Legal Representation
Attorney
Holly Pranger
USPTO Deadlines
Application History
10 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Dec 9, 2025 | NRCC | E | NOTICE OF REGISTRATION CONFIRMATION EMAILED | Loading... |
| Dec 9, 2025 | R.PR | A | REGISTERED-PRINCIPAL REGISTER | Loading... |
| Oct 21, 2025 | NPUB | E | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | Loading... |
| Oct 21, 2025 | PUBO | A | PUBLISHED FOR OPPOSITION | Loading... |
| Oct 15, 2025 | NONP | E | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | Loading... |
| Sep 23, 2025 | CNSA | O | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... |
| Sep 22, 2025 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Sep 11, 2025 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| May 5, 2025 | MAFR | O | APPLICATION FILING RECEIPT MAILED | Loading... |
| May 5, 2025 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
Downloadable software for access control for users, groups, identities, roles, permissions and access for organizations and business; Downloadable software for maintaining history and logs of access control for users, groups, identities, roles, permissions and access for organizations and business; Downloadable software for setting, assigning, configuring, managing, changing, rotating, securing, optimizing, storing, tracking, sharing secrets including data, passwords, API keys, credentials, encryption keys, accessibility digital certificates and digital identities; Downloadable software for generating, storing, managing, rotating, encrypting, decrypting, and auditing cryptographic keys, including symmetric keys, used to protect sensitive data; Downloadable software for comparing, syncing and quality checking secrets including data, passwords, API keys, credentials, encryption keys, accessibility digital certificates and digital identities; Downloadable software for generating unique data, passwords, API keys, credentials, encryption keys, accessibility digital certificates and digital identities; Downloadable software for integration of computer systems and networks, databases, software applications, users, and network resources; Downloadable software for issuing, authenticating, and managing public key infrastructure using certificates and encryption to enable secure authenticated communication and data exchange; Downloadable software for creating, configuring and authorizing Secure Shell Protocol credentials and certificates according to Secure Shell Protocol; Downloadable software for creating, configuring and authorizing digital signatures; Downloadable software development kits (SDK); Downloadable application programming interface (API) software for integration of secrets including data, passwords, API keys, credentials, encryption keys, accessibility digital certificates and digital identities into computer systems and networks, software applications, users, and network resources; Downloadable application programming interface (API) software for retrieving, updating, deleting, and creating secrets including data, passwords, API keys, credentials, encryption keys, accessibility digital certificates and digital identities
First Use Anywhere:
20220800
First Use in Commerce:
20220800
Class 042
Software as a service (SAAS) services featuring software for access control for users, groups, identities, roles, permissions and access for organizations and business; Software as a service (SAAS) services featuring software for for maintaining history and logs of access control for users, groups, identities, roles, permissions and access for organizations and business; Software as a service (SAAS) services featuring software for setting, assigning, configuring, managing, changing, rotating, securing, optimizing, storing, tracking, sharing secrets including data, passwords, API keys, credentials, encryption keys, accessibility digital certificates and digital identities; Software as a service (SAAS) services featuring software for generating, storing, managing, rotating, encrypting, decrypting, and auditing cryptographic keys, including symmetric keys, used to protect sensitive data; Software as a service (SAAS) services featuring software for comparing, syncing and quality checking Secrets including data, passwords, API keys, credentials, encryption keys, accessibility digital certificates and digital identities; Software as a service (SAAS) services featuring software for generating unique data, passwords, API keys, credentials, encryption keys, accessibility digital certificates and digital identities; Software as a service (SAAS) services featuring software for integration of computer systems and networks, databases, software applications, users, and network resources; Application service provider featuring application programming interface (API) software for integration of secrets into computer systems and networks, software applications, users, and network resources; Application service provider featuring application programming interface (API) software for retrieving, updating, deleting, and creating secrets; Software as a service (SAAS) services featuring software for issuing, authenticating, and managing public key infrastructure using certificates and encryption to enable secure authenticated communication and data exchange; Data encryption and decoding services; Software as a service (SAAS) services featuring software for creating, configuring and authorizing Secure Shell Protocol credentials and certificates according to Secure Shell Protocol; Software as a service (SAAS) services featuring software for creating, configuring and authorizing digital signatures
First Use Anywhere:
20220800
First Use in Commerce:
20220800
Classification
International Classes
009
042