Embrace the future of trademark practice with our AI-powered solution, providing a transformative approach to both trademark prosecution and litigation.
Maximize your brand's impact with AI-powered solutions for brand content creation, management and protection. (Invite only to pilot clients)
Like a Google reverse image search and text search, but for trademarks. Search for existing marks in USPTO...
Catch potential conflicts as soon as they’re filed. Everything you need in one place.
Discover threats to your clients’ trademarks from over 60 million eCommerce listings.
Most advanced image recognition for trademark law
Case research has never been easier thanks to the largest knowledge graph in trademark law
For the first time, trademark lawyers and professionals have their own “achievement profiles”
Reconsidering portfolio management as revenue management
Hear what your peers love about Huski.ai for their trademark practices.
Browse potential refusal cases in pending applications against existing marks
Browse new trademark applications everyday. Discover business trends
The only ranking in the industry that is based on big data analysis of attorneys’ performance on trademark applications and litigations
The only ranking in the industry that is based on big data analysis of brand litigation records and brand impact factor
Your source of data insights, technology progress, and industry trend of trademark law.
We are AI engineers and intellectual property litigation professionals. As innovators ourselves, we believe that creativity and innovation are what drive us forward, and we want all individuals, professionals, and businesses of all sizes enjoy and benefit from the process of innovation.
Huski.ai exists to make brand creation and protection easy with cutting-edge AI.
Built by AI experts in Silicon Valley who worked on self-driving cars and other cutting-edge tech innovations, Huski.ai is developing unprecedented technologies for trademark prosecution and protection, ultimately transforming trademark and brand protection for all.
We deeply appreciate the media's recognition about our work. It's a great motivation to keep us moving forward.
CURE EIGHT CURATE
The mark consists of wording CURE8 in a stylized font. A design of a pointed leaf appears inside the number 8.
U.S Class(es): 100, 101, 102
Class Status: Active
First Use: Nov-16-2020
First Use in Commerce: Nov-16-2020
Online retail store services featuring a wide variety of consumer goods of others; Online retail store services in the field of consumer electronics, tvs, projectors, monitoring systems, security systems, information technology products, video equipment, audio equipment, portable electronic devices and related accessories, personal computers, printers, scanners, point-of sale hardware and electronic cables and office supplies;
U.S Class(es): 100, 101
Consulting in the field of IT project management; IT consulting services; IT integration services; Computer services, namely, remote and on-site management of the information technology (IT) systems of others; Web site and web application design and programming; Computer co-location services, namely, providing facilities for the location of computer servers with the equipment of others; Computer services, namely, providing virtual and non virtual application servers, web servers, file servers, co-location servers, load balancing servers, redundancy servers, media servers and database servers of variable capacity to third party computing and data storage facilities; Rental of space in a computer co-location facility for containerized data centers of others; Application service provider (ASP), namely, hosting computer software applications of others; Application service provider, namely, hosting, managing, developing, and maintaining applications, software, and web sites, in the fields of personal productivity, wireless communication, mobile information access, and remote data management for wireless delivery of content to handheld computers, laptops and mobile electronic devices; Computer services, namely, cloud hosting provider services; Consulting services in the field of hosting computer software applications; Hosting the web sites of others; Maintenance of websites and hosting on-line web facilities for others; Web site hosting services; Developing and hosting a server on a global computer network for the purpose of facilitating e-commerce via such a server. Technology consultation in the field of information systems threat analysis and network security; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer services, namely, remote and on-site management of information technology (IT) systems of others comprised of computer software systems used in provision of information technology security services for others; Monitoring of computer systems for detecting unauthorized access or data breach; providing computer virus protection services; providing computer services, namely, online scanning and detecting of viruses, spyware, adware, malware, ransomware, and other malicious code and programs on computers and electronic devices; computer security services, namely, restricting unauthorized network access by users without credentials to hard drives, computer networks and websites; Information technology security network infrastructure consulting services, namely, providing security strategies to assist businesses in protecting their intellectual property, data and network infrastructure against cyber security attack, and conducting security, vulnerability and penetration assessments; information technology computer security consultancy in the field of incident response, risk assessments, cyber security compliance, regulation compliance, and other practices of consultancy in relation to cyber security; Computer security threat analysis for protecting data from cyber threats and incidents; Managed information technology security services, namely, computer security threat analysis for protecting data; Monitoring of computer systems for detecting unauthorized access or data breach, namely, monitoring third-party information systems, operational technology (OT) and internet of things (IoT) networks for security detection and response purposes; Computer security threat analysis for protecting data, namely, assisting third-party enterprise network owners and operators to guard, monitor, detect, secure and respond to cyberattack and malware network and digital infrastructure intrusion incidents, both actual and attempted; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Computer security consultancy and monitoring of computer systems for detecting unauthorized access or data breach, namely, Information, OT and IoT networks security incident and response services, consisting of monitoring third-party information systems and IoT and OT networks for security and incident response purposes, including detection and response plan development, delivery and implementation services. Technology supervision and inspection in the field of security, fire and burglar alarm systems and alarm detection and monitoring services; Design, development and installation of security systems and surveillance systems;
Complete security facility services, namely, monitoring of security systems, security software, security surveillance systems, climate control systems, closed circuit television and other monitoring systems, access control systems, burglar and fire alarms;