Use GleanMark for a free trademark search powered by millions of USPTO records. See similar trademarks, filter results, and sign up for active monitoring.
Class 009: Earphones; Baby monitors; Blank USB flash drives; Car video recorders; Cases for smartphones; Chronographs for use as specialized time recording apparatuses; Computer keyboards; Computer mouse; Covers for tablet computers; Diving goggles; Electric door bells; Electrical adapters; Electronic collars to train animals
Class 025: [ Gloves; Halloween costumes and masks sold in connection therewith; ] Hats [ ; Head scarves; Headbands; Neckties; Pantyhose; Scarfs; Shawls; Socks ]
Electric toothbrush replacement handles and recharging docks sold as a unit; Electric toothbrush replacement heads; Electric toothbrushes; Electric devices for cleaning cosmetic brushes; Electric hot brushes; Electric pet brushes; Electric tooth brushes; Electrical toothbrushes; Toothbrushes, electric; Heads for electric toothbrushes; Tooth brushes, non-electric
On-line retail store services featuring beverages, elixirs, beverage mixers and additives, mushroom drops; promoting the goods and services of others by means of operating an on-line shopping mall with links to the retail web sites of others
On-line retail store services featuring glassware, barware, smoking accessories, cigarette papers and rolling papers, dietary beverage supplements, non-alcoholic beverages, electronic oral vaporizers, and cannabis-based products containing hemp-derived Cannabidiol (CBD) and/or delta-8 tetrahydrocannabinol (THC) including: herbs for smoking, smokable hemp being cigarettes containing tobacco substitutes not for medical purposes, vaporizer pod cartridges, skin care cosmetics, body lotions, scrubs, gummies, candies, snacks, nutritional supplements, drops, beverages, pet treats, and pet nutritional supplements, with none of the foregoing comprised of, or which contain, any oils, extracts or ingredients from Cannabis sativa L with a delta-9 tetrahydrocannabinol content of more than 0.3 percent on a dry weight basis; Retail book store services; Retail stores featuring glassware, barware, smoking accessories, cigarette papers and rolling papers, dietary beverage supplements, non-alcoholic beverages, electronic oral vaporizers, and cannabis-based products containing hemp-derived Cannabidiol (CBD) and/or delta-8 tetrahydrocannabinol (THC) including: herbs for smoking, smokable hemp being cigarettes containing tobacco substitutes not for medical purposes, vaporizer pod cartridges, skin care cosmetics, body lotions, scrubs, gummies, candies, snacks, nutritional supplements, drops, beverages, pet treats, and pet nutritional supplements, with none of the foregoing comprised of, or which contain, any oils, extracts or ingredients from Cannabis sativa L with a delta-9 tetrahydrocannabinol content of more than 0.3 percent on a dry weight basis; Retail gift shops; Retail store services in the field of housewares
Non-electric depilatory appliance; Non-electric depilatory device for the removal of body hair and facial hair for humans; Hair erasers being depilatory appliances for removing body hair
DOWNLOADABLE GRAPHICS APPLICATIONS COMPUTER SOFTWARE FOR GENERAL COMMERCIAL, INDUSTRIAL, ARTISTIC AND EDUCATIONAL USE AND MANUALS THEREFOR SOLD AS A UNIT
Insecticides; Air purifying preparations; Babies' napkin-pants; Bandages for dressings; Candy for medical purposes; Dietary supplements for animals; Dietetic beverages adapted for medical purposes; Dietetic foods adapted for medical use; Dietetic preparations adapted for medical purposes; Flaxseed dietary supplements; Medicated oils containing Natural Dietary Supplement; Micro-nutrient animal feed; Mineral food supplements; Nutritional supplements; Personal sexual lubricants; Powdered milk for babies; Sanitary towels; Vitamin preparations; Yeast dietary supplements; Medicated dog washes
Access control and alarm monitoring systems; Battery charge devices; Cases for smartphones; Computer peripheral devices; Covers for smartphones; Data cables; Data processing equipment, namely, couplers; Earphones; Headphones; Modems; Network routers; Portable and handheld digital electronic devices for recording, organizing, transmitting, manipulating, and reviewing text, data, image, and audio files; Smart watches; Smartglasses; Switchboards; USB hubs; Wearable activity trackers; Wireless chargers; Wireless headsets for smartphones; Wireless routers; Blank USB flash drives
Apparatus and instruments for conducting, switching, transforming, accumulating, storing, regulating or controlling the distribution or consumption of electricity; Electrical power distribution boxes; electrical power distribution blocks; uninterruptable electrical power supply devices; electrical outlet boxes; diagnostic apparatus for metering electrical installations; electric terminal blocks and boxes; electronic and electric apparatus and instruments, and parts therefor, for the production, distribution and supply of electrical energy; electric converters; current rectifiers; line voltage regulators; electrical transformers; electric resistances; electrical power distribution boards and distribution cabinets; batteries; battery chargers; electronic integrated circuit chips; printed circuit boards and printed circuit boards, namely sensor boards; electrical power distribution boards and consoles; electric and electronic piezoelectric, power, and computer switches ; electricity inverters; voltage regulators; sensors, namely digital sensors, electronic sensors; position sensors; level sensors; laser sensors; measuring sensors; magnetic sensors; temperature sensors; optical sensors; electric sensors; timing sensors; piezoelectric sensors; fuses; circuit breakers; electric meters and dosage dispensers for dispensing electricity; electrical controllers; control and information systems for electronic switches for passing to alternative power lines comprised of electric power distribution machines, computer hardware, and parts and accessories therefor; switching equipment, namely uninterruptible power supply systems and static transfer switches; high voltage switchgears; low-voltage switchgear; automatic transfer switches; static transfer switches; electrical distribution transformers; downloadable and recorded computer software and computer hardware for monitoring and managing uninterruptible power supply systems, static transfer switches, power monitor units, power distribution units, and power conditioning system and used in uninterruptible power supply systems, particularly in static transfer switches
Uninterruptible Power Systems, Electrical Power Supply Units-Namely, Uninterruptible Power Systems, Line Voltage Regulators, Inverters, Battery Chargers, and Rectifiers, and Structural Components Therefor
Class 009: Vehicle diagnostic systems for cyber security in vehicle network technologies, namely, diagnostic apparatus for the detection of computer software and network problems in vehicles; Vehicle computer systems, namely, computerized vehicle engine analyzers; Electronic componentry goods, namely, downloadable computer software and computer hardware for operating automobile communication networks, downloadable computer software for performing vehicle diagnostics in the automotive and automation industries, downloadable computer software for database management in the automotive and automation industries; Vehicle network diagnostic system, namely, diagnostic apparatus for the detection of vehicle computer network problems; Vehicle network cyber security diagnostic system, namely, diagnostic apparatus for the detection of vehicle computer network problems; Vehicle network security system, namely, diagnostic apparatus for the detection of vehicle computer network security problems; Vehicle wireless network security system, namely, diagnostic apparatus for the detection of vehicle wireless network problems; Class 041: Training in the field of cyber security in vehicle network technologies; Class 042: Technological consulting in cyber security in vehicle network technologies; Vehicle computer network diagnostic services; Vehicle security technology consultancy; Technical consultation in the fields of automotive electronics; Computer programming for others; Electronic and electrical systems design services, namely, design for others in the field of automotive electronics
Controls for industrial production machines and material handling equipment, namely, heavy-duty industrial joysticks and control grips for construction, agricultural, off-highway, forestry, marine and automation systems
Computer programs for computer security; computer hardware containing computer security software; cyber security computer hardware and software to protect computer networks against unauthorized intrusion, data theft, compromise, infiltration and corruption by hackers, and other risks as it relates to computer security; cyber security appliances, namely, computer hardware and software combinations for protecting computer networks against unauthorized intrusion, data theft, compromise, infiltration and corruption by hackers, and other risks relating to computer security, for providing real-time Security Information Event Management (SIEM) for satellite networks for use in providing situational awareness across network and security devices, for providing real-time monitoring and recording and built-in alerting for use in protecting against insider threats, for providing cyber security hardware and software that passes secure information across classified and unclassified network domains, and for providing computer hardware and software combinations that reverse engineer internet protocol out of an RF link; cyber security software and software incorporating algorithms for use in harden system configuration against tampering; Computer security service, namely, providing real-time Security Information Event Management (SIEM) for satellite networks for use in providing situational awareness across network and security devices
Model cars; toy cars; toy vehicles; toy vehicle play sets and accessories therefor; miniature toy models of vehicles, diecast toy vehicle models; scale size collector toy model vehicles; Clothing, namely, t-shirts; shirts; hats; socks; clothing jackets; sweaters; infant wear; footwear; pants; Drinkware; cups; mugs; travel mugs; water bottles sold empty; bottle openers
Model cars; toy cars; toy vehicles; toy vehicle play sets and accessories therefor; miniature toy models of vehicles, diecast toy vehicle models; scale size collector toy model vehicles; Clothing, namely, t-shirts; shirts; hats; socks; clothing jackets; sweaters; infant wear; footwear; pants; Drinkware; cups; mugs; travel mugs; water bottles sold empty; bottle openers
Software as a service (saas) services featuring software for detecting, and protecting against, cyber-attacks; Software as a service (saas) services for managing computer security and endpoint security
Computer software for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; computer software for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; computer software for managing computer network endpoint security and predicting and monitoring security threats to computer networks; computer software for preventing unauthorized access to computers and computer networks | Conducting seminars and conferences in the field of cyber security; educational services, namely, providing educational speakers in the field of cyber security | Software as a service (SAAS) services featuring software for detecting, and protecting against, cyber-attacks; Software as a service (SAAS) services for managing computer security and endpoint security; computer security services in the nature of monitoring, analysis and reporting, and threat hunting for protecting data and information from unauthorized access; computer security threat analysis for protecting data; computer security consultancy; Computer security consultancy, namely, in person consultation in the field of cybersecurity and on the implementation and ongoing use of cybersecurity software; software as a service (SAAS) services for use in threat prevention, detection, investigation, response, remediation and analysis for computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; software as a service (SAAS) services for preventing viruses and unauthorized access to computers, computer systems, servers, computer networks, endpoints, mobile devices, and internet of things (IoT) enabled devices; software as a service (SAAS) services for predicting and monitoring security threats to computer networks; software as a service (SAAS) services for preventing unauthorized access to computers and computer networks; software as a service (SAAS) services for data analytics
Security analytics as a service, namely, computer security threat analysis for protecting data; cyber security services, namely, providing computer security information and orchestrating computer security by restricting unauthorized access to hard drives, computer servers, computer networks, websites; cyber security consultancy and advisory services, namely, computer security consultancy; computer defense, namely, monitoring of computer network systems for unauthorized access and notification of related events and alerts; cyber security protection, namely, providing computer security consultation on defensive and offensive techniques, approaches, and strategies that users may adopt to secure computer systems; protection from data loss and protection from data leaks, namely, detecting and alerting for anomalous behavior; analytics as a service, namely, providing computer security information and orchestrating computer security by restricting unauthorized access to hard drives, computer servers, computer networks, websites, all of the foregoing provided through security information and event management (SIEM), user and entity behavior analytics (UEBA), and/or security orchestration, automation and response (SOAR) solutions
Providing internet-based education and information services related to information risk management, namely, providing on-line classes in the field of information technology and information security risk management, fraud prevention, data breach prevention and response, and compliance, privacy and security technology all for information security and risk management professionals
Air exchangers for cleaning and purifying air; Air purification units; Air purifiers; Air purifiers for household purposes; Air purifying apparatus and machines; Air purifying units for household use; Filters for air purifiers; "EGG"
Communications and conferencing services, namely, providing telephone, video and internet communications services and equipment for telephone, video and internet conferencing; communication services, namely, transmitting and streaming voice, messages, data, documents, signals, images, video, digital media content, and audio, visual, and audiovisual materials via computers, electronic devices, communications networks, information services networks, data networks, local computer networks, global computer networks, and the internet; providing access and communications connections to multinational telecommunication networks; instant messaging services; interactive delivery of video over digital networks; providing access and communications connections to communications via telecommunication networks; providing access and communications connections to local computer networks, global computer networks, and the internet; providing voice communication services via the internet; transmission of digital media content, audio, visual, and audiovisual materials from web cams, video cameras, or mobile phones, all featuring live or recorded materials; voice over internet protocol (VOIP) services; audio conferencing services; network conferencing services; teleconferencing services; telephone conferencing services; video conferencing services; video teleconferencing services; voice over internet protocol (VOIP) conferencing services; web conferencing services
Arranging and conducting of educational courses in the field of cybersecurity; Education services, namely, providing classes, conferences, seminars, workshops, courses in the field of information technology and cybersecurity; Educational services, namely, developing, arranging, and conducting educational conferences and programs and providing courses of instruction in the field of information technology and cybersecurity; Educational services, namely, providing training of engineers and students for certification in the field of cybersecurity; Information on education; IT training services; Providing information about education; Publication of texts, books, journals; Research in the field of education; Computer education training services in the field of secure development of computer programs and software systems, computer programming, software design, and computer systems architecture; Blouses; Coats; Dresses; Headwear; Hoods; Leggings; Nightwear; Pullovers; Scarfs; Shirts; Shorts; Skirts; Socks; Suits; Sweaters; Swimwear; Trousers; Underwear; Vests; Belts for clothing; Clothing jackets; Gloves as clothing; Polo shirts; T-shirts; Computer programming consultancy; Computer programming consultancy in the field of cybersecurity; Computer programming services; Computer security consultancy; Consultancy in the field of software design; Consultation about the maintenance and updating of computer software; Data security consultancy; Design and development of electronic data security systems; Design, maintenance, development and updating of computer software; Development of security systems and contingency planning for information systems; Information technology consulting relating to computer network design; Information technology consulting relating to computer software design; Internet security consultancy; Providing information in the fields of technology and software development via an on-line website; Providing information relating to computer technology and programming via a website; Software as a Service (SaaS) services featuring software for providing interactive hands-on simulations, exercises, assessments, and pre-recorded video and audio recordings of classes and seminars in the field of cybersecurity; Testing of security systems
Blades and brushes for electric hair clippers and trimmers; Electric and battery-powered hair trimmers; Electric ear hair trimmers; Electric hair curling irons; Electric hair straightening irons; Electric hand-held hair styling irons; Electric nasal hair trimmers; Electric razors and electric hair clippers; Foot care implements, namely, foot files; Hair clippers for personal use, electric and non-electric; Manicure sets, electric; Mustache and beard trimmers; Nail clippers, electric or non-electric; Nail skin treatment trimmers
Training services in the field of computer intrusions and malware analysis | Computer forensic services; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer systems analysis; Development of security systems and contingency planning for information systems; Maintenance of computer software relating to computer security and prevention of computer risks; Updating of computer software relating to computer security and prevention of computer risks
Technological consultation in the technology field of data governance, data privacy, cybersecurity, implementation of artificial intelligence technology, risk management, compliance, and data transformation