THOR AI

Serial Number 98495138
730

Registration Progress

Application Filed
Apr 11, 2024
Under Examination
Apr 1, 2025
Approved for Publication
Feb 4, 2025
Published for Opposition
Feb 4, 2025
Registered

Attorney Assistance

NOA E-Mailed - SOU Required
Due: Apr 01, 2026 101 days

Trademark Image

THOR AI

Basic Information

Serial Number
98495138
Filing Date
April 11, 2024
Published for Opposition
February 4, 2025
Drawing Code
4

Status Summary

Current Status
Active
Status Code
730
Status Date
Sep 29, 2025
Application
Pending
Classes
009 035 038 042
+1 more

Rights Holder

Sysnet North America, Inc.

03
Address
5775 Glenridge Drive
Atlanta, GA 30328

Ownership History

Sysnet North America, Inc.

Original Applicant
03
Atlanta, GA

Sysnet North America, Inc.

Owner at Publication
03
Atlanta, GA

Legal Representation

Attorney
Bryant E. Wade & Jessica S. Sachs

USPTO Deadlines

Next Deadline
101 days remaining
NOA E-Mailed - SOU Required
Due Date
April 01, 2026
Extension Available
Until October 01, 2026

Application History

18 events
Date Code Type Description Documents
Sep 29, 2025 EXRA E NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED Loading...
Sep 29, 2025 EX1G S SOU EXTENSION 1 GRANTED Loading...
Sep 29, 2025 EXT1 S SOU EXTENSION 1 FILED Loading...
Sep 29, 2025 EEXT I SOU TEAS EXTENSION RECEIVED Loading...
Apr 1, 2025 NOAM E NOA E-MAILED - SOU REQUIRED FROM APPLICANT Loading...
Feb 4, 2025 NPUB E OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED Loading...
Feb 4, 2025 PUBO A PUBLISHED FOR OPPOSITION Loading...
Jan 29, 2025 NONP E NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED Loading...
Jan 9, 2025 CNSA P APPROVED FOR PUB - PRINCIPAL REGISTER Loading...
Jan 9, 2025 TEME I TEAS/EMAIL CORRESPONDENCE ENTERED Loading...
Jan 9, 2025 CRFA I CORRESPONDENCE RECEIVED IN LAW OFFICE Loading...
Jan 9, 2025 TROA I TEAS RESPONSE TO OFFICE ACTION RECEIVED Loading...
Oct 24, 2024 GNRN O NOTIFICATION OF NON-FINAL ACTION E-MAILED Loading...
Oct 24, 2024 GNRT F NON-FINAL ACTION E-MAILED Loading...
Oct 24, 2024 CNRT R NON-FINAL ACTION WRITTEN Loading...
Oct 24, 2024 DOCK D ASSIGNED TO EXAMINER Loading...
Sep 22, 2024 NWOS I NEW APPLICATION OFFICE SUPPLIED DATA ENTERED Loading...
Apr 11, 2024 NWAP I NEW APPLICATION ENTERED Loading...

Detailed Classifications

Class 009
Downloadable computer software, namely, software for documenting, organizing, and reporting system controls and institutional processes for information security, regulatory compliance, and unified threat management; computer hardware, namely, firewalls; downloadable computer software, namely, software for monitoring and scanning of performance, data and activity and for detecting, blocking, and facilitating removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices for use in a web-based portal for information security, regulatory compliance, and unified threat management; Downloadable large language model (LLM) artificial intelligence software application; Downloadable software application using artificial intelligence (AI) for implementing large language models (LLMs); Downloadable software application using artificial intelligence (AI) for enabling end users to implement large language models (LLMs); Downloadable software application for implementing large language models (LLMs) for building, testing, deploying and performance monitoring of artificial intelligence assistants; Downloadable software application for implementing large language models (LLMs) for building, testing, deploying and performance monitoring of chatbots for simulating conversations; Downloadable computer software for generative artificial intelligence (AI) for developers to combine model prompts, generated text, and functions for text-based applications; downloadable computer software using artificial intelligence for creating text-based experiences by connecting prompts, data, and models in a user interface; downloadable computer software using artificial intelligence for introducing developers to Large Language Model fundamentals, and generative artificial intelligence (AI) to build applications; Downloadable intelligent personal assistant software for large language model (LLM) used for the identification of cybersecurity threat patterns and customer-specific security and compliance trends and for customization of the level of answer detail, complexity, and vocabulary used in responses and recommendations by identifying the level of cybersecurity expertise of users; Downloadable chatbot software using artificial intelligence for the identification of cybersecurity threat patterns and customer-specific security and compliance trends and for customization of the level of answer detail, complexity, and vocabulary used in responses and recommendations by identifying the level of cybersecurity expertise of users
Class 035
Computer data network management services for the collection, retrieval, analysis and reporting of information and data for others, namely, computerized database management
Class 038
Telecommunications and internet services provider reseller services for businesses, namely, providing telecommunication access services, cellular telephone services, and Internet access provider services
Class 042
Software as a service (SAAS) services featuring cyber security software for monitoring and scanning of performance, data and activity and for detecting, blocking, and facilitating removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; software as a service (SAAS) services featuring computer software for monitoring and scanning of performance, data and activity and for detecting, blocking, and facilitating removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; software as a service (SAAS) services featuring computer software for alerting, tracking, and monitoring security threats, and preparing reports thereon; Providing online non-downloadable computer software for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices for use in a web-based portal for payment card compliance, security compliance, regulatory compliance, cyber security, and data analytics; software as a service (SAAS) services featuring cybersecurity software for documenting, organizing, and reporting system controls and institutional processes; software as a service (SAAS) services featuring software for providing access to online non-downloadable software for documenting, organizing, and reporting system controls and institutional processes for information security, cybersecurity, unified threat management, regulatory compliance, business continuity planning, cybersecurity assessments, information security risk assessment, payment card security, and security compliance for information security; providing a website featuring temporary use of non-downloadable software for documenting, organizing and reporting system controls and institutional processes for information security, cybersecurity, regulatory compliance, business continuity planning, cybersecurity assessments, information security risk assessment, payment card security, and security compliance for information security; technology cybersecurity consulting services and managed computer security services relating to information security and compliance assessments, computer network security policy development, implementation and integration of information technology solutions, unified threat management, critical incident response, computer systems analysis, computer security threat analysis, and computer and network vulnerability assessments, namely, technology consultation in the field of cybersecurity and computer security consultancy; technology security consultancy services relating to remote and onsite management of computer networks, firewalls, virtual private networks and networked devices of others for the purpose of assessing and preventing information security vulnerability, namely, technology consultation in the field of cybersecurity and computer security consultancy; managed security services in the nature of security information event management (SIEM) relating to electronic collection and analysis of real-time network information to manage and respond to security vulnerabilities and external threats, namely, data security consultancy and computer security consultancy; managed computer security services relating to implementation of firewalls, virtual private networks, and intrusion detection systems, namely, computer security consultancy; Technology consultation in the field of cybersecurity relating to information and data security and payment card industry data security; Providing temporary use of online, non-downloadable computer chatbot software for simulating conversations; Providing temporary use of online, non-downloadable chatbot software using artificial intelligence for the identification of cybersecurity threat patterns and customer-specific security and compliance trends and for customization of the level of answer detail, complexity, and vocabulary used in responses and recommendations by identifying the level of cybersecurity expertise of users
Class 045
Regulatory compliance consulting in the field of information and data security and payment card industry data security

Additional Information

Pseudo Mark
THOR ARTIFICIAL INTELLIGENCE

Classification

International Classes
009 035 038 042 045

Disclaimers

The following terms have been disclaimed and are not claimed as part of the trademark:
Specific Disclaimer
"AI"