Legal Representation
Attorney
Alexander Lazouski
Application History
12 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Dec 17, 2025 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| Dec 17, 2025 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Dec 17, 2025 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
| Sep 5, 2025 | RFNT | P | REFUSAL PROCESSED BY IB | Loading... |
| Aug 21, 2025 | RFCS | P | NON-FINAL ACTION MAILED - REFUSAL SENT TO IB | Loading... |
| Aug 21, 2025 | RFRR | P | REFUSAL PROCESSED BY MPU | Loading... |
| Jul 18, 2025 | RFCR | E | NON-FINAL ACTION (IB REFUSAL) PREPARED FOR REVIEW | Loading... |
| Jul 17, 2025 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Jul 8, 2025 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Apr 25, 2025 | MAFR | O | APPLICATION FILING RECEIPT MAILED | Loading... |
| Apr 25, 2025 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| Apr 24, 2025 | REPR | M | SN ASSIGNED FOR SECT 66A APPL FROM IB | Loading... |
Detailed Classifications
Class 009
Downloadable software using artificial intelligence for remediation of security vulnerabilities in software code; automated access control systems for security barriers; downloadable software for analyzing software code; downloadable computer programs using artificial intelligence for developing predictive models; downloadable software for machine learning used in computerized predictive analysis programs; downloadable application software for software testing; downloadable cloud-based software for remediation of security vulnerabilities in software code; downloadable software for computer protection; downloadable software for ensuring security; downloadable software for modeling software threats; downloadable software for detecting security abnormalities; downloadable software for detecting software vulnerabilities; downloadable software for advice on correction of security breaches; downloadable software for static application security testing; downloadable software for compositional analysis; downloadable software for interactive application security testing; downloadable software for dynamic application security testing; downloadable software for protecting the security of running applications; downloadable software for security vulnerability assessment; downloadable software for penetration testing of computer systems and networks; downloadable software for software risk management; downloadable software application programming interfaces (APIs); downloadable software for security monitoring; downloadable software for security vulnerability analysis; downloadable software for security training simulation; downloadable software for integration of artificial intelligence and machine learning in the field of security; downloadable software for cloud-based network monitoring; downloadable software for simulating virtual reality training in the field of security; downloadable software for configuring computer networks; downloadable software using artificial intelligence for software code analysis; downloadable computer software for remote monitoring and analysis; downloadable software using machine learning used in computer language processing programs; downloadable language recognition software; downloadable computer software platforms for analyzing cybersecurity data; downloadable computer operating system software; downloadable computer programs for network management; computer and telecommunications hardware used with downloadable security software; computer hardware for network access servers
Class 042
Computer security consultations in the field of computer and network digitization for information security vulnerability assessment; computer security consultancy in the nature of information technology security and computer and network vulnerability assessment; cloud-based data leak protection services; data security consultancy and firewall hardening services; Software as a Service (SAAS) services featuring software for analysis and reporting with respect to computer network security self-assessment; computer services, namely, computer software integration services into multiple systems and networks; software development for secure use in a network; cybersecurity and software security consulting services; software source code security assurance services; software design and security design services; software threat modeling services in the nature of computer security threat analysis for protecting data; network traffic anomaly detection services; static application security testing and vulnerability detection services; cybersecurity consulting services concerning the correction of computer security vulnerabilities; static application security testing services; software compositional analysis services; interactive application security testing services; dynamic application security testing services; runtime application self-protection; software security vulnerability assessment services in the nature of computer security threat analysis for protecting data; penetration testing services for computer systems and networks aided by artificial intelligence; software risk management services aided by artificial intelligence; security testing and monitoring services related to application programming interface; software security monitoring services in the nature of computer security threat analysis for protecting data; development of software in virtual reality; analysis of computer exposure to security risks for data protection purposes; consultancy for computer hardware design; design and development of computer hardware and software in the field of security; analysis of threats and attacks supported by artificial intelligence ; installation, maintenance and updating of computer software; behavior analytics-based detection services; computer security consultancy; testing of security systems; computer programming services for electronic data protection; design and development of programs for Internet security; testing of computer software; computer software development and testing; design and analysis of computer systems; computer technology services in the field of cybersecurity; scientific research in the field of cybersecurity; programming of computer programs; analysis of computer systems; design of computer networks; information technology engineering; information system design services
Additional Information
Design Mark
The mark consists of the stylized wording "GLOG.AI". The letters GLOG appear in dark-to-light gradient blue, and the letters AI appear in a lighter turquoise-blue color. A solid turquoise-blue dot appears below the letter G, forming the period before "AI". On the left and right sides of the wording are stylized angle brackets "(" and ")" in blue, framing the entire mark. The mark is presented on a white background, which is not claimed as a feature of the mark.
Pseudo Mark
GLOG
Classification
International Classes
009
042