Legal Representation
Attorney
James D. Johnson
USPTO Deadlines
Application History
20 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Jul 23, 2025 | MAB2 | E | ABANDONMENT NOTICE E-MAILED - FAILURE TO RESPOND | Loading... |
| Jul 23, 2025 | ABN2 | O | ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE | Loading... |
| Apr 8, 2025 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Apr 8, 2025 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
| Apr 8, 2025 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Feb 21, 2025 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| Feb 21, 2025 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Feb 21, 2025 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
| Jan 14, 2025 | CHAN | I | APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED | Loading... |
| Jan 14, 2025 | ALIE | A | ASSIGNED TO LIE | Loading... |
| Dec 12, 2024 | EWAF | I | TEAS WITHDRAWAL OF ATTORNEY RECEIVED-FIRM RETAINS | Loading... |
| Dec 12, 2024 | TCCA | I | TEAS CHANGE OF CORRESPONDENCE RECEIVED | Loading... |
| Dec 12, 2024 | ARAA | I | ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED | Loading... |
| Dec 12, 2024 | REAP | I | TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED | Loading... |
| Nov 25, 2024 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Nov 25, 2024 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
| Nov 25, 2024 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Nov 23, 2024 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Nov 7, 2024 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| May 9, 2024 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 042
Cyber security consulting services in the field of cyber-attack protection; Computer security services, namely, cyber security and data breach protection in the nature of restricting access to and from computer networks of undesired websites, enforcing, restricting and controlling access privileges of users of cloud computing resources based on assigned credentials, updating of computer software relating to computer security and prevention of computer risks, data loss, and data recovery services in the field of computer security; Utilizing artificial intelligence (AI) to assist in threat identification for vulnerabilities.
First Use Anywhere:
Feb 10, 2022
First Use in Commerce:
Feb 10, 2022
Additional Information
Pseudo Mark
CYBER AL
Classification
International Classes
042