Filters
Also try searching for:
ULT*
on 20 Nov 2024
TMRW LIFE SCIENCES, Inc.
2363663 · 16 Oct 2024
011
Class 011
Environmental Control Instrument Products (lighting,heating,cooling,cooking)
Cryogenic freezers.
Cryogenic freezers.
on 10 Oct 2024
Wolf Haus Games Inc.
2355246 · 10 Oct 2024
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Audio books; computer screensaver software; digital music downloadable from the Internet; downloadable computer game software for use on mobile and cellular phones; downloadable computer game software via a global computer network and wireless devices; downloadable digital books; downloadable digital content being videos; downloadable electronic publications in the nature of comics, comic strips, comic books and stories in illustrated form; downloadable electronic publications in the nature of magazines in the field of video games; downloadable electronic publications namely journals in the field of computer games and video games; downloadable electronic publications namely newsletters in the field of computer games and video games; downloadable musical sound recordings; downloadable podcasts; downloadable video game assets sold individually, namely downloadable digital files containing videogame avatars, clothing, pets, vehicles, items, tools, toys, terrain, 3D objects, textures, meshes, animations, sound effects, music, emotes, and gestures for use in video game development; downloadable video game characters; downloadable video games; downloadable virtual reality game software; electronic calendars; gaming headsets adapted for use in playing video games; interactive multimedia computer games; mousepads; video game cartridges; video game cassettes; video game discs; video game programs; video game software; video games and downloadable video game software; video games for use with video game consoles
041
Class 041
Education and Entertainment Services
Conducting tournaments, contests and competitions in the field of computer games; editing of video games; entertainment services in the nature of non-downloadable digital content being videos via the Internet; entertainment services, namely, providing on-line, non- downloadable virtual art works, photographs, images, animation, and videos for use in virtual environments; entertainment services, namely, providing online computer games; entertainment services, namely, providing online electronic games; entertainment services, namely, providing temporary use of non-downloadable computer games; organization of online computer game competitions; organization of online gaming contests; organization of video gaming leagues; production of video games and computer games; providing assistance, advisory, consultancy and information services in the field of video games; providing information on entertainment in the field of computer games and video games; providing interactive multiplayer online computer games via a global network; providing online non-downloadable audio and visual recordings in the field of computer games and video games; providing user rankings and ratings for video game content for entertainment purposes via a website
Audio books; computer screensaver software; digital music downloadable...
on 13 Nov 2024
Shanghai Xiedian Eletronic Commerce Co., Ltd.
2361969 · 27 Aug 2024
003
Class 003
Cosmetics and Cleaning Products
Facial washes; stain removers; soap; essential oils; cosmetics; toothpaste; nail polish; cosmetics for animals; air fragrancing preparations; beauty masks.
035
Class 035
Advertising, Business & Retail Services
Presentation of goods on communication media, for retail purposes; commercial administration of the licensing of the goods and services of others; business management of hotels; provision of an online marketplace for buyers and sellers of goods and services; sales promotion for others; procurement services for others [purchasing goods and services for other businesses]; marketing; personnel management consultancy; employment agency services; publicity.
Facial washes; stain removers; soap; essential oils; cosmetics; toothp...
on 04 Sep 2024
D. PORTHAULT
2347880 · 22 Aug 2024
004
Class 004
Lubricant and Fuel Products
Bougies; bougies parfumées; veilleuses [bougies].
024
Class 024
Fabrics
Tissus, couvertures de lit et de table, articles textiles non compris dans d'autres classes; tissus à usage textile; matières textiles; non-tissés [textile]; linge de maison; linge ouvré; linge de table en matières textiles; gigoteuses [turbulettes]; nids d'ange; tours de lit d'enfant [linge de lit]; housses de couette, draps, taies d'oreillers et taies de traversins; nappes; napperons individuels; chemins de table; dessous de carafes en matières textiles; ronds de table en matières textiles; serviettes de table et tapis de table en matières textiles; toiles cirées (nappes); couvertures de lit et de table; draps; enveloppes de matelas; toile à matelas; linge de lit; literie (linge); édredons; couettes; cache-sommiers; sacs de couchage (enveloppes cousues remplaçant les draps); dessus-de-lit (couvre-lits); édredons (couvre-pieds de duvet); couvre-pieds; courtepointes; housses et taies d'oreillers; housses pour coussins; essuie-mains en matières textiles; linge de bain (à l'exception de l'habillement); serviettes de plage; mouchoirs de poche et serviettes à démaquiller en matières textiles; gants et serviettes de toilette en matières textiles; essuie-verres; tissus d'ameublement; embrasses en matières textiles; tissus et étoffes pour meubles; housses de protection pour meubles; revêtements de meubles en matières textiles ou en matières plastiques; portières (rideaux); voilages [rideaux]; rideaux en matières textiles ou en matières plastiques; rideaux de douche en matières textiles ou en matières plastiques; tentures murales en matières textiles; bannières; calicots; drapeaux et fanions (non en papier); étiquettes en tissu; coiffes de chapeaux; couvertures de voyage, plaids; canevas pour la tapisserie ou la broderie; tissus recouverts de motifs dessinés pour la broderie; toiles gommées (autres que pour la papeterie); textiles non-tissés; tricots (tissus); tissus de laine, de lin et de jute; tissus de coton, cotonnades; tissus de soie; crêpe (tissu), crépon; étoffes de laine; doublures (étoffes); moleskine (tissu), flanelle (tissu), jersey (tissu), taffetas (tissu); tulles; velours; damas (étoffe); frise (étoffe); matières plastiques (succédanés du tissu); tissus élastiques; tissus en fibres de verre à usage textile; tissus imitant la peau d'animaux; housses pour abattants de toilettes.
...
Class 025
Clothing Products
Vêtements, chaussures, chapellerie; robes de chambre; peignoirs de bain; chaussons, pantoufles; sandales et souliers de bain; bonnets de bain; bonnets de douche; kimonos; maillots de bain; sous-vêtements; layettes; pyjamas; ponchos; bavoirs non en papier; bandanas [foulards]; bandeaux pour la tête [habillement]; masques pour dormir; tabliers [vêtements].
Class 027
Floor Covering products
Tapis, paillassons, nattes, linoléum et autres revêtements de sols; descentes de bain [tapis]; tapis antiglissants; papiers peints textiles; revêtements muraux en matières textiles; sous-tapis.
Bougies; bougies parfumées; veilleuses [bougies].,Tissus, couvertures ...
on 08 Aug 2024
PURITY GAS INC.
2342841 · 08 Aug 2024
007
Class 007
Machinery Products
Air compressors
011
Class 011
Environmental Control Instrument Products (lighting,heating,cooling,cooking)
Gas purifiers for nitrogen gas generation; Housing for gas purifiers for nitrogen gas generation;
Air compressors,Machines used for the separation and concentration of ...
on 06 Aug 2024
TIKTOK LTD.
2342254 · 06 Aug 2024
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Computer application software for live streaming user-generated audio and video messages on an online social networking portal via the internet; computer e-commerce software to allow users to perform electronic business transactions via a global computer network; computer software applications for mobile phones and handheld computers for coordinating live video and social media feeds; computer software for electronic trading of virtual currency; computer software for processing digital images; computer software for use as an application programming interface (API) for use in the fields of image content analysis; computer software platforms for social networking; downloadable computer applications for sending, receiving, buying, selling, trading and exchanging virtual digital currency; downloadable computer software applications for social networking services; downloadable emoticons; downloadable graphics for mobile phones; downloadable mobile application e-commerce software to allow users to perform electronic business transactions via a global computer network; downloadable mobile application software for sending status updates to subscribers of web feeds for use in social media; downloadable mobile application to allow users to search, identify, and redeem loyalty reward offers; image recognition software; mobile applications for sending, receiving, buying, selling, trading and exchanging virtual currencies, digital and blockchain assets
041
Class 041
Education and Entertainment Services
Digital imaging of artwork; entertainment services in the nature of non-downloadable digital content being videos via the Internet; multimedia entertainment software publishing services; providing entertainment information in the field of social media via the internet; providing on-line videos, not downloadable, in the field of social media via the internet; providing online computer games through social media websites
...
Class 042
Computer & Software Services & Scientific Services
Computer programming; computer services, namely, creating an online community for registered users to participate in discussions, share recommendations, get feedback from their peers, from virtual communities and engage in social networking; computer software design and development; online platform for the transfer and exchange of virtual currencies; platform as a services (PAAS) featuring computer application interface [API] integration software for online marketplaces; providing temporary use of non-downloadable computer software for image processing; providing temporary use of non-downloadable software applications for social networking; providing temporary use of non-downloadable software that enables online users to create personal profiles featuring social networking information via a web site; software as a service (SAAS) featuring software for sending, receiving, buying, selling, trading and exchanging virtual currencies, digital and blockchain assets; software as a service (SAAS) featuring software to allowing users to search, identify, and redeem loyalty reward offers; software as a service (SaaS) provider in the field of software that supports interaction between computer applications with computer data from application programming interfaces (APIs), digital databases and digital files
Computer application software for live streaming user-generated audio ...
on 04 Sep 2024
BROOKS SPORTS INC.
2347786 · 22 Jul 2024
025
Class 025
Clothing Products
Footwear.
Footwear.
on 04 Sep 2024
CLIMATE VAULT INC.
2347633 · 05 Jun 2024
036
Class 036
Insurance & Financial Services
Consulting services in the field of brokerage and trading of carbon credits; brokerage of carbon credits, namely, assisting others in purchasing, selling, and trading carbon credits.
042
Class 042
Computer & Software Services & Scientific Services
Consulting services in the fields of reduction of carbon emissions, climate change, and environmental science in the nature of environmental sustainability.
Consulting services in the field of brokerage and trading of carbon cr...
on 24 Jul 2024
TECHSOLOGIC INCORPORATED
2340163 · 25 Apr 2024
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Downloadable computer security software for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer application software for mobile telephones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable application software for smartphones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; smartphone software applications, downloadable for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer software applications for smartphones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable software applications for cell phones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer software applications for mobile telephones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable applications for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer utility programs for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; computer software applications, downloadable for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer software applications for cellular phones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer application software for cellular phones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable software applications for smartphones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable software applications for mobile telephones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable cloud-based software for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable smartphone apps [software] for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer application software for cellular telephones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; computer application software for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer software for tablets for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable apps for encrypted security and cryptographic protection of digital assets and sensitive data, featuring advanced access control mechanisms including biometric, PIN, security key, and device-based authentication; downloadable computer security software for encrypted security and cryptographic protection of digital assets and sensitive data, tailored for integration within a Data Self-Governance compliant digital vault environment; downloadable computer application software for mobile telephones for encrypted security and cryptographic protection of digital assets and sensitive data, designed to support Data Self-Governance principles; downloadable application software for smartphones for encrypted security and cryptographic protection of digital assets and sensitive data, ensuring adherence to Data Self-Governance as a Service protocols; smartphone software applications, downloadable for encrypted security and cryptographic protection of digital assets and sensitive data, suitable for use within Data Self-Governance secured environments; downloadable computer software applications for smartphones for encrypted security and cryptographic protection of digital assets and sensitive data, customized for Data Self-Governance compliance; downloadable software applications for cell phones for encrypted security and cryptographic protection of digital assets and sensitive data, featuring compliance with Data Self-Governance standards; downloadable computer software applications for mobile telephones for encrypted security and cryptographic protection of digital assets and sensitive data, developed under Data Self-Governance guidelines; downloadable applications for encrypted security and cryptographic protection of digital assets and sensitive data, aligned with the principles of Data Self-Governance and Data Self-Governance as a Service; downloadable computer utility programs for encrypted security and cryptographic protection of digital assets and sensitive data, integrated within a Data Self-Governance framework; computer software applications, downloadable for encrypted security and cryptographic protection of digital assets and sensitive data, tailored for operation within digital vaults that adhere to Data Self-Governance protocols; downloadable computer software applications for cellular phones for encrypted security and cryptographic protection of digital assets and sensitive data, optimized for Data Self-Governance compliant secure environments; downloadable computer application software for cellular phones for encrypted security and cryptographic protection of digital assets and sensitive data, developed to facilitate Data Self-Governance and Data Self-Governance as a Service implementations; downloadable software applications for smartphones for encrypted security and cryptographic protection of digital assets and sensitive data, designed to enhance security measures under Data Self-Governance standards; downloadable software applications for mobile telephones for encrypted security and cryptographic protection of digital assets and sensitive data, ensuring compliance with Data Self-Governance and Data Self-Governance as a Service requirements; downloadable cloudbased software for encrypted security and cryptographic protection of digital assets and sensitive data, supporting Data Self-Governance principles through cloud technologies; downloadable smartphone apps [software] for encrypted security and cryptographic protection of digital assets and sensitive data, structured to conform to Data Self-Governance operational protocols; downloadable computer application software for cellular telephones for encrypted security and cryptographic protection of digital assets and sensitive data, built to align with Data Self-Governance and Data Self-Governance as a Service frameworks; computer application software for encrypted security and cryptographic protection of digital assets and sensitive data, integrating Data Self-Governance compliant mechanisms; downloadable computer software for tablets for encrypted security and cryptographic protection of digital assets and sensitive data, customized to support Data Self-Governance compliance in digital asset management; downloadable apps for encrypted security and cryptographic protection of digital assets and sensitive data, designed to function within environments regulated by Data Self-Governance principles; all the foregoing limited to digital security software on the secure management, storage, and encryption of digital assets and sensitive data, and which facilitates the encryption, backup, recovery, and secure storage of critical and sensitive digital information, and not in respect of general consumer software, entertainment, or unrelated technological fields.
042
Class 042
Computer & Software Services & Scientific Services
Computer software programming for scanning or reading a QR code via mobile devices, tailored specifically for secure digital asset management environments, enhancing security protocols; computer programming of software for scanning or reading a bar code via mobile devices, tailored specifically for secure digital asset management environments, enhancing security protocols; computer programming of software for scanning or reading a QR code via mobile devices, tailored specifically for secure digital asset management environments, enhancing security protocols; programming of computer software for scanning or reading a QR code via mobile devices, tailored specifically for secure digital asset management environments, enhancing security protocols; computer programming of computer software for scanning or reading a bar code via mobile devices, tailored specifically for secure digital asset management environments, enhancing security protocols; computer programming of computer software for scanning or reading a QR code via mobile devices, tailored specifically for secure digital asset management environments, enhancing security protocols; computer software programming for scanning or reading a QR code via computer networks, tailored specifically for secure digital asset management environments, enhancing security protocols; user authentication services using single sign-on technology for online software applications, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; user authentication services using biometric hardware and software technology for access control, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; user authentication services using biometric hardware and software technology for managing human identification, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; user authentication services using biometric hardware and software technology for password management, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; providing user authentication services using biometric hardware and software technology for access control, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; providing user authentication services using biometric hardware and software technology for managing human identification, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; user authentication services using biometric hardware and software technology for managing identification of things, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; providing user authentication services using biometric hardware and software technology for password management, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; providing user authentication services using biometric hardware and software technology for managing identification of things, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; providing user authentication services using biometric hardware and software technology for e-commerce transactions, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems; authentication services for computer security, offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; electronic signature verification services using technology to authenticate user identity, offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; electronic cryptology services in the nature of electronic data encryption services, providing advanced encryption services for digital images and data to secure sensitive information during transmission and storage; computer security services in the nature of providing authentication, issuance, validation, and revocation of digital keys, offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; computer security services for managing digital certificates, offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; digital signature verification services [electronic cryptology services], offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; identity verification services [computer security], offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; identity verification [computer security], offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; authentication, issuance and validation of digital keys, offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; providing authentication of personal identification information [computer security services], offering enhanced security measures for the protection and management of digital assets, including cryptographic solutions and digital signature validation tailored for financial and personal data; encryption, decryption, and authentication of information, messages, and data, offering enhanced encryption technologies to secure digital communications and sensitive information against unauthorized access and data breaches; cryptographic engineering, providing specialized encryption services tailored to secure sensitive and critical information, including but not limited to digital assets and personal data; digital image encryption services, focused on providing high-security solutions for protecting digital images from unauthorized access and tampering; encryption of digital images, ensuring the security and integrity of digital visual content through advanced encryption standards; electronic storage of digital video files, providing secure digital storage solutions with advanced encryption and access controls to ensure data privacy and integrity; electronic storage of digital videos, focused on maintaining high security and data integrity in digital video storage through encrypted services; electronic storage of digital images, providing secure cloud-based solutions for storing sensitive visual content, ensuring data integrity and preventing unauthorized access; electronic storage of digital audio files, offering encrypted storage services that safeguard audio data against unauthorized access and corruption; electronic storage of digital photographs, ensuring the secure archiving of digital photo data with comprehensive encryption and secure access protocols; electronic storage of digital music, providing secure storage solutions that protect musical digital files from piracy and unauthorized distribution; electronic storage of images and videos, offering robust digital archiving services with advanced security measures to ensure the safety and confidentiality of multimedia files; electronic storage services for archiving electronic data, providing secure cloud-based solutions for businesses and individuals to safely store and manage their digital information with full encryption and access control; electronic storage of files and documents, focused on providing secure and encrypted storage solutions tailored for sensitive and critical business and personal documents; electronic storage services for archiving databases, offering secure database management solutions with strong encryption and real-time backup capabilities; electronic data storage and data backup services, providing comprehensive solutions for securely backing up and restoring digital assets and sensitive data in the event of data loss or system failure; electronic storage and retrieval services for archiving biological data, offering specialized storage solutions tailored for sensitive biological and medical data with enhanced security measures; electronic data log storage, providing secure and encrypted logging services to ensure the integrity and confidentiality of transaction logs and other sensitive data entries; computerised data storage services, offering advanced digital storage solutions that include encrypted data management and secure access systems to ensure data safety and privacy; online data storage and on-line data storage services, providing cloud-based solutions for secure and accessible online storage of digital assets, allowing for secure management and retrieval of data from anywhere; authentication services for computer security featuring advanced biometric capabilities, utilizing fingerprint, facial recognition, iris scanning, and other biometric technologies to ensure secure user verification and access control; authentication services for computer security incorporating multi-factor authentication, combining biometrics, hardware tokens, security keys, and PINs to enhance the security layers protecting user data and access points; authentication services for computer security utilizing device-based recognition systems, where access is granted based on the authentication of a registered device, adding an extra layer of security by linking user access specifically to their hardware; authentication services for computer security that integrate traditional security methods such as security keys and PINs with modern biometric verification, providing a robust, hybrid security solution that covers both physical and digital authentication mechanisms; user authentication services using biometric hardware and software technology for access control, specifically designed for legacy planning and secure transfer of digital asset control to designated beneficiaries under predefined conditions; user authentication services using biometric hardware and software technology for access control, tailored for the seamless and secure inheritance of digital assets, ensuring that biometric data and other secure access methods are transferable according to the user's estate plans; user authentication services using biometric hardware and software technology for access control, incorporating advanced encryption and secure protocols to facilitate the transition of access rights to digital assets from the original owner to heirs or designated entities; user authentication services using biometric hardware and software technology for access control that includes features to manage digital assets posthumously, enabling executors or legal representatives to access or transfer assets securely, adhering to the wishes of the deceased; authentication, issuance, and validation of digital keys, designed with redundant key systems to prevent lockouts, ensuring users have multiple ways to authenticate and gain access to their digital vaults without compromising security; authentication, issuance, and validation of digital keys that include advanced recovery options, such as biometrically enabled recovery processes or multi-factor authentication steps, to restore access in case primary keys are lost or compromised; authentication, issuance, and validation of digital keys, allowing trusted individuals or entities to access the vault under strict conditions defined by the original user; authentication and issuance of digital keys that include self-recovery options through rigorous identity verification processes, allowing users to regain access through steps that securely confirm their identity without external intervention; authentication, issuance, and validation of digital keys with integrated time-lock features, allowing vault owners to set specific time windows for access, thereby restricting entry to the vault outside these predefined periods; software as a Service (SaaS) providing encrypted security and cryptographic protection for digital assets and sensitive data, with features including advanced access control through biometric, PIN, security key, and device-based authentication systems tailored for enhanced user security; software as a service (SaaS) featuring secure management and cryptographic protection of digital assets and sensitive information, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring database management software providing advanced encryption and access controls for digital asset protection, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software for use in database management with robust security features tailored for digital assets and sensitive data management, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring artificial intelligence software for facial and speech recognition technologies for secure identity verification and authentication in managing digital assets, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring artificial intelligence software for face and speech recognition tools designed to enhance security protocols for digital asset access and management, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring word processing software with integrated security features for encrypted document creation and management, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring artificial intelligence software for use in facial and speech recognition technologies for facial and speech recognition, ensuring secure user authentication and data protection, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software using artificial intelligence for facial and speech recognition capabilities, focusing on secure and encrypted access to digital resources, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software using artificial intelligence for face and speech recognition services, aimed at strengthening security measures for digital asset handling, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software using artificial intelligence for use in facial and speech recognition to bolster secure access controls for sensitive digital environments, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring artificial intelligence software for use in face and speech recognition, designed to authenticate and secure access to digital assets, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software using artificial intelligence for use in face and speech recognition to support secure user authentication through face and speech recognition for digital asset management, specifically tailored for use within a digital vault environment; computer security services for managing digital certificates with enhanced security for authentication and data integrity in digital asset transactions, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software for use as a word processor offering encryption and secure access features for safeguarding sensitive information, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software for use in word processing tools that include data protection and security measures tailored for confidentiality, specifically tailored for use within a digital vault environment; software as a service (SaaS) featuring software for use as a spreadsheet with integrated security functions for managing and protecting sensitive financial and asset data, specifically tailored for use within a digital vault environment; computer security services in the nature of providing digital certificates to authenticate and secure digital transactions and communications, specifically tailored for use within a digital vault environment; computer security services providing comprehensive security services for the protection and management of digital assets and sensitive data, specifically tailored for use within a digital vault environment; digital signature verification services (electronic cryptology services) offering digital signature verification to ensure the security and integrity of electronic transactions involving digital assets, specifically tailored for use within a digital vault environment; data security services providing data security solutions focused on the encrypted storage and safe handling of digital assets and sensitive information, specifically tailored for use within a digital vault environment; digital archiving services offering digital archiving solutions with advanced security features to protect and preserve digital assets over long periods, specifically tailored for use within a digital vault environment; identity verification services (computer security) providing identity verification services using advanced biometric and cryptographic technologies to ensure secure access to digital systems, specifically tailored for use within a digital vault environment; electronic cryptology services in the nature of digital certificate and digital signature verification services offering cryptology services focused on the verification of digital certificates and signatures to secure digital transactions, specifically tailored for use within a digital vault environment; quality control and authentication services providing quality control and authentication services to ensure the security and authenticity of digital transactions and asset management, specifically tailored for use within a digital vault environment; digital music encryption services offering encryption services specifically for digital music to ensure secure storage and transmission, specifically tailored for use within a digital vault environment; authentication services for computer security providing authentication services designed to secure access to computer systems and protect digital assets, specifically tailored for use within a digital vault environment; platform as a service (PaaS) that includes tools and services for secure digital asset management and protection, specifically tailored for use within a digital vault environment; user authentication services using biometric hardware and software technology for point-of-sale transactions providing user authentication services at point-of-sale using biometric technology to secure transactions involving digital assets, specifically tailored for use within a digital vault environment; IT services for data protection specifically focused on the protection of digital assets and sensitive data through advanced security measures, specifically tailored for use within a digital vault environment; information technology services for data protection providing information technology services that emphasize the secure management and protection of digital assets and sensitive information, specifically tailored for use within a digital vault environment; computer software programming for scanning or reading a QR code via mobile devices, tailored specifically for secure digital asset management environments adhering to Data Self-Governance and Data Self-Governance as a Service protocols, enhancing security protocols; computer programming of software for scanning or reading a bar code via mobile devices, developed to facilitate Data Self-Governance and Data Self-Governance as a Service implementations, enhancing security protocols within secure digital asset management environments; computer programming of software for scanning or reading a QR code via mobile devices, optimized for environments that comply with Data Self-Governance and Data Self-Governance as a Service standards, enhancing security protocols; programming of computer software for scanning or reading a QR code via mobile devices, integrated within a Data Self-Governance framework to enhance security protocols in secure digital asset management environments; computer programming of computer software for scanning or reading a QR code via mobile devices, developed specifically for secure digital asset management environments that adhere to Data Self-Governance and Data Self-Governance as a Service standards, thereby enhancing security protocols; computer software programming for scanning or reading a QR code via computer networks, optimized for integration within digital vault environments regulated by Data Self-Governance principles, aiming to enhance security protocols; user authentication services using single sign-on technology for online software applications, tailored to secure user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems, compliant with Data Self-Governance requirements; user authentication services using biometric hardware and software technology for access control, designed to secure user access to digital assets and sensitive information in environments adhering to Data Self-Governance and Data Self-Governance as a Service frameworks; user authentication services using biometric hardware and software technology for managing human identification, structured to enhance the security protocols within digital asset management systems that operate under strict Data Self-Governance standards; user authentication services using biometric hardware and software technology for password management, focused on providing robust security solutions for the management of digital assets and sensitive information within Data Self-Governance compliant environments; providing user authentication services using biometric hardware and software technology for access control, designed specifically to secure user access to digital assets and sensitive information, leveraging advanced multi-factor and biometric authentication systems compliant with Data Self-Governance principles; providing user authentication services using biometric hardware and software technology for managing human identification, optimized to enhance security measures in managing digital assets and sensitive information through the use of advanced multi-factor and biometric authentication systems, aligned with Data Self-Governance and Data Self-Governance as a Service protocols; user authentication services using biometric hardware and software technology for managing identification of things, tailored to ensure robust security for digital assets and sensitive information by incorporating advanced multi-factor and biometric authentication systems, within a Data Self-Governance regulated environment; providing user authentication services using biometric hardware and software technology for password management, focused on securing user access and enhancing protection of digital assets and sensitive data through comprehensive multi-factor and biometric authentication strategies, compliant with Data Self-Governance standards; providing user authentication services using biometric hardware and software technology for managing identification of things, focused on securing user access to digital assets and sensitive information through advanced multi-factor and biometric authentication systems, aligned with Data Self-Governance protocols for enhanced asset management security; providing user authentication services using biometric hardware and software technology for e-commerce transactions, tailored to ensure secure transactions by utilizing advanced multi-factor and biometric authentication systems, supporting Data Self-Governance standards in safeguarding digital assets and sensitive e-commerce interactions; authentication services for computer security, offering enhanced security measures for the protection and management of digital assets, incorporating cryptographic solutions and digital signature validation specifically tailored for financial and personal data protection under Data Self-Governance frameworks; electronic signature verification services using technology to authenticate user identity, designed to offer robust security measures for digital asset management, featuring cryptographic solutions and digital signature validation in compliance with Data Self-Governance standards for financial and personal data security; electronic cryptology services in the nature of electronic data encryption services, providing state-of-the-art encryption for digital images and data to secure sensitive information during transmission and storage, fully integrated with Data Self-Governance measures for comprehensive information security; computer security services in the nature of providing authentication, issuance, validation, and revocation of digital keys, offering enhanced security measures for digital asset management, including cryptographic solutions and digital signature validation, developed to meet Data Self-Governance requirements for protecting financial and personal data; computer security services for managing digital certificates, providing rigorous security protocols for digital asset protection, including cryptographic solutions and digital signature validation, tailored to support the stringent requirements of Data Self-Governance and safeguard sensitive financial and personal information; digital signature verification services [electronic cryptology services], providing enhanced security measures for digital assets management, including cryptographic solutions and digital signature validation specifically tailored for financial and personal data protection under Data Self-Governance standards; identity verification services [computer security], delivering advanced security protocols for digital asset management, incorporating cryptographic solutions and digital signature validation designed to meet Data Self-Governance guidelines; identity verification [computer security], offering stringent security measures to protect and manage digital assets, enhanced by cryptographic solutions and digital signature validation in compliance with Data Self-Governance practices; Authentication, issuance, and validation of digital keys, providing robust security measures for digital asset management, featuring cryptographic solutions and digital signature validation to support the principles of Data Self-Governance; providing authentication of personal identification information [computer security services], ensuring enhanced protection of digital assets with cryptographic solutions and digital signature validation developed to adhere to Data Self-Governance standards; encryption, decryption, and authentication of information, messages, and data, deploying advanced encryption technologies to secure digital communications and sensitive information against unauthorized access and breaches, aligned with Data Self-Governance protocols; cryptographic engineering, offering specialized encryption services tailored to secure sensitive and critical information, including digital assets and personal data, ensuring compliance with Data Self-Governance requirements; digital image encryption services, focused on providing high-security encryption solutions to protect digital images from unauthorized access and tampering, within a Data Self-Governance compliant environment; encryption of digital images, ensuring the security and integrity of digital visual content through advanced encryption standards, tailored for secure digital asset management under Data Self-Governance frameworks; electronic storage of digital video files, providing secure digital storage solutions with advanced encryption and access controls to ensure data privacy and integrity, fully compliant with Data Self-Governance protocols; electronic storage of digital videos, ensuring high-security and data integrity through encrypted storage services, tailored for DSG-compliant digital asset management; electronic storage of digital images, providing secure cloud-based solutions for storing sensitive visual content, aligned with DSG standards to ensure data integrity and prevent unauthorized access; electronic storage of digital audio files, offering encrypted storage services designed to safeguard audio data against unauthorized access and corruption, compliant with Data Self-Governance protocols; electronic storage of digital photographs, ensuring the secure archiving of digital photo data with comprehensive encryption and secure access protocols, adhering to DSG requirements; electronic storage of digital music, providing secure storage solutions that protect musical digital files from piracy and unauthorized distribution, consistent with Data Self-Governance principles; electronic storage of images and videos, offering robust digital archiving services with advanced security measures to ensure the safety and confidentiality of multimedia files, tailored for Data Self-Governance; electronic storage services for archiving electronic data, delivering secure cloud-based solutions for businesses and individuals to safely store and manage their digital information with full encryption and access control, designed under DSG protocols; electronic storage of files and documents, focused on providing secure and encrypted storage solutions tailored for sensitive and critical business and personal documents, ensuring compliance with Data Self-Governance standards; electronic storage services for archiving databases, offering secure database management solutions with strong encryption and real-time backup capabilities, optimized for Data Self-Governance compliant environments; electronic data storage and data backup services, providing comprehensive solutions for securely backing up and restoring digital assets and sensitive data in event of data loss or system failure, aligned with DSG; electronic storage and retrieval services for archiving biological data, delivering specialized storage solutions tailored for sensitive biological and medical data with enhanced security measures, compliant with Data Self-Governance frameworks; electronic data log storage, offering secure and encrypted logging services to ensure the integrity and confidentiality of transaction logs and other sensitive data entries, aligned with DSG standards; computerized data storage services, providing advanced digital storage solutions that include encrypted data management and secure access systems, designed to ensure data safety and compliance with Data Self-Governance; online data storage and on-line data storage services, offering cloud-based solutions for secure and accessible online storage of digital assets, allowing for secure management and retrieval of data from anywhere, under DSG frameworks; authentication services for computer security featuring advanced biometric capabilities, utilizing fingerprint, facial recognition, iris scanning, and other biometric technologies to ensure secure user verification and access control, fully integrated within a Data Self-Governance compliant system; authentication services for computer security, incorporating multi-factor authentication that combines biometrics, hardware tokens, security keys, and PINs, enhancing security layers to protect user data and access points, in alignment with Data Self-Governance standards; authentication services for computer security, utilizing device-based recognition systems where access is granted based on the authentication of a registered device, adding an extra layer of security by linking user access specifically to their hardware, compliant with Data Self-Governance requirements; authentication services for computer security, integrating traditional security methods such as security keys and PINs with modern biometric verification to provide a robust, hybrid security solution covering both physical and digital authentication mechanisms, designed for Data Self-Governance compliance; user authentication services using biometric hardware and software technology for access control, specifically designed for legacy planning and secure transfer of digital asset control to designated beneficiaries under predefined conditions, ensuring adherence to Data Self-Governance protocols; user authentication services using biometric hardware and software technology for access control, tailored for the seamless and secure inheritance of digital assets, ensuring that biometric data and other secure access methods are transferable according to the user's estate plans, fully compliant with Data Self-Governance; user authentication services using biometric hardware and software technology for access control, incorporating advanced encryption and secure protocols to facilitate the transition of access rights to digital assets from the original owner to heirs or designated entities, in line with Data Self-Governance principles; user authentication services using biometric hardware and software technology for access control, including features to manage digital assets posthumously, enabling executors or legal representatives to access or transfer assets securely, adhering to the wishes of the deceased, and aligned with Data Self-Governance standards; authentication, issuance, and validation of digital keys, designed with redundant key systems to prevent lockouts, ensuring users have multiple ways to authenticate and gain access to their digital vaults without compromising security, developed to meet Data Self-Governance guidelines; authentication, issuance, and validation of digital keys that include advanced recovery options, such as biometrically enabled recovery processes or multi-factor authentication steps, to restore access in case primary keys are lost or compromised, ensuring compliance with Data Self-Governance frameworks; authentication, issuance, and validation of digital keys, allowing trusted individuals or entities to access the vault under strict conditions defined by the original user, crafted to support the principles of Data Self-Governance; authentication and issuance of digital keys that include self-recovery options through rigorous identity verification processes, allowing users to regain access through steps that securely confirm their identity without external intervention, aligned with Data Self-Governance standards; authentication, issuance, and validation of digital keys with integrated time-lock features, allowing vault owners to set specific time windows for access, thereby restricting entry to the vault outside these predefined periods, tailored for use within a digital vault environment influenced by Data Self-Governance; software as a Service (SaaS) providing encrypted security and cryptographic protection for digital assets and sensitive data, with features including advanced access control through biometric, PIN, security key, and device-based authentication systems tailored for enhanced user security, fully compliant with Data Self-Governance requirements; software as a service (SaaS) featuring secure management and cryptographic protection of digital assets and sensitive information, specifically tailored for use within a digital vault environment, developed under Data Self-Governance guidelines; software as a service (SaaS) featuring database management software providing advanced encryption and access controls for digital asset protection, specifically tailored for use within a digital vault environment to meet Data Self-Governance protocols; software as a service (SaaS) featuring software for use in database management with robust security features tailored for digital assets and sensitive data management, specifically tailored for use within a digital vault environment, ensuring adherence to Data Self-Governance principles; software as a service (SaaS) featuring artificial intelligence software for facial and speech recognition technologies for secure identity verification and authentication in managing digital assets, specifically tailored for use within a digital vault environment to enhance Data Self-Governance compliance; software as a service (SaaS) featuring artificial intelligence software for face and speech recognition tools designed to enhance security protocols for digital asset access and management, specifically tailored for use within a digital vault environment, in alignment with Data Self-Governance frameworks; software as a service (SaaS) featuring word processing software with integrated security features for encrypted document creation and management, specifically tailored for use within a digital vault environment, compatible with Data Self-Governance standards; software as a service (SaaS) featuring artificial intelligence software for use in facial and speech recognition technologies for facial and speech recognition, ensuring secure user authentication and data protection, specifically tailored for use within a digital vault environment, crafted to meet the needs of Data Self-Governance; software as a service (SaaS) featuring software using artificial intelligence for facial and speech recognition capabilities, focusing on secure and encrypted access to digital resources, specifically tailored for use within a digital vault environment adhering to Data Self-Governance standards; software as a service (SaaS) featuring software using artificial intelligence for face and speech recognition services, aimed at strengthening security measures for digital asset handling, specifically designed for operation within Data Self-Governance compliant digital vault environments; software as a service (SaaS) featuring software using artificial intelligence for use in facial and speech recognition to bolster secure access controls for sensitive digital environments, specifically tailored for integration within digital vaults governed by Data Self-Governance protocols; software as a service (SaaS) featuring artificial intelligence software for use in face and speech recognition, designed to authenticate and secure access to digital assets, specifically developed for digital vaults adhering to Data Self-Governance; software as a service (SaaS) featuring software using artificial intelligence for use in face and speech recognition to support secure user authentication through face and speech recognition for digital asset management, specifically tailored for use within Data Self-Governance structured digital vaults; computer security services for managing digital certificates with enhanced security for authentication and data integrity in digital asset transactions, specifically tailored for use within digital vault environments focused on Data Self-Governance; software as a service (SaaS) featuring software for use as a word processor offering encryption and secure access features for safeguarding sensitive information, specifically designed for use within digital vaults that follow Data Self-Governance frameworks; software as a service (SaaS) featuring software for use in word processing tools that include data protection and security measures tailored for confidentiality, specifically designed for secure operations within digital vaults adhering to Data Self-Governance standards; software as a service (SaaS) featuring software for use as a spreadsheet with integrated security functions for managing and protecting sensitive financial and asset data, specifically developed for use within digital vaults that enforce Data Self-Governance principles; computer security services in the nature of providing digital certificates to authenticate and secure digital transactions and communications, specifically tailored for secure operations within digital vaults adhering to Data Self-Governance; computer security services providing comprehensive security services for the protection and management of digital assets and sensitive data, specifically designed for deployment within digital vault environments that are governed by Data Self-Governance protocols; digital signature verification services (electronic cryptology services) offering digital signature verification to ensure the security and integrity of electronic transactions involving digital assets, specifically tailored for operations within digital vaults that prioritize Data Self-Governance; data security services providing data security solutions focused on the encrypted storage and safe handling of digital assets and sensitive information, specifically designed for secure operations within a digital vault environment that adheres to Data Self-Governance standards; digital archiving services offering digital archiving solutions with advanced security features to protect and preserve digital assets over long periods, tailored for integration within digital vault environments that implement Data Self-Governance protocols; identity verification services (computer security) providing identity verification services using advanced biometric and cryptographic technologies to ensure secure access to digital systems, specifically developed for use within digital vaults focused on Data Self-Governance; electronic cryptology services in the nature of digital certificate and digital signature verification services offering cryptology solutions focused on the verification of digital certificates and signatures to secure digital transactions, specifically tailored for digital vault environments enforcing Data Self-Governance; quality control and authentication services providing quality control and authentication services to ensure the security and authenticity of digital transactions and asset management, tailored for secure operations within digital vaults that follow Data Self-Governance practices; digital music encryption services offering encryption services specifically for digital music to ensure secure storage and transmission, designed to integrate seamlessly into digital vault environments that prioritize Data Self-Governance; authentication services for computer security providing authentication services designed to secure access to computer systems and protect digital assets, specifically developed for deployment within digital vaults that adhere to Data Self-Governance frameworks; platform as a Service (PaaS) that includes tools and services for secure digital asset management and protection, specifically tailored for use within digital vault environments that implement Data Self-Governance protocols; user authentication services using biometric hardware and software technology for point-of-sale transactions providing user authentication services at point-of-sale using biometric technology to secure transactions involving digital assets, specifically tailored for integration within digital vault environments governed by Data Self-Governance; IT services for data protection specifically focused on the protection of digital assets and sensitive data through advanced security measures, tailored for secure operations within digital vault environments that enforce Data Self-Governance; information technology services for data protection providing IT services that emphasize the secure management and protection of digital assets and sensitive information, specifically designed for use within digital vault environments committed to Data Self-Governance; all the foregoing limited to digital security services on the secure management, storage, and encryption of digital assets and sensitive data, and which facilitate the encryption, backup, recovery, and secure storage of critical and sensitive digital information, and not in respect of general consumer software, entertainment, or unrelated technological fields.
Downloadable computer security software for encrypted security and cry...
on 05 Feb 2024
FEA DISTILLING INC.
2308787 · 05 Feb 2024
033
Class 033
Wines and Spirits Products
Distilled spirits, namely, whisky, gin, bourbon, vodka, brandy, rum, spirits distilled from agave; alcoholic cocktails; alcoholic seltzer, hard seltzer, spirit seltzer, alcoholic cocktails, alcoholic coolers, alcoholic punches
Distilled spirits, namely, whisky, gin, bourbon, vodka, brandy, rum, s...
Country
CA
Status
All
Registered
Pending
Abandoned
Other
Owners
Hill's pet nutrition inc. (40)
Stemcell technologies canada inc. (19)
Merck kgaa (8)
Microsoft corporation (7)
Ag growth international inc. (5)
Denver laboratories (canada) ltd. (5)
Envirovault lp (5)
Glaxo group limited (5)
Futurevault inc. (4)
Monster energy company (4)
Norton llc (4)
Canupy inc. (3)
J2 global holdings limited (3)
Kabushiki kaisha bandai namco entertainment (also trading as bandai namco entertainment inc.) (3)
L'oreal société anonyme (3)
Light & wonder inc. (3)
M. caplan furs ltd. (3)
Mars canada inc. (3)
Registry connect limited partnership (3)
Smith kline & french canada ltd. (3)
Apple inc. (2)
Atterus holdings ltd. (2)
Cardiac pacemakers inc. (2)
Commvault systems inc. (2)
Critical role llc (2)
Docuvault delaware valley llc (2)
Dynamark management corp. (2)
Dyno nobel inc. (2)
Fea distilling inc. (2)
Gilwell technology services llc (2)
Idexx laboratories inc. (2)
Kabushiki kaisha square enix (also trading as square enix co. ltd.) (2)
Machinerie feuiltault canada inc. (2)
Manufacture adria inc. (2)
Metallicus inc. (2)
Nippon soda co. ltd. (2)
Norton rose fulbright canada llp/s.E.N.C.R.L. s.R.L. (2)
Orion-yhtyma oy (2)
Pristine mining inc. (2)
Revelyst operations llc (2)
Signum international ag (2)
Smith & cult llc (2)
Storagevault canada inc. (2)
The bank of nova scotia (2)
Vault properties inc. (2)
Veba-dev inc. (2)
0810262 b.C. ltd. (1)
10281735 canada inc. (1)
1273550 ontario limited (1)
2645278 ontario inc. (1)
2697638 ontario corporation o/a industry beauty supply (1)
3176282 canada ltd (1)
543077 alberta ltd. (1)
9329-4106 québec inc.. (1)
9348-7015 québec inc. (1)
A-consult holding group a/s (1)
A. axiz corp. (1)
Aaron dermen (1)
Accent-fairchild group inc. (1)
Achieve life sciences inc. (1)
Adm protexin limited (1)
Aeci limited (1)
Aerial assault inc. (1)
Aggogle incorporated (1)
Ags llc (1)
Aidian oy (1)
Aidian oy (1)
Ajay potluri (1)
Alain berranger & associes inc. (1)
Albumedix a/s (1)
Alexandre demers for oceanlogics inc (1)
Alienvault inc. (1)
Allarco entertainment 2008 inc. (1)
Allegiance marketing (gourmet plus) pte. ltd. (1)
Allied marketing group inc. (1)
Altia plc (1)
Altigi gmbh (1)
Amazon technologies inc. (1)
Amco american cosmetics company s.A.S. di gaetano trapani & c. (1)
American building control inc. (1)
Amgen inc. (1)
Amgen inc. (a delaware corporation) (1)
Anhinga co. (1)
Applied science technologists and technicians of british columbia (1)
Argus software inc. (1)
Armor cast inc. (1)
Armor defense inc. (1)
Associated textiles of canada limited (1)
Atb financial (1)
Attache software australia pty limited (1)
Authentica inc. a legal entity (1)
Auticon gmbh (1)
Auticonsult inc. (1)
Auto vault canada corp. (1)
Avmor ltd (1)
Bausch & lomb incorporated (1)
Bell sygma inc. (1)
Bemo academic consulting inc. (1)
Benjamin rembeault (1)
Berger-levrault international ltée. (1)
Bessie blu llc (1)
Best ever footwear company ltd. (1)
Bev.Con aps (1)
Biotest aktiengesellschaft (1)
Birger christensen a/s (1)
Blue globe gmbh (1)
Bocks inc (1)
Boehringer ingelheim animal health usa inc. (1)
Bonafide factory products inc. (1)
Booyah inc. (1)
Bou-matic technologies corporation (1)
Bourgault industries ltd. (1)
Brightvault llc (1)
Bristolridge management inc. (1)
Broadcast electronics inc. a rhode island corporation (1)
Brooks sports inc. (1)
Bureaucom inc. (1)
Bushnell inc. (1)
Buy-tel limited (1)
Brooks sports, inc. (1)
Canada post corporation (1)
Canadian association of management consultants (1)
Canadian boutique jewellery (1)
Canadian tire corporation limited (1)
Candeal.Ca inc. (1)
Cansult limited (1)
Caradigm usa llc (1)
Carbonite gmbh (1)
Carl zeiss vision gmbh (1)
Carol ann neville (1)
Casdec technology corporation (1)
Catapult environmental inc. (1)
Catapult inc. (1)
Cb therapeutics inc. (1)
Cbs studios inc. (1)
Charles schwab & co. inc. (1)
Chem2i n.V. (1)
Christian valenzuela (1)
Clairol incorporated (1)
Clearestate technologies inc. (1)
Clearesult canada inc. (1)
Climate vault inc. (1)
Club de hockey canadien inc. (1)
Clyde calixte (1)
Cognac ferrand une entité légale (1)
Collectors universe inc. a delaware corporation (1)
Colossus media corp. (1)
Condor it solutions inc. (1)
Continental assets ltd. dba maxim software systems (1)
Convault inc. (1)
Convey teknik ab (1)
Cortech systems ltd. (1)
Cravates diffusion s.A.R.1. (1)
Crompton co./cie (1)
Cyberark software ltd. (1)
Carl zeiss vision gmbh (1)
D. porthault (1)
D. porthault design holdings llc (1)
D.P.M. thibault inc. (1)
Dakota investments inc. (1)
Danstar ferment ag (1)
Dare to be grah llc a legal entity (1)
David yurman ip llc (1)
De beers uk limited (1)
Decisionvault llc (1)
Dell inc. (1)
Delma properties l.P. (1)
Delta controls inc. (1)
Derrick corporation (1)
Digicoins canada inc. (1)
Digital cinema implementation partners llc (1)
Diversey inc. (1)
Donald bush (1)
Dundas data visualization inc. (1)
Dault products llc (1)
E. & j. gallo winery (1)
Earle k. lucas (1)
East penn manufacturing co. a pennsylvania corporation (1)
Eckel industries inc. (1)
Econovault storage inc. (1)
Econsult health limited (1)
Ecr software corporation (1)
Ed davis (1)
Edmond sylvain limitee 1954 (1)
Edward paterson (1)
Eftf - enterprises for the future (1)
Eftf entertainment for the future inc. (1)
Elemetal llc (1)
Eli lilly and company (1)
Emc corporation (a massachusetts corporation) (1)
Energy consult gmbh (1)
Energy vault inc. (1)
Eqonex limited (1)
Esprida corporation (1)
Etablissements boursault (1)
Evervault (1)
Exult worldwine (1)
Fagerhults belysning ab (a swedish joint-stock company) (1)
Farhin patel (1)
Fidelity electronics inc. (1)
First affiliated holdings inc. (1)
First data corporation (1)
Firstquintile information technologies inc. (1)
Flex-rest inc. (1)
Florence thirion une personne physique (1)
Fmh (canada) limited (1)
Fmp group (australia) pty limited an australian company (1)
Fred brooks (1)
Fromageries perreault une societe anonyme (1)
Ftr ltd. (1)
Fusion laboratories ltd (1)
Fox factory, inc. (1)
G. daviault ltee (1)
Galmarley limited (1)
General electric company (1)
Genetec inc. (1)
Genologics life sciences software inc. (1)
Genvault corporation (a delaware corporation) (1)
Genxys health care systems inc. (1)
Geotab inc. (1)
Getbusy uk limited (1)
Gilles nicault (1)
Globeconsult corporation c/o david k. du feu (1)
Golden delta enterprises inc. (1)
Golf cult (1)
Goliath far east limited (1)
Google llc (1)
Gridside energy consult gmbh (1)
Groupe archambault inc. (1)
Groupe conseil pm scada inc. t/a pm scada cyber defense (1)
Groupe procycle inc. (1)
Groupe rossignol canada inc. (1)
Gsc theault (1)
Gsl solutions inc. (1)
Gt group telecom services corp. (1)
H. lundbeck a/s (1)
Haldex brake products corporation (1)
Hallmark industries inc. (1)
Hangzhou ezviz network co. ltd. (1)
Hashicorp inc. (1)
Head sport ag (1)
Herff jones llc (1)
Hewitt associates llc (an illinois limited liability company) (1)
Hewlett packard enterprise development lp (1)
Hewlett-packard development company l.P. a texas limited partnership (1)
Highwater marine llc (1)
Hmv (brands) limited (1)
Hodge dylan trading as digitalvault internet solutions (1)
Hubbell lighting inc. (1)
Huron technologies international inc. (1)
Hv solutions canada inc. (1)
I & k vending inc. (1)
Ic consult group gmbh (1)
Igt (1)
Imagi-native arts & crafts inc. (1)
Imation corp. (1)
Categories
Class 9 (185)
Class 42 (124)
Class 35 (114)
Class 41 (71)
Class 5 (64)
Class 31 (47)
Class 36 (47)
Class 25 (45)
Class 39 (44)
Class 28 (39)
Class 6 (38)
Class 1 (37)
Class 16 (36)
Class 3 (31)
Class 37 (26)
Class 38 (26)
Class 44 (26)
Class 12 (25)
Class 20 (25)
Class 7 (22)
Class 14 (22)
Class 18 (19)
Class 21 (19)
Class 45 (18)
Class 11 (17)
Class 33 (13)
Class 10 (12)
Class 29 (12)
Class 40 (12)
Class 19 (10)
Class 26 (10)
Class 32 (9)
Class 8 (8)
Class 22 (8)
Class 34 (8)
Class 24 (7)
Class 30 (6)
Class 4 (5)
Class 13 (5)
Class 17 (4)
Class 27 (4)
Class 43 (4)
Class 2 (3)
Class 15 (2)
Class 23 (2)
Correspondents
Smart & biggar lp (120)
Gowling wlg (canada) llp (60)
Mccarthy tetrault llp (27)
Robic agence pi s.E.C./ robic ip agency lp (27)
Borden ladner gervais llp (21)
Fasken martineau dumoulin llp (14)
Norton rose fulbright canada llp/s.E.N.C.R.L.,s.R.L. (11)
Osler, hoskin & harcourt llp (11)
Marks & clerk (10)
Baker & mckenzie llp (9)
Bennett jones llp (9)
Aventum ip law llp (8)
Clark wilson llp (8)
Riches, mckenzie & herbert llp (8)
Mcmillan llp (7)
Torys llp (6)
May m.M. cheng (5)
Seastone ip llp (5)
Stikeman elliott llp (5)
Cassels brock & blackwell llp (4)
Cpst intellectual property inc. (4)
Dla piper (canada) llp (4)
Lavery, de billy, llp (4)
Macrae & co. (4)
Miltons ip/p.I. (4)
Oyen wiggs green & mutala llp (4)
Perley-robertson, hill & mcdougall llp (4)
Smart & biggar ip agency co. (4)
Bcf s.E.N.C.R.L./bcf llp (3)
Cassan maclean ip agency inc. (3)
Moffat & co. (3)
Aird & mcburney lp (2)
Amy croll (2)
Amy e. grenon (2)
Brouillette legal inc. (2)
Deeth williams wall llp (2)
Diana mansour (2)
Goodmans llp (2)
Kimberley cunningham (2)
Lapointe rosenstein marchand melançon, l.L.P./s.E.N.C.R.L. (2)
Mark cameron mcleod (2)
Mlt aikins llp (2)
Piasetzki nenniger kvas llp (2)
Ronald r. toledano (2)
Therrien couture joli-coeur s.E.N.C.R.L. (2)
Wendy d. riel (2)
Xin xu (2)
Ade & lee law group llp (1)
Alexander j. stack (1)
Andrea friedman-rush (1)
Andrews robichaud (1)
Anita mar (1)
Benoît & côté inc. (1)
Blake, cassels & graydon llp (1)
Boughton law corporation (1)
Burnet, duckworth & palmer llp (1)
Cameron ip (1)
Carson law office professional corporation (1)
Chitiz pathak llp (1)
Clinton lee (1)
Coastal trademark services limited (1)
Colleen caissie-dupuis (1)
David durand (1)
De grandpré chait (1)
Dentons canada llp (1)
Eric lavallée (1)
Eva derhy (1)
Furman ip law & strategy pc (1)
Heidi jensen (1)
Jensen ip (1)
Joseph i. etigson (1)
Julian l. doyle (1)
Ken poulin (1)
Kirby eades gale baker (1)
Ldalegal inc. (1)
Lei zhou (1)
Ljt lawyers, llp / ljt avocats, s.E.N.C.R.L. (1)
Lorraine may fleck (1)
Magyar, bogle & o'hara llp (1)
Mark sumbulian (1)
Mason bennett johncox professional corporation (1)
Mbm intellectual property agency (1)
Michael a. poznanski (1)
Michele ballagh (1)
Nelligan o'brien payne llp (1)
Palmer ip inc. (1)
Parlee mclaws llp (1)
Paul e. bain (1)
Phillips friedman kotler s.E.N.C.R.L./llp (1)
Pillar ip, inc. (1)
Pushor mitchell llp (1)
R.Grant cansfield (1)
Richard uditsky (1)
Robert d. mcdonald (1)
Ronald s. ade law corporation (1)
Ryan shebelski (1)
Scardicchio litigation counsel professional corporation (1)
Stikeman elliott s.E.N.C.R.L., srl/llp (1)
Thompson cooper llp (1)
Timothy n. vandermeer (1)
Van tu duong (1)
Vantek intellectual property llp (aka d/b/a vantek ip llp) (1)
Waterous, holden, amey, hitchon llp (1)
Image Search
Drag and drop or upload to search any image