Legal Representation
Attorney
James D. Johnson
USPTO Deadlines
Next Deadline
57 days remaining
Abandonment Notice E-Mailed - Failure to Respond
Due Date
September 23, 2025
Application History
20 eventsDate | Code | Type | Description | Documents |
---|---|---|---|---|
Jul 23, 2025 | MAB2 | E | ABANDONMENT NOTICE E-MAILED - FAILURE TO RESPOND | Loading... |
Jul 23, 2025 | ABN2 | O | ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE | Loading... |
Apr 8, 2025 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
Apr 8, 2025 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
Apr 8, 2025 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
Feb 21, 2025 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
Feb 21, 2025 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
Feb 21, 2025 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Jan 14, 2025 | ALIE | A | ASSIGNED TO LIE | Loading... |
Jan 14, 2025 | CHAN | I | APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED | Loading... |
Dec 12, 2024 | REAP | I | TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED | Loading... |
Dec 12, 2024 | ARAA | I | ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED | Loading... |
Dec 12, 2024 | EWAF | I | TEAS WITHDRAWAL OF ATTORNEY RECEIVED-FIRM RETAINS | Loading... |
Dec 12, 2024 | TCCA | I | TEAS CHANGE OF CORRESPONDENCE RECEIVED | Loading... |
Nov 25, 2024 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
Nov 25, 2024 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
Nov 25, 2024 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
Nov 23, 2024 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
Nov 7, 2024 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
May 9, 2024 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 042
Cyber security consulting services in the field of cyber-attack protection; Computer security services, namely, cyber security and data breach protection in the nature of restricting access to and from computer networks of undesired websites, enforcing, restricting and controlling access privileges of users of cloud computing resources based on assigned credentials, updating of computer software relating to computer security and prevention of computer risks, data loss, and data recovery services in the field of computer security; Utilizing artificial intelligence (AI) to assist in threat identification for vulnerabilities.
First Use Anywhere:
Feb 10, 2022
First Use in Commerce:
Feb 10, 2022
Additional Information
Pseudo Mark
CYBER AL
Classification
International Classes
042