Use GleanMark for a free trademark search powered by millions of USPTO records. See similar trademarks, filter results, and sign up for active monitoring.
Downloadable computer programs for analyzing whether local area networks have been breached; Downloadable computer programs for collecting and filtering networking behavior records of computers; Downloadable computer programs for detecting malware infection; Downloadable computer programs for monitoring computer networking behaviors; Downloadable software for analyzing and detecting attacker invasion; Downloadable software for analyzing whether computer systems have been breached; Downloadable software for analyzing whether local area networks have been breached; Downloadable software for collecting and filtering networking behavior records of computers; Downloadable software for detecting malware infection; Downloadable software for monitoring computer networking behaviors; Downloadable software platforms for analyzing and detecting attacker invasion; Downloadable software platforms for analyzing whether computer systems have been breached; Downloadable software platforms for analyzing whether local area networks have been breached; Downloadable software platforms for collecting and filtering networking behavior records of computers; Downloadable software platforms for detecting malware infection; Downloadable software platforms for monitoring computer networking behaviors; Recorded computer operating programs; Recorded computer programs for analyzing and detecting attacker invasion; Recorded computer programs for analyzing whether computer systems have been breached; Recorded computer programs for analyzing whether local area networks have been breached; Recorded computer programs for collecting and filtering networking behavior records of computers; Recorded computer programs for detecting malware infection; Recorded computer programs for monitoring computer networking behaviors; Recorded software for analyzing and detecting attacker invasion; Recorded software for analyzing whether computer systems have been breached; Recorded software for analyzing whether local area networks have been breached; Recorded software for collecting and filtering networking behavior records of computers; Recorded software for detecting malware infection; Recorded software for monitoring computer networking behaviors; Recorded software platforms for analyzing and detecting attacker invasion; Recorded software platforms for analyzing whether computer systems have been breached; Recorded software platforms for analyzing whether local area networks have been breached; Recorded software platforms for collecting and filtering networking behavior records of computers; Recorded software platforms for detecting malware infection; Recorded software platforms for monitoring computer networking behaviors; Computer services, namely, integration of private and public cloud computing environments; Computer security consultancy; Computer software design; Computer system analysis; Computer virus, malware, worms, trojans, spyware, adware, ransomware and data exfiltration protection services; Data security consultancy; Maintenance of computer software; Monitoring of computer systems by online scanning, machine learning and digital forensics technology to ensure proper functioning; Monitoring of computer systems for detecting data breach; Monitoring of computer systems for detecting unauthorized access; Monitoring of computer systems to detect breakdowns; Computer network security administration services, namely, restricting computer networks to access malicious domains; Computer network security administration services, namely, restricting computer networks to access malicious web sites; Platform as a service (PAAS) featuring computer software platforms for detecting and analyzing computer and network security threats; Software as a service (SAAS) services featuring software for detecting and analyzing computer and network security threats; Updating of computer software
Class 016: Painting tablets; Seals; Paper; Stencils; Stencils for face painting; Personalized printed coloring books for children; Paper note books; Printed calendars; Adhesive paper labels; Padfolios
Software as a service (SaaS) services featuring software for compiling and systemization of information for computer databases, managing computer files, searching data, updating and maintaining computer databases and information in registries, in the field of information security, namely, cybersecurity of computerized information systems and data; platform as a service (PaaS) featuring computer software platforms for providing an automated artificial intelligence (AI) generated information and analysis
Compilation of information into computer databases; computerized file management; office functions in the nature of data searching in computer files for others; systemization of information into computer databases; updating and maintenance of data in computer databases; updating and maintenance of information in registries; Providing consumer product information for the purpose of selecting artificial intelligence (AI) hardware and software to meet the consumer's specifications; Providing business intelligence services; Business risk management; Providing business advice in the field of cyber security; providing business intelligence services; Analyzing and compiling business data; Business strategic planning services; Business data analysis
Downloadable computer programs for analyzing and detecting hacker invasion and malware infection; Computer programs and downloadable computer software for analyzing and detecting hacker invasion or malware infection; Recorded computer programs for analyzing and detecting hacker invasion or malware infection; Computer operating programs, recorded; Downloadable computer software applications for analyzing and detecting hacker invasion or malware infection; Downloadable computer software for analyzing and detecting hacker invasion or malware infection; Computer software platforms, recorded, for analyzing and detecting hacker invasion or malware infection; Computer software platforms, downloadable, for analyzing and detecting hacker invasion or malware infection; Downloadable computer application software and computer programs for analyzing and detecting hacker invasion or malware infection; Recorded computer software for analyzing and detecting hacker invasion or malware infection; Computer programming; Computer software design; Consultancy on computer software design; Updating of computer software; Maintenance of computer software; Computer software consultancy; Installation of computer software; Computer system analysis; Monitoring of computer systems for detecting unauthorized access or data breach; Monitoring of computer systems to detect breakdowns; Monitoring of computer systems by remote access to ensure proper functioning; Conversion of computer programs and data, other than physical conversion; Duplication of computer programs; Computer virus protection services; Recovery of computer data; Data security consultancy; Data encryption services; Internet security consultancy; Network safety administration services, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities
Downloadable computer programs for analyzing and detecting hacker invasion and malware infection; Computer programs and downloadable computer software for analyzing and detecting hacker invasion or malware infection; Recorded computer programs for analyzing and detecting hacker invasion or malware infection; Computer operating programs, recorded; Downloadable computer software applications for analyzing and detecting hacker invasion or malware infection; Downloadable computer software for analyzing and detecting hacker invasion or malware infection; Computer software platforms, recorded, for analyzing and detecting hacker invasion or malware infection; Computer software platforms, downloadable, for analyzing and detecting hacker invasion or malware infection; Downloadable computer application software and computer programs for analyzing and detecting hacker invasion or malware infection; Recorded computer software for analyzing and detecting hacker invasion or malware infection; Computer programming; Computer software design; Consultancy on computer software design; Updating of computer software; Maintenance of computer software; Computer software consultancy; Installation of computer software; Computer system analysis; Monitoring of computer systems for detecting unauthorized access or data breach; Monitoring of computer systems to detect breakdowns; Monitoring of computer systems by remote access to ensure proper functioning; Conversion of computer programs and data, other than physical conversion; Duplication of computer programs; Computer virus protection services; Recovery of computer data; Data security consultancy; Data encryption services; Internet security consultancy; Network safety administration services, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities
Blades for power saws; [ Centering drilling bits being parts of machines; Circular saws; Drilling machines; Gear cutters; Machine parts, namely, grindstones; Metal working machines, namely, saws and cutters; Milling cutters; ] Power saw blades [ ; Power-operated tools, namely, grinders; Electrical drills ]
scarf fastener and enhancer in the nature of an elastic material cinch, configured in various combinations of loops, used to fasten scarfs in a decorative manner
Semiconductor manufacturing machines; plating apparatus for manufacturing semiconductors; electric cleaning apparatus for manufacturing semiconductors; semiconductor manufacturing machines and apparatus and their parts; electric cleaning apparatus for use in manufacturing semiconductor substrates [parts of machines]; electric semiconductor wafer cleaning apparatus for use in the manufacture of semiconductors; plating apparatus for manufacturing semiconductors for plating while covering the substrate and electric contact with conductivity-controlled pure water; honeycomb-structured paddles for stirring plating solution with high efficiency during plating [parts of machines].
Business services, namely, providing personnel selection and assessment services by identifying, and screening of employment skills of employee candidates
Accent furniture; Air beds, not for medical purposes; Antique reproduction furniture; Armchairs; Beach chairs; Benches; Booster seats; Boxes of wood or plastic; Chairs; Folding chairs; High chairs for babies; Funerary urns for pets; Inflatable chairs; Lounge chairs; Pet furniture; Plant racks; Wood cases; Works of art of cork; Works of art made of wood; Works of art of plastic
Sewing machines; needles for sewing machines; knitting machines; needles for knitting machines; Games, toys and playthings, namely, knitting and crochet starter kits, fabric doll-making sets, sewing pattern kits, yarn-based plush toys, and embroidery activity sets, designed to be used with haberdashery products such as knitting needles, crochet hooks, yarns, threads, and fabrics; craft model kits comprising plastic blister molds, plaster, instructional sheets for making toy plaster casting craft models; early childhood educational arts and crafts toys, namely bendable toys and board game products, namely, three-dimensional modular pieces for assembly to resemble miniature terrain; Paper and cardboard; a series of printed materials, including but not limited to books, articles, handouts, and worksheets, specifically tailored for use in the field of haberdashery; bookbinding material for creating hardcover books, namely, book covers, crack-and peel binding paper, reinforcement strips, peel-and-stick labels, stapler and staples; framed photographs; stationery and office requisites, namely, envelope sealing machines, except furniture; adhesives for stationery or household purposes; drawing materials for blackboards and materials for artists, namely, canvas panels, canvas for painting or printing, stretcher bars, and stretcher bar braces; paintbrushes; printed instructional and teaching materials in the field of haberdashery, including but not limited to knitting, sewing, embroidery, and textile crafts; plastic sheets, films and bags for wrapping and packaging; printers' type, printing blocks; arts, crafts and modelling equipment, namely, molds for modeling clay; paper crafts materials, namely, paper; paper decorations for cakes; paper bunting, wrapping paper; paper party decorations; printed or embosed and optionally recyclable paper equipped with holograms or hologram images, gratings, sterograms and lithographs, for use as decorative material for gifts; papier mâché; party bags made of paper and of plastic, gift bags made of paper and of plastic; Artists' modelling materials, artists' modeling clay, artists' modelling wax, artists' modelling paste, moulds for modelling clay; stickers; stationery; party stationery; paper, cardboard, paper articles, namely, greeting cards and stationery for use in crafts; printed matter, namely, scrapbooks, colouring books, drawing books, albums, photograph albums, craft paper, designer craft paper; printed picture cards, printed picture postcards, printed index cards; pictures in the nature of drawings, paintings, posters made of paper; book binding cords for papers and books; adhesives for arts and crafts purposes; decorative glitter for stationery purposes; Gesso, namely, plasters in the nature of artists' materials; painting sets for children, namely, paint boxes, paint brushes, brushes, stencils, boards, easels, transfers, stickers, decals; drawing materials for blackboards; pens, colouring pencils, colouring pens, ball point pens, felt-tip pens, highlighter pens, gel roller pens, crayons; liquid paint felt tip marking and coloring applicators for use in children's crafts; printed embroidery designs and patterns; Haberdashery, namely, ribbons, rosettes, hook and loop fasteners, sewing pins, needles of precious metal, tassels, fabric appliques, beads for handicraft work; knitting needles and pins; knitting kits comprised primarily of knitting needles and also including yarn, stitch markers, a row counter, a tapestry needle, a pattern guide, and scissors, and sometimes also including a measuring tape, a project bag, or additional accessories like cable needles and stitch holders; artificial flowers; ribbons and bow being hair decorations; Textiles and substitutes for textiles for domestic use, namely cotton fabric, polyester fabric, and non-woven textile fabrics; Yarns and threads, for textile use; knitting wools and knitting yarns of wool; Apparatus and installations for lighting; electric lamps; electric torches for lighting; Furniture, namely, tables and chairs; furniture; mirrors, picture frames; non-modular containers, not of metal, for use in transportation and storage for commerical, non-commercial or industrial use; artificial horns, or mother-of-pearl unworked or semi-worked; shells, unworked or semi-worked; works of art of meerschaum; yellow amber, raw or partly worked; Corkboards
Scarf clips not being jewelry; Clasps for clothing; Scarf fastener, namely, scarf clips not being jewelry; Fasteners for securing scarves, namely, scarf clips not being jewelry; Fasteners for securing scarves in unique configurations, namely, scarf clips not being jewelry; Fasteners for securing scarves in stylish configurations, namely, scarf clips not being jewelry; Stylized fasteners for securing scarves, namely, scarf clips not being jewelry; Stylized fasteners for securing scarves in unique configurations, namely, scarf clips not being jewelry; Uniquely shaped fasteners for securing scarves, namely, scarf clips not being jewelry; Uniquely shaped fasteners for securing scarves in stylish configurations, namely, scarf clips not being jewelry
molds, namely pre-fabricated polymer molds for use in residential, industrial and commercial building construction in connection with fabrication of structural pillar supports