Research |
![]() ![]() ![]() ![]() ![]() |
Serial Number | 78151898 |
Mark Drawing Code | 1000: Typeset: Word(s)/letter(s)/number(s) |
Domestic Representative | Bruce W. McKee |
Attorney Name | Bruce W. McKee |
Attorney Docket Number | T53824US0 |
Law Office Assigned | M70 |
Employee Name | SNAPP, TINA LOUISE |
2002-08-07 | Application Filed |
2003-07-15 | Abandon |
2003-09-24 | Status: Dead/Abandoned |
2003-10-08 | Location: FILE REPOSITORY (FRANCONIA) |
2018-07-08 | Transaction Date |
Owner: | ![]() |
Address | 8F V-Valley, 724 Suseo-Dong, Kangnam-Ku Seoul KR |
Legal Entity Type | Corporation |
Legal Entity State | KR |
Click the blue "Refresh" button to load certificates, specimines, application, and other documents.
International Codes: | 9 |
U.S. Codes: | 021,023,026,036,038 |
International Codes: | 42 |
U.S. Codes: | 100,101 |
Type Code | Type |
---|---|
GS0091 | Computer softwares used in the field of computer security, specifically working for the monitoring, detection, interception, diagnosis and therapy of computer virus; computer softwares used in the field of computer security, specifically by providing the function of protecting precious data and information by preventing unauthorized user from accessing the computer system; computer with pre-installed computer software used in the field of computer security, specifically working for the monitoring, detection, interception, diagnosis and therapy of computer virus; computer with pre-installed computer software used in the field of computer security, specifically by providing the function of protecting precious data and information by preventing unauthorized user from accessing the computer system; encoded smart cards used in the field of computer security, containing computer program, specifically for the monitoring, detection, interception, diagnosis and therapy of computer virus; encoded smart cards used in the field of computer security, containing computer program, specifically to protect precious data and information by preventing unauthorized user from accessing the computer system; computer memory cards used for computer security; embedded computer chips in symmetry-key algorithm used for computer security; computer e-commerce software to allow users to perform electronic business transactions; computer memory chips used for computer security; fingerprint recognizers used for computer security |
Description | Date | Event Coding |
---|---|---|
PAPER RECEIVED | 2002-08-12 | 1 MAIL I:Incoming Correspondence |
ASSIGNED TO EXAMINER | 2002-12-27 | 2 DOCK D:Assigned to Examiner |
NON-FINAL ACTION E-MAILED | 2003-01-14 | 3 GNRT F:First Action |
ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE | 2003-09-24 | 4 ABN2 O:Outgoing Correspondence |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.