Mark Identification

VALLLT

Serial Number

98366269

Filing Date

Jan 19, 2024

Trademark by

VALLLT LLC

Classification Information

Downloadable computer application software for mobile phones, tablets, handheld computers, smart watches, portable media players, and computers, namely, software for securing and protecting electronic communications; Downloadable computer application software for mobile phones, tablets, handheld computers, smart watches, portable media players, and computers, namely, software for user identity authentication; Downloadable computer application software for mobile phones, tablets, handheld computers, smart watches, portable media players, and computers, namely, software for website security; Downloadable computer application software for mobile phones, tablets, handheld computers, smart watches, portable media players, and computers, namely, software for password and personal identity information access and management;; Downloadable computer application software for mobile phones, tablets, handheld computers, smart watches, portable media players, and computers, namely, software for providing a scoring system for rating 3rd party website on the level of security; Downloadable computer application software for mobile phones, tablets, handheld computers, smart watches, portable media players, and computers, namely, software for securing and encrypting data; Downloadable computer application software for mobile phones, tablets, handheld computers, smart watches, portable media players, and computers, namely, software for user identification, authentication, and verification with integrated multi-factor authentication; Downloadable computer application software for mobile phones, tablets, handheld computers, smart watches, portable media players, and computers, namely, software for facilitate multi-factor authentication; Downloadable computer application software for mobile phones, tablets, handheld computers, smart watches, portable media players, and computers, namely, software for detecting malicious cyber activity; Downloadable computer application software for mobile phones, tablets, handheld computers, smart watches, portable media players, and computers, namely, software for blocking cyber attacks; Downloadable computer application software for mobile phones, tablets, handheld computers, smart watches, portable media players, and computers, namely, software for transaction verification; Downloadable computer application software for mobile phones, tablets, handheld computers, smart watches, portable media players, and computers, namely, software for enhancing website privacy and security; Downloadable computer application software for mobile phones, tablets, handheld computers, smart watches, portable media players, and computers, namely, software for combining user identity data with transaction data; Downloadable computer application software for mobile phones, tablets, handheld computers, smart watches, portable media players, and computers, namely, software for secure management of digital wallets; Downloadable computer software for computer system and application development, deployment and management; Downloadable software for ensuring the security of electronic mail; Downloadable software for website security; Downloadable software for user identity authentication; Downloadable software for secure management of digital wallets; Downloadable software for combining user identity data with transaction data; Downloadable software for enhancing website privacy and security; Downloadable software for password and personal identity information access and management;; Downloadable software for encrypting data; Downloadable software for blocking cyber attacks; Downloadable software for detecting malicious cyber activity; Downloadable software for protecting identities and online identities of users; Downloadable software for creating, minting, transferring, trading, exchanging, selling, buying, utilizing, and/or transacting with digital assets, such as crypto-currencies, crypto-coins, non-fungible tokens (nfts), metaverse avatars, virtual reality (vr) assets, augmented reality (ar) assets, metaverse assets; Downloadable software for providing a scoring system for rating 3rd party website on the level of security; Downloadable software for use as a website plugin; Downloadable computer software for encryption; Downloadable computer software for managing and verifying financial transactions; Downloadable application programming interface (API) software; Downloadable anti-spyware software; Downloadable computer software for use as an application programming interface (API); Recorded anti-spyware software

Electrical and Scientific Apparatus

Application service provider featuring application programming interface (API) software; Computer programming; Computer software design; Computer software design and updating; Computer software design, computer programming, and maintenance of computer software; Computer software development, computer programming and maintenance of computer software for website security; Computer software development, computer programming and maintenance of computer software for user identity authentication; Computer software development, computer programming and maintenance of computer software for password and personal identity information access and management;; Computer software development, computer programming and maintenance of computer software for providing a scoring system for rating 3rd party website on the level of security; Computer software development, computer programming and maintenance of computer software for securing and protecting electronic communications; Computer software development, computer programming and maintenance of computer software for securing and encrypting data; Computer software development, computer programming and maintenance of computer software for enhancing website privacy and security; Software design and development; Computer software development; Computer software consulting; Developing and updating computer software; Providing temporary use of non-downloadable computer software for tracking freight over computer networks, intranets and the internet; Software as a service (SAAS) services featuring software for user identity authentication; Software as a service (SAAS) services featuring software for securing user identity; Software as a service (SAAS) services featuring software for securing digital assets; Software as a service (SAAS) services featuring software for securing online transactions; Software as a service (SAAS) services featuring software for securing electronic commerce transactions; Software as a service (SAAS) services featuring software for opening or creating new accounts; Software as a service (SAAS) services featuring software for protecting identities and online identities of users; Software as a service (SAAS) services featuring software for securing user data; Software as a service (SAAS) services featuring software for transaction verification; Software as a service (SAAS) services featuring software for detecting malicious cyber activity; Software as a service (SAAS) services featuring software for detecting fraudulent transactions; Software as a service (SAAS) services featuring software for blocking a suspicious transaction; Software as a service (SAAS) services featuring software for tokenizing user identity data with transaction data; Software as a service (SAAS) services featuring software for combining user identity data with transaction data; Software as a service (SAAS) services featuring software for blocking cyber attacks; Software as a service (SAAS) services featuring software for providing cybersecurity protection; Software as a service (SAAS) services featuring software for online identity protection; Software as a service (SAAS) services featuring software for secure file sharing; Software as a service (SAAS) services featuring software for secure management of digital wallets; Software as a service (SAAS) services featuring software for creating, minting, transferring, trading, exchanging, selling, buying, utilizing, and/or transacting with digital assets, such as crypto-currencies, crypto-coins, non-fungible tokens (nfts), metaverse avatars, virtual reality (vr) assets, augmented reality (ar) assets, metaverse assets; Software as a service (SAAS) services featuring software for preventing biometric fraud; Software as a service (SAAS) services featuring software for enhancing and managing web browser software and personal identity information; Software as a service (SAAS) services featuring software for user identity authentication and computer access management; Software as a service (SAAS) services featuring software for authentication of authorized users of a computer system; Software as a service (SAAS) services featuring software for password and personal identity information access and management;; Software as a service (SAAS) services featuring software for user identification, authentication, and verification with integrated multi-factor authentication; Software as a service (SAAS) services featuring software for facilitate multi-factor authentication; Software as a service (SAAS) services featuring software for providing a scoring system for rating 3rd party website on the level of security; Software as a service (SAAS) services featuring software for encrypting data; Software as a service (SAAS) services featuring software for anti-spyware; Software as a service (SAAS) services featuring software for securing and protecting electronic communications

Computer and Scientific