AWAKE trademarks | Applied Marks - Trademark, Domain Name and Social Media Protection for Brands - /\\\ Applied Marks

exact AWAKE exact AWAKE

Trademarks matching 'awake'

Summary of page content
2015-06-09
4926350
2016-03-29
US
  • 25
    Clothing, footwear, headgear.
    bottoms; tops
700
REGISTERED
2016-03-29
2021-03-29
green time stardom wide stay lip coffee powder energy 3rs roots retro rock jet airway work beyond awareness os solution
2014-02-10
4758377
2015-06-23
US
  • 5
    Pharmaceutical and veterinary preparations; sanitary preparations for medical purposes; dietetic substances adapted for medical use, food for babies; plasters, materials for dressings; material for stopping teeth, dental wax; disinfectants; preparations for destroying vermin; fungicides, herbicides.
    dietary supplements
702
SECTION 8 & 15-ACCEPTED AND ACKNOWLEDGED
2019-05-08
2021-03-27
money coffee time green media stardom wide stay lip powder energy 3rs roots retro rock jet airway work beyond awareness
2020-11-25
US
Trademark Image
The mark consists of A sun and an eye above the word AWAKE.
  • 43
    Services for providing food and drink; temporary accommodation
    coffee shops; restaurant and bar services, including restaurant carryout services
630
NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER
2021-02-01
2021-02-05
stardom wide stay lip coffee powder energy 3rs roots retro rock jet airway work beyond awareness os solution deep purity
2019-03-20
US
  • 37
    Building construction; repair; installation services
    technical support and consulting services related to customizing, installing, maintaining and repairing cyber-security computer hardware systems for others
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    information technology troubleshooting, namely, investigation, research and diagnosis of computer system and computer network threats; computer consultation in the field of computer security to detect and assess information security vulnerability; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats, malware and unauthorized data and programs on computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer security services for protecting and managing enterprise networks; computer security services, namely, restricting and detecting unauthorized access to enterprise computer networks; technical support and consulting services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical support and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security systems for others; technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; cloud computing services featuring software and databases for use in computer security and prevention and mitigation of computer risks; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; application service provider (asp) featuring software for use for detection, blocking, and facilitating removal and remediation of viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; application service provider (asp) featuring software that provides secure virtual computer systems and virtual computing environments; providing temporary use of non-downloadable, artificial-intelligence based network security software that detects and prioritizes mal-intent and behavioral threats from internal and external sources and performs autonomous incident triage; providing temporary use of non-downloadable computer software for use in protecting and managing enterprise security; providing temporary use of non-downloadable computer software for digital security; providing temporary use of non-downloadable computer software and non-downloadable software platform, all for monitoring enterprise networks and computer systems to protect against malicious attacks; providing temporary use of non-downloadable computer software for monitoring data and communications for security purposes; providing temporary use of non-downloadable computer software for protecting private information on enterprise networks; providing temporary use of non-downloadable computer software for implementing computer, software and network security measures; providing temporary use of non-downloadable computer software for monitoring and detecting security breaches; providing temporary use of non-downloadable computer software that provides intrusion alert, threat protection and other security functions; providing temporary use of non-downloadable anti-malware software applications; providing temporary use of non-downloadable computer software for providing network, internet, and computer security; providing temporary use of non-downloadable computer software for scanning, detecting, remediating and removing viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware; providing temporary use of non-downloadable internet security software, including namely, computer software for use in the monitoring and control of computer and online activity; providing temporary use of non-downloadable computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; providing temporary use of non-downloadable computer software for providing secure networks; providing temporary use of non-downloadable computer software for security analytics; providing temporary use of non-downloadable computer software for network traffic analysis; providing temporary use of non-downloadable computer software for network detection and response; providing temporary use of non-downloadable computer software for threat investigations and incident response; providing temporary use of non-downloadable computer software for threat hunting
654
REPORT COMPLETED SUSPENSION CHECK - CASE STILL SUSPENDED
2020-08-19
2021-01-21
life incorporated stardom wide stay lip coffee powder energy 3rs roots retro rock jet airway work beyond awareness os solution
2019-03-20
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    network security appliance comprised of computer hardware and artificial intelligence-based software for identifying, analyzing, visualizing, tracking, and collecting information on network security incidents and network traffic, and providing customized cyber security, governance, risk and compliance response options; network security appliance comprised of computer hardware and software featuring dashboard software for searching, mapping and graphing network devices and security threats, producing security incident reports, monitoring, tracking and managing computer and network security and providing trend visualization and analytics regarding computer and network security threats; downloadable, artificial-intelligence based network security software that detects and prioritizes mal-intent and behavioral threats from internal and external sources and performs autonomous incident triage; downloadable computer software for use in protecting and managing enterprise security; downloadable computer software for digital security; downloadable computer software and downloadable software platform, all for monitoring enterprise networks and computer systems to protect against malicious attacks; downloadable computer software for monitoring data and communications for security purposes; downloadable computer software for protecting private information on enterprise networks; downloadable computer software for implementing computer, software and network security measures; downloadable computer software for monitoring and detecting security breaches; downloadable computer software that provides intrusion alert, threat protection and other security functions; downloadable anti-malware software applications; downloadable computer software for providing network, internet, and computer security; downloadable computer software for scanning, detecting, remediating and removing viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware; downloadable internet security software, including namely, computer software for use in the monitoring and control of computer and online activity; downloadable computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; downloadable computer software for providing secure networks; downloadable computer software for security analytics; downloadable computer software for network traffic analysis; downloadable computer software for network detection and response; downloadable computer software for threat investigations and incident response; downloadable computer software for threat hunting
654
REPORT COMPLETED SUSPENSION CHECK - CASE STILL SUSPENDED
2020-08-19
2021-01-21
life incorporated stardom wide stay lip coffee powder energy 3rs roots retro rock jet airway work beyond awareness os solution
2019-03-20
US
  • 41
    Education; providing of training; entertainment; sporting and cultural activities
    on-line journals, namely, blogs in the field of information technology security and vulnerability
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    providing information in the field of information technology security and vulnerability, including information related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices
654
REPORT COMPLETED SUSPENSION CHECK - CASE STILL SUSPENDED
2020-08-19
2021-01-21
life incorporated stardom wide stay lip coffee powder energy 3rs roots retro rock jet airway work beyond awareness os solution
2020-11-25
US
Trademark Image
The mark consists of A sun and an eye above the word AWAKE.
  • 43
    Services for providing food and drink; temporary accommodation
    coffee shops; restaurant and bar services, including restaurant carryout services
630
NEW APPLICATION - RECORD INITIALIZED NOT ASSIGNED TO EXAMINER
2021-02-01
2021-02-05
stardom wide stay lip coffee powder energy 3rs roots retro rock jet airway work beyond awareness os solution deep purity
2020-01-09
6157029
2020-09-22
US
  • 24
    Textiles and textile goods, not included in other classes; bed and table covers
    textile fabrics for home and commercial interiors, namely, translucent fabrics and textiles fabrics for digital printing; textile fabrics for home and commercial interiors, namely, polyurethane-coated textile fabrics
  • 27
    Carpets, rugs, mats and matting, linoleum and other materials for covering existing floors; wall hangings (non-textile).
    wallcoverings, namely, interior decorating and finishing stretch coverings for walls and ceilings composed of vinyl, non-woven membranes and polyurethane-coatings
700
REGISTERED
2020-09-22
2020-09-22
time incorporated media green stardom wide stay lip coffee powder energy 3rs roots retro rock jet airway work beyond awareness
2019-01-18
5821290
2019-07-30
US
  • 29
    Meat, fish, poultry and game; meat extracts; preserved, dried and cooked fruits and vegetables; jellies, jams, compotes; eggs, milk and milk products; edible oils and fats
    olive oil for food; extra virgin olive oil for food
700
REGISTERED
2019-07-30
2020-05-31
energy media life stardom wide stay lip coffee powder 3rs roots retro rock jet airway work beyond awareness os solution
2019-03-18
US
Trademark Image
The mark consists of The image is mirrored of ma'at goddess.
  • 35
    Advertising; business management; business administration; office functions
    on-line retail store services featuring t-shirts; on-line retail store services featuring hoodies; on-line retail store services featuring jackets; on-line retail store services featuring hats; on-line retail store services featuring pants; on-line retail store services featuring sweaters
602
ABANDONED-FAILURE TO RESPOND OR LATE RESPONSE
2020-01-27
2020-05-31
stardom wide stay lip coffee powder energy 3rs roots retro rock jet airway work beyond awareness os solution deep purity
2019-03-20
US
  • 37
    Building construction; repair; installation services
    technical support and consulting services related to customizing, installing, maintaining and repairing cyber-security computer hardware systems for others
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    information technology troubleshooting, namely, investigation, research and diagnosis of computer system and computer network threats; computer consultation in the field of computer security to detect and assess information security vulnerability; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats, malware and unauthorized data and programs on computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer security services for protecting and managing enterprise networks; computer security services, namely, restricting and detecting unauthorized access to enterprise computer networks; technical support and consulting services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical support and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security systems for others; technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; cloud computing services featuring software and databases for use in computer security and prevention and mitigation of computer risks; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; application service provider (asp) featuring software for use for detection, blocking, and facilitating removal and remediation of viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; application service provider (asp) featuring software that provides secure virtual computer systems and virtual computing environments; providing temporary use of non-downloadable, artificial-intelligence based network security software that detects and prioritizes mal-intent and behavioral threats from internal and external sources and performs autonomous incident triage; providing temporary use of non-downloadable computer software for use in protecting and managing enterprise security; providing temporary use of non-downloadable computer software for digital security; providing temporary use of non-downloadable computer software and non-downloadable software platform, all for monitoring enterprise networks and computer systems to protect against malicious attacks; providing temporary use of non-downloadable computer software for monitoring data and communications for security purposes; providing temporary use of non-downloadable computer software for protecting private information on enterprise networks; providing temporary use of non-downloadable computer software for implementing computer, software and network security measures; providing temporary use of non-downloadable computer software for monitoring and detecting security breaches; providing temporary use of non-downloadable computer software that provides intrusion alert, threat protection and other security functions; providing temporary use of non-downloadable anti-malware software applications; providing temporary use of non-downloadable computer software for providing network, internet, and computer security; providing temporary use of non-downloadable computer software for scanning, detecting, remediating and removing viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware; providing temporary use of non-downloadable internet security software, including namely, computer software for use in the monitoring and control of computer and online activity; providing temporary use of non-downloadable computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; providing temporary use of non-downloadable computer software for providing secure networks; providing temporary use of non-downloadable computer software for security analytics; providing temporary use of non-downloadable computer software for network traffic analysis; providing temporary use of non-downloadable computer software for network detection and response; providing temporary use of non-downloadable computer software for threat investigations and incident response; providing temporary use of non-downloadable computer software for threat hunting
654
REPORT COMPLETED SUSPENSION CHECK - CASE STILL SUSPENDED
2020-08-19
2021-01-21
life incorporated stardom wide stay lip coffee powder energy 3rs roots retro rock jet airway work beyond awareness os solution
2019-03-20
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    network security appliance comprised of computer hardware and artificial intelligence-based software for identifying, analyzing, visualizing, tracking, and collecting information on network security incidents and network traffic, and providing customized cyber security, governance, risk and compliance response options; network security appliance comprised of computer hardware and software featuring dashboard software for searching, mapping and graphing network devices and security threats, producing security incident reports, monitoring, tracking and managing computer and network security and providing trend visualization and analytics regarding computer and network security threats; downloadable, artificial-intelligence based network security software that detects and prioritizes mal-intent and behavioral threats from internal and external sources and performs autonomous incident triage; downloadable computer software for use in protecting and managing enterprise security; downloadable computer software for digital security; downloadable computer software and downloadable software platform, all for monitoring enterprise networks and computer systems to protect against malicious attacks; downloadable computer software for monitoring data and communications for security purposes; downloadable computer software for protecting private information on enterprise networks; downloadable computer software for implementing computer, software and network security measures; downloadable computer software for monitoring and detecting security breaches; downloadable computer software that provides intrusion alert, threat protection and other security functions; downloadable anti-malware software applications; downloadable computer software for providing network, internet, and computer security; downloadable computer software for scanning, detecting, remediating and removing viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware; downloadable internet security software, including namely, computer software for use in the monitoring and control of computer and online activity; downloadable computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; downloadable computer software for providing secure networks; downloadable computer software for security analytics; downloadable computer software for network traffic analysis; downloadable computer software for network detection and response; downloadable computer software for threat investigations and incident response; downloadable computer software for threat hunting
654
REPORT COMPLETED SUSPENSION CHECK - CASE STILL SUSPENDED
2020-08-19
2021-01-21
life incorporated stardom wide stay lip coffee powder energy 3rs roots retro rock jet airway work beyond awareness os solution
2019-03-20
US
  • 41
    Education; providing of training; entertainment; sporting and cultural activities
    on-line journals, namely, blogs in the field of information technology security and vulnerability
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    providing information in the field of information technology security and vulnerability, including information related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices
654
REPORT COMPLETED SUSPENSION CHECK - CASE STILL SUSPENDED
2020-08-19
2021-01-21
life incorporated stardom wide stay lip coffee powder energy 3rs roots retro rock jet airway work beyond awareness os solution
2019-04-09
6005492
2020-03-10
US
  • 40
    Treatment of materials
    fine art printing services; printing services
700
REGISTERED
2020-03-10
2020-05-31
time incorporated media green stardom wide stay lip coffee powder energy 3rs roots retro rock jet airway work beyond awareness
2019-04-24
US
Trademark Image
The mark consists of a stylized word designed by special font.
  • 34
    Tobacco; smokers' articles; matches
    flavorings, other than essential oils, for tobacco
602
ABANDONED-FAILURE TO RESPOND OR LATE RESPONSE
2020-01-21
2020-05-31
stardom wide stay lip coffee powder energy 3rs roots retro rock jet airway work beyond awareness os solution deep purity
2018-01-23
5929743
2019-12-10
US
  • 3
    Bleaching preparations and other substances for laundry use; cleaning, polishing, scouring and abrasive preparations; soaps; perfumery, essential oils, cosmetics, hair lotions; dentifrices.
    cosmetics; hair care preparations; perfumes; cosmetic soaps; non-medicated soaps; detergents for household use; dentifrices; perfumery, fragrances and incense; breath freshening sprays; breath freshening strips; false eyelashes; false nails; cotton wool for cosmetic purposes
  • 21
    Household or kitchen utensils and containers; combs and sponges; brushes (except paint brushes); brush-making materials; articles for cleaning purposes; steelwool; unworked or semi-worked glass (except glass used in building); glassware, porcelain and earthenware not included in other classes.
    cosmetic and toilet utensils other than electric tooth brushes, namely, eyebrow brushes, cheek brushes in the nature of cosmetic brushes, eye shadow brushes in the nature of cosmetic brushes, mascara combs, and lip brushes; make-up brushes; sponges used for applying make-up; powder puffs; compacts sold empty
700
REGISTERED
2019-12-10
2020-05-31
stardom wide stay lip coffee powder energy 3rs roots retro rock jet airway work beyond awareness os solution deep purity
2017-11-13
5830967
2019-08-13
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    downloadable musical sound recordings
  • 41
    Education; providing of training; entertainment; sporting and cultural activities
    entertainment services in the nature of live musical performances
700
REGISTERED
2019-08-13
2020-05-31
formula stardom wide stay lip coffee powder energy 3rs roots retro rock jet airway work beyond awareness os solution deep
2017-08-17
US
  • 3
    Bleaching preparations and other substances for laundry use; cleaning, polishing, scouring and abrasive preparations; soaps; perfumery, essential oils, cosmetics, hair lotions; dentifrices.
    essential oils; essential oils for aromatherapy use
602
ABANDONED-FAILURE TO RESPOND OR LATE RESPONSE
2019-01-14
2020-05-31
stardom wide stay lip coffee powder energy 3rs roots retro rock jet airway work beyond awareness os solution deep purity
2017-02-02
5392882
2018-01-30
US
  • 32
    Beers; mineral and aerated waters and other non-alcoholic drinks; fruit drinks and fruit juices; syrups and other preparations for making beverages.
    beer; porter
700
REGISTERED
2018-01-30
2020-05-31
stardom wide stay lip coffee powder energy 3rs roots retro rock jet airway work beyond awareness os solution deep purity
2016-11-19
US
  • 25
    Clothing, footwear, headgear.
    shorts; sweatshirts; t-shirts
602
ABANDONED-FAILURE TO RESPOND OR LATE RESPONSE
2017-09-25
2020-05-31
stardom wide stay lip coffee powder energy 3rs roots retro rock jet airway work beyond awareness os solution deep purity
First 1 2 3 Last  1 of 3
NEED HELP? Chat with us online

Copyright 2008 - 2024 Applied Marks Pty Ltd (ACN 134 698 249). All rights reserved. Terms of Service, Privacy Policy and Acceptable Use Policy.