Legal Representation
Attorney
Taylor G. Minshall
USPTO Deadlines
Application History
17 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Sep 30, 2025 | REAP | I | TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED | Loading... |
| Sep 30, 2025 | TCCA | I | TEAS CHANGE OF CORRESPONDENCE RECEIVED | Loading... |
| Sep 30, 2025 | ARAA | I | ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED | Loading... |
| Aug 5, 2025 | GNS3 | O | NOTIFICATION OF LETTER OF SUSPENSION E-MAILED | Loading... |
| Aug 5, 2025 | GNSL | F | LETTER OF SUSPENSION E-MAILED | Loading... |
| Aug 5, 2025 | CNSL | R | SUSPENSION LETTER WRITTEN | Loading... |
| Jun 13, 2025 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| Jun 13, 2025 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
| Jun 13, 2025 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Jun 4, 2025 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Jun 4, 2025 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Jun 4, 2025 | RFTP | Z | REMOVED FROM TEAS PLUS | Loading... |
| Jun 4, 2025 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
| Jun 4, 2025 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| May 24, 2025 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| May 24, 2025 | MDSM | E | NOTICE OF DESIGN SEARCH CODE E-MAILED | Loading... |
| Dec 17, 2024 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 042
Artificial intelligence as a service (AIAAS) services featuring non-downloadable software using artificial intelligence (AI) for enabling cybersecurity threat detection, machine learning, operation of threat sensors and scanners, and process automation in the fields of military and defense; Cloud computing featuring non-downloadable software for use in cybersecurity and secure data management for private business, military, and defense; Computer services, namely, remote management of information technology (IT) systems of others comprised of network engineering, infrastructure migration, and cybersecurity software applications for military and defense; Computer services, namely, cloud hosting provider services for secure data storage in military and defense applications; Computer services, namely, on-line scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, and unauthorized data and programs on computers and electronic devices for private business, military, and defense; Cybersecurity services in the nature of restricting unauthorized access to computer systems for private business, military, and defense; Information technology consultancy relating to installation, maintenance, and repair of cybersecurity software for military and defense; Computer programming consultancy in the field of cybersecurity for military and defense; Computer services, namely, integration of private and public cloud computing environments for secure data management in military and defense; Computer technical support services, namely, 24/7 service desk or help desk services for cybersecurity software and cloud computing systems in military and defense; Consultancy in the field of artificial intelligence (AI) technology for cybersecurity applications in military and defense; Technical consulting in the field of artificial intelligence (AI) software customization for cybersecurity in military and defense; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration, and management of private cloud computing IT and cybersecurity application systems for military and defense; Technology consultation in the field of cybersecurity for military and defense.
First Use Anywhere:
Sep 21, 2020
First Use in Commerce:
Sep 21, 2020
Additional Information
Design Mark
The mark consists of a design depicting the left-side profile of a hawk in flight, swooping in a downward motion. The hawk's head, left-eye, and beak face to the left-side of the design. The hawk's left wing is outstretched above and behind the hawk's head and extended in the opposite direction of the head, revealing three prominent under feathers located directly beneath the outstretched wing. The words "NIGHTHAWK" and "CYBER" are located directly beneath the outstretched wing and three under feathers, aligned with the hawk's torso, and above and to the right-side of the hawk's outstretched left leg and fully extended left talon.
Color Claim
Color is not claimed as a feature of the mark.
Pseudo Mark
NIGHT HAWK CYBER
Classification
International Classes
042
Disclaimers
The following terms have been disclaimed and are not claimed as part of the trademark:
Specific Disclaimer
"CYBER"