Devon IT, Inc. logo

Devon IT, Inc.

6 Marks
Corp.
First Filed:Jul 12, 2004Latest Filed:Feb 23, 2013Address:Suite 100, King of Prussia, PA 19406

Portfolio Overview

Dead
6(100%)

Top Classes

Class 9
Electronics, Software & Scientific Equipment
6(100%)

TTAB Proceedings

No litigation activity

Top Firms

MILLER LAW GROUP PLLC(Feb 2013)
6

Trademark Portfolio

6 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
ECHO
ECHO
Trademark
Word
CANCELLED
Owner:
Serial:85858293
Filed:Feb 23, 2013
Classes:9
Registration:4527926
Registered:May 13, 2014
SAFEBOOK
SAFEBOOK
Trademark
Word
CANCELLED
Owner:
Serial:78972775
Filed:Sep 12, 2006
Classes:9
Registration:3411005
Registered:Apr 8, 2008
Goods & Services
Class 009: computer notebooks
SAFEBOOK
SAFEBOOK
Trademark
Combined
CANCELLED
Owner:
Serial:78972793
Filed:Sep 12, 2006
Classes:9
Registration:3411006
Registered:Apr 8, 2008
Goods & Services
Class 009: computer notebooks
NTA VIRTUAL OFFICE
NTA VIRTUAL OFFICE
Trademark
Word
CANCELLED
Owner:
Serial:76612108
Filed:Sep 20, 2004
Classes:9
Registration:3078194
Registered:Apr 11, 2006
Goods & Services
Computer hardware and software to provide a secure remote access system for permitting a user to access a central computer system; VIRTUAL OFFICE
NTAVO
NTAVO
Trademark
Word
CANCELLED
Owner:
Serial:76612107
Filed:Sep 20, 2004
Classes:9
Registration:3078193
Registered:Apr 11, 2006
Goods & Services
Computer hardware and software to provide a secure remote access system for permitting a user to access a central computer system
NTA
NTA
Trademark
Combined
ABANDONED
Owner:
Serial:76601782
Filed:Jul 12, 2004
Classes:9
Goods & Services
Computer hardware, central processing units, computer monitors, keyboards, network access server hardware and computer network workstations comprising computer case, motherboard, central processing unit, computer memory, keyboard, computer hardware for preventing unauthorized access to a computer system, computer software for use in providing remote access to a computer system, computer software for encryption, computer software for identifying and verifying computer system users, web-enabling legacy computer software applications for use in providing access to a computer system from a remote terminal as part of a network of terminals

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.