tm logo
THOR AI
Live/Pending
NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER

record initialized not assigned to examiner

on 11 Apr 2024

Last Applicant/ Owned by

5775 Glenridge Drive

Atlanta

GA

30328

Serial Number

98495138 filed on 11th Apr 2024

Registration Number

N/A

Correspondent Address

Bryant E. Wade/Jessica S. Sachs

Harness, Dickey & Pierce, P.L.C.

5445 Corporate Drive

Suite 200

Troy,MI 48098

Filing Basis

1. intent to use

2. intent to use current

Disclaimer

NO DATA

THOR AI

Software as a service (SAAS) services featuring cyber security software for monitoring and scanning of performance, data and activity and for detecting, blocking, and facilitating removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digRead More

Classification Information


Class [045]
Personal & Legal & Social Services


Regulatory compliance consulting in the field of information and data security and payment card industry data security

Class [042]
Computer & Software Services & Scientific Services


Software as a service (SAAS) services featuring cyber security software for monitoring and scanning of performance, data and activity and for detecting, blocking, and facilitating removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital device; software as a service (SaaS) featuring computer software platforms for monitoring and scanning of performance, data and activity and for detecting, blocking, and facilitating removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital device; software as a service (SaaS) featuring computer software platforms for alerting, tracking, and monitoring security threats, and preparing reports thereon; Providing online non-downloadable computer software for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital device for use in a web-based portal for payment card compliance, security compliance, regulatory compliance, cyber security, and data analytics; software as a service (SAAS) services featuring cybersecurity software for documenting, organizing, and reporting system controls and institutional processes; software as a service (SAAS) services, namely, providing access to online non-downloadable software for documenting, organizing, and reporting system controls and institutional processes for information security, cybersecurity, unified threat management, regulatory compliance, business continuity planning, cybersecurity assessments, information security risk assessment, payment card security, security compliance for information security; providing a website featuring temporary use of non-downloadable software for documenting, organizing and reporting system controls and institutional processes for information security, cybersecurity, regulatory compliance, business continuity planning, cybersecurity assessments, information security risk assessment, payment card security, security compliance for information security; technology consulting services and managed computer security services, namely, information security and compliance assessments, computer network security policy development, implementation and integration of information technology solutions, unified threat management, critical incident response, computer systems analysis, computer security threat analysis, computer and network vulnerability assessments; technology security consultancy services, namely, remote and onsite management of computer networks, firewalls, virtual private networks and networked devices of others for the purpose of assessing and preventing information security vulnerability; managed security services in the nature of security information event management (SIEM), namely, electronic collection and analysis of real-time network information to manage and respond to security vulnerabilities and external threats; managed computer security services, namely, implementation of firewalls, virtual private networks, and intrusion detection systems; Technology consultation in the field of cybersecurity, specifically, information and data security and payment card industry data security; Providing temporary use of online, non-downloadable computer chatbot software for simulating conversations; Providing temporary use of online, non-downloadable chatbot software using artificial intelligence for the identification of cybersecurity threat patterns and customer-specific security and compliance trends and for customization of the level of answer detail, complexity, and vocabulary used in responses and recommendations by identifying the level of cybersecurity expertise of users

Class [038]
Communications Services


Telecommunications and internet services provider reseller services for businesses, namely, providing telecommunication access services, cellular telephone services, and Internet access provider services

Class [035]
Advertising, Business & Retail Services


Computer data network management services, namely, the collection, retrieval, analysis and reporting of information and data for others

Class [009]
Computer & Software Products & Electrical & Scientific Products


Downloadable computer software, namely, software for documenting, organizing, and reporting system controls and institutional processes for information security, regulatory compliance, and unified threat management; computer hardware, namely, firewalls; downloadable computer software, namely, software for monitoring and scanning of performance, data and activity and for detecting, blocking, and facilitating removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital device for use in a web-based portal for information security, regulatory compliance, and unified threat management; Downloadable large language model (LLM) artificial intelligence software application; Downloadable software application for implementing large language model (LLM) artificial intelligence software; Downloadable software application enabling end users to implement large language model (LLM) artificial intelligence software; Downloadable software application for implementing large language models (LLMs) for building, testing, deploying and performance monitoring of artificial intelligence assistants; Downloadable software application for implementing large language models (LLMs) for building, testing, deploying and performance monitoring of chatbots for simulating conversations; Downloadable computer software for generative AI for developers to combine model prompts, generated text, and functions for text-based applications; downloadable computer software using artificial intelligence for creating text-based experiences by connecting prompts, data, and models in a user interface; downloadable computer software using artificial intelligence for introducing developers to Large Language Model fundamentals, and generative AI to build applications; Downloadable intelligent personal assistant software for large language model (LLM) used for the identification of cybersecurity threat patterns and customer-specific security and compliance trends and for customization of the level of answer detail, complexity, and vocabulary used in responses and recommendations by identifying the level of cybersecurity expertise of users; Downloadable chatbot software using artificial intelligence for the identification of cybersecurity threat patterns and customer-specific security and compliance trends and for customization of the level of answer detail, complexity, and vocabulary used in responses and recommendations by identifying the level of cybersecurity expertise of users

Mark Details


Serial Number

No 98495138

Mark Type

No Service Mark

Attorney Docket Number

No 17385200022

44D Filed

No

44D Current

No

44E filed

No

44E Current

No

66A Filed

No

66A Current

No

Current Basis

No

No Basis

No

Legal History


Status DateAction Taken
11th Apr 2024NEW APPLICATION ENTERED