Legal Representation
Attorney
Theresa D. Koller
USPTO Deadlines
Application History
18 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Mar 12, 2025 | MAB2 | E | ABANDONMENT NOTICE E-MAILED - FAILURE TO RESPOND | Loading... |
| Mar 12, 2025 | ABN2 | O | ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE | Loading... |
| Jan 14, 2025 | CHAN | I | APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED | Loading... |
| Jan 14, 2025 | ALIE | A | ASSIGNED TO LIE | Loading... |
| Dec 19, 2024 | TCCA | I | TEAS CHANGE OF CORRESPONDENCE RECEIVED | Loading... |
| Dec 19, 2024 | CHAN | I | APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED | Loading... |
| Dec 19, 2024 | COAR | I | TEAS CHANGE OF OWNER ADDRESS RECEIVED | Loading... |
| Dec 12, 2024 | EWAF | I | TEAS WITHDRAWAL OF ATTORNEY RECEIVED-FIRM RETAINS | Loading... |
| Dec 12, 2024 | TCCA | I | TEAS CHANGE OF CORRESPONDENCE RECEIVED | Loading... |
| Dec 12, 2024 | ARAA | I | ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED | Loading... |
| Dec 12, 2024 | REAP | I | TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED | Loading... |
| Nov 22, 2024 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Nov 22, 2024 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
| Nov 22, 2024 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Nov 18, 2024 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Nov 3, 2024 | MDSC | E | NOTICE OF DESIGN SEARCH CODE E-MAILED | Loading... |
| Nov 3, 2024 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| May 2, 2024 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
Downloadable anti-malware software; Downloadable anti-virus software; Downloadable security software; Downloadable computer firewall software; Downloadable computer software for the creation of firewalls; Downloadable intelligent software for computer security; Downloadable privacy protection software; Downloadable computer software for protecting confidential information from third parties; Downloadable computer software for protection and security of data; Downloadable computer software for improving operating system performance; Downloadable computer software to maintain and operate computer systems; Virtual private network (VPN) hardware; Downloadable virtual private network (VPN) software; Downloadable software based on artificial intelligence for protecting computers from viruses and other threats, optimizing security settings; Downloadable computer programs using artificial intelligence for protecting computers from viruses and other threats, optimizing security settings; Downloadable software to verify personal identity; Downloadable authentication software
First Use Anywhere:
Mar 5, 2024
First Use in Commerce:
Mar 5, 2024
Class 042
Computer security services, namely, Computer security services, namely, protecting computers from viruses and other threats, optimizing security setting; User authentication services for computer security, namely, using single sign-on technology for online software applications; Verification of personal identification, namely, electronic signature verification services using technology to authenticate user identity; Data security services, namely, design, development and testing of electronic data security firewalls systems and network security infrastructure; Design and development of electronic data security systems; Computer software development; Computer security services for protection against illegal network access, namely, restricting unauthorized network access by users without credentials; Testing of security systems; Computer security consultancy in the field of protecting computers from viruses and other threats, optimizing security setting; Maintenance of computer software relating to computer security and prevention of computer risks; Data security services, restricting unauthorized access to networks via firewalls; Computer security threat analysis for protecting data; IT consultancy, advisory and information services relating to installation, maintenance, and repair of computer software; Computer virus protection services; Data encryption services; Data security consultancy; Monitoring of computer systems for detecting unauthorized access or data breach; Software as a service (SaaS) services, feature software for protecting computers from viruses and other threats, optimizing security setting; User authentication services for computer security, namely, using single sign-on technology for online software applications; Verification of personal identification, namely, electronic signature verification services using technology to authenticate user identity; Data security services, namely, design, development and testing of electronic data security firewalls systems and network security infrastructure; Design and development of electronic data security systems; Computer software development; Computer security services for protection against illegal network access, namely, restricting unauthorized network access by users without credentials; Testing of security systems; Computer security consultancy in the field protecting computers from viruses and other threats, optimizing security setting; Maintenance of computer software relating to computer security and prevention of computer risks; Data security services, restricting unauthorized access to networks via firewalls; Computer security threat analysis for protecting data; IT consultancy, advisory and information services relating to installation, maintenance, and repair of computer software; Computer virus protection services; Data encryption services; Data security consultancy; Monitoring of computer systems for detecting unauthorized access or data breach; Software as a service (SaaS) services, feature software for protecting computers from viruses and other threats, optimizing security setting.
First Use Anywhere:
Mar 5, 2024
First Use in Commerce:
Mar 5, 2024
Additional Information
Design Mark
The mark consists of a rectangle with rounded edges representing an electronic device screen with a stylized windshield wiper attached at the top, centered, and the wiper blade positioned to the right side of the screen and the blade has swept away hazy areas at the top, the bottom, and both sides of the screen creating an open space where the wiper blade has crossed the screen, and near the bottom of the screen is displayed a thick black circular line that is open ended and has four small claws at the top of one end.
Color Claim
Color is not claimed as a feature of the mark.
Classification
International Classes
009
042