|
CORE SECURITY
Filed on: 6/3/2016
|
Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external...
read more...
|
ABANDONED - FAILURE TO RESPOND OR LATE RESPONSE
4/18/2017
|
|
|
CORE SECURITY
Filed on: 3/31/2016
|
Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external...
read more...
|
CONTINUED USE NOT FILED WITHIN GRACE PERIOD, UN-REVIVABLE
1/19/2024
|
|
|
CORE SECURITY
Filed on: 3/31/2016
|
Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external...
read more...
|
CONTINUED USE AND INCONTESTIBILITY ACCEPTED
12/30/2023
|
|
|
CORE SECURITY
Filed on: 3/31/2016
|
Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external...
read more...
|
REGISTERED
3/19/2019
|
|
|
CORE SECURITY
Filed on: 5/15/2001
|
Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks; computer software for authentication, access control and other security features within computer networks and through external...
read more...
|
CONTINUED USE NOT FILED WITHIN GRACE PERIOD, UN-REVIVABLE
4/18/2019
|
|