Filters
Also try searching for:
ant*
on 17 Oct 2024
Windy Gates, Soho, Inc.
87776532 · 30 Jan 2018
18 Sep 2028
043
Class 043
Restaurant and Hotel Services
The mark consists of the word "BALTHAZAR" in upper case flanked on both sides by floral emblems in a curved position and below that is the word "RESTAURANT" in upper case which is flanked on both sides by a tilde also in a curved position.
The mark consists of the word "BALTHAZAR" in upper case flanked on bot...
on 17 Oct 2024
Grand China Restaurant, Inc.
73424916 · 09 May 1983
26 Jul 1994
042
Class 042
Computer & Software Services & Scientific Services
No claim is made to the exclusive right to use "China Restaurant", apart from the mark as shown.
No claim is made to the exclusive right to use "China Restaurant", apa...
on 16 Oct 2024
Kevin Durant Charity Foundation
87878066 · 16 Apr 2018
12 Mar 2029
035
Class 035
Advertising, Business & Retail Services
promoting youth development by providing amateur travel basketball teams for boys and girls in different age groups up to 17 years of age
promoting youth development by providing amateur travel basketball tea...
on 15 Oct 2024
BULL SAS
79374233 · 21 Mar 2023
15 Oct 2030
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Telecommunications access services; Telecommunications access services for electronic sites, namely, providing access toelectronic sites; Providing electronic transmission of secure electronic mail; computer aided transmission of messages, data andimages; providing access to databases; leasing access time to a computer database, namely, rental of access time to globalcomputer networks; advisory services concerning the rental or leasing of communication equipment; communication services forinformation transmission, namely, providing electronic transmission of information stored in a database via interactivelycommunicating computer systems; electronic communication services, namely, electronic data transmission; Assistance, namely,advisory, information and consulting services in the field of telecommunications services, namely, transmission of voice, data, anddocuments via telecommunications networks; remote transmission of data via telecommunications network; secure transmissionof data, sound and images
038
Class 038
Communications Services
Electronic Encryption units; security token hardware; data networks, namely, data processors and downloadable and recordedcomputer software for transmission and reception of data; interactive data transfer apparatus in the nature of network routers;computers; process calculators; calculating machines; supercomputers; computer servers; computer terminals; Computer displayscreens; cloud servers being computer network servers; Downloadable cloud computing server operating software; Downloadableapplication software for cloud computing; Downloadable computer software packages comprised of downloadable computercybersecurity software, software for use in computer access control, namely, software for imposing access restrictions, softwarefor high performance computing, namely, software that assists computers in deploying parallel applications and performingparallel computations, software for operating quantum computers, software for operating artificial intelligence computers, andsoftware for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access tocloud computing systems and quantum computing systems; Downloadable computer software for encryption; computer systemsbeing computers; information processing apparatus being central processing units for processing information; Downloadable computer cybersecurity software, downloadable software for use in computer access control, namely, software for imposingaccess restrictions, downloadable software for high performance computing, namely, software that assists computers in deployingparallel applications and performing parallel computations, downloadable software for operating quantum computers,downloadable software for operating artificial intelligence computers, and downloadable software for accessing cloud computingsystems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantumcomputing systems; Downloadable computer software for providing network, Internet, and computer security, namely,downloadable software for network and computer access control; Downloadable computer software for database management;Downloadable computer software, namely downloadable computer utility software, downloadable cybersecurity software forprotecting data, and downloadable cryptographic software for generating cryptographic keys for receiving and spendingcryptographic currency; downloadable software for testing software reliability, namely, software for testing and monitoring theprivacy, data security, data vulnerability of other software programs; Recorded computer operating system software;Downloadable computer anti-virus software; Downloadable computer software for word processing; Downloadable cloudcomputing software for cybersecurity, downloadable cloud computing software for use in computer access control, namely,software for imposing access restrictions, downloadable cloud computing software for high performance computing, namely,software that assists computers in deploying parallel applications and performing parallel computations, downloadable cloudcomputing software for operating quantum computers, downloadable cloud computing software for operating artificial intelligencecomputers, and downloadable cloud computing software for accessing cloud computing systems and quantum computingsystems, namely, software for authorizing access to cloud computing systems and quantum computing systems; Downloadableauthentication software for authenticating user identification; Downloadable computer software for protection against spyware,namely, downloadable anti-spyware software; Downloadable network access server operating software; Downloadable computercybersecurity software, downloadable computer software for use in computer access control, namely, software for imposingaccess restrictions, downloadable computer software for high performance computing, namely, software that assists computers indeploying parallel applications and performing parallel computations, downloadable computer software for operating quantumcomputers, downloadable computer software for operating artificial intelligence computers, and downloadable computer softwarefor accessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloudcomputing systems and quantum computing systems; Downloadable computer software for data encryption; Downloadablecomputer application software for cybersecurity, downloadable computer application software for use in computer access control,namely, software for imposing access restrictions, downloadable computer application software for high performance computing,namely, software that assists computers in deploying parallel applications and performing parallel computations, downloadablecomputer application software for operating quantum computers, downloadable computer application software for operatingartificial intelligence computers, and downloadable computer application software for accessing cloud computing systems andquantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computingsystems; Downloadable speech recognition software; Downloadable facial recognition software, namely, downloadable computerprograms using artificial intelligence for facial recognition; Downloadable artificial intelligence software for cybersecurity,downloadable artificial intelligence software for use in computer access control, namely, software for imposing access restrictions,downloadable artificial intelligence software for high performance computing, namely, software that assists computers in deployingparallel applications and performing parallel computations, downloadable artificial intelligence software for operating quantumcomputers, downloadable artificial intelligence software for operating artificial intelligence computers, and downloadable artificialintelligence software for accessing cloud computing systems and quantum computing systems, namely, software for authorizingaccess to cloud computing systems and quantum computing systems; Downloadable computer software designed to be deployedon web servers for cybersecurity, downloadable computer software designed to be deployed on web servers for use in computeraccess control, namely, software for imposing access restrictions, downloadable computer software designed to be deployed onweb servers for high performance computing, namely, software that assists computers in deploying parallel applications andperforming parallel computations, downloadable computer software designed to be deployed on web servers quantum computers,downloadable computer software designed to be deployed on web servers for operating artificial intelligence computers, anddownloadable computer software designed to be deployed on web servers for accessing cloud computing systems and quantumcomputing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems;Downloadable data communication software, namely, software enabling computers to communicate by sending data;Downloadable data processing software, namely downloadable software for processing images, graphics and text; Downloadablecloud-based software for cybersecurity, downloadable cloud-based software for use in computer access control, namely, softwarefor imposing access restrictions, downloadable cloud-based software for high performance computing, namely, software thatassists computers in deploying parallel applications and performing parallel computations, downloadable cloud-based software foroperating quantum computers, downloadable cloud-based software for operating artificial intelligence computers, anddownloadable cloud-based software for accessing cloud computing systems and quantum computing systems, namely, softwarefor authorizing access to cloud computing systems and quantum computing systems; Downloadable computer software for thecreation of firewalls; downloadable computer software for providing network security; Downloadable collaborative softwareplatforms for cybersecurity, downloadable collaborative software platforms for use in computer access control, namely, softwarefor imposing access restrictions, downloadable collaborative software platforms for high performance computing, namely, softwarethat assists computers in deploying parallel applications and performing parallel computations, downloadable collaborativesoftware platforms for operating quantum computers, downloadable collaborative software platforms for operating artificialintelligence computers, and downloadable collaborative software platforms for accessing cloud computing systems and quantumcomputing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems;Downloadable communications software for connecting computer servers; Downloadable communication software for processingimages, graphics, and text; Downloadable operating software for main frame computers; apparatus and instruments for electricand electronic security, namely fob-like devices used by an authorized user of a computer system to facilitate authentication;Electronic target monitoring apparatus, namely, wireless controllers to monitor and control the functioning of other electronicdevices, excluding gaming apparatus; Recorded computer cybersecurity software, Recorded software for use in computer accesscontrol, namely, software for imposing access restrictions, Recorded software for high performance computing, namely, softwarethat assists computers in deploying parallel applications and performing parallel computations, Recorded software for operatingquantum computers, Recorded software for operating artificial intelligence computers, and Recorded software for accessing cloudcomputing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems andquantum computing systems; Downloadable smartphone software for cybersecurity, downloadable smartphone software for usein computer access control, namely, software for imposing access restrictions, downloadable smartphone software for highperformance computing, namely, software that assists computers in deploying parallel applications and performing parallelcomputations, downloadable smartphone software for operating quantum computers, downloadable smartphone software foroperating artificial intelligence computers, and downloadable smartphone software for accessing cloud computing systems andquantum computing systems, namely, software for authorizing access to cloud computing systems and quantum computingsystems; Downloadable software for tablet computers for cybersecurity, downloadable software for tablet computers for use incomputer access control, namely, software for imposing access restrictions, downloadable software for tablet computers for highperformance computing, namely, software that assists computers in deploying parallel applications and performing parallelcomputations, downloadable software for tablet computers for operating quantum computers, downloadable software for tabletcomputers for operating artificial intelligence computers, and downloadable software for tablet computers for accessing cloudcomputing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems andquantum computing systems; Downloadable software for accessing digital content in the fields of entertainment, travel, hotels,and restaurants via electronic and optical communications networks; Downloadable software for performance testing of computerhardware; Downloadable software that assists computers in deploying parallel applications and performing parallel computations;monitors being downloadable software for monitoring and controlling communication between computers and automated machinesystems; Downloadable software for migration between various computer network operating systems; Downloadable software fortesting computer hardware reliability; Downloadable software for maintenance and operation of computer system; Downloadablesoftware for the integration of artificial intelligence and machine learning in the field of mega data; downloadable computersoftware for use as an application programming interface (API); Downloadable computer software for creating searchabledatabases of information and data; Downloadable software for providing information in the field of cybersecurity and accessrestrictions, high performance computing, quantum computers, artificial intelligence computers, business computing services, andcloud computing services; Downloadable computer software for transmitting electronic media via communication networks;downloadable software for remotely accessing and controlling a computer; Downloadable computer software for application anddatabase integration; Downloadable computer software for controlling and managing access server applications; Downloadablesoftware for the operational management of portable magnetic and electronic cards; Downloadable software for collecting andanalyzing real-time location data to predict the spread of an illness in a community; Downloadable security software for protectingdata through detection of threats against computer networks; utility software, namely downloadable software for performingcomputer system diagnostics; Downloadable software for monitoring the operation of audio and video devices in the field ofsecurity; downloadable software for remote monitoring and analysis of computer systems; Downloadable application softwaredesigned to be deployed on web servers for monitoring computer security incidents and running reports on cloud computingconfiguration and metadata; Downloadable and recorded computer platform software for cybersecurity, downloadable andrecorded computer platform software for tablet computers for use in computer access control, namely, software for imposingaccess restrictions, downloadable and recorded computer platform software for tablet computers for high performance computing,namely, software that assists computers in deploying parallel applications and performing parallel computations, downloadableand recorded computer platform software for tablet computers for operating quantum computers, downloadable and recordedcomputer platform software for tablet computers for operating artificial intelligence computers, and downloadable and recordedcomputer platform software for tablet computers for accessing cloud computing systems and quantum computing systems,namely, software for authorizing access to cloud computing systems and quantum computing systems; Downloadable software forproviding information in the field of cybersecurity and access restrictions, high performance computing, quantum computers,artificial intelligence computers, business computing services, and cloud computing services via the Internet; Downloadableapplication software for portable computer devices for cybersecurity, application software for portable computer devices for use incomputer access control, namely, software for imposing access restrictions, downloadable application software for portablecomputer devices for high performance computing, namely, software that assists computers in deploying parallel applications andperforming parallel computations, downloadable application software for portable computer devices for operating quantumcomputers, downloadable application software for portable computer devices for operating artificial intelligence computers, anddownloadable application software for portable computer devices for accessing cloud computing systems and quantum computingsystems, namely, software for authorizing access to cloud computing systems and quantum computing systems; Downloadablesoftware for data searching and data retrieval; Downloadable software for system cleaning and optimization; Downloadablesoftware for network security and computer units, namely, downloadable computer software for detecting threats againstcomputer networks; Downloadable computer software for authorizing access to databases; calculating devices being calculating machines
...
Class 042
Computer & Software Services & Scientific Services
Software as a Service (SaaS) services featuring software for cybersecurity, software for use in computer access control, namely,software for imposing access restrictions, software for high performance computing, namely, software that assists computers indeploying parallel applications and performing parallel computations, software for operating quantum computers, software foroperating artificial intelligence computers, and software for accessing cloud computing systems and quantum computing systems,namely, software for authorizing access to cloud computing systems and quantum computing systems; computer Platform as aService (PaaS) services featuring computer software platforms for cybersecurity, computer software platforms for use in computeraccess control, namely, software platforms for imposing access restrictions, computer software platforms for high performancecomputing, namely, software platforms that assist computers in deploying parallel applications and performing parallelcomputations, computer software platforms for operating quantum computers, computer software platforms for operating artificialintelligence computers, and computer software platforms for accessing cloud computing systems and quantum computingsystems, namely, software platforms for authorizing access to cloud computing systems and quantum computing systems;Software as a Service (SaaS) services featuring software using artificial intelligence for cybersecurity, software using artificialintelligence for use in computer access control, namely, software for imposing access restrictions, software using artificialintelligence for high performance computing, namely, software that assists computers in deploying parallel applications andperforming parallel computations, software using artificial intelligence for operating quantum computers, software using artificialintelligence for operating artificial intelligence computers, and software using artificial intelligence for accessing cloud computingsystems and quantum computing systems, namely, software for authorizing access to cloud computing systems and quantumcomputing systems; computer programming for others; programming of computer software for others; design, maintenance,development and updating of computer software; design and development of computers; development of computer platforms;duplication of computer programs; computer code writing; quantum computing services namely, providing temporary use of onlinenon-downloadable cloud-based quantum computing software systems and online non-downloadable software developmentplatforms for use in the development of quantum computing software; consulting services relating to computer systems analysis;consulting services for analyzing information systems namely, planning, design and management of information technologysystems; computer programming services for data processing; software engineering services for data processing; consultingservices in the field of computer system integration; technological advice relating to digital transformation; outsource serviceprovider in the field of information technology consulting relating to installation, maintenance and repair of computer software forcybersecurity and access restrictions, high performance computing, quantum computers, artificial intelligence computers,business computing services, cloud computing services, and for accessing cloud computing systems and quantum and computingsystems; rental of computers and computer software for cybersecurity, computer software for use in computer access control,namely, software for imposing access restrictions, computer software for high performance computing, namely, software thatassists computers in deploying parallel applications and performing parallel computations, computer software for operatingquantum computers, computer software for operating artificial intelligence computers, and computer software for accessing cloudcomputing systems and quantum computing systems, namely, software for authorizing access to cloud computing systems andquantum computing systems; rental of computer hardware and computer software for cybersecurity, computer software for use incomputer access control, namely, software for imposing access restrictions, computer software for high performance computing,namely, software that assists computers in deploying parallel applications and performing parallel computations, computersoftware for operating quantum computers, computer software for operating artificial intelligence computers, and computersoftware for accessing cloud computing systems and quantum computing systems, namely, software for authorizing access tocloud computing systems and quantum computing systems; technological research in the field of cybersecurity and accessrestrictions, high performance computing, quantum computers, artificial intelligence computers, business computing services,cloud computing services, and for accessing cloud computing systems and quantum and computing systems; cloud seeding;cloud computing featuring software for cybersecurity, software for use in computer access control, namely, software for imposingaccess restrictions, software for high performance computing, namely, software that assists computers in deploying parallelapplications and performing parallel computations, software for operating quantum computers, software for operating artificialintelligence computers, and software for accessing cloud computing systems and quantum computing systems, namely, softwarefor authorizing access to cloud computing systems and quantum computing systems; Computer services, namely, cloud hostingprovider services; providing temporary use of on-line non-downloadable software using artificial-intelligence for cybersecurity, online non-downloadable software using artificial-intelligence for use in computer access control, namely, software for imposingaccess restrictions, on-line non-downloadable software using artificial-intelligence for high performance computing, namely,software that assists computers in deploying parallel applications and performing parallel computations, on-line non-downloadablesoftware using artificial-intelligence for operating quantum computers, on-line non-downloadable software using artificial-intelligence for operating artificial intelligence computers, and on-line non-downloadable software using artificial-intelligence foraccessing cloud computing systems and quantum computing systems, namely, software for authorizing access to cloudcomputing systems and quantum computing systems; development of computer hardware; Software as a Service (SaaS) servicesfeaturing software using artificial intelligence for machine learning, deep learning and creation of deep learning networks; Softwareas a Service (SaaS) services featuring software for digital asset management; hosting of digital content on the internet; electronicdata storage; digital compression of computer data; data encryption and decoding services; data security consultancy; consultantservices with respect to data security; computer programming services for data storage; computer services concerning electronicdata storage, namely, cybersecurity services and access restrictions, namely, restricting unauthorized access to computersystems, business computing services, namely, consulting services in the design and implementation of computer-basedinformation systems for businesses, cloud computing services featuring software for use in database management; developmentof data storage systems, namely, software for cloud storage of data; technical data analysis services for protecting data byassessing computer security threats, namely, computer security threat analysis for protecting data; data mining; computerprogramming services for electronic data security; security services for computer networks, computer access and computer-basedtransactions, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile ornetwork resources based on assigned credentials; computer security services for protection against unauthorized network access,namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or networkresources based on assigned credentials; monitoring of computer systems for the detection of unauthorized access or dataprotection breaches; electronic monitoring of personally identification information for the detection of identity theft via the Internet;user authentication services using single sign-on technology for online software applications; technological advice in the fields ofselection, implementation, and use of computer programs being software; Access Control as a Service (ACaaS) featuringsoftware for cybersecurity, software for use in computer access control, namely, software for imposing access restrictions,software for high performance computing, namely, software that assists computers in deploying parallel applications andperforming parallel computations, software for operating quantum computers, software for operating artificial intelligencecomputers, and software for accessing cloud computing systems and quantum computing systems, namely, software forauthorizing access to cloud computing systems and quantum computing systems; application service provider (ASP) featuringsoftware for cybersecurity, software for use in computer access control, namely, software for imposing access restrictions,software for high performance computing, namely, software that assists computers in deploying parallel applications andperforming parallel computations, software for operating quantum computers, software for operating artificial intelligencecomputers, and software for accessing cloud computing systems and quantum computing systems, namely, software forauthorizing access to cloud computing systems and quantum computing systems; providing virtual computer systems throughcloud computing; conversion of computer programs and data, other than physical conversion; recovery of computer data; cloud stored data protection services in the nature of providing temporary use of online, non-downloadable software for protecting datastored in the cloud; electronic storage services for archiving databases, images and other electronic data; rental of computersoftware for data stream reading; consultancy, advisory and information services in relation to information technology relating toinstallation, maintenance and repair of computer software; computer services for the security, protection and restoration ofinformation technology namely, computer security services in the nature of restricting unauthorized access to computer networks,computer security threat analysis for protecting data, and computer data recovery services; computer security services, namely,providing user authentication services using biometric hardware and software technology for hardware and software systemsvulnerability testing; Technical support services, namely, troubleshooting in the nature of diagnosing problems with computerhardware and software, data communication systems; Telecommunications network security consultancy; computer securitythreat analysis for protecting data; monitoring computer systems for security purposes, namely, monitoring of computer systemsfor detecting unauthorized access or data breach; computer services for data protection, namely design and development ofcomputer software for cybersecurity, software for use in computer access control, namely, software for imposing accessrestrictions, software for high performance computing, namely, software that assists computers in deploying parallel applicationsand performing parallel computations, software for operating quantum computers, software for operating artificial intelligencecomputers, and software for accessing cloud computing systems and quantum computing systems, namely, software forauthorizing access to cloud computing systems and quantum computing systems; computer system monitoring services, namely,monitoring of computer systems for detecting unauthorized access or data breach; computer services, namely, data recoveryservices; computer virus protection services; programming of computer software in the field of internet security for others;consultation with respect to computer security; information security services, namely, installation, maintenance, and repair offirewall software systems; security technology testing services, namely, testing of security systems; Technological advice in thefield of artificial intelligence; design and development of software for evaluation and calculation of data; IT services, namely,development, programming and implementation of software for cybersecurity, software for use in computer access control,namely, software for imposing access restrictions, software for high performance computing, namely, software that assistscomputers in deploying parallel applications and performing parallel computations, software for operating quantum computers,software for operating artificial intelligence computers, and software for accessing cloud computing systems and quantumcomputing systems, namely, software for authorizing access to cloud computing systems and quantum computing systems; design and development of supercomputers, and number crunchers being data processing apparatus
Electronic Encryption units; security token hardware; data networks, n...
on 15 Oct 2024
Snow Federal Retirement Seminars & ChFEBC, LLC
97601501 · 21 Sep 2022
15 Oct 2030
041
Class 041
Education and Entertainment Services
Business training consultancy services
Business training consultancy services,The mark consists of a blue and...
on 15 Oct 2024
Wadi, Zanna
98271054 · 15 Nov 2023
15 Oct 2030
025
Class 025
Clothing Products
The mark consists of the word "Afrodescendant" in a stylized cursive font.
The mark consists of the word "Afrodescendant" in a stylized cursive f...
on 15 Oct 2024
Melissa & Doug, LLC
87773904 · 29 Jan 2018
18 Sep 2028
028
Class 028
Toys and Sporting Goods Products
Role playing toys in the nature of play sets for children to imitate real life occupations; toy furniture; toy food items, toy cooking utensils, toy kitchen appliances, and toy dishes, sold as a unit
Role playing toys in the nature of play sets for children to imitate r...
on 15 Oct 2024
LASCO, LLC
98258550 · 07 Nov 2023
15 Oct 2030
030
Class 030
Staple Food Products
Bakery products
Bakery products
on 15 Oct 2024
MONTECATINI RISTORANTE LLC
98237593 · 24 Oct 2023
15 Oct 2030
043
Class 043
Restaurant and Hotel Services
The mark consists of a stylized letter "M" disposed within a circular and contrasting background and the term "MONTECATINI" disposed to the right of the circular background and the word "RESTAURANT" disposed underneath the term "MONTECATINI".
The mark consists of a stylized letter "M" disposed within a circular ...
Country
US
Status
All
Registered
Pending
Abandoned
Other
Owners
ElI Lilly And Company (43)
RoIvant Sciences Gmbh (37)
B&g Foods North AmerIca Inc. (36)
I Love You Restaurant LLC (26)
Glaxo Group LImited (25)
Deutsche Telekom Ag (23)
Nant HoldIngs Ip LLC (23)
Ahold DelhaIze Licensing Sarl (21)
Gant Ab (21)
RIot Games Inc. (18)
Categories
Class 9 (3070)
Class 42 (2756)
Class 35 (2098)
Class 43 (1924)
Class 41 (1675)
Class 25 (1458)
Class 5 (1203)
Class 16 (916)
Class 3 (915)
Class 36 (796)
Class 10 (617)
Class 30 (600)
Class 1 (576)
Class 28 (558)
Class 21 (540)
Class 44 (482)
Class 11 (479)
Class 14 (386)
Class 7 (362)
Class 20 (353)
Class 38 (347)
Class 33 (335)
Class 18 (306)
Class 29 (306)
Class 37 (292)
Class 12 (273)
Class 45 (272)
Class 31 (243)
Class 39 (217)
Class 32 (208)
Class 40 (206)
Class 6 (198)
Class 24 (195)
Class 4 (148)
Class 8 (146)
Class 34 (109)
Class NaN (109)
Class 17 (108)
Class 19 (106)
Class 2 (93)
Class 26 (85)
Class 23 (80)
Class 13 (51)
Class 27 (51)
Class 46 (43)
Class 22 (40)
Attorney
Raj Abhyanker (70)
AllIson Strickland Ricketts (59)
Lawrence E Abelman (46)
Sana HakIm (40)
AdrIano Pacifici (36)
Yue Robert Xu (31)
Douglas R Wolf (26)
ChrIstopher J Day (25)
Bruce W Longbottom (22)
Jonathan G Morton (21)
Correspondents
Legalforce Rapc WorldwIde Pc (108)
Lawrence E Abelman (40)
AllIson Strickland Ricketts (39)
Sana HakIm (37)
Lz Legal ServIces LLC (36)
Intellectual Property Consulting LLC (34)
Fross ZelnIck Lehrman Zissu Pc (33)
Foley Lardner LLP (27)
Greenberg TraurIg LLP (23)
AI Trademark Registrability
Image Search
Drag and drop or upload to search any image