Use GleanMark for a free trademark search powered by millions of USPTO records. See similar trademarks, filter results, and sign up for active monitoring.
Providing supply chain and transportation information services relating to the tracking of goods, freight and cargo provided on-line via global computer networks from a computer or the Internet | Providing information in the field of delivery and pick-up of goods, freight and cargo provided on-line via global computer networks from a computer or the Internet
Downloadable software for location-based commerce and reward distribution; Providing on-line non-downloadable software for merchant analytics and reward campaign management
Computer software for developing and deploying business analysis graphics from commercial databases, business information systems, business applications and e-commerce systems
Criminal investigation services; expert witness services in legal matters in the field of criminal investigations and litigation; providing intelligence and information to local, state, and federal law enforcement agencies relating to criminal activity and investigations; criminal investigation services for law enforcement agencies, namely, providing real-time criminal intelligence from Internet sources, open source intelligence, social media, deep web, dark net, online channels, open source platforms, websites, and URLs and domain names; criminal investigation services for law enforcement agencies, namely, using artificial intelligence to identify and analyze information from Internet sources, open source intelligence, social media, deep web, dark net, online channels, open source platforms, websites, and URLs and domain names for use in criminal investigations
Providing non-downloadable digital music from the internet; production of music; songwriting; Tee-shirts; clothing, namely, shirts and pants; headwear; footwear other than special footwear for sports
Scales; Anti-theft alarms, other than for vehicles; Burglar alarms; Electric door bells; Electric door chimes; Electric locks; Electric outlet covers; Electric plugs; Electric switches
Dehumidifiers; Humidifiers; Multicookers; Refrigerators; Air fryers; Air sterilizers; Anion generating humidifiers; Electric bladeless fans; Electric bread toasters; Electric coffee machines; Electric fryers; Electric kettles; Humidifiers for household use; Ice-cream making machines; Ice machines; USB-powered humidifiers for household use; Water purifying apparatus and machines
Providing medical equipment data and data modeling services, namely, data automation and data collection services in the field of medical equipment using proprietary software for use in creating virtual versions of medical devices and software, and for use in connection with initial device installation, device re-installation, and replacement of system components; Design of computer simulated models for use in creating virtual versions of medical devices and medical device data; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems, and providing backup computer programs and virtual versions of computer hardware and software applications in connection with creating virtual versions of medical device, software and associated data, and with medical device installation, device re-installation, and replacement of system components; Technology consultation services regarding computer and scientific technologies used in the field of medical and surgical equipment
Supply chain management in the field of information technology | Installation, maintenance, repair and disposal of computer hardware | Information technology consultation; computer systems network integration; installation, maintenance and repair of computer software; leasing of computer hardware and computer software; engineering services to government agencies and commercial businesses
Class 009: Recorded computer software using artificial intelligence (AI) for cybersecurity risk management, continuous monitoring, and automated compliance with NIST Special Publication 800-53, NIST Special Publication 800-171, and FedRAMP requirements.
Class 042: Software as a service (SAAS) services, namely, hosting software for use by others for detecting and containing data breaches, monitoring computer systems to detect cybersecurity incidents, and restricting unauthorized access to computer systems, for use by Defense Industrial Base (DIB) companies
Providing online non-downloadable software for analyzing and preventing cyber threats in the fields of computer security; providing online non-downloadable computer software for provide real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; computer security consultancy; computer security consultancy in the nature of providing technical recommendations and advice in the fields of internet website, network, and computer data security; computer security consultation, namely, policy assessment; providing online non-downloadable computer software for providing real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; computer support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring vulnerability of networks, monitoring intrusions in networks; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; cybersecurity diagnostic services, namely, computer security threat analysis for protecting data and network access; cybersecurity computer software maintenance services; cybersecurity, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, detecting threats and intrusions, preventing intrusions; computer security consultation, namely, cybersecurity policy assessment; cybersecurity support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; data security computer software maintenance services; data security consultation, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; computer security consultation, namely, data security policy assessment; data security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; computer consultation, services, namely, endpoint detection and response to software and hardware threats; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; firewall security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; firewall computer software security maintenance services; firewall security consultation, namely, security threat analysis for protecting data; computer security, namely, firewall security policy assessment; firewall security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer hardware diagnostic services; hardware security, namely, maintenance of computer hardware security systems; computer security consultation, namely, hardware security policy assessment; Technical support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; hardware vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; information technology diagnostic services, namely, computer security threat analysis for protecting data; information technology maintenance services, namely, computer software maintenance services; information technology security consultation, namely, security threat analysis for protecting data; computer security consultation, namely, information technology security policy assessment; information technology support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance of computer software relating to computer security and prevention of computer risks; computer services, namely, managed detection and response of cyber intrusions and threats; managed security service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software, and web sites, of others in the fields of cybersecurity; computer network diagnostic services; computer network security consultation, namely, analysis for protecting data, administering digital credentials, enforcing network policies; computer network security consultation, namely, policy assessment; computer network support services, namely, installation, administration, and troubleshooting of cybersecurity applications; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; password diagnostic services; computer software and hardware password maintenance services; computer password security, namely, providing authentication, issuance, validation and revocation of digital credentials; password support services, namely, providing help desk services to retrieve computer software and hardware passwords; password vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer security consultancy; security policy assessment, namely, data security consultancy; support services, namely, troubleshooting of computer software problems, troubleshooting of information technology (IT) security problems; testing of computer software and hardware security systems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; penetration testing for computer security threats for computer hardware and software; providing temporary use of online non-downloadable software for information technology (IT) security operations center management; software diagnostic services, namely, computer security threat analysis for protecting data; computer software maintenance services; information technology (IT) consultation for software security policy assessments, namely, computer security threat analysis for protecting data; software support services, namely, troubleshooting of computer software problems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability
Education Services in the nature of a competency-based learning platform in the nature of classes, workshops and seminars that enables learners to gain critical training and on-the-job training experience using methodologies, technologies, processes, and approaches in the fields of live-fire, real world monitoring of critical technology assets, namely, information technology (IT) security; Simulation-based training services in the field of cyber defense testing, namely, cyberwarfare exercises and information technology (IT) security operational training using sanitized data streams and structures; Training Services, namely, a live-fire Security Operations Center (SOC) that will provide 24x7x365 workforce development opportunities in the nature of classes, workshops and seminars by leveraging Security Clinic structures in the nature of monitoring, detection, response services for clientele
Computer programs for computer security; computer hardware containing computer security software; cyber security computer hardware and software to protect computer networks against unauthorized intrusion, data theft, compromise, infiltration and corruption by hackers, and other risks as it relates to computer security; cyber security appliances, namely, computer hardware and software combinations for protecting computer networks against unauthorized intrusion, data theft, compromise, infiltration and corruption by hackers, and other risks relating to computer security, for providing real-time Security Information Event Management (SIEM) for satellite networks for use in providing situational awareness across network and security devices, for providing real-time monitoring and recording and built-in alerting for use in protecting against insider threats, for providing cyber security hardware and software that passes secure information across classified and unclassified network domains, and for providing computer hardware and software combinations that reverse engineer internet protocol out of an RF link; cyber security software and software incorporating algorithms for use in harden system configuration against tampering; Computer security service, namely, providing real-time Security Information Event Management (SIEM) for satellite networks for use in providing situational awareness across network and security devices
Downloadable software in the nature of a mobile application for providing and managing transportation services, namely, software for scheduling and dispatching autonomous vehicles to passengers; downloadable software in the nature of a mobile application for management of transportation rideshare and ride hailing services; downloadable computer software in the nature of a mobile application for vehicle fleet management and operations, namely, positioning, dispatching, and routing vehicles and generating and communicating related prices; downloadable mobile applications for scheduling and booking transportation and delivery services; downloadable software in the nature of a mobile application for scheduling and booking delivery of consumer goods, food, and groceries
Downloadable software in the nature of a mobile application for providing and managing transportation services, namely, software for scheduling and dispatching autonomous vehicles to passengers; downloadable software in the nature of a mobile application for management of transportation rideshare and ride hailing services; downloadable computer software in the nature of a mobile application for vehicle fleet management and operations, namely, positioning, dispatching, and routing vehicles and generating and communicating related prices; downloadable mobile applications for scheduling and booking transportation and delivery services; downloadable software in the nature of a mobile application for scheduling and booking delivery of consumer goods, food, and groceries
Model cars; toy cars; toy vehicles; toy vehicle play sets and accessories therefor; miniature toy models of vehicles, diecast toy vehicle models; scale size collector toy model vehicles; Clothing, namely, t-shirts; shirts; hats; socks; clothing jackets; sweaters; infant wear; footwear; pants; Drinkware; cups; mugs; travel mugs; water bottles sold empty; bottle openers
Model cars; toy cars; toy vehicles; toy vehicle play sets and accessories therefor; miniature toy models of vehicles, diecast toy vehicle models; scale size collector toy model vehicles; Clothing, namely, t-shirts; shirts; hats; socks; clothing jackets; sweaters; infant wear; footwear; pants; Drinkware; cups; mugs; travel mugs; water bottles sold empty; bottle openers
Transport; packaging and storage of merchandise; travel organization; providing information with respect to transport; logistics services with respect to transport; delivery of newspapers; water distribution; electricity distribution; distribution (delivery of goods); freight forwarding services; towing; garage rental; rental of garage spaces for parking; vehicle rental; taxi transport; booking of seats for travel; physical storage of electronically-stored data or documents.; Vehicles; apparatus for locomotion by land; apparatus for locomotion by air; apparatus for locomotion by sea; electric vehicles; caravans; tractors; mopeds; cycles; handling carts.
Class 035: Advertising; commercial business administration, organization and management; office functions; direct mail advertising; arranging newspaper subscriptions for third parties; arranging subscriptions to telecommunication services for third parties; accounting; photocopying services; employment agency services; business management for freelance service providers; computerized file management service; traffic optimization for websites; organization of exhibitions for commercial or advertising purposes; online advertising on a computer network; rental of advertising time on all communication media; publication of advertising texts; rental of advertising space; dissemination of advertisements; advice regarding communication (advertising); public relations; advice regarding communication (public relations); company audits (commercial analyses); commercial intermediation services.; Class 041: Education; training; entertainment; sporting and cultural activities; provision of information with respect to entertainment; provision of information with respect to education; vocational retraining; provision of recreational facilities; publication of books; lending library services; provision of non-downloadable films via video-on-demand services; production of films other than advertising films; rental of show scenery; photography services; organization of competitions (education or entertainment); organization and conducting of colloquiums; organization and conducting of conferences; organization and conducting of congresses; organization of exhibitions for cultural or educational purposes; booking of seats for shows; game services provided online from a computer network; gambling services; electronic publication of books and journals online.; Class 043: Services for providing food and beverages; temporary accommodation; bar services; catering services; hotel accommodation services; temporary accommodation reservation; day-care centers; providing campground facilities; retirement home services; pet boarding services.
Leasing of motor vehicles; transportation and storage of automobiles; transportation of passengers and goods; coordinating travel arrangements for individuals and for groups, namely, arranging time-based ridesharing services for individuals and for groups; vehicle rental services; vehicle sharing services, namely, arranging and coordinating temporary use of vehicles; transportation and delivery services, namely, monitoring, managing, and tracking of transportation of persons and delivery of goods and packages; conveyance rental and sharing services, namely, arranging and coordinating peer-to-peer vehicle sharing and rental services
Class 039: Leasing of motor vehicles; transportation and storage of automobiles; transportation of passengers and goods; coordinating travel arrangements for individuals and for groups, namely, arranging time-based ridesharing services for individuals and for groups; vehicle rental services; vehicle sharing services, namely, arranging and coordinating temporary use of motor vehicles; transportation and delivery services, namely, monitoring, locating and tracking of people, goods and packages for transportation purposes; vehicle rental and sharing services, namely, arranging and coordinating peer-to-peer vehicle sharing and rental services
Technical consulting in the field of cybersecurity risk management training; Entertainment services, namely, providing temporary use of non-downloadable video games related to cybersecurity training and learning; Providing online non-downloadable game software for playing cybersecurity learning games for employees and business owners
Class 039: Leasing of motor vehicles; transportation and storage of automobiles; transportation of passengers and goods; coordinating travel arrangements for individuals and for groups, namely, arranging time-based ridesharing services for individuals and for groups; vehicle rental services; vehicle sharing services, namely, arranging and coordinating temporary use of vehicles; transportation and delivery services, namely, monitoring, managing, and tracking of transportation of persons and delivery of goods and packages; conveyance rental and sharing services, namely, arranging and coordinating peer-to-peer vehicle sharing and rental services.
Class 028: Swings; Smart electronic toy vehicles; Smart robot toys; Stress relief balls for neck, hand, back exercise; Swing sets; Toy balance bicycles; Toy models; Toy robots; Toy scooters; Toy vehicles
Camera cases; Carrying cases for mobile computers; Cell phone cases; Clear protective covers specially adapted for personal electronic devices, namely, cell phones, tablet computers, MP3 players, and laptop computers; Computer bags; Computer carrying cases; Laptop carrying cases; Protective covers and cases for cell phones, laptops and portable media players; Protective covers and cases for tablet computers