Legal Representation
Attorney
Joshua S. Jarvis, Esq.
USPTO Deadlines
Application History
12 eventsDate | Code | Type | Description | Documents |
---|---|---|---|---|
Apr 2, 2025 | GNSL | F | LETTER OF SUSPENSION E-MAILED | Loading... |
Apr 2, 2025 | CNSL | R | SUSPENSION LETTER WRITTEN | Loading... |
Apr 2, 2025 | GNS3 | O | NOTIFICATION OF LETTER OF SUSPENSION E-MAILED | Loading... |
Mar 6, 2025 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
Mar 6, 2025 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
Mar 6, 2025 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Jan 16, 2025 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
Jan 16, 2025 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
Jan 16, 2025 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
Jan 8, 2025 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
Jan 7, 2025 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
Jun 16, 2024 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
Computer hardware; Downloadable computer software for use in the field of cybersecurity, namely, software for providing network session monitoring, analysis, detection and response, anomaly detection for network identities, identity security and configuration assistance, access management assistance, automated review, creation and enforcement of security policies, detecting anomalies in network user behavior, analyzing, calculating and reporting user risk score, applying adaptive authentication and authorization logic and automated response actions, reviewing, analyzing, remediating and reporting the contents of documents and computer files, and providing real-time communication functionality for assisting with all of the foregoing; downloadable computer hardware and software instruction manuals distributed with the foregoing.
Class 042
Providing on-line non-downloadable software for use in the field of cybersecurity, namely, software for providing network session monitoring, analysis, detection and response, anomaly detection for network identities, identity security and configuration assistance, access management assistance, automated review, creation and enforcement of security policies, detecting anomalies in network user behavior, analyzing, calculating and reporting user risk score, applying adaptive authentication and authorization logic and automated response actions, reviewing, analyzing, remediating and reporting the contents of documents and computer files, and providing real-time communication functionality for assisting with all of the foregoing; Providing online nondownloadable computer hardware and software instruction manuals distributed with the foregoing; software as a service (SAAS) services featuring software in the field of cybersecurity, namely, software for providing network session monitoring, analysis, detection and response, anomaly detection for network identities, identity security and configuration assistance, access management assistance, automated review, creation and enforcement of security policies, detecting anomalies in network user behavior, analyzing, calculating and reporting user risk score, applying adaptive authentication and authorization logic and automated response actions, reviewing, analyzing, remediating and reporting the contents of documents and computer files, and providing real-time communication functionality for assisting with all of the foregoing; Providing online non-downloadable computer hardware and software instruction manuals distributed with the foregoing; platform as a service (PAAS) services featuring software for use in the field of cybersecurity, namely, software for providing network session monitoring, analysis, detection and response, anomaly detection for network identities, identity security and configuration assistance, access management assistance, automated review, creation and enforcement of security policies, detecting anomalies in network user behavior, analyzing, calculating and reporting user risk score, applying adaptive authentication and authorization logic and automated response actions, reviewing, analyzing, remediating and reporting the contents of documents and computer files, and providing realtime communication functionality for assisting with all of the foregoing; Providing online nondownloadable computer hardware and software instructional manuals distributed with the foregoing.
Classification
International Classes
009
042