Legal Representation
Attorney
Katherine A. Markert
USPTO Deadlines
Next Deadline
0 days remaining
Non-Final Action E-Mailed
Due Date
December 24, 2025
Extension Available
Until March 24, 2026
Application History
10 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Dec 18, 2025 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| Dec 18, 2025 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Dec 18, 2025 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
| Sep 24, 2025 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Sep 24, 2025 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
| Sep 24, 2025 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Sep 18, 2025 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Apr 28, 2025 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| Apr 28, 2025 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
| Apr 28, 2025 | MAFR | O | APPLICATION FILING RECEIPT MAILED | Loading... |
Detailed Classifications
Class 009
Downloadable computer security software for monitoring computing devices, detecting and responding to cybersecurity threats, and managing device compliance with security standards; Downloadable software for network and device security, for detecting and responding to cybersecurity threats, and managing security compliance; Downloadable application software relating to security, namely, downloadable security software for detecting and responding to cybersecurity threats, and managing security compliance; Downloadable computer software for endpoint security; Downloadable software for ensuring the security of electronic mail; Downloadable software for providing automated compliance assessments and responses; Downloadable software for providing operating system vulnerability assessments, software vulnerability assessments and network vulnerability assessments
Class 042
IT security services, namely, monitoring and managing endpoint devices for cybersecurity compliance and protection against unauthorized access; IT protection services, namely, detection and response to cybersecurity threats; IT restoration services, namely, restoring system configurations and security compliance following security incidents; Monitoring of computer systems for security purposes, namely, monitoring of computer systems for detecting unauthorized access, configuration vulnerabilities, or cybersecurity compliance failures; Computer security services for protection against illegal network access by users without credentials; Provision of security services, namely, monitoring of computer networks and systems to detect and prevent unauthorized access or cybersecurity threats, for computer networks, computer access, and computerised transactions; Design and development of Internet security programs; Design and development of electronic data security systems; Maintenance of computer software relating to computer security and prevention of computer risks; Updating of computer software relating to computer security and prevention of computer risks; Data security services, namely, monitoring of computer systems to protect data from unauthorized access, loss, or alteration; Computer security system monitoring services, namely, monitoring of computer systems for detecting unauthorized access, configuration vulnerabilities, or cybersecurity compliance failures; Website usability testing services; Technical testing services, namely, testing of computer software and hardware; Safety technological testing of computer software and hardware services; Computer aided testing services, namely, computer aided testing of computer software and hardware; Testing services for security systems, namely, testing services for alarm systems and monitoring systems for detecting unauthorized access, configuration vulnerabilities, or cybersecurity compliance failures; Testing services of computer systems and software of others to determine conformity with cybersecurity compliance, certification and quality standards; Testing services, namely, testing of computer software, computer programs, computer hardware, IT security systems, computer infrastructure and network, computer configurations and electronic data processing systems; Application testing of IT security systems; configuration of computer systems and networks; configuration of computer software; configuration of computer firmware; Consultancy in the field of computer security software, namely, providing advice on selection, deployment, monitoring, and configuration of software and systems to maintain cybersecurity and compliance with information security standards; Consultancy in the field of computer security, namely, providing advice on computer security software and endpoint systems for monitoring, compliance, and protection against unauthorized access and cybersecurity threats; Computer programming of Internet security programs; computer programming services for electronic data security; Providing temporary use of online non-downloadable software for providing automated compliance assessments and responses; Providing temporary use of online non-downloadable software for operating system vulnerability assessments, software vulnerability assessments and network vulnerability assessments
Class 045
Monitoring of computer systems in the nature of surveillance services relating to the physical safety of persons and security of tangible property
Classification
International Classes
009
042
045
Disclaimers
The following terms have been disclaimed and are not claimed as part of the trademark:
Specific Disclaimer
AGENT