ZERO TRUST API
Mark Identification

ZERO TRUST API

Serial Number

90024740

Filing Date

Jun 28, 2020

Trademark by

SRIVASTAVA KUMAR S

Classification Information

Application service provider (ASP) featuring application-to-person (A2P) software for use in one-way text message communication from automated, cybersecurity threat detection systems; Application service provider (ASP) featuring software for use in protection of users, data and network assets; Application service provider (ASP) featuring software using artificial intelligence for detection and collaborative and automated mitigation of cybersecurity risks and threats; Application service provider featuring application programming interface (API) software; Application service provider featuring application programming interface (API) software for detection and collaborative and automated mitigation of cybersecurity risks and threats; Application service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software and web sites of others in the fields of cybersecurity; Cloud computing featuring software for use in protection of users, data and network assets; Computer network design and computer software design for the protection of users, data and network assets; Computer programming services for detection and collaborative and automated mitigation of cybersecurity risks and threats; Computer programming services, namely, detection and collaborative and automated mitigation of cybersecurity risks and threats; Computer security services, namely, restricting unauthorized access to users, devices, network, applications, data and IT infrastructure; Computer security services, namely, restricting unauthorized network access by users, machines, devices and applications; Computer services, namely, remote management of information technology (IT) systems of others comprised of network assets, data, users and devices; Computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for the purpose of protection of users, data and network assets; Computer services, namely, creating an on-line community for registered users to participate in discussions, get feedback from their peers, form virtual communities, and engage in social networking services in the field of collaborative network risk and threat mitigation; Computer services, namely, creating an on-line community for registered users to review and mitigate network cybersecurity threats and risks; Computer services, namely, creating an on-line virtual environment for collaborative mitigation of cybersecurity risks and threats; Computer services, namely, designing and implementing protection of users, data and network assets for others; Computer services, namely, hosting an interactive web site that allows mitigation of cybersecurity risks and threats; Computer services, namely, monitoring and reporting on the performance, availability, and errors of web sites of others; Computer services, namely, monitoring the web sites of others to improve their scalability and performance; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the web sites of others; Computer services, namely, on-site management of information technology (IT) systems of others comprised of network assets, data, users and devices; Computer services, namely, providing search engines for obtaining network and internet threats and risks on a global computer network; Computer services, namely, providing search platforms to allow users to collaboratively detect and mitigate cybersecurity threats and risks; Computer services, namely, providing internet security servers to others; Computer software development in the field of cybersecurity and internet security; Design and development of computer software for protecting data and services; Design of computer networks and software for others for the protection of users, data and network assets; Design, development, and implementation of software for protection of users, data and network assets; Electronic monitoring and reporting of network threat and risk using computers or sensors; Platform as a service (PAAS) featuring computer software platforms for operating secure applications and workflows; Providing a web site featuring temporary use of non-downloadable software for protection of users, data and network assets; Providing a website featuring non-downloadable software using artificial intelligence for detection and collaborative and automated mitigation of cybersecurity risks and threats; Providing a website featuring on-line non-downloadable software that enables users to detect and collaboratively and automatically mitigate cybersecurity risks and threats; Providing a website featuring resources, namely, non-downloadable software for protection of users, data and network assets ; Providing a website featuring technology that enables users to detect and mitigate network and internet risks; Providing an online non-downloadable Internet-based system application featuring technology enabling users to leverage software for network and internet security; Providing on-line non-downloadable software for protection of users, data and network assets; Providing on-line non-downloadable software using artificial intelligence for detection and collaborative and automated mitigation of cybersecurity risks and threats; Providing temporary use of a non-downloadable web application for protection of users, data and network assets; Providing temporary use of a web-based software application for protection of users, data and network assets; Providing temporary use of non-downloadable web-based decentralized applications (DApps) for distributed risk detection and mitigation; Providing temporary use of on-line non-downloadable cloud computing software for protection of users, data and network assets; Providing temporary use of on-line non-downloadable cloud computing software using artificial intelligence for detection and collaborative and automated mitigation of cybersecurity risks and threats; Providing temporary use of on-line non-downloadable software and applications for protection of users, data and network assets; Providing temporary use of on-line non-downloadable software and applications using artificial intelligence for detection and collaborative and automated mitigation of cybersecurity risks and threats; Providing temporary use of on-line non-downloadable software development tools for building secure applications and workflows; Providing temporary use of on-line non-downloadable software for detection and collaborative and automated mitigation of cybersecurity risks and threats; Providing temporary use of online non-downloadable middleware for providing an interface between applications and cyber threat and risk detection intelligence; Providing temporary use of online non-downloadable simulation software for modeling network and internet behavior of users, devices, computers, servers, applications and data; Providing temporary use of online, non-downloadable enterprise software for detection and collaborative and automated mitigation of cybersecurity risks and threats; Providing user authentication services using artificial intelligence powered behavior profiling and risk determination for e-commerce transactions; Software as a service (SAAS) services featuring software for protection of users, data and network assets; Software as a service (SAAS) services featuring software for detection and collaborative and automated mitigation of cybersecurity risks and threats; Software as a service (SAAS) services featuring software using artificial intelligence for detection and collaborative and automated mitigation of cybersecurity risks and threats; Software as a service (SAAS) services, namely, hosting software for use by others for use in protection of users, data and network assets

Computer and Scientific