Use GleanMark for a free trademark search powered by millions of USPTO records. See similar trademarks, filter results, and sign up for active monitoring.
Barrettes; Appliques; Artificial Christmas garlands; Artificial plants, other than Christmas trees; Decorative charms for cellular telephones; Electric hair-curlers, other than hand implements; Electric hair waving implements; False hair; False moustaches; Hair clips; Hair curlers, electric and non-electric, other than hand implements; Lace trimmings; Pet collar accessories, namely, charms; Trimmings for clothing; Wreaths of artificial flowers; Korean ornamental hairpins (Binyer)
Non-medicated skin care creams and lotions; Non-medicated skin care preparations; Non-medicated skin care preparations, namely, creams, lotions, gels, toners, cleansers, skin masks, balms; Skin and body topical lotions, creams and oils for cosmetic use; Topical skin sprays for cosmetic purposes
Bottle openers; Containers for household or kitchen use; Cooking pots; Cruets; Dinnerware; Fruit presses, non-electric, for household purposes; Gloves for household purposes; Graters for kitchen use; Kettles, non-electric; Pastry cutters; Perfume atomizers, sold empty; Toothbrushes, electric; Water apparatus for cleaning teeth and gums for home use; Water bottles sold empty; Whisks; Cooking spoons; Hand-operated grinders; Non-electric carpet sweepers; Non-electric food mixers; Serving spoons
Air humidifying apparatus; Gas scrubbing apparatus; Germicidal lamps for purifying air; Lamps; LED (light emitting diode) lighting fixtures; LED light assemblies for street lights, signs, commercial lighting, automobiles, buildings, and other architectural uses; Light diffusers; Lighting installations for vehicles; Lights for vehicles; Multi-purpose, electric countertop food preparation apparatus for cooking, baking, broiling, roasting, toasting, searing, browning, barbecuing and grilling food; Pocket searchlights; Roasting jacks; Safety lamps for underground use; Sockets for electric lights; Electric Chinese lanterns; Fairy lights for festive decoration; LED safety lamps; Light bulbs [ ; Sanitary installations in the nature of steam rooms ]
Educational services, namely, conducting conferences and training in the fields of data, application, database and computer system integration within and/or among enterprises, cloud computing, cloud automation, cloud data integration, creation and integration of and connectivity to application programming interfaces (APIs), and workflow automation; providing a website featuring blogs and non-downloadable videos and podcasts in the fields of data, application, database and computer system integration within and/or among enterprises, cloud computing, cloud automation, cloud data integration, creation and integration of and connectivity to application programming interfaces (APIs), and workflow automation; Downloadable computer software for use in data, application, database and computer system integration within and/or among enterprises, for cloud computing, cloud automation, cloud data integration, creation and integration of and connectivity to application programming interfaces (APIs), workflow automation, data migration, synchronization of data, managing, ensuring integrity of, and controlling access to data shared across cloud-computing networks, establishing and operating electronic data interchange systems, designing and deploying cloud-based applications, managing compliance with laws and regulations, and collecting and analyzing data generated by business applications; Electronic data interchange services; Arranging and conducting business conferences in the fields of data, application, database and computer system integration within and/or among enterprises, cloud computing, cloud automation, cloud data integration, creation and integration of and connectivity to application programming interfaces (APIs), and workflow automation; Platform as a service (PAAS) and software as a service (SAAS) featuring software for use in data, application, database and computer system integration within and/or among enterprises, for cloud computing, cloud automation, cloud data integration, creation and integration of and connectivity to application programming interfaces (APIs), workflow automation, data migration, synchronization of data, managing, ensuring integrity of, and controlling access to data shared across cloud-computing networks, establishing and operating electronic data interchange systems, designing and deploying cloud-based applications, managing compliance with laws and regulations, and collecting and analyzing data generated by business applications; data management consulting, namely, design and implementation of computer network data hub systems; data integration services in the nature of integration of computer systems and networks, applications, data and databases; computer system analysis and programming services; software programming and design; configuration of computer hardware for others and installation and configuration of software for others; consulting services in the fields of computer software, data, application, database and computer system integration within and/or among enterprises, for cloud computing, cloud automation, cloud data integration, creation and integration of and connectivity to application programming interfaces (APIs), workflow automation, data migration, synchronization of data, managing, ensuring integrity of, and controlling access to data shared across cloud-computing networks, establishing and operating electronic data interchange systems, designing and deploying cloud-based applications; computer services, namely, creating an on-line community for registered users to participate in discussions, get feedback from their peers, form virtual communities, engage in social networking, collaborate, ask technical questions, obtain training and technical support, all in the fields of information technology, technology support, software as a service (SAAS), cloud computing, application development, computer network management and data and application integration within and/or among enterprises
Educational services, namely, conducting conferences and training in the fields of data, application, database and computer system integration within and/or among enterprises, cloud computing, cloud automation, cloud data integration, creation and integration of and connectivity to application programming interfaces (APIs), and workflow automation; providing a website featuring blogs and non-downloadable videos and podcasts in the fields of data, application, database and computer system integration within and/or among enterprises, cloud computing, cloud automation, cloud data integration, creation and integration of and connectivity to application programming interfaces (APIs), and workflow automation; Downloadable Computer software for use in data, application, database and computer system integration within and/or among enterprises, for cloud computing, cloud automation, cloud data integration, creation and integration of and connectivity to application programming interfaces (APIs), workflow automation, data migration, synchronization of data, managing, ensuring integrity of, and controlling access to data shared across cloud-computing networks, establishing and operating electronic data interchange systems, designing and deploying cloud-based applications, managing compliance with laws and regulations, and collecting and analyzing data generated by business applications; Electronic data interchange services; Arranging and conducting business conferences in the fields of data, application, database and computer system integration within and/or among enterprises, cloud computing, cloud automation, cloud data integration, creation and integration of and connectivity to application programming interfaces (APIs), and workflow automation; Platform as a service (PAAS) and software as a service (SAAS) featuring software for use in data, application, database and computer system integration within and/or among enterprises, for cloud computing, cloud automation, cloud data integration, creation and integration of and connectivity to application programming interfaces (APIs), workflow automation, data migration, synchronization of data, managing, ensuring integrity of, and controlling access to data shared across cloud-computing networks, establishing and operating electronic data interchange systems, designing and deploying cloud-based applications, managing compliance with laws and regulations, and collecting and analyzing data generated by business applications; data management consulting, namely, design and implementation of computer network data hub systems; data integration services in the nature of integration of computer systems and networks, applications, data and databases; computer system analysis and programming services; software programming and design; installation and configuration of computer hardware and software for others; consulting services in the fields of computer software, data, application, database and computer system integration within and/or among enterprises, for cloud computing, cloud automation, cloud data integration, creation and integration of and connectivity to application programming interfaces (APIs), workflow automation, data migration, synchronization of data, managing, ensuring integrity of, and controlling access to data shared across cloud-computing networks, establishing and operating electronic data interchange systems, designing and deploying cloud-based applications; computer services, namely, creating an on-line community for registered users to participate in discussions, get feedback from their peers, form virtual communities, engage in social networking, collaborate, ask technical questions, obtain training and technical support, all in the fields of information technology, technology support, software as a service (SAAS), cloud computing, application development, computer network management and data and application integration within and/or among enterprises
computer software, namely, computer software for use in data and application integration within and/or among enterprises; online software services, namely, providing temporary use via global and/or local communications networks of non-downloadable computer software for use in data and application integration within and/or among enterprises; computer programming services, namely, development of computer software for use in data and application integration within and/or among enterprises; consulting in the field of data and application integration within and/or among enterprises
Downloadable computer software and firmware for user authentication services using risk-based multifactor authentication; Downloadable computer software and firmware for user authentication services using biometrics; Downloadable computer software and firmware for user authentication services using device binding; Downloadable computer software and firmware for user authentication services using behavioral analysis; Downloadable computer software and firmware for user authentication services using third-party authenticators; Downloadable computer software and firmware for user authentication services using combinations of methods of authentication, including but not necessarily limited to risk-based multifactor authentication, biometrics, device binding, behavioral analysis and/or third-party authenticators; Downloadable computer software and firmware to orchestrate and manage implementation of user authentication services; Downloadable computer software and firmware for secure single sign on protocols for user and application authentication services; Downloadable computer software and firmware for identity management software for the authentication and authorization of individuals and other computer software, namely, computer programs that provide access to other computer software applications, web-based, mobile and legacy applications, user directories, user databases, devices, and Internet-of-things (IoT) devices, all for security purposes; Downloadable computer software and firmware to enable and manage access by permitted individuals and computer software programs to other computer software applications, web-based, mobile and legacy applications, user directories, user databases, devices, and Internet-of-things (IoT) devices, all for security purposes; Downloadable computer software and firmware to enable and manage authentication and authorization of permitted individuals and computer software programs to other computer software applications, web-based, mobile and legacy applications, user directories user databases, devices, and Internet-of-things (IoT) devices, all for security purposes; Downloadable computer software and firmware for authentication and authorization that enables the creation and management of user directories within the software platform, and that enables interoperability with external user directories; Downloadable computer software and firmware for authentication without use of a password, namely, through biometric authentication, email authentication, SMS authentication, and mobile device authentication; Downloadable computer software and firmware that provides anomaly protection for user and computer program authentication and authorization, namely, computer software that helps identify anomalies during the authentication and authorization processes; Downloadable computer software and firmware for identity management that enables interoperability of identity management functionality with most other computer software applications without code modification of third-party software applications; Downloadable computer software and firmware that provides standards, processes and methods in the field of identity management, namely, the authentication and authorization of individual users and of computer software programs, including machine authentication; Downloadable computer software and firmware that provides verification and authentication of digital certificates, tokens, sessions, browser or website cookies and information in the nature of personal identification and credentials; Downloadable computer software and firmware for monitoring of computers for security purposes, namely, computer security services for protecting data and information from unauthorized access; Downloadable computer software and firmware for an OAUTH resource server, storage of passwords, storage of private encryption keys and secure transport of encrypted tokens; Downloadable computer software for the monitoring of password and security compliance; Downloadable computer software for the storage of verified and unverified categories of digital identity data including but not limited to healthcare records, vaccine passports, business cards, event tickets, nfc badges, government issued Id and credit card data; Downloadable computer software for codeless integration of bot detection and prevention techniques for web and mobile applications; Downloadable computer software service for direct integration of bot detection and prevention techniques for web and mobile applications; Downloadable computer software service for machine learning for authentication and transactional analysis | Platform as a Service (PaaS) services featuring computer software, namely, software for user authentication services using risk-based multifactor authentication; Platform as a Service (PaaS) services featuring computer software, namely, software for user authentication services using biometrics; Platform as a Service (PaaS) services featuring computer software, namely, software for user authentication services using device binding; Platform as a Service (PaaS) services featuring computer software, namely, software for user authentication services using behavioral analysis; Platform as a Service (PaaS) services featuring computer software, namely, software for user authentication services using third-party authenticators; Platform as a Service (PaaS) services featuring computer software, namely, software for user authentication services using combinations of methods of authentication, including but not necessarily limited to risk-based multifactor authentication, biometrics, device binding, behavioral analysis, and/or third-party authenticators; Platform as a Service (PaaS) services featuring computer software, namely, software to orchestrate and manage implementation of user authentication services; Platform as a Service (PaaS) services featuring secure single sign on protocols for user and application authentication services; Platform as a Service (PaaS) services featuring computer software, namely, software for identity management software for the authentication and authorization of individuals and other computer software, namely, computer programs that provide access to other computer software applications, web-based, mobile and legacy applications, user directories, user databases and devices, all for security purposes; Platform as a Service (PaaS) services featuring computer software, namely, software to enable and manage access by permitted individuals and computer software programs to other computer software applications, web-based, mobile and legacy applications, user directories, user databases, devices, and Internet-of-things (IoT) devices, all for security purposes; Platform as a Service (PaaS) services featuring computer software, namely, software to enable and manage authentication and authorization of permitted individuals and computer software programs to other computer software applications, web-based, mobile and legacy applications, user directories, user databases and devices, all for security purposes; Platform as a Service (PaaS) services featuring computer software, namely, software for authentication and authorization that enables the creation and management of user directories within the software platform and that enables interoperability with external user directories; Platform as a Service (PaaS) services featuring computer software, namely, software for authentication without use of a password, namely, through biometric authentication, email authentication, SMS authentication, and mobile device authentication, within mobile applications; Platform as a Service (PaaS) services featuring computer software, namely, software that provides anomaly protection for user and computer program authentication and authorization, namely, computer software that helps identify anomalies during the authentication and authorization processes; Platform as a Service (PaaS) services featuring computer software, namely, software for identity management that enables interoperability of identity management functionality with most other computer software applications, without code modification of third-party software applications; Platform as a Service (PaaS) services featuring computer software, namely, software that provides standards, processes, and methods in the field of identity management, namely, the authentication and authorization of individual users and computer software programs, including machine authentication; Platform as a Service (PaaS) services featuring computer software, namely, software that provides verification and authentication of digital certificates, tokens, sessions, browser or website cookies and information in the nature of personal identification and credentials; Platform as a Service (PaaS) services featuring computer software, namely, software for monitoring of computers for security purposes, namely, computer security services for protecting data and information from unauthorized access; Platform as a Service (PaaS) services featuring firmware for an OAUTH resource server, storage of passwords, storage of private encryption keys and secure transport of encrypted tokens; Platform as a Service (PaaS) services featuring the monitoring of password and security compliance; Platform as a Service (PaaS) services featuring the storage of verified and unverified categories of digital identity data including but not limited to healthcare records, vaccine passports, business cards, event tickets, nfc badges, government issued Id and credit card data; Platform as a Service (PaaS) services featuring codeless integration of bot detection and prevention techniques for web and mobile applications; Platform as a Service (PaaS) services featuring direct integration of bot detection and prevention techniques for web and mobile applications; Platform as a Service (PaaS) services featuring machine learning for authentication and transactional analysis; Software as a Service (SaaS) services featuring computer software, namely, software for user authentication services using risk-based multifactor authentication; Software as a Service (SaaS) services featuring computer software, namely, software for user authentication services using biometrics; Software as a Service (SaaS) services featuring computer software, namely, software for user authentication services using device binding; Software as a Service (SaaS) services featuring computer software, namely, software for user authentication services using behavioral analysis; Software as a Service (SaaS) services featuring computer software, namely, software for user authentication services using third-party authenticators; Software as a Service (SaaS) services featuring computer software, namely, software for user authentication services using combinations of methods of authentication, including but not necessarily limited to risk-based multifactor authentication, biometrics, device binding, behavioral analysis, and/or third-party authenticators; Software as a Service (SaaS) services featuring computer software, namely, software to orchestrate and manage implementation of user authentication services; Software as a Service (SaaS) services featuring secure single sign on protocols for user and application authentication services; Software as a Service (SaaS) services featuring computer software, namely, software for identity management software for the authentication and authorization of individuals and other computer software, namely, computer programs that provide access to other computer software applications, web-based, mobile and legacy applications, user directories, user databases and devices, all for security purposes; Software as a Service (SaaS) services featuring computer software, namely, software to enable and manage access by permitted individuals and computer software programs to other computer software applications, web-based, mobile and legacy applications, user directories, user databases, devices, and Internet-of-things (IoT) devices, all for security purposes; Software as a Service (SaaS) services featuring computer software, namely, software to enable and manage authentication and authorization of permitted individuals and computer software programs to other computer software applications, web-based, mobile and legacy applications, user directories, user databases and devices, all for security purposes; Software as a Service (SaaS) services featuring computer software, namely, software for authentication and authorization that enables the creation and management of user directories within the software platform and that enables interoperability with external user directories; Software as a Service (SaaS) services featuring computer software, namely, software for authentication without use of a password, namely, through biometric authentication, email authentication, SMS authentication, and mobile device authentication, within mobile applications; Software as a Service (SaaS) services featuring computer software, namely, software that provides anomaly protection for user and computer program authentication and authorization, namely, computer software that helps identify anomalies during the authentication and authorization processes; Software as a Service (SaaS) services featuring computer software, namely, software for identity management that enables interoperability of identity management functionality with most other computer software applications, without code modification of third-party software applications; Software as a Service (SaaS) services featuring computer software, namely, software that provides standards, processes, and methods in the field of identity management, namely, the authentication and authorization of individual users and computer software programs, including machine authentication; Software as a Service (SaaS) services featuring computer software, namely, software that provides verification and authentication of digital certificates, tokens, sessions, browser or website cookies and information in the nature of personal identification and credentials; Software as a Service (SaaS) services featuring computer software, namely, software for monitoring of computers for security purposes, namely, computer security services for protecting data and information from unauthorized access; Software as a Service (SaaS) services featuring firmware for an OAUTH resource server, storage of passwords, storage of private encryption keys and secure transport of encrypted tokens; Software as a Service (SaaS) services featuring the monitoring of password and security compliance; Software as a Service (SaaS) services featuring the storage of verified and unverified categories of digital identity data including but not limited to healthcare records, vaccine passports, business cards, event tickets, nfc badges, government issued Id and credit card data; Software as a Service (SaaS) services featuring codeless integration of bot detection and prevention techniques for web and mobile applications; Software as a Service (SaaS) services featuring direct integration of bot detection and prevention techniques for web and mobile applications; Software as a Service (SaaS) services featuring machine learning for authentication and transactional analysis
Balustrades of metal; Bars for metal railings; Fences of metal; Gates of metal; Locks of metal, other than electric; Metal cages for wild animals; Metal chains; Palings of metal; Small items of metal hardware, namely, high security locks and sheet metal plates primarily for the casino and gaming industry; Stakes of metal for plants or trees
Class 018: Crossbody bags; Umbrellas; Backpacks for pets; Pet products, namely, pet restraining devices consisting of leashes, collars, harnesses, restraining straps, and leashes with locking devices; Pet hair ornaments; Garments for pets; Collars for pets; Pet collars; Raincoats for pet dogs; Capes for pets; Travelling trunks; Riding saddles; Diaper bags; Pet harnesses; Purses
Downloadable computer software platforms for playing games of chance on any computerized platform to allow users to win rewards; Downloadable computer software platforms for authorising access to databases for playing games on any computerized platform to allow users win rewards; Downloadable collaborative computer software in the field of gaming, namely, software development tools for the creation of mobile internet gaming applications and client interfaces for playing games on any computerized platform to allow users to win rewards; Telemarketing; Administrative processing of purchase orders; Advertising, marketing and promotion services; Assistance, advisory services and consultancy with regard to business organization; Assistance, advisory services and consultancy with regard to business planning, business analysis, business management, business organization, marketing and customer analysis; Business administration assistance; Business administration of consumer loyalty programs; Business advisory and consultancy services relating to export, export services, export promotion information and services; Business advisory services, consultancy and information; Customer loyalty services and customer club services, for commercial, promotional and/or advertising purposes; Negotiation and conclusion of commercial transactions for third parties; Organization of events, exhibitions, fairs and shows for commercial, promotional and advertising purposes; Outsourcing services; Promoting the goods and services of others by means of the issuance of loyalty rewards cards; Sales demonstration; Sales promotion for others; Computer programming for Internet platforms and software design of single sign-on software; Computer software design of single sign-on software, computer programming for Internet gaming platforms; updating of computer software for playing games on any computerized platform to allow users to win rewards; Hosting communication software platforms on the internet for virtual reality-based work collaboration for the creation of mobile internet gaming applications and client interfaces for playing games on any computerized platform to allow users to win rewards; Developing computer single sign-on software
Card games; party games; parlor games; electronic interactive card games for use with external monitor; electronic game equipment with a watch function; hand-held units for playing electronic games
Electronic gaming machines, namely, devices which accept a wager; Gaming equipment, namely, slot machines with or without video output; Gaming machines; Gaming machines for gambling; Gaming machines for gambling including slot machines or video lottery terminals; Gaming machines that generate or display wager outcomes; Gaming machines, namely, devices which accept a wager; Machines for playing games of chance; Slot machines; Gaming devices, namely, gaming machines, slot machines, bingo machines, with or without video output; Reconfigurable casino gaming machines and recorded operational game software therefor sold as a unit
Creating an on-line community for registered users, including general investors, financial advisors, insurance brokers, startups, small businesses and venture capitalists for the purpose of sharing of educational financial content and news, and to conduct informative discussions via text, documents, photos, videos, and streaming media, with access to learning resources via web-based interfaces and mobile applications.
Dietary supplements; Enzyme dietary supplements; Mineral dietary supplements; Dietary supplements for human consumption; Herbal supplements; Whey protein dietary supplements; Vitamin supplements; Vitamin and mineral supplements; Amino acids for nutritional purposes; Dietary supplements consisting primarily of creatine; Dietary supplements also containing creatine
Class 009: health care access device; personal data access device; Class 010: health care access device for medical purposes; personal access device for medical purposes
Class 041: Rental of electronic baseball training simulators and pitching machines, ball collection machines/apparatus, ball feeding systems being part of pitching machines, batting cage nets, practice nets, pitching screens; rental of electronic sports training simulators
Arranging of contests led by a mascot; [ Entertainment in the nature of professional football games; ] Entertainment services in the nature of live visual and audio performances by a professional football team mascot; Entertainment services in the nature of live professional football team mascot performances; Entertainment services, namely, arranging and conducting of competitions for games of skill and chance and spirit competitions for sports fans led by or featuring a team mascot; Entertainment services, namely, conducting contests led by or featuring a team mascot; Fan clubs featuring a team mascot; [ Organization of sports events in the field of professional football; ] Organizing community sporting and cultural events led by or featuring a team mascot; Organizing exhibitions for the entertainment of football fans featuring a team mascot; [ Organizing sporting events, namely, professional football; Providing information relating to sports and sporting events featuring a professional football team mascot; Providing on-line newsletters in the field of professional football ; Providing online newsletters in the field of professional football via e-mail ]