Use GleanMark for a free trademark search powered by millions of USPTO records. See similar trademarks, filter results, and sign up for active monitoring.
Dishware; Jugs; Automated pet appliances, namely, litter boxes; Automatic soap dispensers; Bathroom fittings, namely, dispensing units for household purposes for dispensing hygienic wipes and lotions, not for medical purposes; Bottle openers, electric and non-electric; Cake servers; Cleaning brushes for household use; Coffee servers; Coffee services in the nature of tableware; Dinnerware, namely, plates, cups and saucers; Fruit presses, non-electric, for household purposes; Gloves for household purposes; Grooming tools for pets, namely, combs and brushes; Ice cube molds; Kitchen containers; Kitchen mitts; Oven mitts; Syringes for watering flowers and plants; Window cleaners in the nature of a combination squeegee and scrubber; Wine glasses; Bath accessories, namely, cup holders
Class 009: Recorded computer software using artificial intelligence (AI) for cybersecurity risk management, continuous monitoring, and automated compliance with NIST Special Publication 800-53, NIST Special Publication 800-171, and FedRAMP requirements.
Providing online non-downloadable software for analyzing and preventing cyber threats in the fields of computer security; providing online non-downloadable computer software for provide real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; computer security consultancy; computer security consultancy in the nature of providing technical recommendations and advice in the fields of internet website, network, and computer data security; computer security consultation, namely, policy assessment; providing online non-downloadable computer software for providing real-time information security intelligence in the fields of computer, data, internet website, and network security; providing online non-downloadable computer software for protecting and securing computer networks and applications; providing online non-downloadable computer software for providing real-time security audits of an online application, network, and host; computer support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring vulnerability of networks, monitoring intrusions in networks; computer vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; cybersecurity diagnostic services, namely, computer security threat analysis for protecting data and network access; cybersecurity computer software maintenance services; cybersecurity, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials, detecting threats and intrusions, preventing intrusions; computer security consultation, namely, cybersecurity policy assessment; cybersecurity support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; data security computer software maintenance services; data security consultation, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; computer security consultation, namely, data security policy assessment; data security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; data security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; design and development of electronic data security systems; development of customized software for others for use in risk assessment and information security; computer consultation, services, namely, endpoint detection and response to software and hardware threats; firewall security assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; firewall security diagnostic services, namely, computer security threat analysis for protecting data, network security threat analysis for protecting data; firewall computer software security maintenance services; firewall security consultation, namely, security threat analysis for protecting data; computer security, namely, firewall security policy assessment; firewall security support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; firewall security vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer hardware diagnostic services; hardware security, namely, maintenance of computer hardware security systems; computer security consultation, namely, hardware security policy assessment; Technical support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; hardware vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; information technology diagnostic services, namely, computer security threat analysis for protecting data; information technology maintenance services, namely, computer software maintenance services; information technology security consultation, namely, security threat analysis for protecting data; computer security consultation, namely, information technology security policy assessment; information technology support services, namely, troubleshooting of computer software problems, monitoring technological functions of computer network systems, monitoring cybersecurity threats, preventing cyber intrusions; information technology vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance of computer software relating to computer security and prevention of computer risks; computer services, namely, managed detection and response of cyber intrusions and threats; managed security service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software, and web sites, of others in the fields of cybersecurity; computer network diagnostic services; computer network security consultation, namely, analysis for protecting data, administering digital credentials, enforcing network policies; computer network security consultation, namely, policy assessment; computer network support services, namely, installation, administration, and troubleshooting of cybersecurity applications; network vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; password diagnostic services; computer software and hardware password maintenance services; computer password security, namely, providing authentication, issuance, validation and revocation of digital credentials; password support services, namely, providing help desk services to retrieve computer software and hardware passwords; password vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; computer security consultancy; security policy assessment, namely, data security consultancy; support services, namely, troubleshooting of computer software problems, troubleshooting of information technology (IT) security problems; testing of computer software and hardware security systems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability; penetration testing for computer security threats for computer hardware and software; providing temporary use of online non-downloadable software for information technology (IT) security operations center management; software diagnostic services, namely, computer security threat analysis for protecting data; computer software maintenance services; information technology (IT) consultation for software security policy assessments, namely, computer security threat analysis for protecting data; software support services, namely, troubleshooting of computer software problems; vulnerability assessments, namely, scanning and penetration testing of computers and networks to assess information security vulnerability
Education Services in the nature of a competency-based learning platform in the nature of classes, workshops and seminars that enables learners to gain critical training and on-the-job training experience using methodologies, technologies, processes, and approaches in the fields of live-fire, real world monitoring of critical technology assets, namely, information technology (IT) security; Simulation-based training services in the field of cyber defense testing, namely, cyberwarfare exercises and information technology (IT) security operational training using sanitized data streams and structures; Training Services, namely, a live-fire Security Operations Center (SOC) that will provide 24x7x365 workforce development opportunities in the nature of classes, workshops and seminars by leveraging Security Clinic structures in the nature of monitoring, detection, response services for clientele
Class 042: Software as a service (SAAS) services, namely, hosting software for use by others for detecting and containing data breaches, monitoring computer systems to detect cybersecurity incidents, and restricting unauthorized access to computer systems, for use by Defense Industrial Base (DIB) companies
business consulting services, namely, providing assistance in promoting greater minority inclusion in the workforce and sourcing pipeline from minority business enterprises to support the needs of corporations and government entities; business services, namely, matching consumers, namely, minority business enterprises with computer security professionals offering corporate and governmental opportunities in the nature of computer security service contracts | educational services, namely, conducting workshops in the field of minority inclusion in the workforce and training to identify gaps on readiness for cyber security opportunities with corporations and governmental entities
Computer network security consultancy; Computer security threat analysis for protecting data; Computer services, namely, remote management of information technology (IT) systems of others comprised of Help Desk support, engineering projects, cyber security; Computer services, namely, remote and on-site management of the information technology (IT) cloud computing systems of others; Engineering and system analysis in the field of home security systems; IT consulting services; IT integration services; Maintenance of computer software relating to computer security and prevention of computer risks; Testing of security systems
Computer network security consultancy; Computer security threat analysis for protecting data; Computer services, namely, remote management of information technology (IT) systems of others comprised of Help Desk support, engineering projects, cyber security; Computer services, namely, remote and on-site management of the information technology (IT) cloud computing systems of others; Engineering and system analysis in the field of home security systems; IT consulting services; IT integration services; Maintenance of computer software relating to computer security and prevention of computer risks; Testing of security systems
Cybersecurity services in the nature of restricting unauthorized access to computer systems; IT integration services; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security threat analysis for protecting data; Computer network security consultancy; Computer services, namely, creating computer network-based indexes of information, websites and resources; Computer services, namely, on-site management of information technology (IT) systems of others; Computer services, namely, remote management of the information technology (IT) systems of others; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Consulting in the field of IT project management; Creating and designing website based indexes of information for others using information technology; Creating website based indexes of information for others using information technology; Designing website based indexes of information for others using information technology; Development of security systems and contingency planning for information systems; Providing planning and engineering services in the field of information and communications networks; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technology consultation in the field of cybersecurity
Downloadable computer application software for phones, computers, tablets, namely, software for healthcare services, exchanging information in the field of employment opportunities and career placement; recruitment, careers, and job listings; providing an on-line searchable database featuring classified ad listings and employment opportunities; career networking services; Online computer services, namely, providing a website that offers the exchange of information in the field of employment, careers, personal issues related to careers and work life, and job resources; Providing a website featuring on-line classified advertisements in the field of healthcare;Online computer services, namely, providing a website that offers the exchange of information in the field of employment opportunities and career placement; recruitment, careers, and job listings; providing an on-line searchable database featuring classified ad listings and employment opportunities; career networking services; Online computer services, namely, providing a website that offers the exchange of information in the field of employment, careers, personal issues related to careers and work life, and job resources
Antibacterial handwashes; Baby diapers; Baby food; Chemical preparations for pharmaceutical or medical purposes, namely, for endurance, anti-aging, anti-inflammation, weight-control; Dietary supplements for humans; Feminine hygiene pads; Gels, creams and solutions for dermatological use; Medicated mouthwash; Medicinal preparations for the mouth and as sprays; Medicinal preparations for the mouth to be applied in the form of drops, capsules, tablets and compressed tablets; Personal lubricants; Pharmaceutical preparations and substances for the treatment of infectious diseases, blood disorders, pain, inflammation, sepsis, alopecia, obesity and cognitive disorders; Powdered milk for babies; Sanitary pads
Application service provider services featuring software for use in creating, displaying, sharing and storing multimedia presentations and online scrapbooks that include photographs, documents, video, and sound, all in the field of personal history and storytelling; providing temporary use of non-downloadable computer software for use in creating, displaying, sharing, and storing multimedia presentations and online scrapbooks that include photographs, documents, video, and sound, all in the field of personal history and storytelling; providing temporary use of non-downloadable computer software that enables relationship groups to create and maintain personalised online archives and scrapbooks for the purpose of storing and sharing information regarding and among members of the relationship group
Mail order services featuring toy models sets, puzzles and toys; Providing a website featuring an online marketplace for exchanging goods and services with other users; Provision of an online marketplace for buyers and sellers of goods and services; Retail store services featuring toy models sets, puzzles and toys; Wholesale store services featuring toy models sets, puzzles and toys; On-line retail store services featuring toy models sets, puzzles and toys; On-line wholesale store services featuring toy models sets, puzzles and toys
Clutches for land vehicles; Covers for vehicle steering wheels; Electrically-powered motor vehicles; Fitted vehicle seat covers; Motor vehicles, namely, automobiles, trucks, vans, sport utility vehicles and structural parts therefor; Plastic parts for vehicles, namely, automotive exterior and interior plastic extruded decorative and protective trim; Rearview mirrors; Shock absorbers for automobiles; Tyres for vehicle wheels; Wheelchairs
Bags specially adapted for handheld video games; Children's educational toys for developing motor, cognitive and counting skills; Electronic learning toys; Handheld game consoles; Hobby grade engines for remote controlled air and surface vehicles; Mah jong games; Mechanical toys; Remote-controlled submarines being toys; Remote-controlled toy vehicles; Remote control toy glider, airplane and sailplane equipment, namely, launchers, engines and propellers; Remote control toys, namely, cars, race cars, airplanes and boats; Toy boats; Toy microscopes; Toy models; Video game consoles
Class 030: Tortillas; Toasted corn kernels; Tortilla chips; Class 043: Restaurant; Food preparation; Food preparation services; Food preparation services featuring Mexican dishes incorporating heirloom corn including tortillas, tamales, tlacoyas, carnitas, tortillas chips, pozole corn and hominy; Preparation of food and beverages; Restaurant and bar services; Restaurant and bar services, including restaurant carryout services; Restaurant and café services; Restaurant and catering services; Restaurant services; Restaurant services featuring Mexican dishes incorporating varieties of heirloom corn including tortillas, tamales, braised meats, carnitas, tlacoyas, hominy, dried corn kernels, tortilla chips and salsa; Restaurant services, including sit-down service of food and take-out restaurant services; Restaurants featuring home delivery; Café and restaurant services
Class 030: Toasted corn kernels; Tortilla chips; Tortillas; Class 043: Restaurant; Food preparation; Food preparation services; Food preparation services featuring dishes incorporating heirloom corn including tortillas, tamales, tlacoyas, carnitas, tortilla chips, pozole corn and hominy; Preparation of food and beverages; Restaurant and bar services; Restaurant and bar services, including restaurant carryout services; Restaurant and café services; Restaurant and catering services; Restaurant services; Restaurant services featuring Mexican dishes incorporating varieties of heirloom corn including tortillas, tamales, braised meats, carnitas, tlacoyas, hominy, dried corn kernels, tortilla chips and salsa; Restaurant services, including sit-down service of food and take-out restaurant services; Restaurants featuring home delivery; Café and restaurant services
Audio-receivers and video-receivers; Audio-video receivers; Cases for smartphones; Cell phones; Headsets for cellular or mobile phones; Headsets for telephones; Headsets for use with computers; Headsets for virtual reality games;[ Loudspeakers;] Microphones; Mobile phones; Pedometers; Smartglasses; Smartphones; [Smartwatches;] Theft alarms; Wearable activity trackers; Blank USB flash drives; Protective cases for smartphones; Speaker microphones; Virtual reality headsets
Electronic devices for non-invasive detecting of analytes in individuals for non-medical purposes | Electronic devices for non-invasive detecting of analytes in individuals for medical purposes | Software as a Service featuring software for collection and reporting of user data acquired non-invasively from electronic devices and Platform as a Service featuring computer software platforms for collection and reporting of user data acquired non-invasively from electronic devices
Class 021: Drinking bottles for sports, namely, reusable plastic water bottles, reusable metal water bottles, insulated thermoses for beverage, and shaker bottles sold empty.