| Goods and Services | Software as a service (SAAS) services featuring software for analyzing data paths to detect security vulnerabilities, namely, improper handling, corruption or breaches; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for analyzing data paths to detect security vulnerabilities, namely, improper handling, corruption or breaches; Software as a service (SAAS) services featuring software for analyzing data paths to detect security vulnerabilities, namely, improper handling, corruption or breaches using security trained large language models and generative artificial intelligence (AI); Software as a service (SAAS) services featuring software for electronic design automation tools for designing, simulating, testing, and verifying in integrated circuits, printed circuit boards, and semiconductor chips; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for electronic design automation tools for designing, simulating, testing, and verifying in integrated circuits, printed circuit boards, and semiconductor chips; Software as a service (SAAS) services featuring software for electronic design automation tools for designing, simulating, testing, and verifying in integrated circuits, printed circuit boards, and semiconductor chips using security trained large language models and generative artificial intelligence (AI); Software as a service (SAAS) services featuring software for analyzing control paths in Finite State Machines to identify security vulnerabilities from attack vectors, namely, fault injection and Denial-of-Service; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for analyzing control paths in Finite State Machines to identify security vulnerabilities from attack vectors, namely, fault injection and Denial-of-Service; Software as a service (SAAS) services featuring software for analyzing control paths in Finite State Machines to identify security vulnerabilities from attack vectors, namely, fault injection and Denial-of-Service using security trained large language models and generative artificial intelligence (AI); Software as a service (SAAS) services featuring software for performing root-cause analysis to pinpoint the exact Register-Transfer-Level code behind security violations; Software as a service (SAAS) services featuring software for performing root-cause analysis to pinpoint the exact Register-Transfer-Level code behind security violations using security trained large language models and generative artificial intelligence (AI); Software as a service (SAAS) services featuring software for generating detailed reports describing detected security vulnerabilities, potential impacts and recommended revisions; Software as a service (SAAS) services featuring software for generating detailed reports describing detected security vulnerabilities, potential impacts and recommended revisions using security trained large language models and generative artificial intelligence (AI); Software as a service (SAAS) services featuring software for providing tailored fixes and detail guidance for identified security vulnerabilities in the data path or control-flow; Software as a service (SAAS) services featuring software for providing tailored fixes and detail guidance for identified security vulnerabilities in the data path or control-flow using security trained large language models and generative artificial intelligence (AI); Software as a service (SAAS) services featuring software for pre-silicon security testing, namely, static, assertion-based and emulation verification; Software as a service (SAAS) services featuring software for pre-silicon security testing, namely, static, assertion-based and emulation verification using security trained large language models and generative artificial intelligence (AI); Platform as a service (PAAS) services featuring software for analyzing data paths to detect security vulnerabilities, namely, improper handling, corruption or breaches; Platform as a service (PAAS) services featuring software for analyzing data paths to detect security vulnerabilities, namely, improper handling, corruption or breaches using security trained large language models and generative artificial intelligence (AI); Platform as a service (PAAS) services featuring software for electronic design automation tools for designing, simulating, testing, and verifying in integrated circuits , printed circuit boards, and semiconductor chips; Platform as a service (PAAS) services featuring software for electronic design automation tools for designing, simulating, testing, and verifying integrated circuits, printed circuit boards , and semiconductor chips using security trained large language models and generative artificial intelligence (AI); Platform as a service (PAAS) services featuring software for analyzing control paths in Finite State Machines to identify security vulnerabilities from attack vectors, namely, fault injection or Denial-of-Service; Platform as a service (PAAS) services featuring software for analyzing control paths in Finite State Machines to identify security vulnerabilities from attack vectors, namely, fault injection or Denial-of-Service using security trained large language models and generative artificial intelligence (AI); Platform as a service (PAAS) services featuring software for performing root-cause analysis to pinpoint the exact Register-Transfer-Level code behind security violations; Platform as a service (PAAS) services featuring software for performing root-cause analysis to pinpoint the exact Register-Transfer-Level code behind security violations using security trained large language models and artificial intelligence (AI); Platform as a service (PAAS) services featuring software for generating detailed reports describing detected security vulnerabilities, their potential impacts and recommended revision; Platform as a service (PAAS) services featuring software for generating detailed reports describing detected security vulnerabilities, their potential impacts and recommended revision using security trained large language models and generative artificial intelligence (AI); Platform as a service (PAAS) services featuring software for providing tailored fixes and detail guidance for identified security vulnerabilities in the data path or control-flow; Platform as a service (PAAS) services featuring software for providing tailored fixes and detail guidance for identified security vulnerabilities in the data path or control-flow using security trained large language models and generative artificial intelligence (AI); Platform as a service (PAAS) services featuring software for pre-silicon security testing, namely, static, assertion-based and emulation verification; Platform as a service (PAAS) services featuring software for pre-silicon security testing, namely, static, assertion-based and emulation verification using security trained large language models and generative artificial intelligence (AI); engineering services; engineering services, namely, on-demand training for safeguarding sensitive data and intellectual property with organizations; providing information, namely, blogs and articles relating to safeguarding data via a website |
| Description of Mark | The mark consists of a depiction of a letter “C” having a letter “T” positioned above and connected by the stem of the letter “T” with the top of the letter “C”, and with the letter “T” having a crossbar that slopes downward on each end, and the letters “C” and “T” forming a centurion helmet, and a pair of vertically sloped lines depicting shields, the first line shield positioned in front of the letter “C” and a second line shield positioned behind the letter “C”, with each vertical line shield sloping from a top height of the letter “C” to the bottom of the letter “C”, and the bottom of each shield extending below the middle of the letter “C”, and further having the wording “CASPIA” positioned on a first line to the right of the centurion helmet and shield, the wording “CASPIA” consisting of a capital letter “C”, a capital letter “A” without the horizontal crossbar, a capital letter “S”, a capital letter “P”, a capital letter “I” and a capital letter “A” without the horizontal crossbar, and the wording, “TECHNOLOGIES”, positioned to the right of the centurion helmet and shield design on a second line below the wording “CASPIA”. |