Mark For: TWENTY20® trademark registration is intended to cover the categories of network operations center services, namely, monitoring networked surveillance and security systems for corporate office, field offices, and facilities of others to ensure proper functioning; Consulting services in the field of office and workplace automation; Monitoring remote devices, namely, sensors, gauges, and cameras to ensure proper functioning; Computer services, namely, acting as an application service provider in the field of information management to host computer application software for the purpose of automation systems in the fields of energy, utilities, construction, agriculture, mining, forestry, homeland security, emergency preparedness, government, disaster relief, water midstream, educational markets and other remote environments' operational data, critical infrastructure, assets and personnel to ensure proper functioning; Computer security services, namely, monitoring of hardware and applications for detecting unauthorized access or data breach, measurements, and asset tracking; Development of software for secure network operations; Design and development of software featuring broadband transmission for others to control access and security systems. [all]
Status
2020-01-12 UTC
LIVE APPLICATION Awaiting Examination
The trademark application has been accepted by the Office (has met the minimum filing requirements) and has not yet been assigned to an examiner.
(Computer, scientific & legal) Scientific and technological services and research and design relating thereto: industrial analysis and research services; design and development of computer hardware and software; legal services.
Filed Use
Yes
Current Use
Yes
Intent To Use
No
Filed ITU
No
44D Filed
No
44E Current
No
66A Current
No
Current Basis
No
No Basis
No
Attorney Name
John C. Rawls
Attorney Docket Number
4868-0001
Timeline
2019-08-27
Date of First Use
2019-08-27
Date of Use In Commerce
2019-11-28
Application Filed
2019-12-05
Location: NEW APPLICATION PROCESSING
2019-12-05
Status: Live/Pending
2019-12-05
Status: New application will be assigned to an examining attorney approximately 3 months after filing date.
JOHN C. RAWLS BAKER WILLIAMS MATTHIESEN LLP 5005 WOODWAY, SUITE 201 HOUSTON, TX 77056
Good, Services, and Codes
IC 042. US 100 101. G & S: Network operations center services, namely, monitoring networked surveillance and security systems for corporate office, field offices, and facilities of others to ensure proper functioning; Consulting services in the field of office and workplace automation; Monitoring remote devices, namely, sensors, gauges, and cameras to ensure proper functioning; Computer services, namely, acting as an application service provider in the field of information management to host computer application software for the purpose of automation systems in the fields of energy, utilities, construction, agriculture, mining, forestry, homeland security, emergency preparedness, government, disaster relief, water midstream, educational markets and other remote environments' operational data, critical infrastructure, assets and personnel to ensure proper functioning; Computer security services, namely, monitoring of hardware and applications for detecting unauthorized access or data breach, measurements, and asset tracking; Development of software for secure network operations; Design and development of software featuring broadband transmission for others to control access and security systems. FIRST USE: 20190827. FIRST USE IN COMMERCE: 20190827
International Codes:
42
U.S. Codes:
100,101
Type Code
Type
GS0421
Network operations center services, namely, monitoring networked surveillance and security systems for corporate office, field offices, and facilities of others to ensure proper functioning; Consulting services in the field of office and workplace automation; Monitoring remote devices, namely, sensors, gauges, and cameras to ensure proper functioning; Computer services, namely, acting as an application service provider in the field of information management to host computer application software for the purpose of automation systems in the fields of energy, utilities, construction, agriculture, mining, forestry, homeland security, emergency preparedness, government, disaster relief, water midstream, educational markets and other remote environments' operational data, critical infrastructure, assets and personnel to ensure proper functioning; Computer security services, namely, monitoring of hardware and applications for detecting unauthorized access or data breach, measurements, and asset tracking; Development of software for secure network operations; Design and development of software featuring broadband transmission for others to control access and security systems
PM0001
TWENTY TWO ZERO; TWENTY TWENTY
Trademark Filing History
Description
Date
Proceeding Number
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.