Trademark Overview
On Thursday, July 10, 2025, a trademark application was filed for GHOST CODE with the United States Patent and Trademark Office. The USPTO has given the GHOST CODE trademark a serial number of 99277620. The federal status of this trademark filing is NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER as of Thursday, July 10, 2025. This trademark is owned by GX INC.. The GHOST CODE trademark is filed in the Computer & Software Products & Electrical & Scientific Products and Computer & Software Services & Scientific Services categories with the following description:
Downloadable cybersecurity software providing a system-level protection layer between the operating system and the central processing unit (CPU), for monitoring, detecting, and neutralizing unauthorized internal activities and threats; Downloadable computer security software that functions below the operating system level, implementing an internal defense layer between the OS and CPU for internal threat detection; Downloadable cybersecurity software implementing a system-level protection layer between the operating system and the CPU for preventing unauthorized code execution and detecting internal threats; Downloadable and embedded cybersecurity software, firmware, and middleware for computer hardware, designed to operate as a protection layer between the operating system and the central processing unit (CPU) to monitor, detect, and prevent unauthorized internal access and code execution; Computer hardware components containing embedded cybersecurity software functioning at the system...
Providing temporary use of non-downloadable cybersecurity software that operates between the operating system and CPU to prevent unauthorized code execution and protect against internal system threats; Software as a service (SaaS) featuring security software functioning at the firmware or kernel level to monitor and control execution between the operating system and CPU in computing systems; Design and development of cybersecurity platforms operating at the hardware-software interface level to protect computing environments against internal attacks; Software as a service (SaaS) featuring cybersecurity software that operates between the operating system and CPU to protect computing systems from internal vulnerabilities and malicious execution; Providing temporary use of non-downloadable cybersecurity software and firmware embedded in computer hardware components, operating between the operating system and CPU to prevent unauthorized internal activities and cyber threats; Design and deve...
