GleanMark

CM Trademark

CM is a USPTO trademark filed by Cheetah Mobile Inc.. Status: Registered.

Trademark Facts

MarkCM
Serial Number86263557
Registration Number5059928
StatusRegistered
Filing Date2014-04-25
Registration Date2016-10-11
Mark TypeStylized
Nice Classes009 (Electronics & Software), 035 (Advertising & Business), 042 (Software & IT)
OwnerCheetah Mobile Inc.
Attorney of RecordJIE LISA LI
Prosecution Events49
Latest EventREM2 on 2025-10-11

Goods & Services

House mark for a line of computer security and privacy software; house mark for a line of computer antivirus software; house mark for a line of utilities software; computer software for the creation of firewall; computer software for use in browsing the Internet; house mark for a line of computer software for system cleaning and optimization; [ computer software for developing and operating cloud computer networks and applications; computer software platforms for cloud computing networks and applications for use in database management and electronic storage of data; computer software used for providing search engine services; ] house mark for a line of computer software for use in testing and evaluating the function of mobile devices and computers | [ Advertising and marketing services, namely, promoting the brands, goods, and services of others; Dissemination of advertising and marketing information for others via the Internet; Online advertising services for others, namely, connecting advertising resource on internet web sites to others; Advertising and marketing services provided by means of online marketing communications, namely, social media, search engine marketing, internet marketing, mobile marketing; Development, operation and administration of online platforms as means for advertising of the goods and services of others; Consultation services in the field of advertising via the Internet ] | [ Computer services, namely, cloud hosting provider services; consulting services in the field of cloud computing; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer services, namely, providing search engines for obtaining data on a global computer network; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses and unauthorized data and programs on computers and electronic devices; providing an on-line network environment that features technology that enables users to share data; computer software design, computer programming, and maintenance of computer software; computer software consulting; computer services, namely, hosting on-line platform for generating, aggregating, and disseminating information about products and services of others ]

Related