Use GleanMark for a free trademark search powered by millions of USPTO records. See similar trademarks, filter results, and sign up for active monitoring.
Decorative boxes made of precious metal; Fitted jewelry pouches; Jewellery boxes; Jewelry boxes; Jewelry boxes not of metal; Jewelry cases; Jewelry organizer rolls for travel; Jewelry rolls for storage; Leather jewelry boxes for jewelry and jewelry accessories; Musical jewelry boxes; Presentation boxes for jewelry
Cosmetic cotton wool; Disposable wipes impregnated with cleansing chemicals or compounds for household use; Kits for removing scratches from automotive finishes and metal trims comprised of buffing compound for automobiles and also including wool buffing pads; Nail enamels; Non-medicated preparations all for the care of skin, hair and scalp; Skin care preparations, namely, skin peels; Skin care products, namely, non-medicated skin serum; Toning lotion, for the face, body and hands
Downloadable computer utility software for performing computer maintenance; recorded computer utility software for performing computer maintenance; downloadable software for ensuring the security of electronic mail; recorded computer anti-virus software; downloadable computer software for secure administration of computer networks; downloadable computer software for transmitting electronic mail and messages | Processing computer data for processing malicious electronic mail and the contents thereof; managing and compiling computer databases for processing malicious electronic mail and the contents thereof; compilation and systematization of information within computer databases; electronic advertising management services; business management in relation to electronic messaging services | Secure transfer of data via telecommunication channels; secure transmission of data via telecommunication channels; electronic messaging services | Security services for computer networks, computer access and computer-based transactions, namely, computer network security consultancy, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities, computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; threat analysis regarding computer security for data protection; design and development of electronic data security systems; technical support, namely, providing computer facilities for the electronic storage of digital data for security purposes; design, programming, development, installation, updating and maintenance of data transmission software for security purposes; computer services, namely, filtering of unwanted electronic mail and the contents thereof; software as a service (SAAS) services featuring software for ensuring the security of electronic messages; scientific and technological research in the field of electronic messaging security and in the development of computer software for security purposes; scientific and technological research relating to patent mapping in the field of messaging security, electronic mail and computer software; data encryption services in the context of processing, filtering and storing electronic mail and the contents thereof; computer security consultancy with respect to messaging security; electronic monitoring of electronic mail to detect unauthorized access or data protection breaches; technical support services, namely, technical administration of electronic mail servers for others; technical support services for others, namely, technical administration of electronic mail servers for security purposes
Downloadable computer utility software for performing computer maintenance; recorded computer utility software for performing computer maintenance; downloadable software for ensuring the security of electronic mail; recorded computer anti-virus software; downloadable computer software for secure administration of computer networks; downloadable computer software for transmitting electronic mail and messages | Computer data processing for processing malicious e-mails and their contents; managing and compiling computer databases for processing malicious e-mails and their contents; compilation and systematization of information within computer databases; electronic advertising management services; business management in relation to electronic messaging services | Secure data transfer via telecommunication channels; secure data transmission via telecommunication channels; electronic messaging services | Security services for computer networks, computer access and computerized transactions, namely, computer network security consultancy, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities, computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; threat analysis regarding computer security for data protection; design and development of electronic data security systems; technical support, namely, providing computer facilities for electronic data storage for security purposes; designing, programming, developing, installing, updating and maintaining data transmission software for security purposes; computer services, namely, filtering of unwanted electronic mail and the contents thereof; software as a service (SAAS) services featuring software for ensuring the security of electronic messages; scientific and technological research in the field of electronic messaging system security and in the development of computer software for security purposes; scientific and technological research relating to patent mapping in the field of security of messaging systems, electronic mail and computer software; data encryption services in the framework of processing, filtering and storage of electronic messages and contents thereof; computer security consultancy with respect to electronic messaging system security; electronic monitoring services for electronic messaging systems to detect unauthorized access or data protection breaches; technical support services, namely, technical administration of electronic messaging servers for others; technical support services for others, namely, technical administration of electronic messaging servers for security purposes
Desks; Sofas; Wardrobes; Workbenches; Baby walkers; Fishing baskets; Fitted furniture covers; Furniture for children; Furniture of metal; Futon mattresses; Head supporting pillows; Moldings for picture frames; Nesting boxes for animals; Pet cushions; Placards of wood or plastic; Plastic door hangers for indicating the room occupant's activity; Residential and commercial furniture; Television stands; Towel racks; Wood crates
Downloadable operating system programs; Electric navigational instruments; Car navigation computers; Satellite-aided navigation systems; Navigation apparatus for vehicles; GPS navigation device; Electronic navigational and positioning apparatus and instruments; Radio receivers and transmitters; Navigation apparatus for boats; Satellite navigational system, namely, a global positioning system (GPS); Blind spot cameras for cars; Loudspeakers; Audio speakers for automobiles; Audio equipment for vehicles, namely, loud speakers for automotive audio systems; Car cassette players; Control units for regulating start-up electrical motors; Loran navigation machines and apparatus
Airsoft guns for recreational purposes; Children's educational games for developing fine motor, cognitive, counting skills; Children's educational toys for developing fine motor, oral language, numbers, counting, colors and alphabet skills sold in a fabric bag which has a clear vinyl window for viewing small trinkets and toys securely contained within the bag itself; Fidget toys; Novelty noisemaker toys for parties; Novelty toys for playing jokes; Outdoor activity game equipment sold as a unit comprising sports balls, baseball bats for playing games; Paper party hats; Party balloons; Squeeze toys; Stress relief balls for neck, hand, back exercise; Stress relief exercise balls; Stress relief exercise toys; Toy balloons; Toy chemistry sets; Toy guns; Toy projectile shooters and accessories therefor; Toy water guns
Wires, electric; Mobile telephones; Scales; Telescopes; Fire extinguishers; Measuring rules; Distance measuring apparatus; Electronic key fobs being remote control apparatus; Semiconductors; Face-shields for protection against accidents, irradiation and fire; Alarm installations; Sports whistles; Spectacles; Cameras
Television broadcasting; Computer-aided transmission of messages and images; Video-on-demand transmission; Videoconferencing services; Providing access to databases; Providing online forums; Wireless broadcasting; News agencies, namely, the transmission of news items to news reporting organizations; Message sending and receiving services
Planning and arranging of wedding ceremonies; Monitoring of burglar and security alarms; Domain name registration services, namely, conducting domain name searches for the purpose of providing legal advice on domain name registration; Online social networking services; Surveillance services by drone; Opening of security locks; Burial services; Clothing rental; Pet sitting
Furniture; Pillows; Bean bag pillows; Bed pillows; Beds, mattresses, pillows and bolsters; Mattresses and pillows; Nap mats; Neck pillows; Novelty pillows; Pillow-like device comprising plastic core, fabric, and cushion material to be worn on arm or leg while sleeping or at rest; Residential and commercial furniture; Sleep products, namely, mattresses, spring mattresses, box springs and mattress foundations; Sleeping mats; Throw pillows; U-shaped pillows
Computer game joysticks; Controllers for game consoles; Fitted covers specially adapted to protect video game consoles for use with an external display screen or monitor; Game controllers for computer games; Game controllers in the nature of keyboards for computer games; Gaming keypads; Hand-held consoles for playing video games; Protective carrying cases specially adapted for handheld video games; Protective covers specially adapted for electronic game playing apparatus, namely, video game consoles, hand-held video game units; Toy balloons; Video game joysticks; Video gaming consoles for playing computer games; Yoga cushions
[ Bed covers; ] Bed linen and table linen; Canvas and muslin backdrops for use in photographic and video production; [ Covers for cushions; ] Curtains; Curtains of textile; [ Pillow-top, low-profile bed skirts; Pillow covers; ] Plastic table covers; Shower room curtains; Table linen; Table linen of textile; Table runners not of paper; Tablecloths of textiles; Textile tablecloths; Bed linen and table linen | Belts made out of cloth; Belts; Belts for clothing; Belts of textile; Fabric belts; Leather belts; Sashes; Sashes for wear; Sashes for wear; Waist belts; Waistbands
Webcams; Cameras; Wireless speakers; Batteries and battery chargers; Wireless chargers; Car video recorders; Protective helmets; Stands adapted for tablet computers; Rechargeable batteries; Covers for smartphones; Video projectors; Walkie-talkies; Computer hardware and computer peripheral devices; Protective films adapted for smartphones; Microphones; Earphones and headphones; Stands adapted for mobile phones; Computer network adapters, switches, routers and hubs; Electric bark control dog collars; LED monitors