Legal Representation
Attorney
                                            Michael A. Grow
                                        USPTO Deadlines
Application History
22 events| Date | Code | Type | Description | Documents | 
|---|---|---|---|---|
| Oct 20, 2025 | CNSA | P | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... | 
| Oct 14, 2025 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... | 
| Oct 13, 2025 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... | 
| Oct 13, 2025 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... | 
| Sep 12, 2025 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... | 
| Sep 12, 2025 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... | 
| Sep 12, 2025 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... | 
| Sep 2, 2025 | ZZZX | Z | PREVIOUS ALLOWANCE COUNT WITHDRAWN | Loading... | 
| Aug 26, 2025 | PBCR | Z | WITHDRAWN FROM PUB - OG REVIEW QUERY | Loading... | 
| Jul 26, 2025 | CNSA | P | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... | 
| May 9, 2025 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... | 
| May 9, 2025 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... | 
| May 9, 2025 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... | 
| Feb 11, 2025 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... | 
| Feb 11, 2025 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... | 
| Feb 11, 2025 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... | 
| Feb 7, 2025 | DOCK | D | ASSIGNED TO EXAMINER | Loading... | 
| Jan 23, 2025 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... | 
| Nov 4, 2024 | AMPX | O | PRELIMINARY/VOLUNTARY AMENDMENT - ENTERED | Loading... | 
| Nov 4, 2024 | ALIE | A | ASSIGNED TO LIE | Loading... | 
| Aug 8, 2024 | PARI | I | TEAS VOLUNTARY AMENDMENT RECEIVED | Loading... | 
| Jul 31, 2024 | NWAP | I | NEW APPLICATION ENTERED | Loading... | 
Detailed Classifications
                                                Class 042
                                            
                                        (Based on 44(e)) Software as a service (SAAS) services featuring software using artificial intelligence (AI) for designing business models for start-ups; Scientific and technological services, namely, research and design in the field of computer networking hardware, computer data enter architecture, artificial intelligence, cybersecurity, and complex systems algorithms; Analysis of industrial fluids and industrial research in the field of artificial intelligence and cyber security; industrial analysis and research services, namely, analysis and research in the field of artificial intelligence; Development and design of computer hardware and software; Platform as a service (PAAS) featuring computer software platforms using artificial intelligence (AI) for facial and speech recognition, use in database management, machine learning; providing temporary use of online, non-downloadable artificial intelligence computer programs for audio, video and text processing and the development of algorithms and AI models on data network; Science and technology services in the nature of research and development of computer software; Conducting of scientific feasibility studies; Computer software design and customization; new product design services; Information technology consulting services relating to installation, maintenance and repair of computer software; technology consultation in the field of computer software system integration and complex system models and algorithms development; Design of models, sets and props for motion pictures, videos, commercials and movie trailers; Software as a service (SAAS) services featuring software for business consulting services in the field of business model design (Based on ITU) Consulting services in the field of new product design; Cybersecurity, IT security, protection and restoration namely, computer security consultancy services, computer security threat analysis for protecting data, design and development of electronic data security systems, data security consultancy, Internet security consultancy, computer network security services, monitoring of computer systems for security purposes, namely, for protecting data and information from unauthorized access, security assessment services for computer networks and systems in the nature of detecting unauthorized access or data breaches, data encryption services, computer virus protection services, recovery of computer data, remote computer backup services, computer diagnostic services; software as a service (SAAS) services featuring software for designing business models for startups; cloud computing featuring software for artificial intelligence model training and deployment, execution of minimum viable product (MVP) platforms, allowing companies to rapidly develop, deploy, and iterate on software prototypes with scalable infrastructure and collaborative development tools; remote computer backup services; providing user authentication services using single sign-on technology for computer security, namely, cryptocurrency transactions, e-commerce transactions; provision of security services for computer networks in the nature of computer security services, namely restricting unauthorized computer network access and e-commerce transactions by unauthorized users, malicious actors, users without proper credentials, automated bots, known threat vectors, compromised devices, and entities attempting to circumvent established security protocols; computer programming services, namely, design and development of electronic data security systems; data encryption services; computer diagnostic services; development of on-line computer software systems
                                        Classification
                                            
                                            International Classes
                                        
                                        
                                                    042