97917819
May 2, 2023
Computer hardware and downloadable software for use in assessing, analyzing and making inferences with respect to detecting, mitigating and resolving internet traffic threats, assessing intelligence data, and analyzing and making inferences regarding end user's internet traffic to determine how such traffic should be handled; downloadable software for use in providing statistical analysis of business functions; downloadable software for providing demographic information and data concerning the geographic location of internet access devices used by consumers, the geographic locations of consumers, the connection speed and method by which consumers are accessing the internet, and the specific types of devices used by consumers to access the internet; downloadable software for providing access to and creating databases featuring IT information about internet protocol addresses in the nature of the user's location, internet service provider, organization, connection type, user type and other data associated with specific internet protocol addresses; downloadable software for providing access to technology that allows users to determine the location, internet service provider, organization, connection type, user type, and other data associated with specific internet protocol addresses; downloadable software for providing (IP) address verification services; downloadable software for providing access to and creating databases featuring the location, internet service provider and organization associated with specific internet addresses; downloadable software for providing identification of website visitor geographical location by using IP addresses; downloadable software for providing identification of the location and other characteristics of internet users for a wide range of applications including content personalization, fraud detection, ad targeting, traffic analysis, compliance, geo-targeting, geofencing and digital rights management; downloadable software for providing internet directory services, namely, recursive domain name server (DNS) services; downloadable software for identification and tracking of IP addresses and ranking or scoring them according to their reputation; downloadable software for use in detecting, mitigating and resolving internet traffic threats and for use in providing intelligence data to assess, analyze and make inferences regarding an end user's internet traffic, to make determinations as to how such traffic should be handled; downloadable software for use in detecting, mitigating and resolving internet traffic security threats; downloadable software for use in compiling computer security threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; downloadable software for providing machine readable threat intelligence (MRTI) information and data to help determine if incoming internet traffic is malicious and to discover associations among threat actors to track and block their activity
Electrical and Scientific ApparatusBusiness data analysis, namely, use of threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled for business purposes
Advertising and BusinessProviding multiple user access to global computer information networks for the transfer and dissemination of a wide range of information; internet infrastructure services, namely, internet service provider services; Internet routing system services, being internet service provider services
TelecommunicationsProviding online, non-downloadable computer software for safeguarding digital infrastructures and online presences and for protecting networks and applications against risks and downtime; providing DNS, web application, network security, DDoS, web application firewall (WAF), bot management, website monitoring and website load software testing services to others; providing online searchable databases featuring IT information about internet protocol addresses in the nature of the user's location, internet service provider, organization, connection type, user type and other data associated with specific internet protocol addresses; computer services, namely, providing an interactive web site featuring technology that allows users to determine the location, internet service provider, organization, connection type, user type, and other data associated with specific internet protocol addresses; internet protocol (IP) address verification services; providing online searchable databases featuring IT information in the form of the location, internet service provider and organization associated with specific internet addresses; providing an interactive website featuring technology that enables user to identify the geographical location of website visitors by IP address, for a wide range of applications including, fraud detection, compliance, geo-targeting, geo-fencing and digital rights management; computer security threat analysis for protecting data by providing using threat analysis data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; computer security threat analysis for protecting data; data automation and collection service using proprietary software to evaluate, analyze and collect service data; providing online non-downloadable software for compiling and organizing statistical analysis of business functions; providing online non-downloadable software which utilizes threat intelligence data to assess and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; network security and threat detection, mitigation and resolution services, namely, providing temporary use of non-downloadable cloud-based software for cleaning, scrubbing and filtering of malicious internet and network traffic; electronic monitoring and reporting of servers, networks, network systems, network data, network information, data packets, and internet protocol traffic using computers for security purposes including providing related reports featuring suspicious and abnormal patterns and anomalies of networks, system activity reports, and event notification alerts; providing temporary use on non-downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing online threats; providing temporary use of online non-downloadable software for use in preventing access to malicious websites and online threats; providing temporary use of online non-downloadable software for use in blocking unwanted and inappropriate internet and network traffic, for mitigating against and defending networks and websites from distributed denial of service (DDoS) attacks and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime; providing temporary use of online non-downloadable software for use in providing bot management, mitigation, protection and guarding against online and software threats; computer security services, namely, a providing temporary use of non-downloadable cloud-based firewall software that monitors and filters DNS queries to prevent and block computer network users from accessing unwanted and inappropriate content and from accessing custom-designated third-party websites or preventing access to malicious websites or online threats; providing temporary use of cloud-based computer software for accessing domain name systems; computer security threat analysis for protecting data by protecting online businesses from the effects of DNS-based DDoS attacks and other threats; computer security threat analysis for protecting data through identification, blocking and mitigating targeted online threats such as malware, ransom ware, phishing, DNS data exfiltration, and advanced zero-day attacks; providing temporary use of online non-downloadable website software applications for providing API security and threat detection, mitigation and resolution services, namely, a web application firewall (WAF) that cleans, scrubs and filters malicious attacks against website software applications and application programming interfaces (APIs); electronic monitoring of website software applications and APIs for cybersecurity purposes including providing related reports featuring suspicious and abnormal patterns, anomalies and activities; providing temporary use of online downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing threats to website software applications and APIs; computer security services, namely, providing temporary use of online non-downloadable software for use restricting unauthorized network access by preventing access to malicious websites and online threats, blocking unwanted and inappropriate interactions with website software applications and APIs, mitigating against and defending attacks against website software applications and APIs and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime; DNS resolver services that make DNS queries faster and more secure for faster and more private browsing of the internet, namely, providing temporary use of online non-downloadable computer software for use in securing and speeding internet browsing capacity; global DNS resolution service, namely, computer code conversion for others; providing temporary use of non-downloadable software for use in providing an internet directory comprising recursive domain name server (DNS) services; non-downloadable software for use in connecting to the internet which provides a wide range of functionality, including providing connectivity in the shortest time possible, determining the most direct route of connectivity, routing around inactive machines, and routing around inactive lines; providing network security and threat detection, mitigation and resolution services, namely, providing temporary use of cloud-based software for cleaning, scrubbing and filtering of malicious internet and network traffic; providing temporary use of online non-downloadable software for use in providing electronic monitoring of servers, networks, network systems, network data, network information, data packets, and internet protocol traffic for security purposes and providing related reports featuring suspicious and abnormal patterns and anomalies of networks, system activity reports, and event notification alerts; providing temporary use of online non-downloadable software for use in detecting, identifying, intercepting, capturing, quarantining and preventing online threats, and for use in preventing access to malicious websites and online threats; computer security services, namely, restricting unauthorized network access by blocking unwanted and inappropriate internet and network traffic, by mitigating against and defending networks and websites from distributed denial of service (DDoS) attacks and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime; providing online non-downloadable software for use in providing threat detection, mitigation and resolution services; providing online non-downloadable software for use in providing bot management and mitigation, protection and guarding against network security threats; technological consultation in the fields of network security, computer security, firewalls, DNS-based DDOS attacks, malware, ransomware, phishing, DNS data exfiltration, advanced zero-day attacks, and threat detection, mitigation and resolution services; technological consultation in the field of global computer information network connectivity and telecommunication hardware and software; domain name server (DNS) resolver services in the nature of online non-downloadable software that makes DNS queries faster and more secure for faster and more private browsing of the internet; global DNS resolution service as an alternative to DNS providers in the nature of online non-downloadable software that makes DNS queries faster and more secure for faster and more private browsing of the internet; providing online non-downloadable computer software for use in connecting to the internet which provides a wide range of functionality, including providing connectivity in the shortest time possible, determining the most direct route of connectivity, routing around inactive machines, and routing around inactive lines; providing online non-downloadable computer software for the directing and managing of internet traffic; providing online non-downloadable computer software for accessing a wide range of transactions and telecommunications over the global computer information network; providing online non-downloadable software for internet directory services, namely, recursive DNS services; providing online non-downloadable software for threat detection, mitigation and resolution services; providing online non-downloadable software for bot management, mitigation, protection and guarding; providing online non-downloadable software for accessing business information services, data analytics, databases and information for business; data automation and collection services using proprietary software to evaluate, analyze and collect data; technological consultation in the field of internet routing system services, DNS resolver services and global DNS resolution services, and related hardware and software; providing temporary use of a non-downloadable web application firewall (WAF) software that cleans, scrubs and filters malicious attacks against website software applications and application programming interface (API) software; providing temporary use of non-downloadable software for electronic monitoring of website software applications and APIs for security purposes and providing related reports featuring suspicious and abnormal patterns, anomalies and activities, and detecting, identifying, intercepting, capturing, quarantining and preventing threats to website software applications and APIs; computer security services, namely, restricting unauthorized network access by preventing access to malicious websites and online threats, blocking unwanted and inappropriate interactions with website software applications and APIs, mitigating against and defending attacks against website software applications and APIs and implementation of countermeasures to limit exposure from such attacks and protect a website's uptime, and bot management, mitigation, protection and guarding; providing temporary use of non-downloadable software for threat detection, mitigation and resolution; providing temporary use of non-downloadable software for use in providing bot management, mitigation, protection and guarding; technological consultation in the fields of API security, network security, computer security, firewalls, DNS-based DDoS attacks, malware, ransomware, phishing, DNS data exfiltration, advanced zero-day attacks, threat detection, mitigation and resolution services; technological consulting services in the fields of selection, implementation and use of computer hardware and software systems for others with regards to network security, computer security, firewalls, DNS-based DDoS attacks, malware, ransomware, phishing, DNS data exfiltration, advanced zero-day attacks, and threat detection, mitigation and resolution services; internet routing system services; computer security services, namely, a providing an online non-downloadable cloud-based firewall software that monitors and filters DNS queries to prevent and block computer network users from accessing unwanted and inappropriate content and from accessing custom-designated third-party websites or preventing access to malicious websites or online threats; providing online non-downloadable cloud-based DNS resolution software; providing online non-downloadable software for protecting online businesses from the effects of DNS-based DDoS attacks and other threats; providing online non-downloadable software for identification, blocking and mitigating targeted online threats such as malware, ransomware, phishing, DNS data exfiltration, and advanced zero-day attacks; providing online, non-downloadable software for use in identification of IP addresses and ranking or scoring them according to their reputation; providing online, non-downloadable software for identifying possible risk or fraud detection related to business information services, data analytics, databases and information for business; computer security threat analysis for protecting data; information technology consulting regarding computer hardware and software for use in identifying IP addresses and ranking or scoring them according to their reputation related to possible risk or fraud; data analytics, namely, computer security threat analysis for protecting data by using threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; providing temporary use of non-downloadable software for use of threat intelligence data to assess, analyze and make inferences regarding an end user's internet traffic and to make determinations as to how such traffic should be handled; providing temporary use of non-downloadable software for providing machine readable threat intelligence (MRTI) information and data to help determine if incoming internet traffic is malicious and to discover associations among threat actors to track and block their activity; providing temporary use of non-downloadable software for threat detection, mitigation and resolution services related to internet traffic; providing temporary use of non-downloadable software for bot management, mitigation, protection and guarding; providing online searchable databases featuring IT information in the nature of the location associated with specific internet addresses for a wide range of applications including fraud detection, compliance, geofencing and digital rights management; cloud-based recursive DNS service being provision of temporary use of non-downloadable cloud-based software for mapping and resolving the proper IP address to queried domain names to requesting hosts; cloud-based recursive DNS service being provision of temporary use of non-downloadable cloud-based software for computer security, namely, blocking, allowing, routing and resolution of queries of protected data and online services via connecting and resolving users of the software to mobile devices, computers, television, telephone and the internet and wireless enabled devices and protecting the networks of others from incoming security threats; providing temporary use of non-downloadable cloud-based software for protecting data by restricting access to non-compliant content and websites with known vulnerabilities; network security and threat intelligence services, namely, providing online, non-downloadable software for creating DNS query resolutions between servers; providing online, non-downloadable software for electronic monitoring of servers, networks, network systems, network data, network information, data packets, and internet protocol traffic for security purposes and providing related reports featuring suspicious and abnormal patterns of networks, system activity reports, and event notification alerts; providing online, non-downloadable software for detecting, identifying, intercepting, capturing, quarantining and preventing online computer data threats; providing online, non-downloadable software for preventing access to malicious websites known for online data threats; providing online, non-downloadable software for blocking unwanted and inappropriate content with the use of pre-defined category-based web filtering and custom white/black lists; providing online, non-downloadable software for defending service from distributed denial of service (DDOS) attacks; providing online, non-downloadable software for cleaning and filtering of malicious internet traffic; network and data security technological advisory services and assessing for others the vulnerability of online systems, and prescribing for other fixes for weaknesses and gauges for performance for protection against cyber threats and interruptions; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control of the web sites of others
Computer and Scientific