Trademark Overview
On Wednesday, September 24, 2025, a trademark application was filed for VISIBLE TRUST with the United States Patent and Trademark Office. The USPTO has given the VISIBLE TRUST trademark a serial number of 99411414. The federal status of this trademark filing is NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER as of Wednesday, September 24, 2025. This trademark is owned by Lion Mountain Analytics, LLC. The VISIBLE TRUST trademark is filed in the Communication Services, Personal, Legal & Social Services, Insurance & Financial Services, and Computer & Software Services & Scientific Services categories with the following description:
Telecommunications services for providing multiple-user access to a global computer network; Providing multiple user access to proprietary collections of information by means of global computer information networks; Providing multiple-user access to data on the Internet in the field of digital identity and identity verification for humans, non-human AI Agents, and legal persons such as organizations and businesses
Insurance underwriting in the field of fraud and criminal liability insurance insuring human to human, human to machine (e.g. AI Agents), and human to business interactions against fraud and criminal liability; Insurance services, namely, underwriting, issuance and administration of human to human, human to machine (e.g. AI Agents), and human to business interactions insurance
Verification of personal identity as part of personal background investigations
Computer security services in the nature of administering digital certificates; Computer security services in the nature of administering digital keys; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Providing user authentication services using biometric hardware and software technology for telephone calls, video calls, text messages, emails, and social media posts; Providing temporary use of on-line non-downloadable software for accessing, reading, and tracking information...
