
| Serial Number | 79422192 |
| Word Mark | GLOG.AI |
| Filing Date | Tuesday, January 28, 2025 |
| Status | 661 - RESPONSE AFTER NON-FINAL ACTION - ENTERED |
| Status Date | Wednesday, December 17, 2025 |
| Registration Number | 0000000 |
| Registration Date | NOT AVAILABLE |
| Mark Drawing | 3 - Illustration: Drawing or design which also includes word(s) / letter(s) / number(s) |
| Published for Opposition Date | NOT AVAILABLE |
| Pseudo Mark | GLOG |
| Description of Mark | The mark consists of the stylized wording "GLOG.AI". The letters GLOG appear in dark-to-light gradient blue, and the letters AI appear in a lighter turquoise-blue color. A solid turquoise-blue dot appears below the letter G, forming the period before "AI". On the left and right sides of the wording are stylized angle brackets "(" and ")" in blue, framing the entire mark. The mark is presented on a white background, which is not claimed as a feature of the mark. |
| Goods and Services | Downloadable software using artificial intelligence for remediation of security vulnerabilities in software code; automated access control systems for security barriers; downloadable software for analyzing software code; downloadable computer programs using artificial intelligence for developing predictive models; downloadable software for machine learning used in computerized predictive analysis programs; downloadable application software for software testing; downloadable cloud-based software for remediation of security vulnerabilities in software code; downloadable software for computer protection; downloadable software for ensuring security; downloadable software for modeling software threats; downloadable software for detecting security abnormalities; downloadable software for detecting software vulnerabilities; downloadable software for advice on correction of security breaches; downloadable software for static application security testing; downloadable software for compositional analysis; downloadable software for interactive application security testing; downloadable software for dynamic application security testing; downloadable software for protecting the security of running applications; downloadable software for security vulnerability assessment; downloadable software for penetration testing of computer systems and networks; downloadable software for software risk management; downloadable software application programming interfaces (APIs); downloadable software for security monitoring; downloadable software for security vulnerability analysis; downloadable software for security training simulation; downloadable software for integration of artificial intelligence and machine learning in the field of security; downloadable software for cloud-based network monitoring; downloadable software for simulating virtual reality training in the field of security; downloadable software for configuring computer networks; downloadable software using artificial intelligence for software code analysis; downloadable computer software for remote monitoring and analysis; downloadable software using machine learning used in computer language processing programs; downloadable language recognition software; downloadable computer software platforms for analyzing cybersecurity data; downloadable computer operating system software; downloadable computer programs for network management; computer and telecommunications hardware used with downloadable security software; computer hardware for network access servers |
| Goods and Services | Computer security consultations in the field of computer and network digitization for information security vulnerability assessment; computer security consultancy in the nature of information technology security and computer and network vulnerability assessment; cloud-based data leak protection services; data security consultancy and firewall hardening services; Software as a Service (SAAS) services featuring software for analysis and reporting with respect to computer network security self-assessment; computer services, namely, computer software integration services into multiple systems and networks; software development for secure use in a network; cybersecurity and software security consulting services; software source code security assurance services; software design and security design services; software threat modeling services in the nature of computer security threat analysis for protecting data; network traffic anomaly detection services; static application security testing and vulnerability detection services; cybersecurity consulting services concerning the correction of computer security vulnerabilities; static application security testing services; software compositional analysis services; interactive application security testing services; dynamic application security testing services; runtime application self-protection; software security vulnerability assessment services in the nature of computer security threat analysis for protecting data; penetration testing services for computer systems and networks aided by artificial intelligence; software risk management services aided by artificial intelligence; security testing and monitoring services related to application programming interface; software security monitoring services in the nature of computer security threat analysis for protecting data; development of software in virtual reality; analysis of computer exposure to security risks for data protection purposes; consultancy for computer hardware design; design and development of computer hardware and software in the field of security; analysis of threats and attacks supported by artificial intelligence ; installation, maintenance and updating of computer software; behavior analytics-based detection services; computer security consultancy; testing of security systems; computer programming services for electronic data protection; design and development of programs for Internet security; testing of computer software; computer software development and testing; design and analysis of computer systems; computer technology services in the field of cybersecurity; scientific research in the field of cybersecurity; programming of computer programs; analysis of computer systems; design of computer networks; information technology engineering; information system design services |
| International Class | 009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus. |
| US Class Codes | 021, 023, 026, 036, 038 |
| Class Status Code | 6 - Active |
| Class Status Date | Thursday, April 24, 2025 |
| Primary Code | 009 |
| First Use Anywhere Date | NOT AVAILABLE |
| First Use In Commerce Date | NOT AVAILABLE |
| International Class | 042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software. |
| US Class Codes | 100, 101 |
| Class Status Code | 6 - Active |
| Class Status Date | Thursday, April 24, 2025 |
| Primary Code | 042 |
| First Use Anywhere Date | NOT AVAILABLE |
| First Use In Commerce Date | NOT AVAILABLE |
| Party Name | GLOG.AI d.o.o. |
| Party Type | 10 - Original Applicant |
| Legal Entity Type | 99 - Other |
| Address | RS |
| Event Date | Event Description |
| Thursday, April 24, 2025 | SN ASSIGNED FOR SECT 66A APPL FROM IB |
| Friday, April 25, 2025 | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED |
| Friday, April 25, 2025 | APPLICATION FILING RECEIPT MAILED |
| Tuesday, July 8, 2025 | ASSIGNED TO EXAMINER |
| Thursday, July 17, 2025 | NON-FINAL ACTION WRITTEN |
| Friday, July 18, 2025 | NON-FINAL ACTION (IB REFUSAL) PREPARED FOR REVIEW |
| Thursday, August 21, 2025 | REFUSAL PROCESSED BY MPU |
| Thursday, August 21, 2025 | NON-FINAL ACTION MAILED - REFUSAL SENT TO IB |
| Friday, September 5, 2025 | REFUSAL PROCESSED BY IB |
| Wednesday, December 17, 2025 | TEAS RESPONSE TO OFFICE ACTION RECEIVED |
| Wednesday, December 17, 2025 | CORRESPONDENCE RECEIVED IN LAW OFFICE |
| Wednesday, December 17, 2025 | TEAS/EMAIL CORRESPONDENCE ENTERED |