Serial Number

97333472

Filing Date

Mar 28, 2022

Registration Date

Jun 20, 2023

Trademark by

LOKI LABS INC.

Active Trademark

Classification Information

Advice relating to the design of computer hardware; Advisory services in the field of product development and quality improvement of software; Advisory services relating to computer software; Authentication, issuance and validation of digital certificates; Business technology software consultation services; Cloud computing featuring software for use in IT administrator training in the field of network security events and for monitoring and detecting computer network security events; Computer diagnostic services; Computer disaster recovery planning; Computer forensic services; Computer hardware and software design; Computer monitoring service which tracks hardware performance and processes and sends out historical reports and alerts; Computer network configuration services; Computer network design and computer software design for computer security threat analysis for protecting the integrity of electronic data; Computer network design for others; Computer network security consultancy; Computer performance testing; Computer programming and maintenance of computer programs; Computer programming and software design; Computer programming consultancy; Computer programming consultancy in the field of training, monitoring and detecting computer network security events; Computer programming for others; Computer programming services for others in the field of software configuration management; Computer programming services for training, monitoring and detecting computer network security events; Computer project management services; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of network administration; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services in the nature of administering digital certificates; Computer security services in the nature of administering digital keys; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computer security services, namely, restricting unauthorized access to computers and networks; Computer security threat analysis for protecting data; Computer services, namely, remote management of information technology (IT) systems of others comprised of monitoring and detecting security events; Computer services, namely, creating computer network-based indexes of information, websites and resources; Computer services, namely, data recovery services; Computer services, namely, encrypted data recovery services; Computer services, namely, filtering of unwanted e-mails; Computer services, namely, integration of private and public cloud computing environments; Computer services, namely, monitoring and reporting on the performance, availability, and errors of web sites of others; Computer services, namely, monitoring the web sites of others to improve their scalability and performance; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the web sites of others; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer services, namely, remote management of the information technology (IT) systems of others; Computer site design; Computer software consultancy; Computer software consultation; Computer software consulting; Computer software design; Computer software design for others; Computer software design, computer programming, and maintenance of computer software; Computer software development; Computer software development and computer programming development for others; Computer software development in the field of computer network and Internet security; Computer software development, computer programming and maintenance of computer software for computer security; Computer software installation and maintenance; Computer system analysis; Computer system design services; Computer systems analysis; Computer technology consultancy; Computer technology consultancy in the field of cyber security; Computer virus protection services; Consultancy and information services relating to information technology architecture and infrastructure; Consultancy in the field of artificial intelligence technology; Consultancy in the field of quantum computing; Consultancy in the field of software design; Consultation about the maintenance and updating of computer software; Consultation services relating to computer software; Consulting in the field of configuration management for computer hardware and software; Consulting in the field of engineering; Consulting in the field of computer engineering; Consulting on root cause analysis in the field of computer network vulnerabilities and threats; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of cloud computing; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the field of hosting computer software applications; Consulting services in the field of providing online, non-downloadable software and applications; Consulting services in the field of software as a service (SAAS); Consulting services in the fields of selection, implementation and use of computer hardware and software systems for others; Creating and designing website based indexes of information for others using information technology; Creating, maintaining, and modernizing computer software; Custom design of computer software; Customizing computer software; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Data security consultancy; Database development services; Debugging computer software for others; Design and development of computer game software and virtual reality software; Design and development of computer hardware and software; Design and development of computer software; Design and development of computer software for computer security, computer network security, and Internet security; Design and development of computers and programs for computers; Design and development of software and hardware for monitoring and detecting computer network security events; Design and writing of computer software; Design for others in the field of computer networks, software, and engineering for the detection of cyber security events; Design of computer networks and software for others for the prevention of computer network security events; Design, development and implementation of software; Design, development, and implementation of software for training, monitoring and detecting computer network security events; Design, development, installation and maintenance of computer software; Design, installation, updating and maintenance of computer software; Design, maintenance, development and updating of computer software; Designing website based indexes of information for others using information technology; Developing and updating computer software; Developing computer software; Developing customized software for others; Developing customized software in the field of computer network and Internet security for others; Development of software for secure network operations; Electronic signature verification services using technology to authenticate user identity; Engineering services in the field of computer network and Internet security; Information technology consulting services; Installation and maintenance of computer software; Installation and maintenance of computer security software; Installation of computer software; Installation of cyber security software; Installation, maintenance and repair of computer software; Installation, maintenance and repair of software for computer systems; Installation, maintenance and repair of cyber security software; Installation, maintenance, and updating of computer software; Installation, repair and maintenance of computer software; Installing computer programs; Internet security consultancy; IT consulting services; IT integration services; Maintenance and updating of computer software; Maintenance and upgrading of computer software; Maintenance of computer software; Maintenance of computer software relating to computer security and prevention of computer risks; Maintenance of computer software used for cyber security; Monitoring of computer systems by remote access to ensure proper functioning; Monitoring of computer systems for detecting unauthorized access or data breach; Monitoring of computer systems to detect breakdowns; Monitoring computers, servers, and switches to ensure proper functioning; Outsource service provider in the field of information technology consulting; Outsource service providers in the field of information technology; Periodic upgrading of computer software for others; Planning and development of electronic communications networks; Planning, design and management of information technology systems; Preparation, update, installation and maintenance of computer software; Product development; Product development consulting in the field of Internet security; Product development for others; Product development in the field of computer security; Professional computer services, namely, network analysis, LAN/WAN design, wireless engineering, virtualization and computer project management; Programming of computer software for others; Providing a website that gives computer users the ability to obtain cyber security information; Providing information in the fields of technology and software development via an on-line website; Providing information relating to computer programming via a website; Providing information relating to computer technology and programming via a website; Providing information relating to computer technology via a website; Providing information relating to on-line non-downloadable software to facilitate electronic communication between individuals provided via the Internet; Providing on-line non-downloadable computer software for use as a cryptocurrency wallet; Providing technology information in the field of cryptocurrency; Providing technology information in the field of computers, computer networks, and Internet security; Providing temporary use of non-downloadable computer anti-virus software; Providing temporary use of non-downloadable computer software for tracking documents over computer networks, intranets and the internet; Provision of information relating to computer programming via a website; Provision of information relating to computer technology and programming via a website; Provision of information relating to computer technology via a website; Recovery of computer data; Repair of computer software; Repair of software; Research and development of computer software; Research, development, design and upgrading of computer software; Services for maintenance of computer software; Services for updating computer software; Software as a service (SAAS) services featuring software for IT administrator training in the field of computer network security events and for monitoring and detecting computer network security events; Software as a service (SAAS) services featuring software for cyber security; Software authoring; Software design and development; Software development and product development consulting in the field of computer network and Internet security; Software development and product development in the field of cyber security; Software development consulting in the field of cyber security; Software development for others in the field of software configuration management; Software development in the field of computer network administration; Software engineering services; Technical consulting in the field of artificial intelligence (AI) software customization; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; Technical support services, namely, troubleshooting in the nature of diagnosing problems with medical equipment; Technical support services, namely, troubleshooting of computer software problems; Technical support, namely, monitoring technological functions of computer network systems; Technical support, namely, providing backup computer programs and facilities; Technical writing in the field of computers, computer networks, and Internet security; Technological consultation in the technology field of computers and network administration; Technological consulting in the field of cryptocurrency; Technological planning and consulting services in the field of computer security; Technology advisory services related to cyber security; Technology consultation and research in the field of computers and network administration; Technology consultation in the field of cybersecurity; Technology consultation in the field of monitoring and detecting computer network security events; Testing of computer software; Testing of computer software for security events; Testing of computers for cyber security; Troubleshooting of computer software problems; Up-dating of computer software; Updating and design of computer software; Updating and maintenance of computer software; Updating of computer programs for third parties; Updating of computer software; Updating of computer software for others; Updating of computer software relating to computer security and prevention of computer risks; Web site design consultancy

Computer and Scientific