98789867 - CISCO HYPERSHIELD

Information

  • Trademark
  • 98789867
  • Serial Number
    98789867
  • Filing Date
    October 08, 2024
    a year ago
  • Transaction Date
    July 19, 2025
    4 months ago
  • Status Date
    July 18, 2025
    4 months ago
  • Location Date
    July 18, 2025
    4 months ago
  • Status Code
    680
  • Current Location
    TMO LAW OFFICE 110
    Employee Name
    CLYBURN, DIONNE
  • Attorney Docket Number
    23764-70010
    Attorney Name
    Mark A. Jansen
    Law Office Assigned Location Code
    M10
  • Owners
Mark Drawing Code
4
Mark Identification
CISCO HYPERSHIELD
Case File Statements
  • GS0091: Computer hardware; downloadable software for application security; downloadable cybersecurity software; downloadable software for providing endpoint security; downloadable computer software for data security and data protection; downloadable software for application security testing; downloadable software using artificial intelligence for cybersecurity and monitoring; downloadable software using artificial intelligence for data security consulting; downloadable software using artificial intelligence for cybersecurity risk management; downloadable software using artificial intelligence monitoring of computer systems for detecting unauthorized access or data breach; downloadable software using artificial intelligence for use in machine learning, cloud and data security, data access, management and collection, cyber threat detection and prevention and data risk analysis; downloadable computer software for computer network management and security, namely, software for traffic prioritization, secure access control, user identification, encryption, security management and intrusion prevention; downloadable software for detecting, blocking and removing computer viruses and threats, encrypting and authenticating data, preventing data-loss, recovering data, securing networks, and detecting, filtering, analyzing, managing and blocking electronic communications; downloadable software for controlling network security and access, and for implementing network security policies; downloadable software for data security for use in machine-to-machine and machine-to-people communications networks; downloadable software for adaptive risk-based decision making in the field of computer security; downloadable software for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies; downloadable software for computer security testing; downloadable software for auditing and monitoring computer systems, computer system resources, machine activity, and user activity; downloadable software for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance; downloadable software for implementing algorithms and programs in the fields of artificial intelligence, generative AI, and machine learning; downloadable software for industrial attack surface management; downloadable software for computer system and computer network vulnerability testing; downloadable software for computer system security analysis using digital twins; downloadable software for segmenting computer systems and networks; downloadable data analytics software for cybersecurity and computer system threat intelligence; downloadable software for computer system and network threat detection and response; downloadable software for simulating computer system and network security breaches and attacks.
  • GS0421: Providing temporary use of online non-downloadable software in the field of application security and data security; Providing temporary use of online non-downloadable software for endpoint security; providing temporary use of online non-downloadable software using artificial intelligence for cybersecurity and monitoring; providing temporary use of online non-downloadable software using artificial intelligence for data security consulting; providing temporary use of online non-downloadable software using artificial intelligence for cybersecurity risk management; providing temporary use of online non-downloadable software using artificial intelligence monitoring of computer systems for detecting unauthorized access or data breach; software as a service (SaaS) featuring artificial intelligence software for cybersecurity and monitoring; software as a service (SaaS) featuring artificial intelligence software for data security consulting; software as a service (SaaS) featuring artificial intelligence software for cybersecurity risk management; software as a service (SaaS) featuring artificial intelligence software for monitoring of computer systems for detecting unauthorized access or data breach; software as a service (SaaS) featuring software for application security testing; software as a service (SaaS) services featuring software for computer networking management and security, namely, software for traffic prioritization, secure access control, user identification, encryption, security management and intrusion prevention; software as a service (SaaS) services featuring software for data security and data protection; software as a service (SaaS) services featuring software for detecting, blocking and removing computer viruses and threats, encrypting and authenticating data, preventing data-loss, recovering data, securing networks, and detecting, filtering, analyzing, managing and blocking electronic communications; software as a service (SaaS) services featuring software for controlling network security and access, and for implementing network security policies; software as a service (SaaS) services featuring software for data security for use in machine-to-machine and machine-to-people communications networks; software as a service (SaaS) services featuring cybersecurity software; software as a service (SaaS) services featuring software for adaptive risk-based decision making in the field of computer security; software as a service (SaaS) services featuring software for the continuous and autonomous creation, monitoring, and enforcement of security protocols, credentials, and policies; software as a service (SaaS) services featuring software for computer security testing; software as a service (SaaS) services featuring software for auditing and monitoring computer systems, computer system resources, machine activity, and user activity; software as a service (SaaS) services featuring software for detecting, analyzing, and countering security threats, generating security reports, providing security alerts, and for security compliance; software as a service (SaaS) services featuring software for implementing algorithms and programs in the fields of artificial intelligence, generative AI, and machine learning; software as a service (SaaS) services featuring software for industrial attack surface management; software as a service (SaaS) services featuring software for computer system and computer network vulnerability testing; software as a service (SaaS) services featuring software for computer system security analysis using digital twins; software as a service (SaaS) services featuring software for segmenting computer systems and networks; software as a service (SaaS) services featuring data analytics software for cybersecurity and computer system threat intelligence; software as a service (SaaS) services featuring software for computer system and network threat detection and response; software as a service (SaaS) services featuring software for simulating computer system and network security breaches and attacks; computer security and computer network security consultancy; cybersecurity services in the nature of restricting unauthorized access to computer systems; computer programming consultancy in the field of cybersecurity; computer security consultancy in the field of scanning and penetration testing of computers and networks to access information security vulnerabilities; computer security services, namely, restricting unauthorized access to computer networks; computer security threat analysis for protecting data and critical computer systems; computer security services in the nature of administering digital keys; computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; monitoring of computer system operation by remote access; technical support services, namely, troubleshooting computer software problems, and services for the updating, maintenance, installation, repair, and customization of computer software; planning, design and implementation of computer technologies for others; computer virus protection services; Internet security services, namely, globally monitoring and collecting cybersecurity intelligence in the nature of collecting and disseminating information from computer networks about cyber threats and malware; computer security services for protecting data and information from unauthorized access; providing security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the internet, and computer networks; Computer network and internet security services, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; research in the field of cybersecurity; providing information in the field of computer network and internet security; providing technical information in the field of computer software applications; providing technical information in the field of big data computer network security analytics.
Case File Event Statements
  • 10/8/2024 - a year ago
    1 - NEW APPLICATION ENTERED Type: NWAP
  • 4/9/2025 - 7 months ago
    2 - NEW APPLICATION OFFICE SUPPLIED DATA ENTERED Type: NWOS
  • 4/10/2025 - 7 months ago
    3 - ASSIGNED TO EXAMINER Type: DOCK
  • 4/19/2025 - 7 months ago
    6 - NOTIFICATION OF NON-FINAL ACTION E-MAILED Type: GNRN
  • 4/19/2025 - 7 months ago
    4 - NON-FINAL ACTION WRITTEN Type: CNRT
  • 4/19/2025 - 7 months ago
    5 - NON-FINAL ACTION E-MAILED Type: GNRT
  • 7/17/2025 - 4 months ago
    8 - CORRESPONDENCE RECEIVED IN LAW OFFICE Type: CRFA
  • 7/17/2025 - 4 months ago
    7 - TEAS RESPONSE TO OFFICE ACTION RECEIVED Type: TROA
  • 7/17/2025 - 4 months ago
    9 - TEAS/EMAIL CORRESPONDENCE ENTERED Type: TEME
  • 7/18/2025 - 4 months ago
    10 - APPROVED FOR PUB - PRINCIPAL REGISTER Type: CNSA