V VERIZON BUSINESS

USPTO USPTO 2006 ABANDONED - NO STATEMENT OF USE FILED

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The US trademark V VERIZON BUSINESS was filed as Word and figurative mark on 08/05/2006 at the U.S. Patent and Trademark Office. The current status of the mark is "ABANDONED - NO STATEMENT OF USE FILED".

Trademark Details

Trademark form Word and figurative mark
File reference 78945780
Application date August 5, 2006
Publication date September 11, 2007

Trademark owner

1320 North Court House Road
22201 Arlington
US

Trademark representatives

goods and services

9 Telecommunications and information technology products, equipment, components, supplies and systems, namely, pagers, telephones, telephone switches, peripheral equipment for use in local area networks and wide area networks, namely, peripheral component interface (PCI) hardware, coaxial and fiber optic cables and adapters, computers, microcomputers, computer monitors, computer display units, speakers, microphones, computer storage media, namely, disk drives, computer memory cards, computer memory chips, hard disks, magnetic disks, floppy disks, optical disks, compact disks, magnetic data media, optical data media, computer memory, computer peripherals and modems; televisions and television peripheral equipment, namely, cameras, set boxes, remote control units for interactive and non-interactive use; computer programs for use in telecommunications and business, namely, software for connecting global computer networks, software to allow users to perform electronic transactions via global computer networks, telephony software, software in the field of telecommunications network management, computer communications software for enabling access to and navigation of global computer networks, on-line services and computer bulletin boards, software for use in the tracking and management of electronic mail, financial accounting system software, software used for detecting and preventing fraud, software used for the provision of on-line information services, proxy server software, alarm monitoring software, billing analysis software, software for use in network access control, and software for creating and maintaining firewalls; machine-readable, magnetically encoded cards, namely, telephone calling cards and credit cards; audio and video recordings in the fields of telecommunications, information technology, safety, news, sports, entertainment, culture, business and finance, weather and travel; headsets for telephones, music and gaming; filters for voice and data communications, namely, filters for radio interference suppression; jacks, namely, patch panel jacks and telephone jacks; jack assemblies for use with telecommunications equipment for voice and data communications; couplers and faceplates for use with telecommunications wires and cables; routers and gateways for telecommunications and computer use; print servers; web cameras; CD players; MP3 players; DVD players; PC cards, namely, PCMCIA cards; blank smart cards; encoded smart cards, namely, electronic chip cards containing programming for storing and retrieving data; EVDO data cards, namely, wireless data cards used in computers for wireless internet access connectivity; Global System for Mobile Communications (GSM) data cards; General Packet Radio Service (GPRS) data cards; Universal Mobile Telecommunications System (UMTS) data cards; Subscriber Identity Module (SIM) cards; computer software in the fields of data networking, computer telephony software, computer software for facilitating e-commerce transactions, computer software for computer and network security, computer software for electronic messaging, computer software for fax transmissions, computer software for desktop video conferencing, computer software for collaborative document sharing, and computer software to enable access to databanks; security systems, namely: (a) database management cryptography software and user/instructional manuals sold as a unit; (b) computer encryption software for secure sales and controlled distribution of content over local area networks, wide area networks, and global computer information networks; (c) computer firmware for use in public key infrastructure, electronic security, electronic signatures, database management, to secure the integrity of computer software programs, and cryptography; and (d) computer software for management and risk analysis in the fields of computer, information, and network security, electronic security, electronic security management, electronic security applications, digital certificates, public key infrastructures, electronic signatures, cryptography, and computer hardware

ID: 1378945780