Legal Representation
Attorney
Andrew T. Pettit
USPTO Deadlines
Application History
25 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Oct 8, 2025 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Oct 8, 2025 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
| Oct 8, 2025 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Oct 8, 2025 | IUAA | P | USE AMENDMENT ACCEPTED | Loading... |
| Oct 1, 2025 | ALIE | A | ASSIGNED TO LIE | Loading... |
| Oct 1, 2025 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| Oct 1, 2025 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Sep 24, 2025 | ERFR | I | TEAS REQUEST FOR RECONSIDERATION RECEIVED | Loading... |
| Sep 22, 2025 | AUPC | I | AMENDMENT TO USE PROCESSING COMPLETE | Loading... |
| Sep 22, 2025 | IUAF | S | USE AMENDMENT FILED | Loading... |
| Sep 22, 2025 | EAAU | I | TEAS AMENDMENT OF USE RECEIVED | Loading... |
| Jun 24, 2025 | XELR | I | APPLICATION EXTENSION TO RESPONSE PERIOD - RECEIVED | Loading... |
| Jun 24, 2025 | XELG | O | APPLICATION EXTENSION GRANTED/RECEIPT PROVIDED | Loading... |
| Mar 26, 2025 | GNFR | O | FINAL REFUSAL E-MAILED | Loading... |
| Mar 26, 2025 | GNFN | O | NOTIFICATION OF FINAL REFUSAL EMAILED | Loading... |
| Mar 26, 2025 | CNFR | R | FINAL REFUSAL WRITTEN | Loading... |
| Feb 19, 2025 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
| Feb 19, 2025 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| Feb 19, 2025 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Nov 21, 2024 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
| Nov 21, 2024 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Nov 21, 2024 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Nov 12, 2024 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Oct 20, 2024 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| Apr 26, 2024 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 042
Providing online non-downloadable software that utilizes machine learning in the field of cybersecurity for restricting unauthorized access to computer systems and computer programs; Providing online non-downloadable software that utilizes machine learning to determine the normal communication behavior of individuals to identify unusual communication behavior; Computer services for analyzing digital activities to discover security threats; Computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats; Computer security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; Computer security services, namely, remediating instances of account takeover by restricting unauthorized access to accounts for email and messaging management services; Computer security services, namely, monitoring of computer systems to detect instances of account takeover; Software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; Platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; Email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; Software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; Computer security consultancy; Computer security services for evaluating emails to identify fraudulent individuals and entities, such as vendors, and then monitoring the computer systems of those fraudulent individuals and entities on an ongoing basis to detect fraud; Computer services for recording behaviors of individuals and entities deemed to be fraudulent in a blacklist for security purposes, namely, identifying and examining digital communications involving individuals and entities to identify security threats; Computer services for tracking digital activities of individuals and entities determined to be fraudulent based on an analysis of emails sent by those individuals and entities, namely, monitoring digital communications involving individuals and entities determined to be fraudulent to identify security threats; Computer services for generating a federated collection of individuals and entities to prevent security threats, namely, online of digital communications in computer systems for threat prevention and for identifying and cataloging individuals' and entities' behaviors to prevent fraud
First Use Anywhere:
20250500
First Use in Commerce:
20250500
Classification
International Classes
042