Legal Representation
Attorney
Howard W. Kline
USPTO Deadlines
Application History
11 eventsDate | Code | Type | Description | Documents |
---|---|---|---|---|
Jul 1, 2025 | CNSA | O | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... |
Jun 25, 2025 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
Jun 25, 2025 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
Jun 25, 2025 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Mar 28, 2025 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
Mar 28, 2025 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
Mar 28, 2025 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
Mar 28, 2025 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
Mar 27, 2025 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
Mar 27, 2025 | MDSC | E | NOTICE OF DESIGN SEARCH CODE E-MAILED | Loading... |
Sep 23, 2024 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
Electronic machines, apparatus and their parts, namely, computers and structural parts therefor; computers and their peripherals; computer software applications, downloadable for controlling computer network access; computer software applications, downloadable for security of network, the internet, and email; computer software applications, downloadable for use in the field of cybersecurity for ensuring security of all forms of IT asset and intellectual property assets of an enterprise against threats like malware, ransomware, data leakage, data theft, intrusion; computer software applications, downloadable for device certificates authentication; computer software applications, downloadable for the management and transfer of files and data; computer software applications, downloadable for management and approval of sending emails; computer software applications, downloadable for securely sending and receiving email attachments; computer software applications, downloadable for file download permission management, management of file sharing status, file sharing permission management; computer software applications, downloadable for email backup, searching, downloading, and managing backed-up emails; computer software applications, downloadable for single sign-on, access control, passwordless authentication, account management, multi-factor authentication; computer software applications, downloadable for providing a browser designed for view-only access; computer software applications, downloadable for malware and cyberattack protection; computer software applications, downloadable for training in the field of phishing, spam, and fraudulent emails; computer software applications, downloadable for computer systems and network access control featuring digital identity authentication, security management and security application auditing; computer software applications, downloadable for providing user authentication services; computer software applications, downloadable for providing authentication using software technology for communications and transactions via a global computer network; computer software applications, downloadable for providing e-mail management service; downloadable computer programs for controlling computer network access; downloadable computer programs for security of network, the internet, and email; downloadable computer programs for use in the field of cybersecurity for ensuring security of all forms of IT asset and intellectual property assets of an enterprise against threats like malware, ransomware, data leakage, data theft, intrusion; downloadable computer programs for device certificates authentication; downloadable computer programs for the management and transfer of files and data; downloadable computer programs for management and approval of sending emails; downloadable computer programs for securely sending and receiving email attachments; downloadable computer programs for file download permission management, management of file sharing status, file sharing permission management; downloadable computer programs for email backup, searching, downloading, and managing backed-up emails; downloadable computer programs for single sign-on, access control, passwordless authentication, account management, multi-factor authentication; downloadable computer programs for providing a browser designed for view-only access; downloadable computer programs for malware and cyberattack protection; downloadable computer programs for training in the field of phishing, spam, and fraudulent emails; downloadable computer programs for computer systems and network access control featuring digital identity authentication, security management and security application auditing; downloadable computer programs for providing user authentication services; downloadable computer programs for providing authentication using software technology for communications and transactions via a global computer network; downloadable computer programs for providing e-mail management service; telecommunication machines and apparatus, namely, computer hardware for telecommunications
Class 042
Providing online non-downloadable computer programs on data networks for controlling computer network access; Providing online non-downloadable computer programs on data networks for security of network, the internet, and email; Providing online non-downloadable computer programs on data networks for use in the field of cybersecurity for ensuring security of all forms of IT asset and intellectual property assets of an enterprise against threats like malware, ransomware, data leakage, data theft, intrusion; Providing online non-downloadable computer programs on data networks for device certificates authentication; Providing online non-downloadable computer programs on data networks for the management and transfer of files and data; Providing online non-downloadable computer programs on data networks for management and approval of sending emails; Providing online non-downloadable computer programs on data networks for securely sending and receiving email attachments; Providing online non-downloadable computer programs on data networks for file download permission management, management of file sharing status, file sharing permission management; Providing online non-downloadable computer programs on data networks for email backup, searching, downloading, and managing backed-up emails; Providing online non-downloadable computer programs on data networks for single sign-on, access control, passwordless authentication, account management, multi-factor authentication; Providing online non-downloadable computer programs on data networks for providing a browser designed for view-only access; Providing online non-downloadable computer programs on data networks for malware and cyberattack protection; Providing online non-downloadable computer programs on data networks for training in the field of phishing, spam, and fraudulent emails; Providing online non-downloadable computer programs on data networks for computer systems and network access control featuring digital identity authentication, security management and security application auditing; Providing online non- downloadable computer programs on data networks for providing user authentication services; Providing online non-downloadable computer programs on data networks for providing authentication using software technology for communications and transactions via a global computer network; Providing online non-downloadable computer programs on data networks for providing e-mail management service; rental of computer programs for controlling computer network access; rental of computer programs for security of network, the internet, and email; rental of computer programs for use in the field of cybersecurity for ensuring security of all forms of IT asset and intellectual property assets of an enterprise against threats like malware, ransomware, data leakage, data theft, intrusion; rental of computer programs for device certificates authentication; rental of computer programs for the management and transfer of files and data; rental of computer programs for management and approval of sending emails; rental of computer programs for securely sending and receiving email attachments; rental of computer programs for file download permission management, management of file sharing status, file sharing permission management; rental of computer programs for email backup, searching, downloading, and managing backed-up emails; rental of computer programs for single sign-on, access control, passwordless authentication, account management, multi-factor authentication; rental of computer programs for providing a browser designed for view-only access; rental of computer programs for malware and cyberattack protection; rental of computer programs for training in the field of phishing, spam, and fraudulent emails; rental of computer programs for computer systems and network access control featuring digital identity authentication, security management and security application auditing; rental of computer program for providing user authentication services; rental of computer programs for providing authentication using software technology for communications and transactions via a global computer network; rental of computer programs for providing e-mail management service; rental of computers; rental of electronic circuit, magnetic tape, magnetic disc, optical disc and other data media recorded with computer programs for controlling computer network access; rental of electronic circuit, magnetic tape, magnetic disc, optical disc and other data media recorded with computer programs for security of network, the internet, and email; rental of electronic circuit, magnetic tape, magnetic disc, optical disc and other data media recorded with computer programs for use in the field of cybersecurity for ensuring security of all forms of IT asset and intellectual property assets of an enterprise against threats like malware, ransomware, data leakage, data theft, intrusion; rental of electronic circuit, magnetic tape, magnetic disc, optical disc and other data media recorded with computer programs for device certificates authentication; rental of electronic circuit, magnetic tape, magnetic disc, optical disc and other data media recorded with computer programs for the management and transfer of files and data; rental of electronic circuit, magnetic tape, magnetic disc, optical disc and other data media recorded with computer programs for management and approval of sending emails; rental of electronic circuit, magnetic tape, magnetic disc, optical disc and other data media recorded with computer programs for securely sending and receiving email attachments; rental of electronic circuit, magnetic tape, magnetic disc, optical disc and other data media recorded with computer programs for file download permission management, management of file sharing status, file sharing permission management; rental of electronic circuit, magnetic tape, magnetic disc, optical disc and other data media recorded with computer programs for email backup, searching, downloading, and managing backed-up emails; rental of electronic circuit, magnetic tape, magnetic disc, optical disc and other data media recorded with computer programs for single sign-on, access control, passwordless authentication, account management, multi-factor authentication; rental of electronic circuit, magnetic tape, magnetic disc, optical disc and other data media recorded with computer programs for providing a browser designed for view-only access; rental of electronic circuit, magnetic tape, magnetic disc, optical disc and other data media recorded with computer programs for malware and cyberattack protection; rental of electronic circuit, magnetic tape, magnetic disc, optical disc and other data media recorded with computer programs for training in the field of phishing, spam, and fraudulent emails; rental of electronic circuit, magnetic tape, magnetic disc, optical disc and other data media recorded with computer programs for computer systems and network access control featuring digital identity authentication, security management and security application auditing; rental of electronic circuit, magnetic tape, magnetic disc, optical disc and other data media recorded with computer programs for providing user authentication services; rental of electronic circuit, magnetic tape, magnetic disc, optical disc and other data media recorded with computer programs for providing authentication using software technology for communications and transactions via a global computer network; rental of electronic circuit, magnetic tape, magnetic disc, optical disc and other data media recorded with computer programs for providing e-mail management service; computer programming; technological advice relating to computers, computer software, automobiles and industrial machines; designing of machines, apparatus, instruments including their parts or systems composed of such machines, apparatus and instruments for others
Additional Information
Design Mark
The mark consists of a highly stylized quadrilateral with four curved sides and four pointed edges.
Color Claim
Color is not claimed as a feature of the mark.
Classification
International Classes
009
042