Legal Representation
Attorney
Andrew D. Price & Paula E. Hopkins
USPTO Deadlines
Application History
8 eventsDate | Code | Type | Description | Documents |
---|---|---|---|---|
Apr 8, 2025 | XELG | O | APPLICATION EXTENSION GRANTED/RECEIPT PROVIDED | Loading... |
Apr 8, 2025 | XELR | I | APPLICATION EXTENSION TO RESPONSE PERIOD - RECEIVED | Loading... |
Jan 10, 2025 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
Jan 10, 2025 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
Jan 10, 2025 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
Nov 15, 2024 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
Oct 27, 2024 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
May 1, 2024 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 042
Providing, maintaining, and operating a subscription-based service that relies on the use of non-downloadable, hosted software for inspecting and editing full session live Internet traffic in both directions with highly accurate detection capabilities and automated removal or neutralization of criminal tactics, techniques and procedures (TTPs), threats, and malware in the field of computer information technology protection; providing, maintaining, and operating a non-downloadable, hosted software for inspecting and editing full session live Internet traffic in both directions with highly accurate detection capabilities and automated removal or neutralization of criminal tactics, techniques and procedures (TTPs), threats, and malware in the field of computer information technology protection; private cloud computing featuring software for use in inspecting and editing full session Internet traffic in both directions with automated removal or neutralization of criminal tactics, techniques and procedures (TTPs), threats, and malware in the field of computer information technology protection; computer security services, namely, restricting unauthorized access to computer networks by identifying harmful and potentially harmful activity from outside a computer network and implementing computer software protection against it succeeding in the field of computer information technology protection; computer network security; computer security threat analysis for protecting data; technical consultancy services in the field of computer information technology protection; computer security consultancy; computer network security consultancy; providing news and information via a website in the field of computer information technology protection
Additional Information
Design Mark
The mark consists of a stylized 3.
Color Claim
Color is not claimed as a feature of the mark.
Pseudo Mark
THREE
Classification
International Classes
042