Trademark Overview
On Monday, April 14, 2025, a trademark application was filed for IDENTITY STAKE with the United States Patent and Trademark Office. The USPTO has given the IDENTITY STAKE trademark a serial number of 99136778. The federal status of this trademark filing is NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER as of Monday, April 14, 2025. This trademark is owned by Lion Mountain Analytics, LLC. The IDENTITY STAKE trademark is filed in the Communication Services, Personal, Legal & Social Services, Insurance & Financial Services, and Computer & Software Services & Scientific Services categories with the following description:
Providing third party users with access to telecommunication infrastructure; Telecommunications services for providing multiple-user access to a global computer network; Providing multiple user access to proprietary collections of information by means of global computer information networks; Providing multiple-user access to data on the Internet in the field of digital identity and identity verifiction
Insurance services, namely, underwriting, issuance and administration of insurance products covering human to human, human to machine, and human to business interactions under the umbrella of fraud and other criminal liability insurance; Insurance underwriting in the field of insuring human to human, human to machine, and human to business interactions against fraud and other criminal liability
Verification of personal identity as part of personal background investigations
Computer security services in the nature of administering digital certificates; Computer security services in the nature of administering digital keys; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Providing user authentication services using multi-factor authentication technology for telephone calls, video calls, text messages, emails, and social media posts; Providing user authentication services using biometric hardware and software technology for telephone calls, vide...
