OVERVIEWTEC

Overview Technologies, Inc.

Application Filed: 2015-12-04
Trademark Application Details
Trademark Logo OVERVIEWTEC
602
Dead/Abandoned
ABANDONED-FAILURE TO RESPOND OR LATE RESPONSE
Research OneLook Acronym Finder
Serial Number86839916
Mark Drawing Code4000: Illustration: Drawing with word(s)/letter(s)/number(s) in Block form
Attorney NameJennifer H. Hamilton
Attorney Docket NumberOVT15004USIT
Law Office AssignedM80
Employee NameHOWARD, PARKER WALDRIP

Timeline

2015-12-04Application Filed
2016-09-29Abandon
2016-10-24Location: LAW OFFICE 117 - EXAMINING ATTORNEY ASSIGNED
2016-10-24Status: Dead/Abandoned
2018-07-08Transaction Date

Trademark Applicants & Owners

Owner: Overview Technologies, Inc.
Address15821 Ventura Blvd., Suite 490 Encino DE 91436
Legal Entity TypeCorporation
Legal Entity StateDE

Documents

Click the blue "Refresh" button to load certificates, specimines, application, and other documents.

Attorney of Record

JENNIFER H. HAMILTON
AVYNO LAW P.C.
6345 BALBOA BLVD., BLDG. I, SUITE 208
ENCINO, CA 91436

Good, Services, and Codes

International Codes:9
U.S. Codes:021,023,026,036,038
International Codes:38
U.S. Codes:100,101,104
International Codes:42
U.S. Codes:100,101
International Codes:45
U.S. Codes:100,101
Type CodeType
GS0091Anti-intrusion alarms; burglar alarms; personal security alarms; radio transmitters; video transmission apparatus; emergency signal transmitters; digital media, radio and video receivers; motion detectors; voice and video communication hubs; cameras, including video, television and surveillance cameras for building and home security; video and television monitors; mounting devices for cameras and monitors; transponder location system including antennas and satellite and radio transmitters and receivers; personnel locator devices to use global positioning systems (GPS) and cellular telecommunications; motion sensitive security lights; electric and electronic video surveillance installations; computer hardware and peripherals; electric, optical and proximity sensors for environmental use; strobes, sirens, bells, horns, and speakers; remote controls, keypads and control panels for security systems, anti-intrusion alarms, burglar alarms, personal health and security alarms, home surveillance systems, lighting controls and home automation devices; computer software used to operate, manage and monitor security systems, anti-intrusion alarms, burglar alarms, personal health and security alarms, home surveillance systems, lighting controls and home automation devices; computer software used to monitor and track movement activity, user conditions and environmental conditions, and used to transmit electronic messages and data via communications networks; automation systems comprising wireless and wired controllers, controlled devices, and software for security, safety and other monitoring and control applications; computer software, namely, computer software for creating private networks and communities; computer software providing a communications platform enabling users to create private networks and online communities based on geographic locations and shared geographic boundaries; software to enable uploading, posting, showing, displaying, tagging, blogging, sharing or otherwise providing electronic media or information over the Internet or other communications network; computer software tools for social networking, building social networking applications and for allowing data retrieval, upload, access and management; computer software for allowing user to receive information about their personal home security and surveillance systems and those surveillance systems within a defined community; computer software for allowing users to control the operating parameters of their personal home security and surveillance system; computer software application programming interface (API) for third-party software and online services for building private communities and sharing information relating to security, crime, panic, alert and emergency situations and responses within the private communities and for allowing data retrieval, upload, access and management of information; computer software and software tools for designing, customizing and installing home security and surveillance systems

Trademark Filing History

DescriptionDateEvent Coding
NEW APPLICATION ENTERED IN TRAM2015-12-081 NWAP I:Incoming Correspondence
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM2015-12-092 NWOS I:Incoming Correspondence
NOTICE OF PSEUDO MARK E-MAILED2015-12-103 MPMK E:E-Mail
ASSIGNED TO EXAMINER2016-03-234 DOCK D:Assigned to Examiner
NON-FINAL ACTION WRITTEN2016-03-285 CNRT R:Renewal
NON-FINAL ACTION E-MAILED2016-03-286 GNRT F:First Action
NOTIFICATION OF NON-FINAL ACTION E-MAILED2016-03-287 GNRN O:Outgoing Correspondence
ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE2016-10-248 ABN2 O:Outgoing Correspondence
ABANDONMENT NOTICE MAILED - FAILURE TO RESPOND2016-10-249 MAB2 O:Outgoing Correspondence

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed