88851700
Mar 29, 2020
Mar 2, 2021
Active Trademark
Computer, embedded systems comprised of embedded computer hardware and mobile device hardware for cyber security; downloadable and recorded computer software for cyber security for detection, mitigation and prevention of computer and internet viruses, malware, network anomalies and security breaches; downloadable software in the nature of a mobile application for cyber security for detection and mitigation of computer and internet viruses, malware, network anomalies and security breaches; VPN (virtual private network) hardware; computer peripherals; Hardware and downloadable and recorded software for Embedded systems for use in artificial intelligence, Data encryption, detection, mitigation and prevention of computer and internet viruses, malware, network anomalies and security breaches; downloadable and recorded computer software and computer hardware for detecting and preventing cyber-attacks; downloadable and recorded computer software for identifying and preventing cyber-attacks in computers, computer systems, embedded systems, networks, hardware, software applications, digital devices, and mobile devices; downloadable and recorded computer software and hardware providing artificial intelligence, Data encryption, vulnerabilities protection and detection, malware and virus protection and security breaches for secure networks, virtual computer systems, virtual private networks and virtual computer environments; computer hardware; downloadable and recorded computer software for detecting and preventing cyber risks; Computers and downloadable and recorded computer software for artificial intelligence, data analytics, deep learning, machine learning, data integration for use in modeling human behavior; Computers and downloadable and recorded computer software for artificial intelligence, Data encryption, data analytics, deep learning, machine learning, data integration for use in Hardware protection; Hardware and downloadable and recorded software using artificial intelligence for use in deep learning, machine learning, data analytics, data integration; Computer hardware for protecting cryptocurrency activities; downloadable and recorded computer software for protecting cryptocurrency activities; Downloadable computer software for encryption; Electronic encryption units; Software-defined radio (SDR); Radio based hardware being radio receivers and transmitters
Electrical and Scientific ApparatusTechnology consulting and technical computer services in the fields of cyber security; Consulting in the field of information technology and computer security; Consulting in the field of embedded systems security; Research and development technologies for cyber security; Designing, developing, customizing being programming, configuring, maintaining, analyzing, integrating and remote management of cyber-security systems of others; Software consulting and technology services related to cyber-attacks and threats against computers, computer systems, embedded systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; software innovation consulting services in the field of cyber security; Technology consulting and technological services related to designing, developing, configuring, maintaining, analyzing, integrating, and remote management of cyber-security systems for others; maintenance of computer software relating to computer security and prevention of computer risks; application service provider (ASP) featuring software for use cyber security for detection, mitigation and preventing of computer and internet viruses, malware, network anomalies and security breaches; application service provider (ASP) featuring software that provides secure virtual private networks, virtual computer systems and virtual computing environments; Computer security threat analysis and artificial intelligence for protecting data; Computer security threat analysis, namely, cybersecurity services in the nature of restricting unauthorized access to computer harddrives and computer networks, Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Technological consulting in the field of protecting cryptocurrency; Data encryption services for providing security and anonymity; Data encryption services; network communications encryption services; hardware and software data encryption services
Computer and Scientific