and operating data lakes; Downloadable cloud computing software for managing cybersecurity risks in the fields of cyber threats, network vulnerabilities, data privacy; Downloadable computer software, namely downloadable computer software applications for providing business analytics; Downloadable computer software platforms for security information and event management (SIEM); Downloadable computer software using artificial intelligence for cybersecurity analytics and for data analytics; Downloadable computer software using artificial intelligence for coordinating computer security information event management (SIEM) operations; Downloadable computer software using artificial intelligence, namely downloadable security orchestration, automation and response (SOAR) software; Downloadable computer software using artificial intelligence for collecting, analyzing, evaluating, monitoring and transmitting data in the fields of cybersecurity, network security, enterprise security and enterprise maintenance; Downloadable computer software and downloadable software applications using artificial intelligence for providing operational intelligence in the field of business analytics, for providing information in the field of cybersecurity and for troubleshooting cybersecurity operations based on data
Class 042
Providing temporary use of non-downloadable computer software for cybersecurity analytics and for data analytics; Providing temporary use of non-downloadable computer software for performing computer security information and event management (SIEM) operations; Providing temporary use of non-downloadable computer software for security orchestration, automation and response (SOAR); Providing temporary use of non-downloadable computer software for collecting, analyzing, evaluating, monitoring and transmitting data in the fields of cybersecurity, network security, enterprise security and enterprise maintenance; Providing temporary use of non-downloadable computer software for advanced analytics to identify and monitor network access risks; Providing temporary use of non-downloadable computer software for performing operations of big data ingestion; Providing temporary use of non-downloadable computer software for creating and operating data lakes; Software as a service (SAAS) services featuring cloud computing software for managing cybersecurity risks in the fields of cyber threats, network vulnerabilities, data privacy; Providing temporary use of non-downloadable software for providing business analytics; Platform as a service (PAAS) featuring computer software platforms for security information and event management (SIEM); Providing temporary use of on-line non-downloadable software and non-downloadable software applications using artificial intelligence for providing business analytics; Providing temporary use of non-downloadable computer software using artificial intelligence for security information and event management (SIEM); Providing temporary use of non-downloadable computer software using artificial intelligence for collecting, analyzing, evaluating, monitoring and transmitting data in the fields of cybersecurity, network security, enterprise security and enterprise maintenance; Providing temporary use of non-downloadable software and applications using artificial intelligence for providing operational intelligence in the field of business analytics, for providing information in the field of cybersecurity and for troubleshooting cybersecurity operations based on data
Classification
International Classes
009
042