SPONSORED CONTENT
Trademark registration service includes:
- Trademark attorney managed
- Federal trademark search
- Apply online - fast & easy
- Electronic filing of application
- You are always kept informed
By: Hani Braish
Business technology software consultation services; Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence for business analytics; Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence for data exploration; Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence for data assessment; Artificial ...
Status Alert: On Tuesday, March 31, 2026, the status for the VAULT AGENTICS mark changed to NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER .
|
On Tuesday, March 31, 2026, a U.S federal trademark application was filed for VAULT AGENTICS by Hani Braish, 8605 Santa Monica Blvd #225310, West Hollywood, CA. The USPTO has assigned the VAULT AGENTICS mark the serial number 99737299. The VAULT AGENTICS mark has been filed in the category Computer and Software Services and Scientific Services. The owner of the VAULT AGENTICS mark is listed as Hani Braish, 8605 Santa Monica Blvd #225310, West Hollywood, CA. The correspondent for the VAULT AGENTICS mark is Hani Braish of 8605 Santa Monica Blvd #225310, West Hollywood, CA 90069, United States. If you have licensing, usage or other questions concerning the VAULT AGENTICS mark, please contact the owner through the listed correspondent. The description provided for the VAULT AGENTICS mark is Business technology software consultation services; Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence for business analytics; Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence for data exploration; Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence for data assessment; Artificial ... |
|
| Word Mark: | VAULT AGENTICS |
| Status: | NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER |
| Status Date: | 03/31/2026 |
| Serial Number: | 99737299 |
| Filing Date: | 03/31/2026 |
| Registration Number: | Not Available |
| Registration Date: | Not Available |
| Goods and Services: | Business technology software consultation services; Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence for business analytics; Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence for data exploration; Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence for data assessment; Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence for data analytics; Artificial intelligence as a service (AIAAS) featuring software using artificial intelligence for database management; Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence for creating and integrating computer models; Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence for creating complex data science analyses; Artificial intelligence as a service (AIAAS) featuring software using artificial intelligence for analyzing data and interacting with humans; Technology consultation in the field of artificial intelligence; Design and development of artificial intelligence (AI) software; Consultancy in the field of artificial intelligence (AI) technology; Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence for designing custom algorithms for use in digital advertising; Technical consulting in the field of artificial intelligence (AI) software customization; Software design provided on an outsourcing basis in the field of artificial intelligence; Computer software design provided on an outsourcing basis in the field of artificial intelligence; Software design services provided on an outsourcing basis in the field of artificial intelligence; Design of software provided on an outsourcing basis in the field of artificial intelligence; Providing online non-downloadable software using artificial intelligence (AI) for machine learning; Design and development of artificial intelligence (AI) software on an outsourcing basis; Computer software design services provided on an outsourcing basis in the field of artificial intelligence; Providing temporary use of online non-downloadable software using artificial intelligence (AI) for controlling revenue operations, cybersecurity posture, sales pipeline management, business workflow automation, data analytics, customer relationship management, marketing campaign optimization, and security compliance monitoring; Design and development of artificial intelligence (AI) software for automating business processes, managing cybersecurity operations, analyzing sales and revenue data, optimizing marketing workflows, monitoring security compliance, generating business intelligence reports, managing customer engagement, and orchestrating multi-agent automation systems; Providing temporary use of online non-downloadable software using artificial intelligence (AI) for controlling revenue operations, cybersecurity workflows, sales pipeline automation, business process orchestration, security compliance monitoring, marketing campaign performance, and customer engagement workflows; Design and development of artificial intelligence (AI) software for automating business workflows, managing cybersecurity operations, orchestrating multi-agent systems, analyzing revenue and sales data, optimizing go-to-market strategies, monitoring security posture, and generating business intelligence insights; Research in the field of artificial intelligence (AI) software for cybersecurity automation, revenue operations optimization, multi-agent orchestration systems, business process automation, security compliance frameworks, and AI-driven sales enablement; Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence (AI) for cybersecurity automation, revenue operations management, sales pipeline optimization, business workflow orchestration, security compliance monitoring, marketing automation, and multi-agent system deployment; Research in the field of artificial intelligence (AI) software for business workflow processes, cybersecurity operations, sales pipeline management, revenue reporting, security compliance monitoring, customer engagement workflows, marketing campaign execution, and multi-agent task orchestration; Providing temporary use of online non-downloadable software using artificial intelligence (AI) for automating business workflow processes, cybersecurity operations, sales pipeline management, revenue reporting, security compliance monitoring, customer engagement workflows, marketing campaign execution, and multi-agent task orchestration; Providing online non-downloadable virtual assistant software using artificial intelligence (AI) for automating business operations, managing cybersecurity workflows, optimizing revenue operations, orchestrating sales processes, monitoring security compliance, and coordinating multi-agent automation systems; Providing a website featuring non-downloadable software using artificial intelligence (AI) for cybersecurity management, revenue operations optimization, sales pipeline automation, business workflow orchestration, security compliance monitoring, marketing automation, multi-agent system deployment, and business intelligence analytics; Application service provider (ASP) featuring software using artificial intelligence (AI) for cybersecurity management, revenue operations optimization, sales pipeline automation, business workflow orchestration, security compliance monitoring, marketing automation, multi-agent system deployment, and business intelligence analytics; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for cybersecurity management, revenue operations optimization, sales pipeline automation, business workflow orchestration, security compliance monitoring, marketing automation, multi-agent system deployment, and business intelligence analytics; Providing temporary use of on-line non-downloadable cloud computing software using artificial intelligence (AI) for cybersecurity management, revenue operations automation, sales pipeline optimization, business workflow orchestration, security compliance monitoring, multi-agent system deployment, and business intelligence analytics; Providing temporary use of on-line non-downloadable software and applications using artificial intelligence (AI) for cybersecurity, revenue operations, sales enablement, business process automation, security compliance, marketing optimization, and enterprise workflow management; Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence for developing data science models; Research in the field of artificial intelligence technology; Rental of humanoid robots with artificial intelligence (AI); Research in the field of artificial intelligence (AI); Technology consultation in the field of artificial intelligence (AI); Research, design and development of software using artificial intelligence; Advanced product research in the field of artificial intelligence (AI); Providing online non-downloadable text-to-image generator software using artificial intelligence (AI); Design of computer software provided on an outsourcing basis in the field of artificial intelligence; Software as a service (SAAS) services featuring artificial intelligence (AI) software for generating business analysis reports; Technical consulting in the field of monitoring technological functions of humanoid robots with artificial intelligence (AI); Software as a service (SAAS) services featuring artificial intelligence software for analyzing data and calculating insurer ratings; Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence (AI) for cybersecurity management, revenue operations automation, sales pipeline optimization, business workflow orchestration, security compliance monitoring, marketing automation, multi-agent system deployment, and business intelligence analytics; Providing online non-downloadable virtual assistant software using artificial intelligence (AI) for managing cybersecurity workflows, automating revenue operations, orchestrating sales processes, scheduling business meetings, monitoring security compliance, coordinating multi-agent automation systems, and generating business intelligence reports; Providing temporary use of online non-downloadable chatbot software using artificial intelligence (AI) for automating customer engagement, managing cybersecurity inquiries, providing sales enablement support, answering business operations questions, facilitating revenue operations workflows, and delivering security compliance guidance; Providing on-line non-downloadable software using artificial intelligence (AI) for cybersecurity management, revenue operations optimization, sales pipeline automation, business workflow orchestration, security compliance monitoring, marketing automation, multi-agent system deployment, business intelligence analytics, and enterprise process automation; Providing a website featuring non-downloadable software using artificial intelligence (AI) for cybersecurity, revenue operations, sales enablement, business process automation, security compliance, marketing optimization, multi-agent orchestration, and enterprise workflow management; Application service provider (ASP) featuring software using artificial intelligence (AI) for cybersecurity, revenue operations, sales enablement, business process automation, security compliance, marketing optimization, multi-agent orchestration, and enterprise workflow management; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for cybersecurity, revenue operations, sales enablement, business process automation, security compliance, marketing optimization, multi-agent orchestration, and enterprise workflow management; Application service provider (ASP) featuring software using artificial intelligence (AI) for Same text for all three boxes: cybersecurity, revenue operations, sales enablement, business process automation, security compliance, marketing optimization, multi-agent orchestration, and enterprise workflow management; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for Same text for all three boxes: cybersecurity, revenue operations, sales enablement, business process automation, security compliance, marketing optimization, multi-agent orchestration, and enterprise workflow management; Providing temporary use of on-line non-downloadable cloud computing software using artificial intelligence (AI) for Same text for all three boxes: cybersecurity, revenue operations, sales enablement, business process automation, security compliance, marketing optimization, multi-agent orchestration, and enterprise workflow management; Research in the field of artificial intelligence; Providing temporary use of on-line non-downloadable software and applications using artificial intelligence (AI) for cybersecurity, revenue operations, sales enablement, business process automation, security compliance, marketing optimization, multi-agent orchestration, and enterprise workflow management; Technology consultation in the field of cybersecurity; Monitoring of computer systems to detect cybersecurity incidents; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Computer programming consultancy in the field of cybersecurity, artificial intelligence, revenue operations, business process automation, multi-agent systems, security compliance, cloud computing, and enterprise software integration; Computer security consultancy; Computer network security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of artificial intelligence, cloud computing, enterprise network security, security compliance, data protection, threat detection and response, security operations automation, and identity and access management; Computer security threat analysis for protecting data; Computer security service, namely, hard drive erasure; Maintenance of computer software relating to computer security and prevention of computer risks; Updating of computer software relating to computer security and prevention of computer risks; Rental of computers relating to computer security and prevention of computer risks; Computer security services in the nature of administering digital keys; Consulting in the field of virtualization technologies for enterprises and businesses; Consulting services in the design and implementation of computer-based information systems for businesses; Providing an interactive website featuring technology that allows users to enter, access, and synthesize information and generate reports for use in consulting with executives and businesses; Computer software consulting; Information technology consulting relating to computer software design; Consulting services in the field of hosting computer software applications; Consulting services in the field of software implementation for others; Consulting services in the field of software as a service (SAAS); Consulting services in the field of providing online, non-downloadable software and applications; Consulting in the field of configuration management for computer hardware and software; IT consulting services relating to installation, maintenance and repair of computer software; Computer software consultancy; Computer software consultation; Software engineering consultancy; Consulting services in the fields of selection, implementation and use of computer hardware and software systems for others; Computer game software consultancy; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consultation services relating to computer software; Software engineering consultancy for data processing; Consultancy in the field of software design; Software development consulting in the field of cybersecurity, artificial intelligence, revenue operations, multi-agent systems, business process automation, security compliance, cloud computing, and enterprise software integration; Software development and product development consulting in the field of cybersecurity, artificial intelligence, revenue operations, multi-agent systems, business process automation, security compliance, cloud computing, and enterprise software integration; Outsource service provider in the field of information technology consulting relating to installation, maintenance and repair of computer software; Consultancy in the field of software engineering; Consulting services, namely, designing, creating, implementing and maintaining computer software for owners, managers and other personnel to set-up, open, operate and manage a commercial climbing facility; Consultation about the maintenance and updating of computer software; Consultancy in the field of software engineering for data processing; Information technology consultancy relating to installation, maintenance and repair of computer software; Consulting services for others in the field of design, planning, and implementation project management of cybersecurity systems, artificial intelligence platforms, enterprise software solutions, cloud computing infrastructure, and multi-agent automation systems; Computer security consultancy in the field of cybersecurity systems, artificial intelligence platforms, enterprise software solutions, cloud computing infrastructure, and multi-agent automation systems; Providing virtual computer systems through cloud computing; Providing virtual computer environments through cloud computing; Consulting services in the field of cloud computing; Provision of virtual computer environments through cloud computing; Computer services, namely, integration of private and public cloud computing environments; Providing virtual computer systems and virtual computer environments through cloud computing; Provision of virtual computer systems and virtual computer environments through cloud computing; Design and development of operating software for accessing and using a cloud computing network; Computer services, namely, remote and on-site management of the information technology (IT) cloud computing systems of others; Computer services, namely, cloud hosting provider services; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Computer services, namely, cloud hosting provider services provided near the geographical location of the end user; Cloud computing featuring software for use cybersecurity management, revenue operations, business process automation, multi-agent system orchestration, security compliance monitoring, and enterprise workflow management; Providing temporary use of on-line non-downloadable cloud computing software for cybersecurity management, revenue operations, business process automation, multi-agent system orchestration, security compliance monitoring, and enterprise workflow management; Design and development of computer software for cybersecurity automation, revenue operations management, multi-agent orchestration, sales pipeline optimization, security compliance monitoring, business intelligence analytics, and marketing workflow automation; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Updating and maintaining cloud-based computer software through on-line updates, automated patching, continuous deployment, and remote configuration management; Providing temporary use of on-line non-downloadable cloud computing software using artificial intelligence (AI) for cybersecurity management, revenue operations optimization, sales pipeline automation, business workflow orchestration, security compliance monitoring, multi-agent system deployment, and business intelligence analytics; Providing temporary use of on-line non-downloadable cloud computing software using artificial intelligence (AI) for cybersecurity, revenue operations, sales enablement, business process automation, security compliance, marketing optimization, multi-agent orchestration, and enterprise workflow management; Information technology consulting relating to computer network design; Consulting services in the field of computer hardware design for others; Computer programming consultancy for data processing; Technological planning and consulting services in the field of cybersecurity, artificial intelligence, cloud computing, revenue operations, business process automation, multi-agent systems, enterprise software integration, and security compliance; Consultancy in the field of computer programming; Technological planning and consulting services in the field of artificial intelligence, cloud computing, enterprise network security, security compliance, data protection, threat detection and response, security operations automation, and identity and access management; Consulting services for others in the field of design, planning, and implementation project management of artificial intelligence, cloud computing, enterprise network security, security compliance, data protection, threat detection and response, security operations automation, and identity and access management; Consultancy in the design and development of computer hardware; Computer technology consultancy in the field of machine learning; Technological consultation in the technology field of cybersecurity, artificial intelligence, cloud computing, revenue operations, business process automation, multi-agent systems, and enterprise software integration; Computer technology consultancy in the field of cybersecurity, artificial intelligence, cloud computing, revenue operations, business process automation, multi-agent systems, and enterprise software integration; Computer technology consultancy in the field of cybersecurity, artificial intelligence, revenue operations, business process automation, multi-agent systems, security compliance, cloud computing, and enterprise software integration; Consultancy in the field of quantum computing; Consultancy in the field of computer programming for data processing; Telecommunications technology consultancy; Consulting services in the field of mining exploration; Measuring television audience size and composition for others via electronic data collection; Providing a secure, web-based service featuring technology that enables individuals to remotely create and manage their own accounts so that whatever private content they upload now can be encrypted, then delivered to their intended recipients, at the time and in the manner requested; Testing, analysis and evaluation of service providers to determine conformity with established accreditation standards; Inspecting food establishments to determine whether foods conform to kosher quality certification standards; Scientific research in the field of artificial intelligence, cybersecurity, multi-agent systems, and business process automation; Scientific study and research in the field(s) of artificial intelligence, cybersecurity, multi-agent systems, and business process automation; Testing of computers for enterprise businesses, technology companies, and cybersecurity organizations; Testing, analysis, and evaluation of goods or services of others to the order and specification of CMMC, HIPAA, SOC, COP, NIST; Testing, analysis and evaluation of the goods and services of others to determine conformity with certification standards; Testing of computer software; Authenticating coins; Testing, analysis, and evaluation of cybersecurity software, artificial intelligence systems, enterprise security solutions, and cloud computing platforms to determine conformity with certification standards; Computer programming; Mapping services; Providing a social networking website which features technology that enables users to give charitable financial gifts to others; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Data encryption services; Providing a website featuring on-line non-downloadable software that enables users to create audio drama series and episodes, write scripts, audition and assign talent, record and mix audio, publish produced audio dramas, track and analyze audio drama statistics, advertise and market audio dramas, and stream and/or download audio dramas; Updating of computer software; Computer services, namely, designing and implementing web pages for others; Computer services, namely, creating an on-line community for registered users to share knowledge and best practices in cybersecurity, artificial intelligence, revenue operations, and business automation; Software authoring; Computer services, namely, redirecting electronic mail to changed personal electronic address; Rental of computers; Computer software design for others; Metering and monitoring electric power consumption by third parties for electric power providers; Product research; Diagnostic services in the field of share knowledge and best practices in cybersecurity, artificial intelligence, revenue operations, and business automation; Computer services, namely, monitoring and reporting on the performance, availability, and errors of web sites of others; Design of home pages and web sites; Computer services, namely, monitoring the web sites of others to improve their scalability and performance; Computer virus protection services; Computer network design for others; Creating and maintaining web sites for others; Database development services; Computer systems analysis; Maintenance of computer software; Recovery of computer data; Computer site design; On-line batch computer services, namely, configuration of multiple files into a single group; Product research and development; Computer monitoring service which tracks hardware performance and processes and sends out historical reports and alerts; Computer services, namely, hosting on-line web facilities for others for organizing and conducting online meetings, gatherings, and interactive discussions; Design of computer networks and software for others for the cybersecurity, artificial intelligence, revenue operations, enterprise security, cloud computing, and business automation; Engineering services, namely, engineering for the cybersecurity, artificial intelligence, revenue operations, enterprise security, cloud computing, and business automation; Design for others in the field of computer networks, software, and engineering for the cybersecurity, artificial intelligence, revenue operations, enterprise security, cloud computing, and business automation; Computer network design and computer software design for the cybersecurity, artificial intelligence, revenue operations, enterprise security, cloud computing, and business automation; Consulting services in the field of design of newsletters; Hosting the digital audio and video content of others for the purpose of enabling hotel, inn, and other lodging establishment guests to download the content on a pay per view basis; Providing technical information updates of industrial process control computer software via the global computer network; Design of computer hardware, integrated circuits, communications hardware and software and computer networks for others; Technical support services, namely, troubleshooting of industrial process control computer software problems; Document data transfer from one computer format to another; Computer-aided engineering services for others; Design and development of on-line computer software systems; Duplication of computer programs; E-mail system design and implementation for others; Consulting services in the field of office and workplace automation; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Tool design; Providing meteorological information; Advisory services in the field of product development and quality improvement of software; Computer services, namely, managing web sites for others; Data automation and collection service using proprietary software to evaluate, analyze and collect service data; Data mining; Computer project management services; Computer graphics services; Development of new technology for others in the field of cybersecurity, artificial intelligence, multi-agent systems, revenue operations, business process automation, cloud computing, and enterprise security; Maintenance of computer software used for operating filling apparatus and machines; Creation and maintenance of web sites for others; Designing websites for advertising purposes; Design of homepages and websites; Design of home pages; Providing temporary use of non-downloadable computer software for tracking documents over computer networks, intranets and the internet; Providing temporary use of non-downloadable computer software for preparing shipping documents over computer networks, intranets and the internet; Providing temporary use of non-downloadable computer software for preparing invoices over computer networks, intranets and the internet; Computer disaster recovery planning; Computer diagnostic services; Computer services, namely, interactive hosting services which allow the users to publish and share their own content and images on-line; Domain registry operator services; Electronic data storage; Providing an on-line network environment featuring technology that enables users to share data in the field of cybersecurity, artificial intelligence, revenue operations, business analytics, security compliance, and enterprise workflow automation; Providing a website for the electronic storage of medical, training and social records of pets that also allows the records to be shared with pet sitters, trainers, dog walkers, veterinarians and other pet service providers; Reconstruction of database systems for others; Technical support, namely, providing computer facilities for the electronic storage of digital data; Internet-based service for the secure electronic storage of multi-lingual documents featuring an ability to track and report all user interactions with the service; Electronic storage of electronic media, namely, images, text and audio data; Providing temporary use of online non-downloadable middleware for providing an interface between web browser and legacy systems; Providing temporary use of online non-downloadable middleware for providing an interface between GoHighLevel and HubSpot; Electronic storage of cybersecurity data, business intelligence data, security compliance records, revenue operations data, and enterprise workflow configurations; Computer services, namely, creating an on-line community for registered users to participate in discussions, get feedback from their peers, form virtual communities, and engage in social networking services in the field of cybersecurity, artificial intelligence, revenue operations, and business automation; Computer services, namely, providing a web site for others that automates party and entertainment events management information consisting of cybersecurity management, revenue operations, business process automation, multi-agent system orchestration, security compliance monitoring, and enterprise workflow management; Computer services, namely, hosting an interactive web site that allows users to upload, store and maintain automotive repair records, manage online records of services performed on their vehicles, and receive automated service reminders, safety alerts, recall alerts, and special discount offers; Providing a web site featuring technology that enables users to connect with other people in their neighborhood or city for any number of user-specified reasons, including providing a service or organizing an event; Design and development of computer-modeled versions of human beings using computer animation for use in movies, television, internet, games and other applications; Consulting services for others in the field of design, planning, and implementation project management of cybersecurity systems, artificial intelligence platforms, enterprise software solutions, cloud computing infrastructure, multi-agent automation systems, and revenue operations technology; Website design consultancy; Computer-aided design services; Consulting services for others in the field of design, planning, and implementation project management of cybersecurity management, revenue operations automation, sales pipeline optimization, business workflow orchestration, security compliance monitoring, multi-agent system deployment, marketing automation, and business intelligence analytics; Providing temporary use of a non-downloadable web application for cybersecurity management, revenue operations automation, sales pipeline optimization, business workflow orchestration, security compliance monitoring, multi-agent system deployment, marketing automation, and business intelligence analytics; Design and implementation of software and technology solutions for the purpose of product and document authentication and tracking, and brand monitoring and protection, to protect against counterfeiting, tampering, and diversion, and to ensure the integrity of genuine products and documents; Software as a service (SAAS) services featuring software for cybersecurity management, revenue operations optimization, sales pipeline automation, business workflow orchestration, security compliance monitoring, multi-agent system deployment, marketing automation, and business intelligence analytics; Remote computer backup services; Scientific and technological services, namely, research and design in the field of integrated system architecture that allows for the rapid development of highly interactive and customizable learning applications; Application service provider, namely, hosting, managing, developing, and maintaining applications, software, and web sites, in the fields of personal productivity, wireless communication, mobile information access, and remote data management for wireless delivery of content to handheld computers, laptops and mobile electronic devices; Application service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software, and web sites, of others in the fields of healthcare, benefits programs, employee productivity, risk management |
| Type Of Mark: | Service Mark |
| Register Type: | Principal |
| Published For Opposition Date: | Not Available |
| Current Owner: | Hani Braish 8605 Santa Monica Blvd #225310 West Hollywood, CA 90069 UNITED STATES |
| Mark Description: | The mark consists of The mark consists of a stylized shield design with rounded upper corners and a pointed base, containing a geometric leaf motif with symmetrical veins extending from a central stem, topped by a diamond shape. Below the shield are the words 'vault' in lowercase stylized lettering and 'AGENTICS' in uppercase spaced lettering. |
| Mark Drawing Type: | Not Available |
| Design Search: | Not Available |
| Disclaimer: | Not Available |
| Correspondent: | Hani Braish 8605 Santa Monica Blvd #225310 West Hollywood, CA 90069 United States |
| International Class(es): | 042 |
| US Class(es): | 100, 101 |
| Primary Class: | Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software. |
| Class(es) Status: | Active |
| First Use Anywhere: | 10/12/2025 |
| First Use In Commerce: | 11/13/2025 |
| Retrieve Trademark Documents |