Filters
Also try searching for:
t f*
on 01 Jul 2024
HONG KONG FUUMY TRADING LIMITED
98027156 · 05 Jun 2023
035
Class 035
Advertising, Business & Retail Services
The wording "TUGBOAT" has no meaning in a foreign language.
The wording "TUGBOAT" has no meaning in a foreign language.,Advertisin...
on 29 Apr 2024
Bracket F, Inc.
97020485 · 09 Sep 2021
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Providing access to computer databases; providing access to computer databases for use by governments, government entities, government agencies, and government contractors
035
Class 035
Advertising, Business & Retail Services
Providing an online searchable database featuring business information; providing on online searchable database featuring business information for use by governments, government entities, government agencies, and government contractors
...
Class 038
Communications Services
Downloadable computer software for performing security, threat, and risk-management assessments, analyses, and investigations; computer hardware for performing security, threat, and risk-management assessments, analyses, and investigations; downloadable computer software, namely, software for management of security breach incidents and responses; downloadable computer software, namely, software for the protection of digital assets from cyber warfare, computer hacking, and computer viruses; downloadable computer software, namely, software to monitor and collect systems and network data; computer hardware, namely, hardware to monitor and collect systems and network data; downloadable computer software for the collection, analysis, storage, management, manipulation, and processing of multi-source information and data; downloadable computer software for data analytics and databases; recorded computer databases in the field of computer software protection, security threat assessment and threat actor identification, pursuit, and deterrence, cybersecurity, computer security, information security, data security, data breach, identity theft, and fraud risk-management and assessment, recorded on computer media; downloadable computer software for creating searchable databases of information and data; downloadable computer software for scanning, detecting, removing and preventing viruses, worms, Trojan horses, adware, spyware, and other malware in the field of computer software protection; computers and computer hardware; downloadable operating software in the nature of computer software for scanning, detecting, removing and preventing viruses, worms, Trojan horses, adware, spyware, and other malware in the field of computer software protection; downloadable computer operating software; downloadable computer software for monitoring and analysis, namely, for scanning, detecting, removing and preventing viruses, worms, Trojan horses, adware, spyware, and other malware; downloadable computer software for use in monitoring use of computers for security purposes; downloadable computer software for use in accessing databases on the global computer network; downloadable computer software for the detection and removal of computer viruses and threats; downloadable computer software for detecting and repairing computer software and hardware problems; downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; downloadable computer optimization software for the protection and running of computer hardware; downloadable computer software for performing security, threat, and risk-management assessments, analyses, and investigations for use by governments, government entities, government agencies, and government contractors; computer hardware for performing security, threat, and risk-management assessments, analyses, and investigations for use by governments, government entities, government agencies, and government contractors; downloadable computer software, namely, software for management of security breach incidents and responses for use by governments, government entities, government agencies, and government contractors; downloadable computer software, namely, software for the protection of digital assets from cyber warfare, computer hacking, and computer viruses for use by governments, government entities, government agencies, and government contractors; downloadable computer software, namely, software to monitor and collect systems and network data for use by governments, government entities, government agencies, and government contractors; computer hardware, namely, hardware to monitor and collect systems and network data for use by governments, government entities, government agencies, and government contractors; downloadable computer software for data analytics and databases for use by governments, government entities, government agencies, and government contractors; recorded computer databases in the field of computer software protection, security threat assessment and threat actor identification, pursuit, and deterrence, cybersecurity, computer security, information security, data security, data breach, identity theft, and fraud risk-management and assessment, recorded on computer media for use by governments, government entities, government agencies, and government contractors; downloadable computer software for scanning, detecting, removing and preventing viruses, worms, Trojan horses, adware, spyware, and other malware in the field of computer software protection for use by governments, government entities, government agencies, and government contractors; computers and computer hardware for use by governments, government entities, government agencies, and government contractors; downloadable operating software in the nature of computer software for scanning, detecting, removing and preventing viruses, worms, Trojan horses, adware, spyware, and other malware in the field of computer software protection for use by governments, government entities, government agencies, and government contractors; downloadable computer operating software for use by governments, government entities, government agencies, and government contractors; downloadable computer software for monitoring and analysis, namely, for scanning, detecting, removing and preventing viruses, worms, Trojan horses, adware, spyware, and other malware for use by governments, government entities, government agencies, and government contractors; downloadable computer software for use in monitoring use of computers for security purposes for use by governments, government entities, government agencies, and government contractors; downloadable computer software for use in accessing databases on the global computer network for use by governments, government entities, government agencies, and government contractors; downloadable computer software for the detection and removal of computer viruses and threats for use by governments, government entities, government agencies, and government contractors; downloadable computer software for authenticating data for use by governments, government entities, government agencies, and government contractors; downloadable computer software for detecting and repairing computer software and hardware problems for use by governments, government entities, government agencies, and government contractors; downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware for use by governments, government entities, government agencies, and government contractors; downloadable computer optimization software for the protection and running of computer hardware for use by governments, government entities, government agencies, and government contractors
Class 042
Computer & Software Services & Scientific Services
Providing and hosting a secure electronic online system featuring technology that allows cyber surveillance to assist in providing defense against data breaches and privacy violations; computer security consultancy in the fields of scanning and penetration testing of computers and networks to assess information security vulnerability; security information services, namely, customized computer security platforms that provide real-time analysis of security alerts generated by network hardware and software, namely, platform as a services (PAAS) featuring computer software platforms for computer security; computer security consultancy; computer software testing to identify security vulnerability; computer forensic services; computer security consulting services in the field of maintaining the security and integrity of databases; computer network security services and communications network security services in the nature of network intrusion protection testing, computer testing for vulnerability management and assessment, risk management and assessment, data breach threat analysis, network threat analysis; computer and network incident response and forensics and penetration testing; computer security consulting services in the field of critical incident response to information, computer, and internet security breaches; computer security consulting services intended to identify, pursue, and deter threat actors; computer software development, design, and implementation services in the field of security for computers and computer networks; computer systems analysis in the field of security for computers and computer networks; computer consultation regarding computer networks and internal computer networks and security services for computer networks and internal computer networks, namely, installation, design and customization; computer consulting services in the field of security integration, network security, and computer security; software as a service (SAAS) services featuring software for use in scanning networks and websites to detect and identify vulnerabilities and malware; computer programming of internet security programs; design and development of computer software programs for Internet security; computer software research; computer software installation; computer software design; computer software development; computer software consultancy services; data security services, namely, design and development of internet security software and electronic data security systems; design and development of electronic data security systems; updating of computer software relating to computer security and prevention of computer risks and risk management; maintenance of computer software relating to computer security and prevention of computer risks and risk management; development of technologies, namely, computer software development for scanning, detecting, removing and preventing viruses, worms, Trojan horses, adware, spyware, and other malware for the protection of electronic networks; providing technical information and technical advisory services related to computer software, computer networks, computer and data security, network security, computer security integration; fraud and identity theft protection services, namely, accessing, scanning and monitoring of reports, the Internet, public records, and computer activity and accounts to facilitate the detection and prevention of data breaches, identity theft and fraud; monitoring of computer systems for detecting unauthorized access or data breach; Data security consultancy in the fields of data breach, identity theft and fraud risk-management and assessment services, fraud detection, and data breach response, threat assessment and simulation, vulnerability analysis and mitigation, and emergency response; Data security consultancy in the field of security threat assessment and threat actor identification, pursuit, and deterrence; monitoring of computer systems, and data network systems, and the Internet for security and risk assessment purposes, namely, detecting unauthorized access or data breach; electronic monitoring services for security purposes in the field of computer and internet services, namely, monitoring of computer systems for detecting unauthorized access or data breach; providing and hosting a secure electronic online system featuring technology that allows cyber surveillance to assist in providing defense against data breaches and privacy violations for use by governments, government entities, government agencies, and government contractors; computer security consultancy in the fields of scanning and penetration testing of computers and networks to assess information security vulnerability for governments, government entities, government agencies, and government contractors; security information services, namely, customized computer security platforms that provide real-time analysis of security alerts generated by network hardware and software, namely, platform as a services (PAAS) featuring computer software platforms for computer security for use by governments, government entities, government agencies, and government contractors; computer security consultancy for governments, government entities, government agencies, and government contractors; computer software testing to identify security vulnerability for governments, government entities, government agencies, and government contractors; computer forensic services for governments, government entities, government agencies, and government contractors; computer security consulting services in the field of maintaining the security and integrity of databases for governments, government entities, government agencies, and government contractors; computer network security services and communications network security services in the nature of network intrusion protection testing, computer testing for vulnerability management and assessment, risk management and assessment, data breach threat analysis, network threat analysis for governments, government entities, government agencies, and government contractors; computer and network incident response and forensics and penetration testing for governments, government entities, government agencies, and government contractors for governments, government entities, government agencies, and government contractors; computer security consulting services in the field of critical incident response to information, computer, and internet security breaches for governments, government entities, government agencies, and government contractors; computer security consulting services intended to identify, pursue, and deter threat actors for governments, government entities, government agencies, and government contractors; computer software development, design, and implementation services in the field of security for computers and computer networks for governments, government entities, government agencies, and government contractors; computer systems analysis in the field of security for computers and computer networks for governments, government entities, government agencies, and government contractors; computer consultation regarding computer networks and internal computer networks and security services for computer networks and internal computer networks, namely, installation, design and customization for governments, government entities, government agencies, and government contractors; computer consulting services in the field of security integration, network security, and computer security for governments, government entities, government agencies, and government contractors; software as a service (SAAS) services featuring software for use in scanning networks and websites to detect and identify vulnerabilities and malware for governments, government entities, government agencies, and government contractors; computer programming of internet security programs for governments, government entities, government agencies, and government contractors; design and development of computer software programs for Internet security for governments, government entities, government agencies, and government contractors; computer software research for governments, government entities, government agencies, and government contractors; computer software installation for governments, government entities, government agencies, and government contractors; computer software design for governments, government entities, government agencies, and government contractors; computer software development for governments, government entities, government agencies, and government contractors; computer software consultancy services for governments, government entities, government agencies, and government contractors; data security services, namely, design and development of internet security software and electronic data security systems for governments, government entities, government agencies, and government contractors; design and development of electronic data security systems for governments, government entities, government agencies, and government contractors; updating of computer software relating to computer security and prevention of computer risks and risk management for governments, government entities, government agencies, and government contractors; maintenance of computer software relating to computer security and prevention of computer risks and risk management for governments, government entities, government agencies, and government contractors; development of technologies, namely, computer software development for scanning, detecting, removing and preventing viruses, worms, Trojan horses, adware, spyware, and other malware for the protection of electronic networks for governments, government entities, government agencies, and government contractors; providing technical information and technical advisory services related to computer software, computer networks, computer and data security, network security, and computer security integration for governments, government entities, government agencies, and government contractors; monitoring of computer systems for detecting unauthorized access or data breach for governments, government entities, government agencies, and government contractors; monitoring of computer systems, and data network systems, and the Internet for security and risk assessment purposes, namely, detecting unauthorized access or data breach for governments, government entities, government agencies, and government contractors; electronic monitoring services for security purposes in the field of computer and internet services, namely, monitoring of computer systems for detecting unauthorized access or data breach for governments, government entities, government agencies, and government contractors
Providing and hosting a secure electronic online system featuring tech...
on 14 Jul 2023
Heiduschke, Sebastian
87028451 · 06 May 2016
041
Class 041
Education and Entertainment Services
"DAS FILM FEST"
"DAS FILM FEST",The English translation of "DASFILMFEST" in the mark i...
on 05 Apr 2023
Factory Institute of Training LLC
88934930 · 27 May 2020
025
Class 025
Clothing Products
The mark consists of the stylized wording "FACTORY INSTITUTE OF TRAINING" in blue arranged in a partial circle, with a sky blue star to each the left and right of the wording, and the stylized wording "BUILDING ATHLETES" in red arranged in a curved manner forming the bottom portion of the circle below the wording "FACTORY INSTITUTE OF TRAINING". Within the outer circle of wording is the design of a grey cogwheel, and a blue lightning design merged with a stylized red letter "F". Above the design is the stylized wording "F.I.T", with the letters in red and the periods between the letters in sky blue. The color white in the mark represents background and/or transparent areas and is not claimed as a feature of the mark.
The mark consists of the stylized wording "FACTORY INSTITUTE OF TRAINI...
on 26 Dec 2022
Trajectory Fitness
90734908 · 26 May 2021
041
Class 041
Education and Entertainment Services
Physical fitness instruction
Physical fitness instruction,The mark consists of a design of a black ...
on 16 Sep 2022
We Live the Finest, LLC
86626942 · 12 May 2015
025
Class 025
Clothing Products
The mark consists of a square box containing crossing lines resembling an "X" centered in the middle, with lines extending two-thirds the distance to each corner. Within the box, a large uppercase "W" block letter sits in the space above the crossing lines; a large uppercase "T" block letter sits in the space to the right of the crossing lines; a large uppercase "F" block letter sits in the space below the crossing lines; a large uppercase "L" block letter sits in the space to the left of the crossing lines.
The mark consists of a square box containing crossing lines resembling...
on 25 Mar 2022
Flawless Vape Wholesale & Distribution Inc.
86394769 · 15 Sep 2014
034
Class 034
Smoker's Products
The mark consists of an image of a tugboat floating on water, with smoke rising out of the smoke stack on the boat, the word "TUGBOAT" below the image of the boat, the letter "F" inside a diamond below the word "TUGBOAT", and a diamond shaped outline around the mark.
The mark consists of an image of a tugboat floating on water, with smo...
on 04 Feb 2022
Fairley, Tobi
86222580 · 16 Mar 2014
035
Class 035
Advertising, Business & Retail Services
Educational services, namely, conducting classes and seminars in the field of interior design, life coaching, and business coaching; life coaching services in the field of personal development and improvement, business coaching services in the field of executive training
041
Class 041
Education and Entertainment Services
The mark consists of a shaded square containing: the letter "T" divided with a central line with another line crossing halfway down the trunk of the "T", the other line being smaller than the top of the "T", so that it could be seen as creating a backwards and a forwards "F".
...
Class 042
Computer & Software Services & Scientific Services
TOBI FAIRLEY
Educational services, namely, conducting classes and seminars in the f...
on 05 Jul 2019
Kinder Fit, L.L.C.
85379357 · 24 Jul 2011
041
Class 041
Education and Entertainment Services
providing a developmental class to help children with their motor skills, cognitive skills, social skills and with physical body development
providing a developmental class to help children with their motor skil...
Country
US
Status
All
Registered
Pending
Abandoned
Other
Owners
Fusion trade inc. (5)
Firstgroup plc (4)
Foremost farms usa cooperative (4)
Fiber industries inc. (2)
The third floor inc. (2)
A finkl & sons company (1)
Anthony frederick (1)
Antigliowittwer monique (1)
Associated distributors inc. (1)
Bracket f inc. (1)
Categories
Class 35 (14)
Class 25 (11)
Class 41 (7)
Class 9 (6)
Class 29 (6)
Class 39 (6)
Class 36 (5)
Class 42 (5)
Class 7 (3)
Class 16 (3)
Class 30 (3)
Class 34 (3)
Class 1 (2)
Class 3 (2)
Class 8 (2)
Class 24 (2)
Class 32 (2)
Class 37 (2)
Class 38 (2)
Class 2 (1)
Class 4 (1)
Class 5 (1)
Class 6 (1)
Class 10 (1)
Class 11 (1)
Class 14 (1)
Class 17 (1)
Class 18 (1)
Class 20 (1)
Class 21 (1)
Class 22 (1)
Class 23 (1)
Class 27 (1)
Class 33 (1)
Class 44 (1)
Class 46 (1)
Attorney
Matthew m yospin (5)
Bennett j berson (3)
Joshua a lorentz (3)
Cheryl hodgson (2)
John l sullivan jr (2)
Molly buck richard (2)
Adam r bialek (1)
Alfred j mangels (1)
Benjamin bailey (1)
Bobby w braxton (1)
Correspondents
Law office of matthew m yospin (3)
Quarles brady llp (3)
John l sullivan jr (2)
Joshua a lorentz dinsmore shohl llp (2)
Matthew m yospin (2)
Remarkable legal pc (2)
A105 1f xinyisheng industrial building (1)
Adam r bialek (1)
Alfred j mangels (1)
AI Trademark Registrability
Image Search
Drag and drop or upload to search any image