HEMLOCK
Mark Identification

HEMLOCK

Serial Number

99344996

Filing Date

Aug 19, 2025

Trademark by

CIGNAL LLC

Classification Information

Downloadable computer software for AI/ML security and defense, including for large and small language models, vision models, audio models, and multi-modal models, and other machine learning models, algorithms, and agents; AI/ML red-teaming, including adversarial testing, prompt injection, data poisoning, and model inversion; blue team AI/ML model defenses, including adversarial robustness, input filtering, data noising, and model monitoring; AI/ML training, fine-tuning, RAG (Retrieval-Augmented Generation), inference, and neural rendering; AI/ML testing and evaluation, AI/ML model benchmarking and ratings; data science, cybersecurity, cloud security, network security, software testing and evaluation, security compliance management, threat intelligence, anomaly detection, threat hunting, intrusion detection and prevention, incident response, digital forensics, reverse engineering, penetration testing, red teaming, adversarial testing, threat modeling, vulnerability management, vulnerability scanning, vector databases, data privacy, encryption, and data loss prevention

Electrical and Scientific Apparatus

Software as a service (SAAS) for AI/ML security and defense, including for large and small language models, vision models, audio models, and multi-modal models, and other machine learning models, algorithms, and agents; AI/ML red-teaming, including adversarial testing, prompt injection, data poisoning, and model inversion; blue team AI/ML model defenses, including adversarial robustness, input filtering, data noising, and model monitoring; AI/ML training, fine-tuning, RAG (Retrieval-Augmented Generation), inference, and neural rendering; AI/ML testing and evaluation, AI/ML model benchmarking and ratings; data science, cybersecurity, cloud security, network security, software testing and evaluation, security compliance management, threat intelligence, anomaly detection, threat hunting, intrusion detection and prevention, incident response, digital forensics, reverse engineering, penetration testing, red teaming, adversarial testing, threat modeling, vulnerability management, vulnerability scanning, vector databases, data privacy, encryption, and data loss prevention

Computer and Scientific