Filters
Also try searching for:
*ath
on 27 Sep 2022
Athleta, Inc.
97105846 · 03 Nov 2021
27 Sep 2028
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Magnetically encoded credit cards and loyalty cards that track customer purchases for reward purposes
Magnetically encoded credit cards and loyalty cards that track custome...
on 27 Sep 2022
Athleta, Inc.
97105849 · 03 Nov 2021
27 Sep 2028
035
Class 035
Advertising, Business & Retail Services
Providing incentive award programs through issuance and processing of loyalty points for purchase of a company's good and services; Promoting the sale of credit card accounts through the administration of incentive award programs
Providing incentive award programs through issuance and processing of ...
on 27 Sep 2022
Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V.
79281199 · 26 Sep 2019
27 Sep 2028
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Downloadable and recorded antispyware software; Downloadable and recorded computer antivirus software; Recorded data, namely, electronic data files featuring data in the field of cybersecurity for monitoring and ensuring the security of business networks, for the detection and protection against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protection for mobile devices and computer networks and in the field of privacy protection and user data protection; Downloadable and recorded authentication software, namely, for authenticating user identification in the field of cybersecurity for monitoring and ensuring the security of business networks; Downloadable and recorded banking software in the field of cybersecurity, privacy protection and user data protection, namely, for monitoring and ensuring the security of business networks, for detecting and protecting against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protecting mobile devices and computer networks; Downloadable and recorded biometric software in the field of cybersecurity, privacy protection and user data protection, namely, for monitoring and ensuring the security of business networks, for detecting and protecting against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protecting mobile devices and computer; Business intelligence software, namely, downloadable and recorded computer software that provides real-time, integrated business management intelligence by combining information from various databases and presenting it in an easy-to-understand user interface; Computers; Computer peripheral devices; Downloadable and recorded computer software for computer aided software engineering; Downloadable and recorded computer software for the detection of threats to computer networks; Downloadable and recorded computer software for the creation of firewalls; Downloadable and recorded computer software for encryption; Downloadable and recorded dashboard software in the field of cybersecurity, namely, for monitoring and ensuring the security of business networks, for detecting and protecting against IT security breaches; Downloadable and recorded databases in the field of cybersecurity for monitoring and ensuring the security of business networks, for the detection and protection against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protection for mobile devices and computer networks and in the field of privacy protection and user data protection; Downloadable and recorded data management software; Downloadable and recorded privacy software in the field of cybersecurity, privacy protection and user data protection, namely, for monitoring and ensuring the security of business networks, for detecting and protecting against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protecting mobile devices and computer networks; Downloadable and recorded debugging software; Downloadable and recorded utility, security and cryptography software in the field of cybersecurity privacy protection and user data protection, namely, for monitoring and ensuring the security of business networks, for detecting and protecting against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protecting mobile devices and computer networks; Digital telephone systems comprised of digital phones and telephone terminals and downloadable and recorded software in the field of cybersecurity, namely, for monitoring and ensuring the security of business networks; Downloadable and recorded embedded software in the field of cybersecurity, privacy protection and user data protection, namely, for monitoring and ensuring the security of business networks, for detecting and protecting against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protecting mobile devices and computer networks; Electronic security systems for home network comprised of USB computer security keys and security token hardware for cybersecurity for monitoring and ensuring the security of networks and the detection and protection against IT security breaches; Electronic encryption units; Computer firewall software, namely, downloadable and recorded computer software for the creation of firewalls; Downloadable and recorded computer security software in the field of cybersecurity, privacy protection and user data protection, namely, for monitoring and ensuring the security of business networks, for detecting and protecting against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protecting mobile devices and computer networks; Artificial intelligence software for surveillance, namely, downloadable and recorded computer software using artificial intelligence cybersecurity, privacy protection and user data protection, namely, for monitoring and ensuring the security of business networks, for detecting and protecting against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protecting mobile devices and computer networks; Artificial intelligence software for driverless cars, namely, downloadable and recorded computer software using artificial intelligence for operating and monitoring driverless cars; Artificial intelligence software for vehicles, namely, downloadable and recorded computer software using artificial intelligence for operating and monitoring vehicles; Artificial intelligence and machine learning software, namely, downloadable and recorded computer software using artificial intelligence in the field of cybersecurity, privacy protection and user data protection, namely, for monitoring and ensuring the security of business networks, for detecting and protecting against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protecting mobile devices and computer networks; Artificial intelligence software for analysis, in particular cybersecurity, namely, downloadable and recorded computer software using artificial intelligence in the field of cybersecurity, privacy protection and user data protection, namely, for monitoring and ensuring the security of business networks, for detecting and protecting against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protecting mobile devices and computer networks; Mail server software, namely, downloadable and recorded computer software for controlling and managing access server applications; Downloadable and recorded middleware for management of software functions on electronic devices; Data protection backup units, namely, recorded software and backup drives for computers for storage of data; Downloadable and recorded operational risk management software; Downloadable and recorded computer software for biometric systems for the identification and authentication of persons; Electronic commerce and electronic payment software, namely, downloadable and recorded computer e-commerce software to allow users to perform electronic business transactions via a global computer network; Downloadable and recorded software for granting Internet access; Downloadable and recorded software for the development of secure software, hardware, devices, systems and networks; Industrial automation software, namely, downloadable software for monitoring and controlling communication between computers and automated machine systems; Downloadable and recorded cloud network monitoring software; Downloadable and recorded software for mobile device management; Downloadable and recorded software for mobile device management, in particular in relation to cybersecurity; Downloadable and recorded intrusion detection system software; Downloadable and recorded software for diagnostics and troubleshooting; Downloadable and recorded content control software; Downloadable and recorded software for operating card readers; Downloadable and recorded computer software using artificial intelligence for machine learning software for surveillance; Downloadable and recorded computer software using artificial intelligence for machine learning software for analysis; Downloadable and recorded software for online messaging; Downloadable and recorded software for security testing of hardware, software, devices, systems and networks; Downloadable and recorded software for operating traffic management systems; Downloadable and recorded software and devices in the nature of information broker systems comprised of computer terminals, web-based and local data libraries in the nature of downloadable electronic files featuring data libraries, repositories in the nature of downloadable electronic files featuring data forms, web-based and local backup solutions comprised of backup drives for computers and downloadable for software for backing-up data, systems comprised of downloadable and recorded software for network security monitoring (SIEM), web based and local information reporting systems comprised of recorded and downloadable software for information reporting, voice over IP-systems comprised of VOIP phones and Voice over internet protocol (VOIP) phone adapter, firewall systems comprised of computer hardware in the nature of firewalls and downloadable computer software for the creation of firewalls, managed firewall systems comprised of computer hardware in the nature of firewalls and downloadable computer software for the creation of firewalls, installation and maintenance systems comprised of recorded and downloadable software for enabling the installation and maintenance of software, enterprise collaboration systems (ECS) comprised of downloadable and recorded enterprise software in the nature of a database for non-transactional data and a search engine for database content, enterprise resource planning systems (ERP) comprised of downloadable and recorded enterprise software in the nature of a database for non-transactional data and a search engine for database content, global information systems (GIS) comprised of downloadable and recorded software for managing information, managed information systems (MIS) comprised of downloadable and recorded software for managing information, detection support systems (DDS) comprised of downloadable and recorded software for controlling access to systems, devices and data; Downloadable and recorded software, computer hardware and data processing equipment for the administration of software, hardware, devices, systems and networks, in particular with respect to cybersecurity properties; Downloadable and recorded software, computer hardware and data processing equipment for the detection and extraction of embedded marks in data, in particular recognition and extraction of watermarks in multimedia data; Downloadable and recorded software, computer hardware and data processing equipment for the detection and visualization of security-related information and events in software, hardware, devices, systems and networks; Downloadable and recorded software, computer hardware and data processing equipment for marking data, in particular watermarks in multimedia data; Downloadable and recorded software and devices in the nature of information broker systems comprised of computer terminals, web-based and local data libraries in the nature of downloadable electronic files featuring data libraries, repositories in the nature of downloadable electronic files featuring data forms, web-based and local backup solutions comprised of backup drives for computers and downloadable for software for backing-up data, systems comprised of downloadable and recorded software for network security monitoring (SIEM), web based and local information reporting systems comprised of recorded and downloadable software for information reporting, voice over IP-systems comprised of VOIP phones and Voice over internet protocol (VOIP) phone adapter, firewall systems comprised of computer hardware in the nature of firewalls and downloadable computer software for the creation of firewalls, managed firewall systems comprised of computer hardware in the nature of firewalls and downloadable computer software for the creation of firewalls, installation and maintenance systems comprised of recorded and downloadable software for enabling the installation and maintenance of software, enterprise collaboration systems (ECS) comprised of downloadable and recorded enterprise software in the nature of a database for non-transactional data and a search engine for database content, enterprise resource planning systems (ERP) comprised of downloadable and recorded enterprise software in the nature of a database for non-transactional data and a search engine for database content, global information systems (GIS) comprised of downloadable and recorded software for managing information, managed information systems (MIS) comprised of downloadable and recorded software for managing information, detection support systems (DDS) comprised of downloadable and recorded software for security analysis of software, hardware, devices, systems and networks; Downloadable and recorded software and devices in the nature of information broker systems comprised of computer terminals, web-based and local data libraries in the nature of downloadable electronic files featuring data libraries, repositories in the nature of downloadable electronic files featuring data forms, web-based and local backup solutions comprised of backup drives for computers and downloadable for software for backing-up data, systems comprised of downloadable and recorded software for network security monitoring (SIEM), web based and local information reporting systems comprised of recorded and downloadable software for information reporting, voice over IP-systems comprised of VOIP phones and Voice over internet protocol (VOIP) phone adapter, firewall systems comprised of computer hardware in the nature of firewalls and downloadable computer software for the creation of firewalls, managed firewall systems comprised of computer hardware in the nature of firewalls and downloadable computer software for the creation of firewalls, installation and maintenance systems comprised of recorded and downloadable software for enabling the installation and maintenance of software, enterprise collaboration systems (ECS) comprised of downloadable and recorded enterprise software in the nature of a database for non-transactional data and a search engine for database content, enterprise resource planning systems (ERP) comprised of downloadable and recorded enterprise software in the nature of a database for non-transactional data and a search engine for database content, global information systems (GIS) comprised of downloadable and recorded software for managing information, managed information systems (MIS) comprised of downloadable and recorded software for managing information, detection support systems (DDS) comprised of downloadable and recorded software for security analysis of software, hardware, devices, systems and networks by means of mass analysis; Downloadable and recorded software, computer hardware and data processing equipment for searching, detecting and extracting data traces and data from security-related events in software, hardware, devices, systems and networks; Downloadable and recorded software, computer hardware and data processing equipment for the protection of software, hardware, devices, systems, networks and data, in particular for the protection of confidentiality and against tampering; Downloadable and recorded privacy protection software, namely, for restricting unauthorized access to computer networks; Downloadable and recorded hardware testing software; Downloadable and recorded electronic payment processing software; Downloadable and recorded threat detection software; Downloadable and recorded software for facilitating secure credit card transactions; Downloadable and recorded computer software to maintain and operate computer systems; Downloadable and recorded risk detection software; Downloadable and recorded software for ensuring the security of electronic mails; Downloadable and recorded instant messaging software; Downloadable and recorded software for software analysis; Downloadable and recorded electronic mail management and messaging software; Software programmable microprocessors, namely, electronic encryption units
035
Class 035
Advertising, Business & Retail Services
Telecommunication gateway services; Telecommunication services provided via Internet platforms and portals, namely, providing Internet access, electronic data transmission, Electronic message sending; Providing Internet access to platforms and portals on the Internet; Transmission of encrypted communications, namely, electronic message transmission; Electronic transmission of encrypted messages and images; Providing access to information on the Internet, namely, providing access to databases; Providing user access to computer programs in data networks; Providing access to databases; Computer communication and Internet access, namely, communications by computer terminals, providing Internet access; Telecommunications services between computer networks, namely, peer-to-peer network computer services, namely, electronic transmission of audio, video and other data and documents among computers, providing user access to global computer networks, providing user access to computer programs in data networks; Telecommunications services, namely, services that support the secure electronic transmission of messages; Secure e-mail services, namely, providing electronic transmission of secure e-mail; Secure electronic transmission of data, sound or images; Providing users with secure remote Internet access to private computer networks via the internet; Provision of wireless application protocol (WAP) services including those utilizing a secure communication channel, namely, providing private and secure real time electronic communication over a computer network; Providing virtual private network (VPN) services
...
Class 038
Communications Services
Market analysis and research; Business consultancy and advisory services, in particular conducting trend analysis to support decisions
Class 042
Computer & Software Services & Scientific Services
Providing reconnaissance and surveillance services; Information services related to health and safety, namely, providing information concerning consumer product safety and in the field of public safety; Closed-circuit surveillance services; Personal security consultancy; Consultancy in the field of data theft and identity theft, namely, assignment of owners' contact information or membership number to affix to valuables to facilitate their recovery following loss or theft; Consulting services in the field of national security, namely, physical security consultancy; Safety, rescue, security and enforcement services, namely, security threat analysis for protecting public safety; Security guard services for the protection of property and individuals; Electronic monitoring services for security purposes, namely, monitoring home security alarms; Security assessment of risks, namely, security threat analysis for protecting personal safety; Information services relating to safety, namely, providing information concerning consumer product safety and in the field of public safety; Locksmithing, namely, opening of locks; Safety evaluation, namely, security threat analysis for protecting personal safety; Security guarding for facilities; Security services for the protection of property, namely, security threat analysis for protecting personal property; Security services for the protection of individuals, namely, security threat analysis for protecting personal safety; Security services for the protection of property and individuals, namely, conducting recovery operations for the recovery of property and personnel; Security inspection services for others, namely, inspection of factories for safety purposes; Monitoring of home security systems; Surveillance services
Class 045
Personal & Legal & Social Services
Computer security threat analysis for protecting data; Authentication services for computer security in the field of cybersecurity for monitoring and ensuring the security of business networks, for the detection and protection against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protection for mobile devices and computer networks and in the field of privacy protection and user data protection, namely, User authentication services using technology for e-commerce transactions, User authentication services using single sign-on technology for online software applications, Providing user authentication services using blockchain-based software technology for cryptocurrency transactions; Provision of security services for computer networks, computer access and computerized transactions, namely, computer security threat analysis for protecting data; Computer firewall services, namely, computer virus protection services; Computer security services in the nature of administration of digital certificates; Design of software for embedded devices; Services for the secure operation of networks and services using information and communication technology, namely, computer security threat analysis for protecting data in the field of cybersecurity for monitoring and ensuring the security of business networks, for the detection and protection against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protection for mobile devices and computer networks and in the field of privacy protection and user data protection; Data security services, namely, Data security consultancy, Design and development of electronic data security systems, Data encryption services for providing security and anonymity for electronically transmitted credit card transactions; Anti-spamming services, namely, online computer services, namely, providing spam filtering services to protect websites and online applications from receiving unsolicited messages; Computer virus protection services; Computer systems analysis services for analyzing cybersecurity characteristics of equipment, networks, software, hardware, data and services; Computer security services for protection against illegal network access, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Services for the development of devices, networks, software, hardware and services in the field of information and communication technology with enhanced cybersecurity capabilities, namely, cybersecurity services in the nature of restricting unauthorized access to computer systems, Computer security threat analysis for protecting data, Computer security consultancy in the field of scanning and penetration testing of computers, devices, hardware, software and networks to assess information security vulnerability; Technical measuring, namely, measurement evaluations in the field of computer science, communications technology, computer hardware, computer software and software engineering; Electronic data storage and data back-up services; Electronic monitoring of personally identifying information to detect identity theft via the internet; Development and testing of computing methods and algorithms; Testing of software; Development of operating system software; Development of computer firmware; Development of measuring and testing methods, namely, research and development of measurement methods in the field of computer science, communications technology, computer hardware, computer software and software engineering; Development of software for communication systems; Development of software solutions for internet providers and internet users; Development of technologies for the protection of electronic networks; Development of driver software; Preparation of scientific reports, namely, scientific research; Surveying; Technical research in the field of computer science, communications technology, computer hardware, computer software and software engineering; Research relating to computer programs; Research in the field of telecommunications technology; Research in the field of computer hardware; Research in the field of information technology; Research related to networks, in particular security of networks; Research relating to security; Computer software research; Computer software research, in particular security of software; Research related to systems, in particular system security; Research and development services in the field of computer science, communications technology, computer hardware, computer software and software engineering; Rental of software; Industrial analysis and research services related to cybersecurity; Industrial research in the field of computer science, communications technology, computer hardware, computer software and software engineering; Engineering research; Information technology consultancy services relating to the development and use of information and communication technologies and services, in particular with regard to cybersecurity; Information technology services, namely, Outsource service providers in the field of information technology, Planning, design and management of information technology systems; Information technology security, protection and recovery, namely, Planning, design and management of information technology systems, Computer virus protection services, Recovery of computer data; Computer analysis and computer diagnostic services; Configuration of computer networks by software; Configuring computer hardware using software, namely, computer network configuration services; Testing, authentication and quality control; Consumer product security testing and consultancy; Product security testing; Software engineering; Software engineering, in particular for secure software; Technical advice relating to security, namely, computer security software consulting; Technical development and research of new products for others; Technical research; Technical measurement services, namely, measurement evaluations in the field of computer science, communications technology, computer hardware, computer software and software engineering; Technological analysis services in the nature of technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of computer science, communications technology, computer hardware, computer software and software engineering; Technological research in the field of computer science, communications technology, computer hardware, computer software and software engineering; Technological research relating to computers; Technological security testing services, namely, testing, analysis and evaluation of the goods and services of others to determine conformity with certification standards; Monitoring of computer systems by remote access to ensure proper functioning for security purposes; Monitoring of computer systems for detecting unauthorized access or data breach; Rental of Internet security software programs; Rental of software for Internet access; Data encryption services of digital images; Data encryption services of digital music; Data encryption services, decryption and authentication of information, messages and data, namely, electronic document and e-mail authentication services; Scientific research; Scientific research and analysis thereof; Scientific and industrial research in the field of computer science, communications technology, computer hardware, computer software and software engineering; Advisory services relating to science research; Science and technology services, namely, scientific research, analysis, testing and research relating to cybersecurity, privacy and data protection; Science and technology services, namely, scientific research, analysis, testing in the field of computer science, communications technology, computer hardware, computer software and software engineering and research and design related thereto
Downloadable and recorded antispyware software; Downloadable and recor...
on 26 Sep 2022
Athletes Go Pro, LLC
86747459 · 03 Sep 2015
26 May 2026
035
Class 035
Advertising, Business & Retail Services
Employment hiring, recruiting, placement, staffing and career networking services
Employment hiring, recruiting, placement, staffing and career networki...
on 21 Sep 2022
Athletes' Potential LLC
87048195 · 24 May 2016
19 Jan 2027
044
Class 044
Medical, Beauty & Agricultural Services
Physical therapy
Physical therapy,"ATHLETES'"
on 21 Sep 2022
Colors in Optics, Ltd.
86068216 · 18 Sep 2013
06 Oct 2025
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Eyewear, sunglasses
Eyewear, sunglasses
on 20 Sep 2022
Volt North America Corp
90148957 · 31 Aug 2020
20 Sep 2028
032
Class 032
Light Beverage Products
Energy drinks
Energy drinks
on 20 Sep 2022
atHeart Medical AG
79315970 · 21 May 2021
20 Sep 2028
010
Class 010
Medical Instrument Products
Surgical, medical, dental and veterinary apparatus and instruments, namely, surgical instruments and apparatus, atrial septal defect closure devices, vascular occluders, occlusion device for atrial septal defects; artificial limbs, eyes and teeth; suture materials; therapeutic and assistance devices designed for people with disabilities, namely, walking frames for disabled persons, power assist suits for medical purposes and medical robots for use in cognitive therapy for children; massage apparatus; apparatus, devices and articles for child care, namely, cups adapted for feeding babies and children and dishes adapted for feeding babies and children
044
Class 044
Medical, Beauty & Agricultural Services
"MEDICAL"
"MEDICAL",Surgical, medical, dental and veterinary apparatus and instr...
on 20 Sep 2022
AthletiPack
90798224 · 28 Jun 2021
20 Sep 2028
018
Class 018
Leather Products (not including clothing)
Sports bags
Sports bags,ATHLETI PACK; ATHLETIC PACK
on 06 Sep 2022
Henan Pangxing Trading Co., Ltd.
90833427 · 16 Jul 2021
06 Sep 2028
012
Class 012
Vehicles and Products for locomotion by land, air or water
Anti-skid chains for vehicle tires; Automobile windshield sunshades; Car interior organizer bags specially adapted for fitting in vehicles; Car window shades; Covers for vehicle steering wheels; Cup holders for use in vehicles; Custom leather interiors for vehicles; Fitted automotive seat covers; Fitted fabric covers for vehicle seat belts; Head-rests for vehicle seats
Anti-skid chains for vehicle tires; Automobile windshield sunshades; C...
Country
US
Status
All
Registered
Pending
Abandoned
Other
Owners
Athleta inc. (28)
Athlon sports communications inc. (25)
United states olympic committee (19)
Athenahealth inc. (18)
Walmart apollo llc (18)
Campus crusade for christ inc. (17)
Athene ip holding ltd (15)
Athletico management llc (15)
Athletic brewing company llc (14)
United states antidoping agency (13)
Categories
Class 41 (585)
Class 25 (560)
Class 35 (401)
Class 9 (393)
Class 42 (351)
Class 5 (244)
Class 28 (175)
Class 36 (173)
Class 44 (153)
Class 16 (140)
Class 10 (113)
Class 3 (98)
Class 45 (83)
Class 18 (81)
Class 30 (70)
Class 21 (68)
Class 32 (63)
Class 20 (54)
Class 29 (52)
Class 14 (50)
Class 38 (49)
Class 24 (43)
Class 43 (43)
Class 11 (40)
Class 7 (33)
Class 33 (33)
Class 12 (31)
Class 37 (30)
Class 39 (30)
Class 6 (27)
Class 27 (24)
Class 26 (23)
Class 40 (22)
Class 1 (20)
Class 19 (20)
Class 31 (15)
Class 8 (13)
Class 22 (11)
Class 4 (9)
Class 13 (7)
Class 34 (6)
Class 2 (4)
Class 46 (3)
Class 51 (3)
Class 17 (2)
Class 23 (2)
Attorney
Danica acosta (20)
Raj abhyanker (20)
Jennifer heisler lavalley (18)
Rose ann sullivan (18)
Holly hanks (15)
Tracy katz muhl (15)
Joshua r bressler (14)
Richard e mancuso (14)
Jill j chalmers (13)
Jon jekel (11)
Correspondents
Legalforce rapc worldwide pc (33)
Rose ann sullivan (18)
Danica acosta (17)
Holly hanks (14)
Joshua r bressler (14)
Campus crusade for christ inc. (13)
Lz legal services llc (13)
Tracy katz muhl (11)
Seed ip law group llp (10)
AI Trademark Registrability
Image Search
Drag and drop or upload to search any image