The trademark application TRAIL OF BITS was filed by Trail of Bits, Inc., a U.S. corporation (the "Applicant"). The application was published for oppositions on June 12, 2024, and it was registered by office on September 19, 2024 without any oppositions.
The application was filed in English (German was selected as the second language).
Goods And Services
The mark was filed in class 9 with Downloadable software for monitoring of computer process and network events, function tracing, parsing of kernel debug symbols, generation and usage of source code, software development and testing, debugging, code translation, decompilation, reverse engineering, security and analysis, vulnerability detection, cryptography, fuzzing, evaluation and testing of security tools and techniques, privacy testing for machine learning systems, and decompilation and reverse engineering using artificial intelligence and software guides and tutorials for cybersecurity and software development..
The mark was filed in class 41 with Training in the field of computer system and software security, software fuzzing and artificial intelligence systems risks.
The mark was filed in class 42 with following description of goods:
Consulting in the fields of: computer system and software security
Security review of blockchain, cryptographic and cryptocurrency code
Blockchain invariant development, identification, implementation, testing, and integration
Cryptographic software development, code analysis, bug fixing and mitigation
Code verification and vulnerability detection
Identification of cryptographic flaws in software
Assessment of artificial intelligence and machine learning software development pipelines and software components
Provision of security risk management with regard to artificial intelligence
Integration of artificial intelligence tools into software security processes
Security threat modeling, namely, identification, analysis and assessment of potential security threats, risks and vulnerabilities to computer software and systems, development and implementation of strategies and countermeasures to mitigate identified threats, risks and vulnerabilities to computer software and systems
Research and development of computer software, program analysis, program testing and cryptography
Design and development of computer software and computer system architecture
Software as a service featuring software for performing security vulnerability detection, checks, and tests in the field of software.