Information
-
Trademark
-
98303107
-
International Classifications
-
Filing Date
December 07, 2023
a year ago
-
Transaction Date
August 30, 2024
3 months ago
-
Status Date
August 29, 2024
3 months ago
-
Location Date
August 29, 2024
3 months ago
-
Status Code
661
-
Current Location
TMO LAW OFFICE 119
Employee Name
KELLY, JOHN M
-
Attorney Docket Number
2804-49.00
Attorney Name
Carrie Bader
Law Office Assigned Location Code
N10
-
Owners
Mark Drawing Code
4
Mark Identification
CHARLOTTE AI
Case File Statements
- PM0001: CHARLOTTE ARTIFICIAL INTELLIGENCE
- DS0000: AI
- GS0421: Software as a service (SaaS) services featuring software for automating customer interactions and data collection for computer security consulting, namely, using artificial intelligence for customer interaction for identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the objectives of computer system attackers; software as a service (SaaS) services featuring software using artificial intelligence for automating customer interactions and data collection for scanning and penetration testing of computers and networks to assess information security vulnerability for maintaining and updating of computer software relating to computer and network security and prevention of computer risks, and for protecting data and information from unauthorized access using artificial intelligence to develop plans for improving computer and network security and preventing criminal activity; cloud computing featuring software for detecting breaches associated with authorizing access to databases in the field of computer and network security; cloud computing services using artificial intelligence for automating customer interactions and data collection in the field of computer and network security; software as a service (SaaS) services featuring software using artificial intelligence for automating customer interactions and data collection for conducting online scanning, detecting, quarantining, and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; software as a service (SaaS) services featuring software using artificial intelligence for automating customer interactions and data collection for monitoring of computer systems for protecting data and information from unauthorized access; computer security consultancy for protecting data and information from unauthorized access and computer technology consulting of systems using software as a service (SaaS) services using artificial intelligence for automating customer interactions for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; computer security consultancy for protecting data and information from unauthorized access in the field of endpoint protection software or curated cyberthreat data for computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints; software as a service (SAAS) services featuring software for detecting breaches associated with authorizing access to databases in the field of computer and network security; software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; application service provider (ASP) featuring non-downloadable computer software for use in computer and network security using artificial intelligence for automating customer interactions and collection of data; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; computer security consultancy in the field of administration of digital keys and digital certificates; providing online non-downloadable software for the artificial production of human speech and text based on deep learning algorithms to recognize and respond to customer interactions relating to computer security consulting, namely, for identifying malware on computer systems, identifying the source and genealogy of malware, identifying the objectives of computer system attackers, scanning and penetration testing of computers and networks to assess information security vulnerability, maintaining and updating of computer software relating to computer and network security and prevention of computer risks, and for protecting data and information from unauthorized access using artificial intelligence to develop plans for improving computer and network security and preventing criminal activity.
Case File Event Statements
-
12/7/2023 - a year ago
1 - NEW APPLICATION ENTERED
Type: NWAP
-
3/5/2024 - 9 months ago
2 - NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Type: NWOS
-
6/22/2024 - 6 months ago
6 - NOTIFICATION OF NON-FINAL ACTION E-MAILED
Type: GNRN
-
8/29/2024 - 3 months ago
9 - TEAS/EMAIL CORRESPONDENCE ENTERED
Type: TEME
-
8/29/2024 - 3 months ago
8 - CORRESPONDENCE RECEIVED IN LAW OFFICE
Type: CRFA
-
8/29/2024 - 3 months ago
7 - TEAS RESPONSE TO OFFICE ACTION RECEIVED
Type: TROA
-
6/14/2024 - 6 months ago
3 - ASSIGNED TO EXAMINER
Type: DOCK
-
6/22/2024 - 6 months ago
5 - NON-FINAL ACTION E-MAILED
Type: GNRT
-
6/22/2024 - 6 months ago
4 - NON-FINAL ACTION WRITTEN
Type: CNRT