Legal Representation
Attorney
Tomoko Nakajima
Application History
2 eventsDate | Code | Type | Description | Documents |
---|---|---|---|---|
Jul 10, 2025 | MAFR | O | APPLICATION FILING RECEIPT MAILED | Loading... |
Jul 10, 2025 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
Downloadable cybersecurity software providing a system-level protection layer between the operating system and the central processing unit (CPU), for monitoring, detecting, and neutralizing unauthorized internal activities and threats; Downloadable computer security software that functions below the operating system level, implementing an internal defense layer between the OS and CPU for internal threat detection; Downloadable cybersecurity software implementing a system-level protection layer between the operating system and the CPU for preventing unauthorized code execution and detecting internal threats; Downloadable and embedded cybersecurity software, firmware, and middleware for computer hardware, designed to operate as a protection layer between the operating system and the central processing unit (CPU) to monitor, detect, and prevent unauthorized internal access and code execution; Computer hardware components containing embedded cybersecurity software functioning at the system level between the operating system and CPU to secure computing environments from internal threats.
Class 042
Providing temporary use of non-downloadable cybersecurity software that operates between the operating system and CPU to prevent unauthorized code execution and protect against internal system threats; Software as a service (SaaS) featuring security software functioning at the firmware or kernel level to monitor and control execution between the operating system and CPU in computing systems; Design and development of cybersecurity platforms operating at the hardware-software interface level to protect computing environments against internal attacks; Software as a service (SaaS) featuring cybersecurity software that operates between the operating system and CPU to protect computing systems from internal vulnerabilities and malicious execution; Providing temporary use of non-downloadable cybersecurity software and firmware embedded in computer hardware components, operating between the operating system and CPU to prevent unauthorized internal activities and cyber threats; Design and development of cybersecurity software, firmware, and middleware for integration in computer hardware, specifically operating as a system-level protection layer between the operating system and central processing unit (CPU).
Additional Information
Design Mark
The mark consists of stylized wordings of "GHOST CODE".
Classification
International Classes
009
042