Filters
on 12 Sep 2024
Loki Labs Inc.
88044768 · 19 Jul 2018
19 Feb 2029
042
Class 042
Computer & Software Services & Scientific Services
"LABS"
"LABS",Computer security services, namely, restricting unauthorized ne...
on 30 Apr 2024
Loki Labs, Inc.
97293080 · 03 Mar 2022
30 Apr 2030
041
Class 041
Education and Entertainment Services
Color is not claimed as a feature of the mark.
Color is not claimed as a feature of the mark.,Arranging and conductin...
on 30 Apr 2024
Loki Labs, Inc.
97284494 · 25 Feb 2022
30 Apr 2030
041
Class 041
Education and Entertainment Services
"LABS"
"LABS",Arranging and conducting educational courses for Information Te...
on 20 Jun 2023
Loki Labs, Inc.
97333472 · 28 Mar 2022
20 Jun 2029
042
Class 042
Computer & Software Services & Scientific Services
Advice relating to the design of computer hardware; Advisory services in the field of product development and quality improvement of software; Advisory services relating to computer software; Authentication, issuance and validation of digital certificates; Business technology software consultation services; Cloud computing featuring software for use in IT administrator training in the field of network security events and for monitoring and detecting computer network security events; Computer diagnostic services; Computer disaster recovery planning; Computer forensic services; Computer hardware and software design; Computer monitoring service which tracks hardware performance and processes and sends out historical reports and alerts; Computer network configuration services; Computer network design and computer software design for computer security threat analysis for protecting the integrity of electronic data; Computer network design for others; Computer network security consultancy; Computer performance testing; Computer programming and maintenance of computer programs; Computer programming and software design; Computer programming consultancy; Computer programming consultancy in the field of training, monitoring and detecting computer network security events; Computer programming for others; Computer programming services for others in the field of software configuration management; Computer programming services for training, monitoring and detecting computer network security events; Computer project management services; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of network administration; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services in the nature of administering digital certificates; Computer security services in the nature of administering digital keys; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computer security services, namely, restricting unauthorized access to computers and networks; Computer security threat analysis for protecting data; Computer services, namely, remote management of information technology (IT) systems of others comprised of monitoring and detecting security events; Computer services, namely, creating computer network-based indexes of information, websites and resources; Computer services, namely, data recovery services; Computer services, namely, encrypted data recovery services; Computer services, namely, filtering of unwanted e-mails; Computer services, namely, integration of private and public cloud computing environments; Computer services, namely, monitoring and reporting on the performance, availability, and errors of web sites of others; Computer services, namely, monitoring the web sites of others to improve their scalability and performance; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the web sites of others; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer services, namely, remote management of the information technology (IT) systems of others; Computer site design; Computer software consultancy; Computer software consultation; Computer software consulting; Computer software design; Computer software design for others; Computer software design, computer programming, and maintenance of computer software; Computer software development; Computer software development and computer programming development for others; Computer software development in the field of computer network and Internet security; Computer software development, computer programming and maintenance of computer software for computer security; Computer software installation and maintenance; Computer system analysis; Computer system design services; Computer systems analysis; Computer technology consultancy; Computer technology consultancy in the field of cyber security; Computer virus protection services; Consultancy and information services relating to information technology architecture and infrastructure; Consultancy in the field of artificial intelligence technology; Consultancy in the field of quantum computing; Consultancy in the field of software design; Consultation about the maintenance and updating of computer software; Consultation services relating to computer software; Consulting in the field of configuration management for computer hardware and software; Consulting in the field of engineering; Consulting in the field of computer engineering; Consulting on root cause analysis in the field of computer network vulnerabilities and threats; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of cloud computing; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the field of hosting computer software applications; Consulting services in the field of providing online, non-downloadable software and applications; Consulting services in the field of software as a service (SAAS); Consulting services in the fields of selection, implementation and use of computer hardware and software systems for others; Creating and designing website based indexes of information for others using information technology; Creating, maintaining, and modernizing computer software; Custom design of computer software; Customizing computer software; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Data security consultancy; Database development services; Debugging computer software for others; Design and development of computer game software and virtual reality software; Design and development of computer hardware and software; Design and development of computer software; Design and development of computer software for computer security, computer network security, and Internet security; Design and development of computers and programs for computers; Design and development of software and hardware for monitoring and detecting computer network security events; Design and writing of computer software; Design for others in the field of computer networks, software, and engineering for the detection of cyber security events; Design of computer networks and software for others for the prevention of computer network security events; Design, development and implementation of software; Design, development, and implementation of software for training, monitoring and detecting computer network security events; Design, development, installation and maintenance of computer software; Design, installation, updating and maintenance of computer software; Design, maintenance, development and updating of computer software; Designing website based indexes of information for others using information technology; Developing and updating computer software; Developing computer software; Developing customized software for others; Developing customized software in the field of computer network and Internet security for others; Development of software for secure network operations; Electronic signature verification services using technology to authenticate user identity; Engineering services in the field of computer network and Internet security; Information technology consulting services; Installation and maintenance of computer software; Installation and maintenance of computer security software; Installation of computer software; Installation of cyber security software; Installation, maintenance and repair of computer software; Installation, maintenance and repair of software for computer systems; Installation, maintenance and repair of cyber security software; Installation, maintenance, and updating of computer software; Installation, repair and maintenance of computer software; Installing computer programs; Internet security consultancy; IT consulting services; IT integration services; Maintenance and updating of computer software; Maintenance and upgrading of computer software; Maintenance of computer software; Maintenance of computer software relating to computer security and prevention of computer risks; Maintenance of computer software used for cyber security; Monitoring of computer systems by remote access to ensure proper functioning; Monitoring of computer systems for detecting unauthorized access or data breach; Monitoring of computer systems to detect breakdowns; Monitoring computers, servers, and switches to ensure proper functioning; Outsource service provider in the field of information technology consulting; Outsource service providers in the field of information technology; Periodic upgrading of computer software for others; Planning and development of electronic communications networks; Planning, design and management of information technology systems; Preparation, update, installation and maintenance of computer software; Product development; Product development consulting in the field of Internet security; Product development for others; Product development in the field of computer security; Professional computer services, namely, network analysis, LAN/WAN design, wireless engineering, virtualization and computer project management; Programming of computer software for others; Providing a website that gives computer users the ability to obtain cyber security information; Providing information in the fields of technology and software development via an on-line website; Providing information relating to computer programming via a website; Providing information relating to computer technology and programming via a website; Providing information relating to computer technology via a website; Providing information relating to on-line non-downloadable software to facilitate electronic communication between individuals provided via the Internet; Providing on-line non-downloadable computer software for use as a cryptocurrency wallet; Providing technology information in the field of cryptocurrency; Providing technology information in the field of computers, computer networks, and Internet security; Providing temporary use of non-downloadable computer anti-virus software; Providing temporary use of non-downloadable computer software for tracking documents over computer networks, intranets and the internet; Provision of information relating to computer programming via a website; Provision of information relating to computer technology and programming via a website; Provision of information relating to computer technology via a website; Recovery of computer data; Repair of computer software; Repair of software; Research and development of computer software; Research, development, design and upgrading of computer software; Services for maintenance of computer software; Services for updating computer software; Software as a service (SAAS) services featuring software for IT administrator training in the field of computer network security events and for monitoring and detecting computer network security events; Software as a service (SAAS) services featuring software for cyber security; Software authoring; Software design and development; Software development and product development consulting in the field of computer network and Internet security; Software development and product development in the field of cyber security; Software development consulting in the field of cyber security; Software development for others in the field of software configuration management; Software development in the field of computer network administration; Software engineering services; Technical consulting in the field of artificial intelligence (AI) software customization; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; Technical support services, namely, troubleshooting in the nature of diagnosing problems with medical equipment; Technical support services, namely, troubleshooting of computer software problems; Technical support, namely, monitoring technological functions of computer network systems; Technical support, namely, providing backup computer programs and facilities; Technical writing in the field of computers, computer networks, and Internet security; Technological consultation in the technology field of computers and network administration; Technological consulting in the field of cryptocurrency; Technological planning and consulting services in the field of computer security; Technology advisory services related to cyber security; Technology consultation and research in the field of computers and network administration; Technology consultation in the field of cybersecurity; Technology consultation in the field of monitoring and detecting computer network security events; Testing of computer software; Testing of computer software for security events; Testing of computers for cyber security; Troubleshooting of computer software problems; Up-dating of computer software; Updating and design of computer software; Updating and maintenance of computer software; Updating of computer programs for third parties; Updating of computer software; Updating of computer software for others; Updating of computer software relating to computer security and prevention of computer risks; Web site design consultancy
Advice relating to the design of computer hardware; Advisory services ...
on 19 Feb 2019
Loki Labs Inc.
88035651 · 12 Jul 2018
19 Feb 2025
042
Class 042
Computer & Software Services & Scientific Services
Computer security services, namely, restricting unauthorized network access by users without credentials; Software as a service (SAAS) services featuring software for stopping all threats intending to damage or disable computers or pull information from those computers
Computer security services, namely, restricting unauthorized network a...
on 29 Jan 2019
Loki Labs Inc.
88004210 · 18 Jun 2018
29 Jan 2025
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Computer application software for mobile phones, computers, and servers, namely, software for computer security monitoring
Computer application software for mobile phones, computers, and server...
on 31 May 2024
Loki Labs, Inc.
98578195 · 31 May 2024
042
Class 042
Computer & Software Services & Scientific Services
Application service provider (ASP) featuring software for use comparing cybersecurity services; Cloud computing featuring software for use cybersecurity services; Computer diagnostic services; Computer monitoring service which tracks hardware performance and processes and sends out historical reports and alerts; Computer network design and computer software design for the cybersecurity industry; Computer programming; Computer programming services for cybersecurity evaluations; Computer programming services, namely, surveying cybersecurity services; Computer security service, namely, hard drive erasure; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, creating an on-line community for registered users to participate in discussions, get feedback from their peers, form virtual communities, and engage in social networking services in the field of cybersecurity services; Computer services, namely, creating an on-line community for registered users to comment on cybersecurity; Computer services, namely, creating computer network-based indexes of information, websites and resources; Computer services, namely, designing and implementing cybersecurity services for others; Computer services, namely, monitoring and reporting on the performance, availability, and errors of web sites of others; Computer services, namely, monitoring the web sites of others to improve their scalability and performance; Computer services, namely, monitoring, testing, analyzing, and reporting on the Internet traffic control and content control of the web sites of others; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer services, namely, providing customized web pages featuring user-defined information; Computer software design; Computer systems analysis; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Computer virus protection services; Computer website design; Consulting in the field of software engineering; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the field of hosting computer software applications; Consulting services in the field of providing online, non-downloadable software and applications; Consulting services in the fields of selection, implementation and use of computer hardware and software systems for others; Creating, designing and maintaining web sites; Data warehousing; Database development services; Design and development of computer software for inventorying cybersecurity services; Design for others in the field of computer networks, software, and engineering for the cybersecurity industry; Design of computer hardware, integrated circuits, communications hardware and software and computer networks for others; Design of computer networks and software for others for the cybersecurity industry; Design of computers for others; Developing computer software; Developing customized software in the field of cybersecurity services for others; Developing customized web pages and other data feed formats featuring user-defined information in the field of cybersecurity; Development and creation of computer programmes for data processing; Development of software for secure network operations; Diagnostic services in the field of computer cybersecurity; Electronic storage of cybersecurity service data; Engineering services, namely, engineering for the cybersecurity industry; Evaluating organizations to determine whether the organizations conform to an established accreditation standard; Installation of cybersecurit software; Installation, maintenance and repair of cybersecurity software; Maintenance of computer software; Maintenance of computer software relating to computer security and prevention of computer risks; Monitoring of computer systems by remote access to ensure proper functioning; Periodic upgrading of computer software for others; Platform as a service (PAAS) featuring computer software platforms for cybersecurity services; Providing a web site featuring technology that enables users to share, bookmark, index, store, collect and showcase content, articles, images, calendars, products, projects, and other information resources in electronic form in the nature and field of cybersecurity; Providing a web site featuring temporary use of non-downloadable software for cybersecurity services; Providing a web site that features information on computer technology and programming; Providing a website featuring a search engine for comparing cybersecurity solutions and services from different providers; Providing a website featuring technology that enables users to compare cybersecurity solutions; Providing an on-line network environment featuring technology that enables users to share data in the field of cybersecurity services; Providing an online non-downloadable Internet-based system application featuring technology enabling users to survey cybersecurity solutions; Providing planning and engineering services in the field of information and communications networks; Providing technology information in the field of cybersecurity; Providing temporary use of a non-downloadable web application for cybersecurity services; Providing temporary use of on-line non-downloadable software development tools for cybersecurity evaluation; Research and development of computer software; Software as a service (SAAS) services featuring software for comparing cybersecurity services; Software development and product development consulting in the field of cybersecurity; Software development consulting in the field of cybersecurity; Technical support services, namely, troubleshooting of computer software problems; Testing and evaluating accreditation standards for cybersecurity to the order and specification of others; Testing of computer software; Testing of computers; Testing of computers for cybersecurity; Testing, analysis and evaluation of service providers to determine conformity with established accreditation standards; Testing, analysis and evaluation of the goods and services of others to determine conformity with certification standards; Testing, analysis and evaluation of the services of others to determine conformity with certification standards; Testing, analysis and evaluation of cybersecurity services to determine conformity with established accreditation standards; Testing, analysis, and evaluation of goods or services of others to the order and specification of cybersecurity; Testing, analysis, and evaluation of the knowledge, skills and abilities of others in the field of cybersecurity to determine conformity with certification standards; Testing, analysis, and evaluation of the knowledge, skills, and abilities of others to the order and specification of cybersecurity; Testing, analysis, and evaluation of cybersecurity services to assure compliance with industry standards; Testing, analysis, and evaluation of computers and computer networks to assure compliance with cybersecurity industry standards; Testing, analysis, and evaluation of cybersecurity services to determine conformity with certification standards; Up-dating of computer software; Updating of computer software relating to computer security and prevention of computer risks
Application service provider (ASP) featuring software for use comparin...
on 09 Jul 2024
Loki Labs, Inc.
97290941 · 02 Mar 2022
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Color is not claimed as a feature of the
Color is not claimed as a feature of the,Computer backup and storage s...
on 06 May 2024
Loki Labs, Inc.
97286876 · 28 Feb 2022
045
Class 045
Personal & Legal & Social Services
"LABS"
"LABS",Advisory services relating to intellectual property rights; Com...
on 06 May 2024
Loki Labs, Inc.
97288781 · 01 Mar 2022
045
Class 045
Personal & Legal & Social Services
Advisory services relating to intellectual property rights; Alternative dispute resolution; Alternative dispute resolution services; Analyzing data in computer databases for criminal activity; Analyzing telephone calling pattern data in computer databases for criminal activity; Arbitration services; Arbitration services relating to industrial relations; Attorney services; Attorney services, namely, representation of clients in intellectual property, software licensing, compliance, and network security matters; Background investigation services; Civil investigation services; Civil protection; Compiling crime occurrence data; Computer software licensing; Conducting legal feasibility studies; Consultancy relating to computer software licensing; Consultancy relating to copyright licensing; Consultancy relating to industrial property rights; Consultancy relating to patent licensing; Consulting and legal services in the field of privacy and security laws, regulations, and requirements; Consulting in the field of intellectual property licensing; Consulting services concerning legal matters in the medical field; Consulting services in the field of counter-terrorism; Copyright management; Criminal investigation services; Detective investigations; Employee misconduct investigation services; Employment background screening, namely, background screening of current employees of others; Expert witness services in legal matters in the field of computers, computer networks, and Internet security; Intellectual property consultancy; Intellectual property consultancy services for inventors; Intellectual property consultation; Intellectual property watch services; Legal advice; Legal advice in responding to requests for proposals (RFPs); Legal advisory services; Legal advisory services in the field of computer, network, and Internet forensics; Legal compliance auditing; Legal consultancy; Legal consultancy relating to licensing; Legal consultancy relating to licensing of computer software; Legal consultation services; Legal consulting services in the field of computers, networks, and Internet security; Legal information services in the field of computer, network, and Internet forensics; Legal policy consultancy; Legal policy consultancy in the field of computers, networks, and Internet security; Legal research in the field of public policy; Legal services; Legal services, namely, providing customized documentation, information, counseling, advice and consultation services in all areas of computers, computer networks, and Internet security; Legal support services; Licensing of software in the framework of software publishing; Licensing of computer software; Licensing of intellectual property; Licensing of intellectual property in the field of software copyrights; Licensing of intellectual property rights; Licensing of software for management of intellectual property; Mediation; Monitoring intellectual property rights for legal advisory purposes; Pre-employment background investigation services; Pre-employment background screening; Product licensing services; Providing a web site featuring information on the development of privacy, security and data governance law; Providing an on-line interactive database featuring legal information; Providing customized legal information, counseling, and advice, and litigation services in the field of computers, computer networks, and Internet security; Providing information about intellectual and industrial property rights; Providing information about legal services for network and information technology administrators and professionals via a website; Providing information about legal services via a website; Providing information in the field of business law; Providing information in the field of business law, litigation and intellectual property; Providing information in the field of intellectual property; Providing information in the field of intellectual property legal services; Providing information in the field of law; Providing information in the field of litigation; Providing information on the development of privacy, security and data governance law via a website; Providing information, news and commentary in the field of law; Providing intelligence and information to local, state, and federal law enforcement agencies relating to organized crime networks that operate across jurisdictional lines; Providing law enforcement information about criminal activity via a website; Providing legal information via a website; Providing legal policy information via a website; Providing legal research in the field of computers, computer networks, and Internet security; Providing legal services in the field of computers, computer networks, and Internet security; Providing on-line information and news in the field of law; Providing on-line information in the field of intellectual property; Providing on-line information in the field of intellectual property legal services; Regulatory compliance auditing; Regulatory compliance consulting in the field of computers, computer networks, and Internet security; Reviewing standards and practices to assure compliance with data privacy and security laws and regulations; Verifying and monitoring the credentials of network and information technology administrators and professionals for computer networks to ensure public safety
Advisory services relating to intellectual property rights; Alternativ...
AI Trademark Registrability
Image Search
Drag and drop or upload to search any image