Legal Representation
Attorney
Andrew R. Nelson
USPTO Deadlines
Next Deadline
48 days remaining
Final Refusal E-Mailed
Due Date
February 03, 2026
Extension Available
Until May 03, 2026
Application History
12 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Nov 3, 2025 | GNFN | O | NOTIFICATION OF FINAL REFUSAL EMAILED | Loading... |
| Nov 3, 2025 | GNFR | O | FINAL REFUSAL E-MAILED | Loading... |
| Nov 3, 2025 | CNFR | R | FINAL REFUSAL WRITTEN | Loading... |
| Aug 20, 2025 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| Aug 19, 2025 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Aug 19, 2025 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
| Jun 29, 2025 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Jun 29, 2025 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
| Jun 29, 2025 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Jun 27, 2025 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Jun 23, 2025 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| Jan 18, 2025 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 042
Computer disaster recovery planning; Computer programming consultancy in the field of cybersecurity; Computer security consultancy in the field of cybersecurity; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security threat analysis for protecting data; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer services, namely, remote and on-site management of the information technology (IT) cloud computing systems of others; Computer virus protection services; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Infrastructure as a service (IAAS) services, namely, hosting software for cybersecurity for use by others; IT consulting services relating to installation, maintenance and repair of computer software; Maintenance of computer software relating to computer security and prevention of computer risks; Monitoring of computer systems for detecting unauthorized access or data breach; Providing temporary use of non-downloadable computer anti-virus software; Recovery of computer data; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technology consultation in the field of cybersecurity; Updating of computer software relating to computer security and prevention of computer risks
First Use Anywhere:
Jan 1, 2019
First Use in Commerce:
Jan 1, 2019
Classification
International Classes
042
Disclaimers
The following terms have been disclaimed and are not claimed as part of the trademark:
Specific Disclaimer
"CYBERSECURITY"