79343091
Sep 7, 2021
Mar 14, 2023
Active Trademark
Downloadable artificial intelligence software for analysis of vulnerability in computers and computer networks; downloadable computer programmes for data processing; downloadable computer software for testing vulnerability in computers and computer networks; downloadable computer software for the detection of threats to computer networks; downloadable computer software for the monitoring of computer systems; downloadable programs for computers for detecting document forgery, serial fraud, synthetic identities, bots, account takeovers, money laundering, and unknown financial threats operating at scale; downloadable security software for computers to detect document forgery, serial fraud, synthetic identities, bots, account takeovers, money laundering, and unknown financial threats operating at scale; downloadable software for network and device security; downloadable system and system support software for protecting AI-based financial automation systems from manipulation, misuse and intentional attacks; downloadable firmware, utility, security and cryptography software for detecting document forgery, serial fraud, synthetic identities, bots, account takeovers, money laundering, and unknown financial threats operating at scale; downloadable web application and server software for detecting document forgery, serial fraud, synthetic identities, bots, account takeovers, money laundering, and unknown financial threats operating at scale; none of the aforesaid being for or in relation to interactive entertainment software, computer games software, video games software, interactive games hardware, computer games hardware and video games hardware
Electrical and Scientific ApparatusRental of computer hardware and computer software; research in the field of computer programs and software; safety technological product testing services; software as a service (SAAS) services featuring software using artificial intelligence for detecting document forgery, serial fraud, synthetic identities, bots, account takeovers, money laundering, and unknown financial threats operating at scale; software as a service (SAAS) services featuring computer software platforms for using artificial intelligence to do vulnerability analysis of computers and computer networks; software as a service (SaaS) services featuring software for machine learning, deep learning and deep neural networks; updating of computer software relating to computer security and prevention of computer risks; advisory services relating to computer programming; advisory services in the field of product development and quality improvement of software; computer programming; computer programming services for electronic data security; computer security services for protection against illegal network access; computer security system monitoring services for detecting document forgery, serial fraud, synthetic identities, bots, account takeovers, money laundering, and unknown financial threats operating at scale; computer software technical support services, namely, troubleshooting of computer software problems; configuration of computer software; configuration of computer systems and networks; computer security consultancy; consultancy in the field of security software; consultancy services relating to computer networks using mixed software environments; consulting in the field of cloud computing networks and computer software applications; consulting services in the field of software as a service (SaaS); computer software consultancy; creation, maintenance and adaptation of software; design and development of computer software architecture; design and development of computer software for evaluation and calculation of data; design and development of data processing software; design and development of Internet security programs; design, development and implementation of software; design and development of electronic data security systems; design, maintenance, development and updating of computer software; development and testing of computing methods, algorithms and software; development of software for secure network operations; IT security services in the nature of protection and recovery of computer data; maintenance of computer software relating to computer security and prevention of computer risks; providing information in the field of computer software development; none of the aforesaid being for or in relation to interactive entertainment software, computer games software, video games software, interactive games hardware, computer games hardware and video games hardware
Computer and ScientificReviewing standards and practices to assure compliance with anti-money laundering laws and regulations; none of the aforesaid being for or in relation to interactive entertainment software, computer games software, video games software, interactive games hardware, computer games hardware and video games hardware
Personal