Legal Representation
Attorney
David Gorski
USPTO Deadlines
Next Deadline
83 days remaining
Non-Final Action E-Mailed
Due Date
April 15, 2026
Extension Available
Until July 15, 2026
Application History
8 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Jan 15, 2026 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Jan 15, 2026 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
| Jan 15, 2026 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Jan 14, 2026 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Jan 13, 2026 | MDSC | E | NOTICE OF DESIGN SEARCH CODE E-MAILED | Loading... |
| Jan 13, 2026 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| Aug 25, 2025 | MAFR | O | APPLICATION FILING RECEIPT MAILED | Loading... |
| Aug 25, 2025 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
Computer hardware and recorded software for evaluating devices, namely, testing, assessing, and diagnosing computer hardware, computer peripherals, information and communications technology devices, BIOS, operating systems, and networks for cybersecurity vulnerabilities, threat detection, and supply chain risk assessment, sold as a unit; multidimensional imaging and scanning apparatus for evaluating devices, namely, itemizing and assessing components in computer hardware, computer peripherals, information and communications technology devices for anomalies; computer and network hardware and peripheral devices, namely, computer servers, laptops, cables, routers, network switches, firewalls, and specialized telecommunications devices and equipment; computer software for threat intelligence with customizable report generation, namely, denied party screening and other sanctioned-entity and corporate violator reporting
Class 035
location tracking services, namely GPS tracking of goods in supply chain
Class 042
Computer hardware design and development consultancy services; computer security consultancy in the field of scanning and penetration testing of computer hardware, computer peripherals, information and communications technology devices, BIOS, operating systems, and networks to assess information security vulnerability; inspection services, namely, evaluation of computer hardware and computer peripherals for counterfeits and performance anomalies; computer security consultancy services, namely, technical analysis of hardware, identification of vulnerabilities, risk analysis of hardware infiltration, and generating and delivery of threat reports; computer security consultation services in the field of cybersecurity, namely, deception network services for monitoring and protecting computer networks for others, providing cyber security and information security diligence and solutions for others, collecting and aggregating cybersecurity data and intelligence; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware, computer peripherals, information and communications technology devices for problems for cybersecurity systems of others; consulting services in the fields of security and vulnerability of computers, computer systems, networks, and related hardware; computer services in the nature of detecting and diagnosing computer hardware, computer peripherals, and information and communications technology devices for security problems and vulnerabilities; computer security consultancy in the field of malware, intrusion and penetration testing, assessing, and diagnosing of computers and networks to assess information technology security and vulnerability; compliance and vulnerability assessments, namely, providing security consultancy in the field of scanning and penetration testing of computer hardware, computer peripherals, information and communications technology devices to assess information security vulnerability; security compliance and vulnerability assessments, namely, technical verification and validation of computer hardware, computer peripherals, information and communications technology devices for others; computer security consultancy services, namely, technical analysis of hardware, identification of vulnerabilities, risk analysis of hardware infiltration, and generation and delivery of a threat score; computer security consultancy services, namely, technical analysis of hardware, identification of vulnerabilities, risk analysis of hardware infiltration, and generation and delivery of a threat status; managed secure services and other technical consulting services in the field of cybersecurity for evaluating devices for potential sabotage or unauthorized access risks; computer services in the nature of electronic imaging, detecting, and diagnosing computer hardware, computer peripherals, information and communications technology devices for security problems and vulnerabilities; computer network security services; computer network defense services, namely, providing firewall and related protections from viruses, infiltration, and malware; threat intelligence services, namely, threat identification, reporting, and data aggregation, namely, denied party screening and other sanctioned-entity and corporate violator reporting.
Additional Information
Design Mark
The mark consists of two hand drawn “X” shapes stacked vertically with the lower legs of the upper “X” and upper legs of the lower “X” in contact with one another to form a central diamond, and with a vertical line extending through the centers of the “X” shapes.
Color Claim
Color is not claimed as a feature of the mark.
Classification
International Classes
009
035
042