Legal Representation
Attorney
Andrew D. Price & Paula E. Hopkins
USPTO Deadlines
Next Deadline
44 days remaining
Final Refusal E-Mailed
Due Date
September 10, 2025
Extension Available
Until December 10, 2025
Application History
14 eventsDate | Code | Type | Description | Documents |
---|---|---|---|---|
Jun 10, 2025 | GNFR | O | FINAL REFUSAL E-MAILED | Loading... |
Jun 10, 2025 | GNFN | O | NOTIFICATION OF FINAL REFUSAL EMAILED | Loading... |
Jun 10, 2025 | CNFR | R | FINAL REFUSAL WRITTEN | Loading... |
May 7, 2025 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
May 7, 2025 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
May 7, 2025 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Feb 7, 2025 | XELG | O | APPLICATION EXTENSION GRANTED/RECEIPT PROVIDED | Loading... |
Feb 7, 2025 | XELR | I | APPLICATION EXTENSION TO RESPONSE PERIOD - RECEIVED | Loading... |
Nov 7, 2024 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
Nov 7, 2024 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
Nov 7, 2024 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
Nov 6, 2024 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
Oct 28, 2024 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
May 1, 2024 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 042
Providing subscription-based temporary use of on-line non-downloadable software for detecting and removing computer security threats and computer viruses; providing temporary use of on-line non-downloadable hosted software for detecting and removing computer security threats and computer viruses; providing temporary use of non-downloadable cloud-based software for detecting and removing computer security threats and computer viruses; computer security services, namely, restricting unauthorized access to computer networks by identifying harmful and potentially harmful activity from outside a computer network and implementing computer software protection against it succeeding in the field of computer information technology protection; computer network security consulting; computer security threat analysis for protecting data; technical consultancy services in the field of computer information technology protection; computer security consultancy; computer network security consultancy; providing news and information via a website in the field of computer information technology protection
Additional Information
Design Mark
The mark consists of the stylized words "TRINITYCYBER", with TRINITY in black and CYBER in blue.
Color Claim
The color(s) black and blue is/are claimed as a feature of the mark.
Pseudo Mark
TRINITY CYBER
Classification
International Classes
042
Disclaimers
The following terms have been disclaimed and are not claimed as part of the trademark:
Specific Disclaimer
CYBER