Use GleanMark for a free trademark search powered by millions of USPTO records. See similar trademarks, filter results, and sign up for active monitoring.
Class 009: Downloadable computer software for data protection; Downloadable mobile applications for data protection; Downloadable cloud-computing software for data protection; Downloadable cloud-based software for data protection; Computer software platforms, downloadable, for data protection; Downloadable interactive software for data protection
Downloadable software for creating, editing, playback, and publishing of digital content; downloadable software in the nature of a mobile application for creating, editing, playback, and publishing of digital content; Providing a website featuring on-line non-downloadable software that enables users to create linear or interactive drama series and episodes in a variety of formats; providing a website featuring on-line non-downloadable software that enables users to create linear or interactive drama series and episodes in formats including audio, video, animation, and real-time 3D; providing a website featuring on-line non-downloadable software that enables users to write and review scripts; providing a website featuring on-line non-downloadable software that enables users to record and mix audio; providing a website featuring on-line non-downloadable software that enables users to create, edit, and playback multimedia content; providing a website featuring on-line non-downloadable software that enables users to publish multimedia content for a variety of user platforms; software as a service (SAAS) services featuring software for creating, editing, playback, and publishing of digital content; software as a service (SAAS) services, namely, hosting software for use by others for creating, editing, playback, and publishing of digital content; computer services, namely, interactive hosting services which allow the users to create, edit, playback, publish, and share their own content and images on-line
Mousepads; Sandglasses; Telescopes; Adapter plugs; Computer keyboards; Computer peripherals; Ear phones; Loudspeakers, headphones, microphones and CD players; Motorcycle goggles; Notebook computer cooling pads; Protective sleeves for laptop computers; Protective work gloves; Ski goggles; Smart watches; Stands adapted for tablet computers; Thermometers other than for medical use; Thermometers not for medical purposes; USB cables; Video projectors; Weighing machines
Downloadable electronic publications in the nature of books in the field of crime fiction; digital media, namely, downloadable audio recordings, e-books, and CDs featuring books in the field of crime fiction | A series of fiction books; posters | Providing a website featuring information relating to books; providing on-line publications in the nature of e-books and audio books in the field of crime fiction
Bruschetta toppings; spreads, namely, vegetable-based spreads, cheese-based spreads, fruit-based spreads, meat-based spreads, dairy-based spreads to be used over bread, crackers, vegetables, meat, fish, pasta, rice and cheese; Dips, namely, vegetable-based cheese-based dips, fruit-based dips, meat-based dips, dairy-based dips, to be used over bread, crackers, vegetables, meat, fish, pasta, rice and cheese; Italian food products, namely, spreads, namely, vegetable-based spreads, cheese-based spreads, fruit-based spreads, meat-based spreads, dairy-based spreads to be used over bread, crackers, vegetables, meat, fish, pasta, rice and cheese; Italian food products, namely, bruschetta toppings; Italian food products, namely, oils, namely, olive oils, edible oils and cooking oils; Hotel kits, namely, packaged kits consisting of spreads, namely, vegetable-based spreads; cheese-based spreads; fruit-based spreads; meat-based spreads to be used over bread, crackers, vegetables, meat, fish, pasta, rice and cheese; dips and crackers; Hotel kits, namely, packaged kits, consisting of dips, spreads, namely, vegetable-based spreads; cheese-based spreads; fruit-based spreads; meat-based spreads; to be used over bread, crackers, vegetables, meat, fish, pasta, rice and cheese, and crackers; and crackers | Pasta sauces; pesto sauces; condiments, namely, tomato-based sauce; cheese-based sauce; and pesto sauce to be used over bread, crackers, vegetables, meat, fish, pasta, rice and cheese to enhance the flavor of a dish or ingredient; Italian food products, namely, pasta; Italian food products, namely, sauces; Italian food products, namely, vinegar
(Based on Use in Commerce) Footwear(Based on Intent to Use) Blazers; Coats; Pants; Sweaters; Belts for clothing; Shirts; Clothing jackets; Denim jackets; Leather jackets; Motorcycle jackets
Animal activated livestock waterers; Electric tooth brushes; Graters for household purposes; Grooming tools for pets, namely, combs and brushes; Hand-operated brush used to clean, smooth, exfoliate skin; Home dental care products for dogs and cats, namely, toothbrush; Make-up brushes; Non-electric fruit squeezers; Pet feeding and drinking bowls
Class 019: Transportable precast concrete buildings; Prefabricated non-metal buildings; Prefabricated walls, not of metal; Class 043: Rental of portable modular buildings; Rental of transportable buildings for temporary accommodation
Computer network adapters, switches, routers and hubs; Consumer electronic products, namely, audio amplifiers, audio speakers, audio receivers, electrical audio and speaker cables and connectors, audio decoders, video decoders, speakers, power conversion devices, power converters, and power inverters; Matrix switchers for audio and video signals; Video processors; Wireless transmitters and receivers
Buttons; Lace; Artificial flowers; Artificial flowers of plastics; Artificial plants, other than Christmas trees; Beads for handicraft work, other than for making jewellery; Eyelets for clothing; Hair bands; Hair nets; Hair ribbons
Bath bombs; Bath oil; Bath oils; Body lotions; Body oils; Body scrub; Body scrubs; Massage lotions; Non-medicated skin care preparations; Skin creams; Cosmetic creams for skin care; Cosmetic preparations for skin care; Non-medicated herbal body care products, namely, body oils, salves, and lip balms
Wigs; Back-hairpieces for Japanese hair styling (tabomino); False hair; Hair bands; Hair barrettes; Hair coloring caps; Hair curlers, electric and non-electric, other than hand implements; Hair extensions; Hair netting; Human braiding hair; Human hair; Pigtail ribbons for Korean hair style (Daeng-gi); Wig caps
Technology consultation in the field of cybersecurity; Data security consultancy; Data encryption services; Computer services, namely, data recovery services; Data encryption and decoding services; Computer services, namely, remote management of the information technology (IT) systems of others; On-line web site that enables the management of print systems of others by providing technical maintenance and performance reports based on data provided by users
Class 016: Painting tablets; Seals; Paper; Stencils; Stencils for face painting; Personalized printed coloring books for children; Paper note books; Printed calendars; Adhesive paper labels; Padfolios
Downloadable computer programs for analyzing whether local area networks have been breached; Downloadable computer programs for collecting and filtering networking behavior records of computers; Downloadable computer programs for detecting malware infection; Downloadable computer programs for monitoring computer networking behaviors; Downloadable software for analyzing and detecting attacker invasion; Downloadable software for analyzing whether computer systems have been breached; Downloadable software for analyzing whether local area networks have been breached; Downloadable software for collecting and filtering networking behavior records of computers; Downloadable software for detecting malware infection; Downloadable software for monitoring computer networking behaviors; Downloadable software platforms for analyzing and detecting attacker invasion; Downloadable software platforms for analyzing whether computer systems have been breached; Downloadable software platforms for analyzing whether local area networks have been breached; Downloadable software platforms for collecting and filtering networking behavior records of computers; Downloadable software platforms for detecting malware infection; Downloadable software platforms for monitoring computer networking behaviors; Recorded computer operating programs; Recorded computer programs for analyzing and detecting attacker invasion; Recorded computer programs for analyzing whether computer systems have been breached; Recorded computer programs for analyzing whether local area networks have been breached; Recorded computer programs for collecting and filtering networking behavior records of computers; Recorded computer programs for detecting malware infection; Recorded computer programs for monitoring computer networking behaviors; Recorded software for analyzing and detecting attacker invasion; Recorded software for analyzing whether computer systems have been breached; Recorded software for analyzing whether local area networks have been breached; Recorded software for collecting and filtering networking behavior records of computers; Recorded software for detecting malware infection; Recorded software for monitoring computer networking behaviors; Recorded software platforms for analyzing and detecting attacker invasion; Recorded software platforms for analyzing whether computer systems have been breached; Recorded software platforms for analyzing whether local area networks have been breached; Recorded software platforms for collecting and filtering networking behavior records of computers; Recorded software platforms for detecting malware infection; Recorded software platforms for monitoring computer networking behaviors; Computer services, namely, integration of private and public cloud computing environments; Computer security consultancy; Computer software design; Computer system analysis; Computer virus, malware, worms, trojans, spyware, adware, ransomware and data exfiltration protection services; Data security consultancy; Maintenance of computer software; Monitoring of computer systems by online scanning, machine learning and digital forensics technology to ensure proper functioning; Monitoring of computer systems for detecting data breach; Monitoring of computer systems for detecting unauthorized access; Monitoring of computer systems to detect breakdowns; Computer network security administration services, namely, restricting computer networks to access malicious domains; Computer network security administration services, namely, restricting computer networks to access malicious web sites; Platform as a service (PAAS) featuring computer software platforms for detecting and analyzing computer and network security threats; Software as a service (SAAS) services featuring software for detecting and analyzing computer and network security threats; Updating of computer software
Downloadable computer programs for analyzing and detecting hacker invasion and malware infection; Computer programs and downloadable computer software for analyzing and detecting hacker invasion or malware infection; Recorded computer programs for analyzing and detecting hacker invasion or malware infection; Computer operating programs, recorded; Downloadable computer software applications for analyzing and detecting hacker invasion or malware infection; Downloadable computer software for analyzing and detecting hacker invasion or malware infection; Computer software platforms, recorded, for analyzing and detecting hacker invasion or malware infection; Computer software platforms, downloadable, for analyzing and detecting hacker invasion or malware infection; Downloadable computer application software and computer programs for analyzing and detecting hacker invasion or malware infection; Recorded computer software for analyzing and detecting hacker invasion or malware infection; Computer programming; Computer software design; Consultancy on computer software design; Updating of computer software; Maintenance of computer software; Computer software consultancy; Installation of computer software; Computer system analysis; Monitoring of computer systems for detecting unauthorized access or data breach; Monitoring of computer systems to detect breakdowns; Monitoring of computer systems by remote access to ensure proper functioning; Conversion of computer programs and data, other than physical conversion; Duplication of computer programs; Computer virus protection services; Recovery of computer data; Data security consultancy; Data encryption services; Internet security consultancy; Network safety administration services, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities
Compilation of information into computer databases; computerized file management; office functions in the nature of data searching in computer files for others; systemization of information into computer databases; updating and maintenance of data in computer databases; updating and maintenance of information in registries; Providing consumer product information for the purpose of selecting artificial intelligence (AI) hardware and software to meet the consumer's specifications; Providing business intelligence services; Business risk management; Providing business advice in the field of cyber security; providing business intelligence services; Analyzing and compiling business data; Business strategic planning services; Business data analysis
Downloadable computer programs for analyzing and detecting hacker invasion and malware infection; Computer programs and downloadable computer software for analyzing and detecting hacker invasion or malware infection; Recorded computer programs for analyzing and detecting hacker invasion or malware infection; Computer operating programs, recorded; Downloadable computer software applications for analyzing and detecting hacker invasion or malware infection; Downloadable computer software for analyzing and detecting hacker invasion or malware infection; Computer software platforms, recorded, for analyzing and detecting hacker invasion or malware infection; Computer software platforms, downloadable, for analyzing and detecting hacker invasion or malware infection; Downloadable computer application software and computer programs for analyzing and detecting hacker invasion or malware infection; Recorded computer software for analyzing and detecting hacker invasion or malware infection; Computer programming; Computer software design; Consultancy on computer software design; Updating of computer software; Maintenance of computer software; Computer software consultancy; Installation of computer software; Computer system analysis; Monitoring of computer systems for detecting unauthorized access or data breach; Monitoring of computer systems to detect breakdowns; Monitoring of computer systems by remote access to ensure proper functioning; Conversion of computer programs and data, other than physical conversion; Duplication of computer programs; Computer virus protection services; Recovery of computer data; Data security consultancy; Data encryption services; Internet security consultancy; Network safety administration services, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities
Software as a service (SaaS) services featuring software for compiling and systemization of information for computer databases, managing computer files, searching data, updating and maintaining computer databases and information in registries, in the field of information security, namely, cybersecurity of computerized information systems and data; platform as a service (PaaS) featuring computer software platforms for providing an automated artificial intelligence (AI) generated information and analysis
Providing online non-downloadable software application for a national security foreign text workflow; Platform as a Service (PaaS) featuring software for a national security foreign text workflow platform; Software as a Service (SaaS) featuring software for a national security foreign text workflow
Providing on-line business news and business information in the fields of blockchain, crypto-currency, and the decentralized web | Providing on-line financial markets news and financial markets information in the field of blockchain, crypto-currency, and the decentralized web; Providing an Internet website portal featuring financial markets news and financial markets information specifically in the field of blockchain, crypto-currency, and the decentralized web | Entertainment and education services in the nature of providing on-line non-downloadable articles including videos, text, photos, and images in the field of the decentralized web | Providing on-line technology news and technology information in the field of blockchain, crypto-currency, and the decentralized web
Payment processing services, namely, credit card and debit card transaction processing services; Credit card payment processing services; Electronic payment services involving electronic processing and subsequent transmission of bill payment data; Providing an internet website portal in the field of financial transaction and payment processing services | Application service provider (ASP) featuring e-commerce software for use as a payment gateway that authorizes processing of credit cards or direct payments for merchants
Downloadable computer software for providing an interface between an internet browser and distributed computing platforms; downloadable computer applications for implementing blockchain transactions and for managing digital identities; Downloadable computer data security software for tokenization of sensitive information; Downloadable software for execution and management of secure data transactions; Downloadable computer software providing Know Your Customer services for use in customer relationship management (CRM); Downloadable computer software for encryption, decryption; Downloadable software for encryption and tokenization of credit card and other personally identifiable information; Downloadable and mobile application computer software for processing electronic payments; downloadable computer software for issuing receipts regarding mobile payment transactions; downloadable and mobile application software for processing electronic payments and transferring funds to and from others; downloadable authentication software for controlling access to and communications with computers and computer networks; downloadable computer software and computer hardware for making, authenticating, facilitating, operating, managing, and processing payment transactions with credit cards, debit cards, prepaid cards, payment cards, gift cards, and other payment forms; downloadable software development kits; downloadable software development kits, namely, software for use in customizing payment software; Downloadable computer software for use in electronically trading, storing, sending, receiving, accepting and transmitting digital currency, and managing digital currency payment and exchange transactions.; Secure digital transaction services, namely, providing tokenization services to increase data security and flexibility in online transactions in the nature of providing electronic transmission of credit card transaction data and electronic payment data via a global computer network; on-line security services, namely, providing security and anonymity for electronically transmitted financial transactions in the nature of providing electronic transmission of credit card transaction data and electronic payment data via a global computer network.; Merchant services that provide a no-code solution for payment transaction processing services, namely, providing electronic processing of ACH and credit card transactions and electronic payments via a global computer network; Tax determination services, namely, calculation and collection of applicable sales tax; Secure digital transaction services, namely, providing tokenization services to increase data security and flexibility in online transactions in the nature of providing secure commercial, consumer and peer to peer transactions and payment options; on-line security services, namely, providing security and anonymity for electronically transmitted financial transactions in the nature of providing secure commercial consumer and peer to peer transactions and payment options.; Providing temporary use of non-downloadable computer software for encryption; Providing temporary use of non-downloadable computer software that provides a user interface for managing digital identities and for signing blockchain transactions; providing temporary use of non-downloadable software that provides a no-code solution for payment transaction processing services; merchant services that provide a no-code solution for payment transaction processing services; Providing temporary use of on-line non-downloadable software for processing electronic payments; providing temporary use of online non-downloadable authentication software for controlling access to and communications with computers and computer networks; Providing temporary use of non-downloadable computer software for identification verification services, namely, providing authentication of personal identification information; Identity theft and fraud prevention services namely, updating of computer software relating to computer security and prevention of computer and cybersecurity risks; cryptocurrency and digital asset services, namely, technology custody services in the nature of electronic storage of cryptocurrency and digital assets for safeguarding, storing, and enabling users to access cryptocurrency and other digital assets for institutional investors; Providing temporary use of online non-downloadable software for use in electronically trading, storing, sending, receiving, accepting and transmitting digital currency, and for managing digital currency payment and exchange transactions; providing temporary use of on-line non-downloadable authentication software for controlling access to and communications with computers and computer networks; Providing temporary use of non-downloadable computer software for providing an interface between an internet browser and distributed computing platforms; Providing temporary use of non-downloadable computer data security software for tokenization of sensitive information; providing temporary use of online non-downloadable software for providing a no-code solution for payment transaction processing services; Identity theft and fraud prevention services, namely, electronic monitoring of personally identifying information to detect identity theft via the internet; Providing temporary use of non-downloadable computer software for use in customer relationship management (CRM); Providing temporary use of non-downloadable computer software for encryption, decryption; Providing data encryption, decryption services; Tax determination services, namely, services in relation to tax calculation and collection in the nature of cloud-based tax management data collection software; cloud-based computer software that provides a user interface for managing digital identities and for signing blockchain transactions; merchant services that provide a no-code solution for payment transaction processing services, namely, Application service provider (ASP) featuring e-commerce software for use as a payment gateway that authorizes processing of credit cards or direct payments for merchants; Providing temporary use of on-line non-downloadable cloud computing data protection software that replaces sensitive data with a tokenized equivalent for business operations conducted via online digital transactions; cloud-based security software-as-a-service that obscures sensitive or personally identifiable data by tokenizing the data and integrating the tokenization solution directly into a cloud environment; Providing temporary use of online non-downloadable software to prevent fraud, facilitate integration with loyalty and reward platforms to allow tracking of purchases and accrual of rewards, and enable merchants to embed checkouts in third party sites and applications to sell and take payments on third party platforms; providing temporary use of online non-downloadable software to evaluate and detect fraud and illegality in payment transactions, manage compliance validation; providing temporary use of online non-downloadable software for customizing Application Programming Interfaces (API's), integrating pay in methods to digital wallets, sharing payment data between users and generating reports, managing disputed charges, and automating chargebacks; Secure digital transaction services, namely, providing tokenization services to increase data security and flexibility in online transactions in the nature of data encryption services for providing security and anonymity for electronically transmitted credit card and electronic payment transactions; on-line security services, namely, providing security and anonymity for electronically transmitted financial transactions in the nature of data encryption services for providing security and anonymity for electronically transmitted credit card and electronic payment transactions.
Animal feed supplements; additives for use in animal food, namely, non-medicated nutritional additives and/or supplements for animals used to abate enteric pathogens
Computers and computer software for security with embedded data security and communication security for vehicles and apparatus for locomotion by land, air or water, for household appliances, for audio and video sets, and for process control and for communication of information for banks insurance companies, and industrial companies | Consulting services for the application and programming of computer software with embedded data security and communication security for locomotion by land, air or water, for household appliances, for audio and video sets, and for process control and for communication of information for banks, insurance companies, industrial companies
Computer software for encryption; computer hardware for encryption; electronic encryption units; hardware and software technology, namely, computer hardware and computer software platforms for data security purposes, namely, encrypting, decrypting, authenticating, and validating data
Building construction services; Construction project management services; Real estate development and construction of commercial, residential and hotel property; Real estate appraisal and valuation; Real estate brokerage; Real estate service, namely, rental property management; Commercial and residential real estate agency services; all of the aforementioned unrelated to distributed ledgers, blockchain technology, decentralised finance, cryptography/encryption, non-fungible tokens or cryptocurrency; Personal concierge services for others comprising making requested customer-specific arrangements for the management and operations of private, not-for-rent real properties and making additional property maintenance and personal transportation appointments to meet individual needs; Stock photography services, namely, leasing reproduction rights of photographs, transparencies and digital content to others; Stock videography services, namely, leasing reproduction rights of real property videos, video clips, and pre-edited promotional videos to others; Interior design consultation; Interior design services; Providing subscription-based temporary use of on-line non-downloadable software for the development of customized web pages featuring blog posts, photographic and video content, all relating to commercial or residential real estate or the buying or selling of the same; all of the aforementioned unrelated to distributed ledgers, blockchain technology, decentralised finance, cryptography/encryption, non-fungible tokens or cryptocurrency