THOR AI
Mark Identification

THOR AI

Serial Number

98495138

Filing Date

Apr 11, 2024

Trademark by

SYSNET NORTH AMERICA INC.

Classification Information

Downloadable computer software, namely, software for documenting, organizing, and reporting system controls and institutional processes for information security, regulatory compliance, and unified threat management; computer hardware, namely, firewalls; downloadable computer software, namely, software for monitoring and scanning of performance, data and activity and for detecting, blocking, and facilitating removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital device for use in a web-based portal for information security, regulatory compliance, and unified threat management; Downloadable large language model (LLM) artificial intelligence software application; Downloadable software application for implementing large language model (LLM) artificial intelligence software; Downloadable software application enabling end users to implement large language model (LLM) artificial intelligence software; Downloadable software application for implementing large language models (LLMs) for building, testing, deploying and performance monitoring of artificial intelligence assistants; Downloadable software application for implementing large language models (LLMs) for building, testing, deploying and performance monitoring of chatbots for simulating conversations; Downloadable computer software for generative AI for developers to combine model prompts, generated text, and functions for text-based applications; downloadable computer software using artificial intelligence for creating text-based experiences by connecting prompts, data, and models in a user interface; downloadable computer software using artificial intelligence for introducing developers to Large Language Model fundamentals, and generative AI to build applications; Downloadable intelligent personal assistant software for large language model (LLM) used for the identification of cybersecurity threat patterns and customer-specific security and compliance trends and for customization of the level of answer detail, complexity, and vocabulary used in responses and recommendations by identifying the level of cybersecurity expertise of users; Downloadable chatbot software using artificial intelligence for the identification of cybersecurity threat patterns and customer-specific security and compliance trends and for customization of the level of answer detail, complexity, and vocabulary used in responses and recommendations by identifying the level of cybersecurity expertise of users

Electrical and Scientific Apparatus

Computer data network management services, namely, the collection, retrieval, analysis and reporting of information and data for others

Advertising and Business

Telecommunications and internet services provider reseller services for businesses, namely, providing telecommunication access services, cellular telephone services, and Internet access provider services

Telecommunications

Software as a service (SAAS) services featuring cyber security software for monitoring and scanning of performance, data and activity and for detecting, blocking, and facilitating removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital device; software as a service (SaaS) featuring computer software platforms for monitoring and scanning of performance, data and activity and for detecting, blocking, and facilitating removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital device; software as a service (SaaS) featuring computer software platforms for alerting, tracking, and monitoring security threats, and preparing reports thereon; Providing online non-downloadable computer software for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital device for use in a web-based portal for payment card compliance, security compliance, regulatory compliance, cyber security, and data analytics; software as a service (SAAS) services featuring cybersecurity software for documenting, organizing, and reporting system controls and institutional processes; software as a service (SAAS) services, namely, providing access to online non-downloadable software for documenting, organizing, and reporting system controls and institutional processes for information security, cybersecurity, unified threat management, regulatory compliance, business continuity planning, cybersecurity assessments, information security risk assessment, payment card security, security compliance for information security; providing a website featuring temporary use of non-downloadable software for documenting, organizing and reporting system controls and institutional processes for information security, cybersecurity, regulatory compliance, business continuity planning, cybersecurity assessments, information security risk assessment, payment card security, security compliance for information security; technology consulting services and managed computer security services, namely, information security and compliance assessments, computer network security policy development, implementation and integration of information technology solutions, unified threat management, critical incident response, computer systems analysis, computer security threat analysis, computer and network vulnerability assessments; technology security consultancy services, namely, remote and onsite management of computer networks, firewalls, virtual private networks and networked devices of others for the purpose of assessing and preventing information security vulnerability; managed security services in the nature of security information event management (SIEM), namely, electronic collection and analysis of real-time network information to manage and respond to security vulnerabilities and external threats; managed computer security services, namely, implementation of firewalls, virtual private networks, and intrusion detection systems; Technology consultation in the field of cybersecurity, specifically, information and data security and payment card industry data security; Providing temporary use of online, non-downloadable computer chatbot software for simulating conversations; Providing temporary use of online, non-downloadable chatbot software using artificial intelligence for the identification of cybersecurity threat patterns and customer-specific security and compliance trends and for customization of the level of answer detail, complexity, and vocabulary used in responses and recommendations by identifying the level of cybersecurity expertise of users

Computer and Scientific

Regulatory compliance consulting in the field of information and data security and payment card industry data security

Personal