Legal Representation
Attorney
Alicia A. Matusheski
USPTO Deadlines
Next Deadline
2134 days remaining
Section 8 Declaration Due (Principal Register) (Based on registration date 20251021)
Due Date
October 21, 2031
Grace Period Ends
April 21, 2032
Additional deadlines exist. Contact your attorney for complete deadline information.
Application History
11 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Oct 21, 2025 | NRCC | E | NOTICE OF REGISTRATION CONFIRMATION EMAILED | Loading... |
| Oct 21, 2025 | R.PR | A | REGISTERED-PRINCIPAL REGISTER | Loading... |
| Sep 2, 2025 | NPUB | E | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | Loading... |
| Sep 2, 2025 | PUBO | A | PUBLISHED FOR OPPOSITION | Loading... |
| Aug 27, 2025 | NONP | E | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | Loading... |
| Jul 29, 2025 | CNSA | O | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... |
| Jul 28, 2025 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Jul 18, 2025 | MDSM | E | NOTICE OF DESIGN SEARCH CODE E-MAILED | Loading... |
| Jul 18, 2025 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| Feb 21, 2025 | MAFR | O | APPLICATION FILING RECEIPT MAILED | Loading... |
| Feb 21, 2025 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 042
Application service provider (ASP) featuring software using artificial intelligence for cybersecurity breach or insider threat detection and automated response; Computer programming consultancy in the field of cybersecurity breach or insider threat detection and automated response; Computer software development, computer programming and maintenance of computer software for cybersecurity breach or insider threat detection and automated response, and access management; Consultancy in the field of artificial intelligence technology; Consulting in the field of information technology; Consulting in the field of virtualization technologies for enterprises and businesses; Cybersecurity services in the nature of restricting unauthorized access to computer systems, data, and apps; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Platform as a service (PAAS) featuring computer software platforms for cybersecurity breach or insider threat detection and automated response, and access management; Providing a website featuring non-downloadable software using artificial intelligence for cybersecurity breach or insider threat detection and automated response; Providing temporary use of a web-based software application for cybersecurity breach or insider threat detection and automated response, and access management; Providing temporary use of non-downloadable cloud-based software for cybersecurity; Providing temporary use of non-downloadable web-based decentralized applications (DApps) for cybersecurity breach or insider threat detection and automated response, and access management; Providing temporary use of on-line non-downloadable cloud computing software using artificial intelligence for cybersecurity breach or insider threat detection and automated response, and access management; Providing temporary use of on-line non-downloadable cloud computing software for cybersecurity; Providing temporary use of on-line non-downloadable opensource software for cybersecurity breach or insider threat detection and automated response, and access management; Providing temporary use of on-line non-downloadable software and applications using artificial intelligence for cybersecurity breach or insider threat detection and automated response, and access management; Technology consultation in the field of artificial intelligence; Technology consultation in the field of cybersecurity; Computer technology consultancy in the field of cybersecurity; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services
First Use Anywhere:
Nov 10, 2024
First Use in Commerce:
Nov 10, 2024
Additional Information
Design Mark
The mark consists of a capitalized letter M partially enclosed in a circle.
Pseudo Mark
MIMOTO
Classification
International Classes
042