GLOG.AI

Serial Number 79422192
661

Registration Progress

Application Filed
Jan 28, 2025
Under Examination
Approved for Publication
Published for Opposition
Registered

Trademark Image

GLOG.AI

Basic Information

Serial Number
79422192
Filing Date
January 28, 2025
Drawing Code
3

Status Summary

Current Status
Active
Status Code
661
Status Date
Dec 17, 2025
Application
Pending
Classes
009 042

Rights Holder

GLOG.AI d.o.o.

99
Address
Ustanicka 170V,
local L2/1 11010 Beograd
RS

Ownership History

GLOG.AI d.o.o.

Original Applicant
99
RS

Legal Representation

Attorney
Alexander Lazouski

Application History

12 events
Date Code Type Description Documents
Dec 17, 2025 TEME I TEAS/EMAIL CORRESPONDENCE ENTERED Loading...
Dec 17, 2025 CRFA I CORRESPONDENCE RECEIVED IN LAW OFFICE Loading...
Dec 17, 2025 TROA I TEAS RESPONSE TO OFFICE ACTION RECEIVED Loading...
Sep 5, 2025 RFNT P REFUSAL PROCESSED BY IB Loading...
Aug 21, 2025 RFCS P NON-FINAL ACTION MAILED - REFUSAL SENT TO IB Loading...
Aug 21, 2025 RFRR P REFUSAL PROCESSED BY MPU Loading...
Jul 18, 2025 RFCR E NON-FINAL ACTION (IB REFUSAL) PREPARED FOR REVIEW Loading...
Jul 17, 2025 CNRT R NON-FINAL ACTION WRITTEN Loading...
Jul 8, 2025 DOCK D ASSIGNED TO EXAMINER Loading...
Apr 25, 2025 MAFR O APPLICATION FILING RECEIPT MAILED Loading...
Apr 25, 2025 NWOS I NEW APPLICATION OFFICE SUPPLIED DATA ENTERED Loading...
Apr 24, 2025 REPR M SN ASSIGNED FOR SECT 66A APPL FROM IB Loading...

Detailed Classifications

Class 009
Downloadable software using artificial intelligence for remediation of security vulnerabilities in software code; automated access control systems for security barriers; downloadable software for analyzing software code; downloadable computer programs using artificial intelligence for developing predictive models; downloadable software for machine learning used in computerized predictive analysis programs; downloadable application software for software testing; downloadable cloud-based software for remediation of security vulnerabilities in software code; downloadable software for computer protection; downloadable software for ensuring security; downloadable software for modeling software threats; downloadable software for detecting security abnormalities; downloadable software for detecting software vulnerabilities; downloadable software for advice on correction of security breaches; downloadable software for static application security testing; downloadable software for compositional analysis; downloadable software for interactive application security testing; downloadable software for dynamic application security testing; downloadable software for protecting the security of running applications; downloadable software for security vulnerability assessment; downloadable software for penetration testing of computer systems and networks; downloadable software for software risk management; downloadable software application programming interfaces (APIs); downloadable software for security monitoring; downloadable software for security vulnerability analysis; downloadable software for security training simulation; downloadable software for integration of artificial intelligence and machine learning in the field of security; downloadable software for cloud-based network monitoring; downloadable software for simulating virtual reality training in the field of security; downloadable software for configuring computer networks; downloadable software using artificial intelligence for software code analysis; downloadable computer software for remote monitoring and analysis; downloadable software using machine learning used in computer language processing programs; downloadable language recognition software; downloadable computer software platforms for analyzing cybersecurity data; downloadable computer operating system software; downloadable computer programs for network management; computer and telecommunications hardware used with downloadable security software; computer hardware for network access servers
Class 042
Computer security consultations in the field of computer and network digitization for information security vulnerability assessment; computer security consultancy in the nature of information technology security and computer and network vulnerability assessment; cloud-based data leak protection services; data security consultancy and firewall hardening services; Software as a Service (SAAS) services featuring software for analysis and reporting with respect to computer network security self-assessment; computer services, namely, computer software integration services into multiple systems and networks; software development for secure use in a network; cybersecurity and software security consulting services; software source code security assurance services; software design and security design services; software threat modeling services in the nature of computer security threat analysis for protecting data; network traffic anomaly detection services; static application security testing and vulnerability detection services; cybersecurity consulting services concerning the correction of computer security vulnerabilities; static application security testing services; software compositional analysis services; interactive application security testing services; dynamic application security testing services; runtime application self-protection; software security vulnerability assessment services in the nature of computer security threat analysis for protecting data; penetration testing services for computer systems and networks aided by artificial intelligence; software risk management services aided by artificial intelligence; security testing and monitoring services related to application programming interface; software security monitoring services in the nature of computer security threat analysis for protecting data; development of software in virtual reality; analysis of computer exposure to security risks for data protection purposes; consultancy for computer hardware design; design and development of computer hardware and software in the field of security; analysis of threats and attacks supported by artificial intelligence ; installation, maintenance and updating of computer software; behavior analytics-based detection services; computer security consultancy; testing of security systems; computer programming services for electronic data protection; design and development of programs for Internet security; testing of computer software; computer software development and testing; design and analysis of computer systems; computer technology services in the field of cybersecurity; scientific research in the field of cybersecurity; programming of computer programs; analysis of computer systems; design of computer networks; information technology engineering; information system design services

Additional Information

Design Mark
The mark consists of the stylized wording "GLOG.AI". The letters GLOG appear in dark-to-light gradient blue, and the letters AI appear in a lighter turquoise-blue color. A solid turquoise-blue dot appears below the letter G, forming the period before "AI". On the left and right sides of the wording are stylized angle brackets "(" and ")" in blue, framing the entire mark. The mark is presented on a white background, which is not claimed as a feature of the mark.
Pseudo Mark
GLOG

Classification

International Classes
009 042