Legal Representation
Attorney
Sean F. Mellino
USPTO Deadlines
Next Deadline
39 days remaining
Non-Final Action E-Mailed
Due Date
February 03, 2026
Extension Available
Until May 03, 2026
Additional deadlines exist. Contact your attorney for complete deadline information.
Application History
10 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Dec 4, 2025 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Dec 4, 2025 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
| Dec 4, 2025 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Nov 3, 2025 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Nov 3, 2025 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
| Nov 3, 2025 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Oct 29, 2025 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Oct 15, 2025 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| Jun 9, 2025 | MAFR | O | APPLICATION FILING RECEIPT MAILED | Loading... |
| Jun 9, 2025 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
Apparatus, hardware and devices featuring software and firmware for cybersecurity, threat detection, network analysis, threat intelligence integration, investigation tools, incident response, behavioral monitoring, mobile cybersecurity, network defense; Wireless communication devices featuring software and firmware for cybersecurity, threat detection, network analysis, threat intelligence integration, investigation tools, incident response, behavioral monitoring, mobile cybersecurity, network defense; Apparatus, hardware and devices featuring LAN (local area network) operating software and firmware for cybersecurity, threat detection, network analysis, threat intelligence integration, investigation tools, incident response, behavioral monitoring, mobile cybersecurity, network defense; Wireless communication devices featuring LAN (local area network) operating software and firmware for cybersecurity, threat detection, network analysis, threat intelligence integration, investigation tools, incident response, behavioral monitoring, mobile cybersecurity, network defense; LAN (local area network) hardware; Downloadable software in the nature of a mobile application for use in cybersecurity; Downloadable computer software for use in cybersecurity
Class 041
Technical consulting in the field of cybersecurity risk management training; Technical consulting in the field of cybersecurity, threat detection, network analysis, threat intelligence integration, investigation tools, incident response, behavioral monitoring, mobile cybersecurity, network defense
Class 042
Technology consultation in the field of cybersecurity; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Internet security consultancy; Data security consultancy; Computer security consultancy; Computer network security consultancy; Computer security consultancy in the field of cybersecurity, threat detection, network analysis, threat intelligence integration, investigation tools, incident response, behavioral monitoring, mobile cybersecurity, network defense; Computer software consulting services in the field of critical incident response to information, computer, network, and internet security breaches; Consultation in the field of data security for assessing and protecting critical assets, identifying compliance issues, incident response support, and identifying technical and non-technical solutions; Monitoring of computer systems for the purpose of data breach discovery and protected-data discovery by reviewing, extracting and mining of files, documents, and data; Providing on-line non-downloadable software connected to a local network for use in cybersecurity, assessing and protecting critical assets, identifying compliance issues, incident response support, identifying technical and non-technical solutions, threat detection, network analysis, threat intelligence integration, investigation tools, incident response, behavioral monitoring, mobile cybersecurity, network defense; Providing non-downloadable software for use in cybersecurity, assessing and protecting critical assets, identifying compliance issues, incident response support, identifying technical and non-technical solutions, threat detection, network analysis, threat intelligence integration, investigation tools, incident response, behavioral monitoring, mobile cybersecurity, network defense; Software as a service (SAAS) services featuring software for cybersecurity, assessing and protecting critical assets, identifying compliance issues, incident response support, identifying technical and non-technical solutions, threat detection, network analysis, threat intelligence integration, investigation tools, incident response, behavioral monitoring, mobile cybersecurity, network defense; Platform as a service (PAAS) featuring computer software platforms for use in cybersecurity, assessing and protecting critical assets, identifying compliance issues, incident response support, identifying technical and non-technical solutions, threat detection, network analysis, threat intelligence integration, investigation tools, incident response, behavioral monitoring, mobile cybersecurity, network defense; Software as a service (SAAS) services featuring software for managing, coordinating, and streamlining cybersecurity incident response activities, communicating and collaborating among incident response teams; collecting and sharing incident data; Consulting in the field of cybersecurity, threat detection, network analysis, threat intelligence integration, investigation tools, incident response, behavioral monitoring, mobile cybersecurity, network defense
Additional Information
Pseudo Mark
RED HOUND
Classification
International Classes
009
041
042