Use GleanMark for a free trademark search powered by millions of USPTO records. See similar trademarks, filter results, and sign up for active monitoring.
Fishing boats; Inflatable boats; Kayak-like boats; Personal jet boats; Personal watercraft, namely, small powerboats; Water scooters; Pontoon boats; Propeller-driven boats; Recreational jet boats; Recreational watercraft, namely, boats; Sail boats; Sailing vessels; Water vehicles, namely, hydrofoil boats supported by single or multi hulls, and structural parts therefor; Boats; Rafts; Vessels
Class 009: Downloadable business process management software; Downloadable software for compiling and organizing business intelligence; Class 035: Consulting services in business organization and management; Business management consultancy services
Menorahs; Vases; Beverage glassware; Ceramic sculptures, vases, vessels, bowls, plates and pots; Cookware, namely, pots and pans; Decorative spheres of china, crystal, ceramic, earthenware, glass, terra cotta, porcelain; Flower pots; Stained glass figurines; Terrariums for plants; Works of art made of glass
Earrings; Children's jewelry; Cloisonne jewellery; Cloisonne pins; Cloisonné jewelry; Cuff links and tie clips; Jewelry and imitation jewelry; Jewelry brooches; Jewelry for the head; Jewelry making kits; Keyrings of common metal; Necklaces made of rubber silicone; Pet jewelry; Sautoir necklaces
Providing information in the field of finance; Tracking and monitoring regulatory requirements in the field of financial crime for regulatory compliance purposes; Software as a service (SAAS) services featuring software for screening, monitoring, governance and quality assurance for financial crime compliance; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for financial crime screening, monitoring, governance and quality assurance
Providing information in the field of finance; Tracking and monitoring regulatory requirements in the field of financial crime for regulatory compliance purposes; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for financial crime screening, monitoring,
governance and quality assurance; Software as a service (SAAS) services featuring software for screening, monitoring, governance and quality assurance for financial
crime compliance
Flame proofing; flame proofing trucks and tanks; Fitting services; fitting out services; service, repair and maintenance of tanks (including road tankers) and trucks; building, installation, maintenance and repair of loading arms at fuel depots; building, installation, maintenance and repair of self-bunded tanks; upgrading of tanks (including road tankers) and trucks; tanker dispensing system repairs; electronic and pneumatic repairs; overfill system diagnostics and repairs; meter, pump and hose reel installation, replacement and repairs; diptronic road installations and repairs; onsite service and repairs for road tankers; fuel terminal and depot installation, repair and maintenance; fuel terminal and depot installations for pumps, meters, loading arms and overfill systems; fuel storage tank and dispensing systems maintenance and repairs; tank and dispenser supply installationFitting services; tank and dispenser supply installation; Trucks; industrial trucks; tank (tanker) trucks; spare parts for tanks and trucks, including filters; aviation tanker refuelling trucks; aviation hydrant dispensing vehicles; aviation narrow body and wide carts; aviation refuelling vehicles; spare parts for aviation refuelling vehicles; vehicles; apparatus for locomotion by land, air or water
Industrial tables, table tops, table frames and table component accessories thereof, namely, tracks for table mounted machines, reinforcement joints for tracks for table mounted machines, reinforcement siding for tables, reinforcement joints for table siding, table component kits comprised of supports, table sections, table extensions, aprons, legs, leg extensions, frames, brackets, and braces to widen tables, and table component kits comprised of supports, aprons, legs, leg extensions, frames, brackets, drawer dividers, and/or braces to divide tables and table drawers all sold as a units
Stickers; Adhesive bands for stationery or household purposes; Bookbinding cloth; Bookbinding cords; Coin albums; Cords for bookbinding; Desktop business card holders; Gift boxes; Paper clip holders; Paper clips; Paper gift bags; Photograph albums; Stamp albums
Boxes of wood or plastic; Decorative mirrors; Jewelry organizer displays; Jewelry organizer displays in the nature of display stands, display boards, trees for displaying and organizing jewelry; Picture frames; Plastic lids for industrial packaging containers; Staves of wood; Wooden craft sticks; Wooden stoppers for industrial packaging containers; Works of art made of wood
Beads for making jewelry; Bracelets; Charms for jewelry; Clasps for jewelry; Earrings; Jewelry; Jewelry boxes; Jewelry chains; Jewelry findings; Jewelry rolls; Jewelry hat pins; Key rings comprised of split rings with decorative fobs or trinkets; Necklaces; [ Ornaments of precious metal in the nature of jewelry; ] Paste jewelry; Pearls; Pins being jewelry; [ Rings; ] Semi-precious stones [ ; Works of art of precious metal; Wristwatches ]
Downloadable computer programs for analyzing and detecting hacker invasion and malware infection; Computer programs and downloadable computer software for analyzing and detecting hacker invasion or malware infection; Recorded computer programs for analyzing and detecting hacker invasion or malware infection; Computer operating programs, recorded; Downloadable computer software applications for analyzing and detecting hacker invasion or malware infection; Downloadable computer software for analyzing and detecting hacker invasion or malware infection; Computer software platforms, recorded, for analyzing and detecting hacker invasion or malware infection; Computer software platforms, downloadable, for analyzing and detecting hacker invasion or malware infection; Downloadable computer application software and computer programs for analyzing and detecting hacker invasion or malware infection; Recorded computer software for analyzing and detecting hacker invasion or malware infection; Computer programming; Computer software design; Consultancy on computer software design; Updating of computer software; Maintenance of computer software; Computer software consultancy; Installation of computer software; Computer system analysis; Monitoring of computer systems for detecting unauthorized access or data breach; Monitoring of computer systems to detect breakdowns; Monitoring of computer systems by remote access to ensure proper functioning; Conversion of computer programs and data, other than physical conversion; Duplication of computer programs; Computer virus protection services; Recovery of computer data; Data security consultancy; Data encryption services; Internet security consultancy; Network safety administration services, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities
Class 016: Painting tablets; Seals; Paper; Stencils; Stencils for face painting; Personalized printed coloring books for children; Paper note books; Printed calendars; Adhesive paper labels; Padfolios
Downloadable computer programs for analyzing and detecting hacker invasion and malware infection; Computer programs and downloadable computer software for analyzing and detecting hacker invasion or malware infection; Recorded computer programs for analyzing and detecting hacker invasion or malware infection; Computer operating programs, recorded; Downloadable computer software applications for analyzing and detecting hacker invasion or malware infection; Downloadable computer software for analyzing and detecting hacker invasion or malware infection; Computer software platforms, recorded, for analyzing and detecting hacker invasion or malware infection; Computer software platforms, downloadable, for analyzing and detecting hacker invasion or malware infection; Downloadable computer application software and computer programs for analyzing and detecting hacker invasion or malware infection; Recorded computer software for analyzing and detecting hacker invasion or malware infection; Computer programming; Computer software design; Consultancy on computer software design; Updating of computer software; Maintenance of computer software; Computer software consultancy; Installation of computer software; Computer system analysis; Monitoring of computer systems for detecting unauthorized access or data breach; Monitoring of computer systems to detect breakdowns; Monitoring of computer systems by remote access to ensure proper functioning; Conversion of computer programs and data, other than physical conversion; Duplication of computer programs; Computer virus protection services; Recovery of computer data; Data security consultancy; Data encryption services; Internet security consultancy; Network safety administration services, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities
Compilation of information into computer databases; computerized file management; office functions in the nature of data searching in computer files for others; systemization of information into computer databases; updating and maintenance of data in computer databases; updating and maintenance of information in registries; Providing consumer product information for the purpose of selecting artificial intelligence (AI) hardware and software to meet the consumer's specifications; Providing business intelligence services; Business risk management; Providing business advice in the field of cyber security; providing business intelligence services; Analyzing and compiling business data; Business strategic planning services; Business data analysis
Downloadable computer programs for analyzing whether local area networks have been breached; Downloadable computer programs for collecting and filtering networking behavior records of computers; Downloadable computer programs for detecting malware infection; Downloadable computer programs for monitoring computer networking behaviors; Downloadable software for analyzing and detecting attacker invasion; Downloadable software for analyzing whether computer systems have been breached; Downloadable software for analyzing whether local area networks have been breached; Downloadable software for collecting and filtering networking behavior records of computers; Downloadable software for detecting malware infection; Downloadable software for monitoring computer networking behaviors; Downloadable software platforms for analyzing and detecting attacker invasion; Downloadable software platforms for analyzing whether computer systems have been breached; Downloadable software platforms for analyzing whether local area networks have been breached; Downloadable software platforms for collecting and filtering networking behavior records of computers; Downloadable software platforms for detecting malware infection; Downloadable software platforms for monitoring computer networking behaviors; Recorded computer operating programs; Recorded computer programs for analyzing and detecting attacker invasion; Recorded computer programs for analyzing whether computer systems have been breached; Recorded computer programs for analyzing whether local area networks have been breached; Recorded computer programs for collecting and filtering networking behavior records of computers; Recorded computer programs for detecting malware infection; Recorded computer programs for monitoring computer networking behaviors; Recorded software for analyzing and detecting attacker invasion; Recorded software for analyzing whether computer systems have been breached; Recorded software for analyzing whether local area networks have been breached; Recorded software for collecting and filtering networking behavior records of computers; Recorded software for detecting malware infection; Recorded software for monitoring computer networking behaviors; Recorded software platforms for analyzing and detecting attacker invasion; Recorded software platforms for analyzing whether computer systems have been breached; Recorded software platforms for analyzing whether local area networks have been breached; Recorded software platforms for collecting and filtering networking behavior records of computers; Recorded software platforms for detecting malware infection; Recorded software platforms for monitoring computer networking behaviors; Computer services, namely, integration of private and public cloud computing environments; Computer security consultancy; Computer software design; Computer system analysis; Computer virus, malware, worms, trojans, spyware, adware, ransomware and data exfiltration protection services; Data security consultancy; Maintenance of computer software; Monitoring of computer systems by online scanning, machine learning and digital forensics technology to ensure proper functioning; Monitoring of computer systems for detecting data breach; Monitoring of computer systems for detecting unauthorized access; Monitoring of computer systems to detect breakdowns; Computer network security administration services, namely, restricting computer networks to access malicious domains; Computer network security administration services, namely, restricting computer networks to access malicious web sites; Platform as a service (PAAS) featuring computer software platforms for detecting and analyzing computer and network security threats; Software as a service (SAAS) services featuring software for detecting and analyzing computer and network security threats; Updating of computer software
Software as a service (SaaS) services featuring software for compiling and systemization of information for computer databases, managing computer files, searching data, updating and maintaining computer databases and information in registries, in the field of information security, namely, cybersecurity of computerized information systems and data; platform as a service (PaaS) featuring computer software platforms for providing an automated artificial intelligence (AI) generated information and analysis
[ Adhesive note paper; Aquarelles; Bookbinding tape; ] [ Boxes of cardboard or paper; ] [ Brochures about real estate, mathematics, science and financial matters; Coasters of paper; Correcting tapes; Decalcomanias; Embroidery design patterns; Entry tickets; ] Greeting cards; [ Ink stamps; ] [ Lithographic works of art; Notebooks; ] [ Paper; Paper clip holders; ] [ Paper cutters; ] [ Paper mache figurines; ] Paper mats; [ Paper sheets for note taking; Pencils; ] Photo albums; [ Photograph corners; ] Postcards; [ Print engravings; ] [ Printed matter, namely, newspapers, photographs, magazines, books, printed periodicals, newsletters, and brochures all in the fields of securities, options and other financial instruments; Printed matter, namely, vinyl static cling sheets on which prayers are printed for affixation in windows and windshields; Printed tickets; ] [ Punches; ] [ Red ink paste used for seals; Table linen of paper; Table napkins of paper; Writing brushes; Brag books; Drawing pens; Marking pens; ] Memory books [ ; Mini photo albums ]
Custom manufacture of transfers and licensed products and merchandise; Merchandise customization and decoration services; Custom printing, embroidery, transfer application, sublimation, 3D printing, UV printing, and product and merchandise decoration services; Custom printing, embroidery, transfer application, sublimation, 3D printing, UV printing, and product and merchandise decoration services for affixing letters, numbers, graphics, artwork, patterns, or designs to textile goods, fabric goods, products, merchandise, or surfaces; Print-on-demand (POD) services for manufacturing customized goods and merchandise; Mobile, on-site product customization services for affixing letters, numbers, graphics, artwork, patterns, or designs to merchandise, textile goods, fabric goods, products, merchandise, or surfaces; Providing information in the fields of product and merchandise customization and decoration, custom manufacture of merchandise, and application of transfers to products and surfaces; Heat transfer vinyl; Heat transfer plastic film; Adhesive transfer vinyl; Adhesive transfer film; Adhesive transfer plastic film; Plastic film for making adhesive transfers; Adhesive plastic film from which letters, numbers, graphics, artwork, patterns, or designs may be made for affixing to merchandise, products, textile or fabric materials or surfaces; Adhesive transfer film in bulk form; Transfers; Adhesive transfers; Heat transfers; Heat transfer paper; Heat transfer material; Wrapping paper; Decals; Adhesive transfer film in bulk form; Crafting materials; Printed materials for decoration; Wallpapers; Ornamental cloth patches; Patches; Retail and wholesale store services featuring merchandise, sports merchandise, licensed merchandise, crafting materials, and customized merchandise; Licensing program management and market development services; Management and administration of licensing programs; Licensing management and administration services, namely, securing licenses, managing art approvals, royalty reporting, and managing compliance with brand quality standards; Business consulting services; Business consulting services in the field of licensing, retail merchandising, and product customization; Providing online non-downloadable software for designing, customizing, and ordering products and merchandise; Providing online non-downloadable software for order and inventory management and e-commerce integration; Providing online non-downloadable software for managing and administering licensing programs; Software as a Service (SAAS) Services featuring software for managing and administering licensing programs; Software as a Service (SAAS) Services featuring software for order management, artwork approvals, royalty tracking, customer communication, and kiosk-based POS integration tools; Development and integration of software and application programming interface (API) software for print-on-demand product fulfillment and licensing compliance
Class 035: Providing advice and assistance to commercial entities relating to the establishment and maintenance of business and contractual relationships with federal, state and local governments; Providing public sector business and market intelligence; Business consulting services in the field of market, competitive, and business intelligence.; Class 042: Software as a service (SAAS) services featuring software for compiling and analyzing business, market, competitive, procurement, and opportunity intelligence related to government contracts.; Software as a service (SAAS) services featuring software for collecting, analyzing, searching, visualizing, and reporting data and information related to government contracts and public sector business development.