| Goods and Services | Downloadable software for analyzing integrated circuits and data paths to detect security vulnerabilities, improper handling, corruption and breaches; downloadable software using artificial intelligence (AI) for analyzing integrated circuits and data paths to detect security vulnerabilities, improper handling, corruption and breaches; downloadable software for analyzing integrated circuits and data paths to detect security vulnerabilities, improper handling, corruption and breaches using security trained large language models and generative artificial intelligence (AI); downloadable software for electronic design automation tools for designing, simulating, testing, and verifying integrated circuits, printed circuit boards, and semiconductor chips; downloadable software using artificial intelligence (AI) for electronic design automation tools for designing, simulating, testing, and verifying integrated circuits, printed circuit boards, and semiconductor chips; downloadable software for electronic design automation tools for designing, simulating, testing, and verifying integrated circuits, printed circuit boards, and semiconductor chips using security trained large language models and generative artificial intelligence (AI); downloadable software for analyzing control paths in Finite State Machines to identify security vulnerabilities from attack vectors, namely, fault injection and Denial-of-Service; downloadable software using Artificial intelligence (AI) for analyzing control paths in Finite State Machines to identify security vulnerabilities from attack vectors, namely, fault injection and Denial-of-Service; downloadable software for analyzing control paths in Finite State Machines to identify security vulnerabilities from attack vectors, namely, fault injection and Denial-of-Service using security trained large language models and generative artificial intelligence (AI); downloadable software for performing root-cause analysis to pinpoint the exact Register-Transfer-Level code behind security violations; downloadable software using artificial intelligence (AI) for performing root-cause analysis to pinpoint the exact Register-Transfer-Level code behind security violations; downloadable software for performing root-cause analysis to pinpoint the exact Register-Transfer-Level code behind security violations using security trained large language models and generative artificial intelligence (AI); downloadable software for generating detailed reports describing detected security vulnerabilities, their potential impacts and recommended revision; downloadable software using artificial intelligence (AI) for generating detailed reports describing detected security vulnerabilities, potential impacts and recommended revisions; downloadable software for generating detailed reports describing detected security vulnerabilities, potential impacts and recommended revisions using security trained large language models and generative artificial intelligence (AI); downloadable software for providing tailored fixes and detail guidance for identified security vulnerabilities in the data path or control-flow; downloadable software using artificial intelligence (AI) for providing tailored fixes and detail guidance for identified security vulnerabilities in the data path or control-flow; downloadable software for providing tailored fixes and detail guidance for identified security vulnerabilities in the data path or control-flow using security trained large language models and generative artificial intelligence (AI); downloadable software platform for pre-silicon security testing, namely, static, assertion-based and emulation verification; downloadable software platform using artificial intelligence (AI) for pre-silicon security testing, namely, static, assertion-based and emulation verification; downloadable software platform for pre-silicon security testing, namely, static, assertion-based and emulation verification using security trained large language models and generative artificial intelligence (AI) |
| Description of Mark | The mark consists of a depiction of a letter “C” having a letter “T” positioned above and connected by the stem of the letter “T” with the top of the letter “C”, and with the letter “T” having a crossbar that slopes downward on each end, and the letters “C” and “T” forming a centurion helmet, and a pair of vertically sloped lines depicting shields, the first line shield positioned in front of the letter “C” and a second line shield positioned behind the letter “C”, with each vertical line shield sloping from a top height of the letter “C” to the bottom of the letter “C”, and the bottom of each shield extending below the middle of the letter “C”, and further having the wording “CASPIA” positioned on a first line to the right of the centurion helmet and shield, the wording “CASPIA” consisting of a capital letter “C”, a capital letter “A” without the horizontal crossbar, a capital letter “S”, a capital letter “P”, a capital letter “I” and a capital letter “A” without the horizontal crossbar, and the wording, “TECHNOLOGIES”, positioned to the right of the centurion helmet and shield design on a second line below the wording “CASPIA”. |