90279082
Oct 26, 2020
Aug 23, 2022
Active Trademark
Downloadable computer application software for computers and mobile electronic devices, namely, software for providing self-help information, and tips concerning dark web activity; downloadable mobile application that enables users to monitor and surveil dark web activity; downloadable mobile application that enables and assists users to respond to dark web activity; downloadable computer software for monitoring, tracking, providing alerts for, and blocking phishing, cyber hacking, malicious scripts, dark web activities, and data breaches; downloadable mobile applications for monitoring, tracking, providing alerts for, and blocking phishing, cyber hacking, malicious scripts, dark web activities, and data breaches; downloadable computer software for monitoring, tracking, providing alerts for, and blocking web-based advertisements, cookies, and programmatic trackers; downloadable mobile applications for monitoring, tracking, providing alerts for, and blocking web-based advertisements, cookies, and programmatic trackers; downloadable computer software for monitoring, tracking, providing alerts for, and blocking unauthorized access to cameras and microphones on computers, mobile computing devices, and mobile communication devices; downloadable mobile applications for monitoring, tracking, providing alerts for, and blocking unauthorized access to cameras and microphones on computers, mobile computing devices, and mobile communication devices; downloadable computer software to assist in cleaning, removing, protecting, and preventing third-party access to, internet browsing data and data related to browser identities; downloadable mobile applications to assist in cleaning, removing, protecting, and preventing third-party access to, internet browsing data and data related to browser identities; downloadable virtual private network (VPN) operating software; downloadable computer software to assist in detecting, identifying, and protecting personal or confidential data, passwords, and documents stored on computers and mobile devices; downloadable mobile applications to assist in detecting, identifying, and protecting personal or confidential data, passwords, and documents stored on computers and mobile devices; downloadable computer software for providing secure and encrypted storage for personal data and confidential data, passwords, and documents; downloadable mobile applications for providing secure and encrypted storage for personal data and confidential data, passwords, and documents; downloadable computer software for removing personal data and confidential information from computers, mobile computing devices, and mobile communication devices downloadable mobile applications for removing personal data and confidential information from computers, mobile computing devices, and mobile communication devices; downloadable computer software for providing alerts, notifications, analyses, assessments, self-help information, and tips on privacy and cyber security risks associated with applications installed on computers, mobile computing devices, and mobile communication devices; downloadable mobile applications for providing alerts, notifications, analyses, assessments, self-help information, and tips on privacy and cyber security risks associated with applications installed on computers, mobile computing devices, and mobile communication devices; downloadable computer anti-virus software for monitoring, detecting, providing alerts for, blocking, scanning for removing, and eliminating viruses, adware, bots, malware, ransomware, spyware, rootkits, trojans, and other unauthorized programs or access; downloadable mobile anti-virus application for monitoring, detecting, providing alerts for, blocking, scanning for removing, and eliminating viruses, adware, bots, malware, ransomware, spyware, rootkits, trojans, and other unauthorized programs or access; downloadable computer anti-virus software to assist in blocking, scanning for and quarantining viruses, adware, bots, malware, ransomware, spyware, rootkits, trojans, and other unauthorized programs transmitted via electronic mails; downloadable mobile anti-virus application to assist in blocking, scanning for and quarantining viruses, adware, bots, malware, ransomware, spyware, rootkits, trojans, and other unauthorized programs transmitted via electronic mails; downloadable computer software for providing cloud-based data backup storage that allows secure transfers and storage of data; downloadable computer software for scrambling digital fingerprint identification while web browsing; downloadable computer software for monitoring stored applications and categorizing the applications by privacy risk level and providing recommendations for mitigating risk; downloadable computer software for blocking tracking records that include personal digital information; mobile applications for blocking tracking records that include personal digital information; downloadable computer software for identifying profiles of devices connected to computers and mobile devices; downloadable computer anti-virus software
Electrical and Scientific ApparatusComputerized management of databases that aggregate information concerning viruses and cyber threats for use in providing anti-virus protection for computers, mobile computing devices, and mobile communication devices
Advertising and BusinessElectronic monitoring of dark web for personally identifying information to detect fraud via the internet; computer security consultation in the field of data theft; computer security services, namely, providing personal protection and security services for the protection against and prevention of data theft, in the nature of computer security threat analysis services for protecting data; providing a secure electronic online system featuring technology which allows users to lock and unlock access to personal identifying information; electronic monitoring of dark web to detect breaches on personal data; electronic monitoring of computers, mobile computing devices, and mobile communication devices to detect hacking attempts, phishing attempts, and other attempts to gain unauthorized access; computer security services, namely, monitoring, tracking, providing alerts for, and blocking phishing, cyber hacking, malicious scripts, dark web activities, and data breaches; computer security services, namely, monitoring, tracking, providing alerts for, and blocking web-based advertisements, cookies, and programmatic trackers; computer security services, namely, monitoring, tracking, providing alerts for, and blocking unauthorized access to cameras and microphones on computers, mobile computing devices, and mobile communication devices; computer security services, namely, cleaning, removing, protecting, and preventing third-party access to, internet browsing data and data related to browser identities; computer security services, namely, detecting, identifying, and protecting personal data and confidential data, passwords, and documents stored on computers and mobile devices; computer security services, namely, providing secure and encrypted storage for personal data and confidential data, passwords, and documents; computer security services, namely, removing personal data and confidential information from computers, mobile computing devices, and mobile communication devices; computer security services, namely, providing alerts, notifications, analyses, assessments, self-help information, and tips on privacy and cyber security risks associated with applications installed on computers, mobile computing devices, and mobile communication devices; developing and maintaining databases that aggregate information concerning viruses and cyber threats for use in providing anti-virus protection for computers, mobile computing devices, and mobile communication devices
Computer and Scientific