Research |
![]() ![]() ![]() ![]() ![]() |
Serial Number | 78187167 |
Mark Drawing Code | 1000: Typeset: Word(s)/letter(s)/number(s) |
Law Office Assigned | M70 |
Employee Name | DWYER, JOHN D |
2002-11-20 | Application Filed |
2003-11-03 | Abandon |
2003-12-15 | Status: Dead/Abandoned |
2003-12-17 | Location: FILE REPOSITORY (FRANCONIA) |
2018-07-08 | Transaction Date |
Owner: | ![]() |
Address | 73 Princeton Street North Chelmsford DE 01863 |
Legal Entity Type | Corporation |
Legal Entity State | DE |
Click the blue "Refresh" button to load certificates, specimines, application, and other documents.
International Codes: | 9 |
U.S. Codes: | 021,023,026,036,038 |
Type Code | Type |
---|---|
GS0091 | Computer security software; Internet security software; enterprise security software; internal and external intrusion detection software; anti-distributed denial of service (anti-DDoS) software; blended-threat defense software; antivirus software; vulnerability assessment software; intrusion detection system (IDS) software; intrusion prevention system (IPS) software; counter-cyber-terrorism software; firewall software; privacy control software; content filtering software; computer software for the creation of a virtual private network; security software for facilitating computer use at remote locations and for facilitating encrypted communications among mobile users over networks; computer software and downloadable computer software for use in updating other computer software; computer software for use in networking applications; computer software for sending and receiving encrypted transmissions from computers, notebook computers and personal digital assistant (PDA) devices over wired and wireless networks; computer software for connecting and managing remote computers, for communication, collaboration and for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for secure file management and transfer, for secure telecommuting, for secure mobile computing and for use with a home or remote office; computer software and databases for use in diagnosis, repair and configuration of network security appliances, computers, computer software and computer peripherals; user manuals supplied with all of the foregoing. Computer hardware; computer hardware appliances that provide blended threat defensive measures, vulnerability assessments, internal intrusion detection, firewall, content filtering, intrusion alert and defense, virus protection, virtual private networking and other security functions. |
Description | Date | Event Coding |
---|---|---|
ASSIGNED TO EXAMINER | 2003-05-02 | 1 DOCK D:Assigned to Examiner |
NON-FINAL ACTION E-MAILED | 2003-05-02 | 2 GNRT F:First Action |
NON-FINAL ACTION MAILED | 2003-05-08 | 3 CNRT O:Outgoing Correspondence |
ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE | 2003-12-15 | 4 ABN2 O:Outgoing Correspondence |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.