Legal Representation
Attorney
Peter B Bromaghim
USPTO Deadlines
Next Deadline
25 days remaining
Published for Opposition
Due Date
February 19, 2026
Extension Available
Until March 19, 2026
Application History
15 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Jan 20, 2026 | NPUB | E | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | Loading... |
| Jan 20, 2026 | PUBO | A | PUBLISHED FOR OPPOSITION | Loading... |
| Jan 14, 2026 | NONP | E | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | Loading... |
| Dec 18, 2025 | CNSA | P | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... |
| Dec 15, 2025 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| Dec 15, 2025 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Dec 15, 2025 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
| Sep 19, 2025 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Sep 19, 2025 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
| Sep 19, 2025 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Aug 18, 2025 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Aug 13, 2025 | MDSM | E | NOTICE OF DESIGN SEARCH CODE E-MAILED | Loading... |
| Aug 13, 2025 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| Mar 28, 2025 | MAFR | O | APPLICATION FILING RECEIPT MAILED | Loading... |
| Mar 28, 2025 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
Downloadable and recorded computer software for computer, network, and device security, for identification, management, monitoring, analysis, and security of computers, computer networks and devices on computer networks; Downloadable and recorded computer software for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, intrusion detection and maintenance, networked device monitoring and security, medical and wearable technology device being internet of medical things (IoMT) device monitoring and security, and operational technology systems; downloadable and recorded computer software for monitoring, detecting, investigating, remediating, and responding to network, networked device, and enterprise threat incidents; Downloadable and recorded computer software for detecting, blocking, and removing threats to computer and network security, determining device compliance, and segmenting computer networks for isolating devices and enforcing security protocols; Downloadable and recorded computer software for providing a continuous exchange of computer network user, device, system, application, and configuration data between a network security control platform and other network, security and application platforms, to allow the monitoring, applying compliance policy to, and modifying of computer, device, application and network states; Downloadable and recorded computer software for providing enterprise security and computer network perimeter security; Downloadable and recorded computer software for network security management and monitoring; Downloadable and recorded computer software for automating security remediation actions and managing such actions for use in computer network management, device management, IoT device management, internet of medical things (IoMT) medical device security, IT management, and operational technology (OT) management
Class 042
Platform-as-a-service (PaaS) featuring computer software platforms for computer, network, and networked device security, for identification, management, monitoring, analysis, and security of computer networks, devices on computer networks, embedded devices, and operational technology; Platform-as-a-service (PaaS) featuring computer software platforms for monitoring and security compliance monitoring of IoT devices, internet of medical things (IoMT) medical and wearable devices, and operational technology (OT) systems; Software-as-a-service (SaaS) services featuring software for computer and network security, for identification, management, monitoring, analysis, and security of computer networks, devices on computer networks, embedded devices, and operational technology; Providing online non-downloadable computer software and cloud-based non-downloadable computer software for computer and network security, for identification, management, monitoring, analysis, and security of computers, computer networks and devices on computer networks, and for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, intrusion detection and maintenance; Technology consulting services in the field of computer network security, security of networked, IoT, and internet of medical things (IoMT) devices, enterprise security, and operational technology (OT) software, hardware, and devices; Application service provider (ASP) featuring non-downloadable computer software for use in computer and network security; Computer security consultancy, namely, developing plans for improving computer and network security for businesses and governmental agencies, medical and wearable device networks, and operational technology (OT) systems; Computer security consultation in the field of security of computers, computer networks, networked IoT and internet of medical things (IoMT) devices, and enterprise security; Maintenance and updating of computer software relating to computer and network security and prevention of security risks
Additional Information
Design Mark
The mark consists of a hexagon design with six internal lines from each point and another partial hexagon inside which includes the stylized lettering "4D".
Pseudo Mark
FOUR D
Pseudo Mark
FOR D
Classification
International Classes
009
042