Legal Representation
Attorney
Carrie Bader
USPTO Deadlines
Next Deadline
2136 days remaining
Section 8 (6-Year) Declaration Due (Based on registration date 2025-06-03)
Due Date
June 03, 2031
Grace Period Ends
December 03, 2031
Additional deadlines exist. Contact your attorney for complete deadline information.
Application History
15 eventsDate | Code | Type | Description | Documents |
---|---|---|---|---|
Jun 3, 2025 | NRCC | E | NOTICE OF REGISTRATION CONFIRMATION EMAILED | Loading... |
Jun 3, 2025 | R.PR | A | REGISTERED-PRINCIPAL REGISTER | Loading... |
Apr 15, 2025 | NPUB | E | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | Loading... |
Apr 15, 2025 | PUBO | A | PUBLISHED FOR OPPOSITION | Loading... |
Apr 9, 2025 | NONP | E | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | Loading... |
Mar 17, 2025 | CNSA | O | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... |
Mar 11, 2025 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
Mar 11, 2025 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
Mar 11, 2025 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Mar 5, 2025 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
Mar 5, 2025 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
Mar 5, 2025 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
Feb 20, 2025 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
Jan 22, 2025 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
Aug 14, 2024 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 042
Computer security consulting; consulting in the field of information technology; consultation in the field of computer and network security for protecting data and information from unauthorized access, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security consultancy for protecting data and information from unauthorized access, namely, developing plans for improving computer and network security and preventing criminal activity; cloud computing featuring software for use in computer and network security; computer services, namely, cloud computing services in the field of computer and network security; computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; monitoring of computer systems for protecting data and information from unauthorized access; computer security consultancy for protecting data and information from unauthorized access and computer technology consulting of systems for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; computer security consultancy in the field of endpoint protection software and curated cyberthreat data for protecting data and information from unauthorized access computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints; software as a service (SAAS) services featuring software for computer and network security; software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; application service provider (ASP) featuring non-downloadable computer software for use in computer and network security; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; computer security consultancy in the field of administration of digital keys and digital certificates; computer security threat analysis services, namely, advanced computer threat detection services, using real-time monitoring and machine learning to detect computer threats and viruses, and providing detailed analysis and contextual intelligence to inform responses to sophisticated computer threats; computer security services, namely, monitoring and investigation of bad actors and adversaries across computer networks to neutralize emerging computer threats and improve cybersecurity and computer network security
First Use Anywhere:
Aug 5, 2024
First Use in Commerce:
Aug 5, 2024
Classification
International Classes
042
Disclaimers
The following terms have been disclaimed and are not claimed as part of the trademark:
Specific Disclaimer
"ADVERSARY"