V3 VIRUSWALL

Ahnlab, Inc.

Application Filed: 2002-01-10
Trademark Application Details
Trademark Logo V3 VIRUSWALL
602
Dead/Abandoned
ABANDONED-FAILURE TO RESPOND OR LATE RESPONSE
Research OneLook Acronym Finder
Serial Number78101938
Mark Drawing Code1000: Typeset: Word(s)/letter(s)/number(s)
Domestic RepresentativeBruce W. McKee
Attorney NameBruce W. McKee
Attorney Docket NumberT53622US0
Law Office AssignedM60
Employee NameLEIPZIG, MARC J

Timeline

2002-01-10Application Filed
2003-01-03Abandon
2003-03-04Status: Dead/Abandoned
2003-04-25Location: FILE REPOSITORY (FRANCONIA)
2018-07-08Transaction Date

Trademark Applicants & Owners

Owner: Ahnlab, Inc.
Address8F V-Valley, 724 Suseo-Dong, Kangnam-Ku Seoul KR
Legal Entity TypeCorporation
Legal Entity State KR

Documents

Click the blue "Refresh" button to load certificates, specimines, application, and other documents.

Attorney of Record

Bruce W. McKee
McKee, Voorhees & Sease
801 Grand Avenue, Suite 3200
Des Moines IA 50309-2721

Good, Services, and Codes

International Codes:9
U.S. Codes:021,023,026,036,038
Type CodeType
GS0091Computer softwares used in the field of computer security, specifically working for the monitoring, detection, interception, diagnosis and therapy of computer virus; computer softwares used in the field of computer security, specifically by providing the function of protecting precious data and information by preventing unauthorized user from accessing the computer system; computer with pre-installed computer software used in the field of computer security, specifically working for the monitoring, detection, interception, diagnosis and therapy of computer virus; computer with pre-installed computer software used in the field of computer security, specifically by providing the function of protecting precious data and information by preventing unauthorized user from accessing the computer system; encoded smart cards used in the field of computer security, containing computer program, specifically for the monitoring, detection, interception, diagnosis and therapy of computer virus; encoded smart cards used in the field of computer security, containing computer program, specifically to protect precious data and information by preventing unauthorized user from accessing the computer system; computer memory cards used for computer security; embedded computer chips in symmetry-key algorithm used for computer security; computer e-commerce software to allow users to perform electronic business transactions; computer memory chips used for computer security; fingerprint recognizers used for computer security; pupil recognizers used for computer security; Computer softwares used in the field of computer security, specifically working for the monitoring, detection, interception, diagnosis and therapy of computer virus; computer softwares used in the field of computer security, specifically by providing the function of protecting precious data and information by preventing unauthorized user from accessing the computer system; computer with pre-installed computer software used in the field of computer security, specifically working for the monitoring, detection, interception, diagnosis and therapy of computer virus; computer with pre-installed computer software used in the field of computer security, specifically by providing the function of protecting precious data and information by preventing unauthorized user from accessing the computer system; encoded smart cards used in the field of computer security, containing computer program, specifically for the monitoring, detection, interception, diagnosis and therapy of computer virus; encoded smart cards used in the field of computer security, containing computer program, specifically to protect precious data and information by preventing unauthorized user from accessing the computer system; computer memory cards used for computer security; embedded computer chips in symmetry-key algorithm used for computer security; computer e-commerce software to allow users to perform electronic business transactions; computer memory chips used for computer security; fingerprint recognizers used for computer security; pupil recognizers used for computer security

Trademark Filing History

DescriptionDateEvent Coding
CORRESPONDENCE RECEIVED IN LAW OFFICE2002-01-151 CRFA I:Incoming Correspondence
Sec. 1(B) CLAIM DELETED2002-01-152 1.BD I:Incoming Correspondence
ASSIGNED TO EXAMINER2002-05-143 DOCK D:Assigned to Examiner
NON-FINAL ACTION MAILED2002-07-014 CNRT F:First Action
ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE2003-03-045 ABN2 O:Outgoing Correspondence

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed