THEIA

Serial Number 99355660
638

Registration Progress

Application Filed
Aug 25, 2025
Under Examination
Approved for Publication
Published for Opposition
Registered

Trademark Image

THEIA

Basic Information

Serial Number
99355660
Filing Date
August 25, 2025
Drawing Code
4

Status Summary

Current Status
Active
Status Code
638
Status Date
Jan 14, 2026
Application
Pending
Classes
009 042 045

Rights Holder

Lone Elk Holdings, LLC

16
Address
2802 Flintrock Trace, Suite 373
Austin, TX 78738

Ownership History

Lone Elk Holdings, LLC

Original Applicant
16
Austin, TX

Legal Representation

Attorney
David Gorski

Application History

4 events
Date Code Type Description Documents
Jan 14, 2026 DOCK D ASSIGNED TO EXAMINER Loading...
Jan 13, 2026 NWOS I NEW APPLICATION OFFICE SUPPLIED DATA ENTERED Loading...
Aug 25, 2025 MAFR O APPLICATION FILING RECEIPT MAILED Loading...
Aug 25, 2025 NWAP I NEW APPLICATION ENTERED Loading...

Detailed Classifications

Class 009
Computer hardware and recorded software for evaluating devices, namely, testing, assessing, and diagnosing computer hardware, computer peripherals, information and communications technology devices, BIOS, operating systems, and networks for cybersecurity vulnerabilities, threat detection, and supply chain risk assessment, sold as a unit; multidimensional imaging and scanning apparatus for evaluating devices, namely, itemizing and assessing components in computer hardware, computer peripherals, information and communications technology devices for anomalies; computer and network hardware and peripheral devices, namely, computer servers, laptops, cables, routers, network switches, firewalls, and specialized telecommunications devices and equipment; computer software for threat intelligence with customizable report generation, namely, denied party screening and other sanctioned-entity and corporate violator reporting.
Class 042
– Computer hardware design and development consultancy services; computer security consultancy in the field of scanning and penetration testing of computer hardware, computer peripherals, information and communications technology devices, BIOS, operating systems, and networks to assess information security vulnerability; inspection services, namely, evaluation of computer hardware and computer peripherals for counterfeits and performance anomalies; computer security consultancy services, namely, technical analysis of hardware, identification of vulnerabilities, risk analysis of hardware infiltration, and generating and delivery of threat reports; computer security consultation services in the field of cybersecurity, namely, deception network services for monitoring and protecting computer networks for others, providing cyber security and information security diligence and solutions for others, collecting and aggregating cybersecurity data and intelligence; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware, computer peripherals, information and communications technology devices for problems for cybersecurity systems of others; consulting services in the fields of security and vulnerability of computers, computer systems, networks, and related hardware; computer services in the nature of detecting and diagnosing computer hardware, computer peripherals, and information and communications technology devices for security problems and vulnerabilities; computer security consultancy in the field of malware, intrusion and penetration testing, assessing, and diagnosing of computers and networks to assess information technology security and vulnerability; compliance and vulnerability assessments, namely, providing security consultancy in the field of scanning and penetration testing of computer hardware, computer peripherals, information and communications technology devices to assess information security vulnerability; security compliance and vulnerability assessments, namely, technical verification and validation of computer hardware, computer peripherals, information and communications technology devices for others; computer security consultancy services, namely, technical analysis of hardware, identification of vulnerabilities, risk analysis of hardware infiltration, and generation and delivery of a threat score; computer security consultancy services, namely, technical analysis of hardware, identification of vulnerabilities, risk analysis of hardware infiltration, and generation and delivery of a threat status; managed secure services and other technical consulting services in the field of cybersecurity for evaluating devices for potential sabotage or unauthorized access risks; computer services in the nature of electronic imaging, detecting, and diagnosing computer hardware, computer peripherals, information and communications technology devices for security problems and vulnerabilities; computer network security services; computer network defense services, namely, providing firewall and related protections from viruses, infiltration, and malware; threat intelligence services, namely, threat identification, reporting, and data aggregation, namely, denied party screening and other sanctioned-entity and corporate violator reporting.
Class 045
Regulatory compliance consulting and auditing using computer software for threat intelligence with customizable report generation, namely, denied party screening, other sanctioned-entity and corporate violator reporting; background checking services for denied party/entity cross checks

Classification

International Classes
009 042 045