Use GleanMark for a free trademark search powered by millions of USPTO records. See similar trademarks, filter results, and sign up for active monitoring.
Garments of outer clothing for men and women, namely shirts, blouses, jackets, trousers, jeans, skirts, sweaters, hats, scarves, pullovers, suits, dresses, jerseys, ties, and coats
Computer virus protection services; Computer security consultancy in the field of virus scanning software; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Online computer services, namely, providing spam filtering services to protect websites and online applications from receiving unsolicited messages; Providing temporary use of non-downloadable computer anti-virus software; Rental of humanoid robots with artificial intelligence; Rental of laboratory robots; Technical consulting in the field of monitoring technological functions of humanoid robots with artificial intelligence
Business marketing services, marketing advisory services, business marketing strategy development and business consulting services; brand imagery consulting services; brand concept and brand development services for corporate clients; providing marketing consulting in the field of social media, blogging, company branding, marketing content creation and website content; advertising and marketing services provided by means of indirect methods of marketing communications, namely, social media, search engine marketing, inquiry marketing, internet marketing, mobile marketing, blogging and other forms of passive, sharable or viral communications channels | Graphic design services; website design and development for others; creating and maintaining blogs for others
Mechanical and electrical interconnect systems comprised of computer hardware and electronic cables for electronic signal transmission to be used with keyboards and displays
Computer technology support services, namely, help desk services; Technical support, namely, monitoring technological functions of computer network systems; Technology advice provided to Internet users by means of a support hotline; Technical support services, namely, troubleshooting of computer software problems; Technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Technical support services, namely, installation, administration, and troubleshooting of web and database applications; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems
Humidifiers; Air conditioners; Air purifiers; Ice cube making machines; Portable air conditioners; Portable electric fans; Portable refrigerators; Portable utility lights; Radiators, electric; Water purifying apparatus
Inverters; Batteries, electric; Chargers for electric batteries; Charging appliances for rechargeable equipment; Charging stations for electric vehicles; Electric cables, wires, conductors and connection fittings therefor; Mobile phone cases featuring rechargeable batteries; Photovoltaic cells; Renewable battery system to provide backup power; Solar panels for the production of electricity
Class 007: Weeding machines; Electronically and power-operated tools, namely, pullers and components therefor, nut splitters, extractors, separators, spanners and coil spring compressors; Electric ice crushers; Automatic electrostatic-paint sprayers; Electric pumps; Drycleaning machines; Electric juicers; Power-operated coffee grinders; Electric vacuum cleaners; Electric food blenders; Dish washing machines; Solar-powered electricity generators; Can openers, electric; Dishwashers; Electric washing machines for household purposes
Computer services, namely, filtering of unwanted email; online computer services, namely, providing spam filtering services to protect websites and online applications from receiving unsolicited messages; development of security systems and contingency planning for information systems; computer technology support services, namely, help desk services; computer technical support services, namely, service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; computer technical support services, namely, selection, installation, maintenance, and operation anti-virus software for others
Educational services, namely, providing training, classes, workshops, seminars, and internships in the fields of information technology, computer science, computer programming, cybersecurity, information security, big data, data analytics, software development, computer coding, web design, web development, application development, mobile application and data mining
Class 009: Sunglasses; Sunglasses and spectacles; Eyewear, namely, sunglasses, eyeglasses and ophthalmic frames and cases therefor; Eyewear, namely, lightweight, full coverage single lense sunglasses; Floatable sunglasses; Frames for spectacles and sunglasses
Entertainment services, namely, providing facilities for indoor games, namely, for wireless sword fighting games and competitions; entertainment information; organization of indoor and outdoor sporting events in the nature of large wireless sword fighting tag game tournaments; games equipment rental; club services for historical European martial arts clubs, namely, sword fighting training and organizing sword fighting competitions; physical education; practical training and educational demonstrations in the field of fitness workouts, namely, physical exercises in the field of fencing, historical European martial arts, kendo, and aikido, all of which incorporate training in the use of a sword; party planning; organization of indoor sword-fighting competitions and tournaments, both single player and team competitions and tournaments; organization of sports competitions; providing sports facilities; rental of sports equipment, except vehicles; entertainment services in the nature of organizing social entertainment events; Toy swords used for playing wireless electronic tag games with physical contact, said swords used for playing in competitive sporting events and engaging in recreational activities; "TAG"
self-contained saunas; self-contained spas in the nature of environmentally controlled saunas having one or more of ultraviolet light, infrared light, visible light, heated air, cooled air, steam, shower, aromatherapy, enriched oxygen, vibration, gemstones, crystals and internet connectivity; infrared saunas; infrared exercise rooms in the nature of infrared saunas that can be used for exercise that include one or more of gemstones, crystals and internet connectivity; mind-wellness meditation spa in the nature of environmentally controlled saunas having one or more of ultraviolet light, infrared light, visible light, heated air, cooled air, steam, shower, aromatherapy, enriched oxygen, vibration, gemstones, crystals and internet connectivity
Action figure toys; Action figures; Doll clothing; Dolls and accessories therefor; Dolls and doll accessories, namely, clothing for dolls, doll rooms, doll beds, doll houses, toy fabrics and linens for dolls and strollers for dolls; Play sets for action figures; Plush toys; PVC toy figures; Toy action figures and accessories therefor; Toy models; Vinyl dolls
Dishwashers; Cordless vacuum cleaners; Electric egg beaters; Electric food blenders; Electric juicers; Electric meat grinders; Electric powered soldering irons; Electric vacuum cleaners; Hand-held vacuum cleaners; Vacuum packaging machines
Cameras; Earphones; Headphones; Alarm monitoring systems; Batteries and battery chargers; Battery chargers; Data cables; USB cables; USB cables for cellphones; Video monitors
Arranging and conducting of conferences in the field of cybersecurity and data in agriculture, aquaculture and the environment; Arranging and conducting of conferences, congresses and symposiums in the field of cybersecurity and data in agriculture, aquaculture and the environment; Arranging and conducting of educational conferences in the field of cybersecurity and data in agriculture, aquaculture and the environment; Conducting of business conferences in the field of cybersecurity and data in agriculture, aquaculture and the environment; Conducting of educational conferences in the field of cybersecurity and data in agriculture, aquaculture and the environment; Consultancy relating to arranging and conducting of conferences; Educational services, namely, conducting classes, seminars, conferences, and workshops in the field of cybersecurity and data in agriculture, aquaculture and the environment and distribution of course and educational materials in connection therewith
Electronic blasting systems comprised of remote controlled wireless electronic transmitter and receiver devices and programmable electronic detonators used to detonate explosives; Electronic programmable blasting control devices and electronic blasting devices, namely, electronic controllers for detonators; downloadable computer software, namely, software for the use and operation of detonators or other instruments and tools used to ignite explosives or initiate explosive blasts and explosions | Electronic explosive blasting systems comprised of remote controlled wireless electronic delay detonators; devices initiating explosives, namely, detonators; Blasting systems for use in the blast hole comprised of blasting equipment in the nature of electronic delay detonators, detonator receiver antenna and booster unit, near field communication (NFC) programming tagger, transmitter antenna for transmitting electronic signals and blast control unit
3D scanners; Accumulators and batteries; Apparatus for converting electronic radiation to electrical energy, namely, photovoltaic roofing members; Apparatus for converting electronic radiation to electrical energy, namely, photovoltaic solar hybrid modules; Cameras; Cell phones; Computer hardware; Downloadable computer software, namely, software development tools for the creation of mobile internet applications and client interfaces; Photovoltaic cells and modules; Portable computers; Semi-conductors; Semiconductor chips; Semiconductor devices; Semiconductor testing apparatus; Semiconductor wafers
Incident response services, namely, consultancy for mitigating damage, in the nature of maintenance and repair of computer networks, from computer security breaches; Computer network security monitoring services, namely, monitoring computer systems and computer network systems for security purposes; Cybersecurity services, namely, restricting access to and by computer software and networks to and of undesired websites, media, software, individuals, facilities and malicious attackers; Incident response services, namely, technical support and consulting in the nature of diagnosing and investigating damage from computer security breaches; Malware analysis services, namely, technical support in the nature of remote and on-site troubleshooting for diagnosing intrusion incidents for computer hosts and computer network devices; software as a service (SaaS) for gathering threat intelligence designed to detect and defend against network security intrusions and investigate existing network security intrusions
Class 042: Software as a service (SAAS) services, namely, hosting software for use by others for detecting and containing data breaches, monitoring computer systems to detect cybersecurity incidents, and restricting unauthorized access to computer systems, for use by Defense Industrial Base (DIB) companies
Providing online non-downloadable software for analyzing and preventing cyber threats in the fields of computer security; providing online non-downloadable computer software for provide real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; computer security consultancy; computer security consultancy in the nature of providing technical recommendations and advice in the fields of internet website, network, and computer data security; computer security consultation, namely, policy assessment; providing online non-downloadable computer software for providing real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; computer support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring vulnerability of networks, monitoring intrusions in networks; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; cybersecurity diagnostic services, namely, computer security threat analysis for protecting data and network access; cybersecurity computer software maintenance services; cybersecurity, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, detecting threats and intrusions, preventing intrusions; computer security consultation, namely, cybersecurity policy assessment; cybersecurity support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; data security computer software maintenance services; data security consultation, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; computer security consultation, namely, data security policy assessment; data security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; computer consultation, services, namely, endpoint detection and response to software and hardware threats; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; firewall security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; firewall computer software security maintenance services; firewall security consultation, namely, security threat analysis for protecting data; computer security, namely, firewall security policy assessment; firewall security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer hardware diagnostic services; hardware security, namely, maintenance of computer hardware security systems; computer security consultation, namely, hardware security policy assessment; Technical support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; hardware vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; information technology diagnostic services, namely, computer security threat analysis for protecting data; information technology maintenance services, namely, computer software maintenance services; information technology security consultation, namely, security threat analysis for protecting data; computer security consultation, namely, information technology security policy assessment; information technology support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance of computer software relating to computer security and prevention of computer risks; computer services, namely, managed detection and response of cyber intrusions and threats; managed security service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software, and web sites, of others in the fields of cybersecurity; computer network diagnostic services; computer network security consultation, namely, analysis for protecting data, administering digital credentials, enforcing network policies; computer network security consultation, namely, policy assessment; computer network support services, namely, installation, administration, and troubleshooting of cybersecurity applications; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; password diagnostic services; computer software and hardware password maintenance services; computer password security, namely, providing authentication, issuance, validation and revocation of digital credentials; password support services, namely, providing help desk services to retrieve computer software and hardware passwords; password vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer security consultancy; security policy assessment, namely, data security consultancy; support services, namely, troubleshooting of computer software problems, troubleshooting of information technology (IT) security problems; testing of computer software and hardware security systems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; penetration testing for computer security threats for computer hardware and software; providing temporary use of online non-downloadable software for information technology (IT) security operations center management; software diagnostic services, namely, computer security threat analysis for protecting data; computer software maintenance services; information technology (IT) consultation for software security policy assessments, namely, computer security threat analysis for protecting data; software support services, namely, troubleshooting of computer software problems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability
Education Services in the nature of a competency-based learning platform in the nature of classes, workshops and seminars that enables learners to gain critical training and on-the-job training experience using methodologies, technologies, processes, and approaches in the fields of live-fire, real world monitoring of critical technology assets, namely, information technology (IT) security; Simulation-based training services in the field of cyber defense testing, namely, cyberwarfare exercises and information technology (IT) security operational training using sanitized data streams and structures; Training Services, namely, a live-fire Security Operations Center (SOC) that will provide 24x7x365 workforce development opportunities in the nature of classes, workshops and seminars by leveraging Security Clinic structures in the nature of monitoring, detection, response services for clientele
Class 009: Recorded computer software using artificial intelligence (AI) for cybersecurity risk management, continuous monitoring, and automated compliance with NIST Special Publication 800-53, NIST Special Publication 800-171, and FedRAMP requirements.