BLS GOVERNMENT SERVICES - Trademark Details
Status: 700 - Registered
Image for trademark with serial number 88260584
Serial Number
88260584
Registration Number
6240362
Word Mark
BLS GOVERNMENT SERVICES
Status
700 - Registered
Status Date
2021-01-05
Filing Date
2019-01-14
Registration Number
6240362
Registration Date
2021-01-05
Mark Drawing
4000 - Standard character mark Typeset
Published for Opposition Date
2019-06-04
Attorney Name
Law Office Assigned Location Code
N40
Employee Name
ADEMI, XHENETA
Statements
Disclaimer with Predetermined Text
"GOVERNMENT SERVICES"
Goods and Services
Secure digital (SD) card readers; Secure Digital (SD) Memory Cards; Secure terminals for electronic transactions; Security alarm controllers; Security and fire alarms; Security control panels and motion detectors; Security devices, namely, mobile image projection device for displaying retinal images; Security lighting system for vehicles using radio frequency device; Security lights for outdoor use; Security mirrors for surveillance; Security mirrors for surveillance for use in monitoring; Security products, namely, entry door systems comprising touch pads and security doors; Security surveillance robots; Software defined radio; Downloadable software development kits (SDK); Downloadable software for monitoring and controlling communication between computers and automated machine systems; Downloadable software for optical character recognition; Downloadable software for processing images, graphics and text; Downloadable software for the operational management of portable magnetic and electronic cards; Downloadable software for securing and auditing computer network operations; Software programmable microprocessors; Downloadable anti-piracy software; Downloadable anti-spyware software; Automated process control system, namely, micro-processor based hardware and software used to monitor the status of industrial processes, namely, power generation, electrical distribution and oil and gas processing; Downloadable basic Input/Output System (BIOS) software; Building security systems comprising software and hardware for providing picture, video, alarm status, building plans, and other information to a remote station; Cards encoded with security features for identification purposes; Closed circuit TV systems for security and surveillance, namely, cameras, switchers, monitors, microphones, and recorders; Downloadable communication software for providing access to the Internet; Downloadable communications software for connecting computer security auditors; Downloadable compiler software; Downloadable computer software and firmware for operating system programs; Downloadable computer software and firmware for playing games of chance on any computerized platform, including dedicated gaming consoles, video based slot machines, reel based slot machines, and video lottery terminals; Computer software, downloadable, and hardware for securing and auditing computer network operations; Downloadable computer software development tools; Downloadable computer software for accessing information directories that may be downloaded from the global computer network; Downloadable computer software for administration of computer local area networks; Downloadable computer software for administration of computer networks; Downloadable computer software for application and database integration; Downloadable computer software for authorising access to data bases; Downloadable computer software for communicating with users of hand-held computers; Downloadable computer software for computer system and application development, deployment and management; Downloadable computer software for controlling and managing access server applications; Downloadable computer software for controlling self-service terminals; Downloadable computer software for creating searchable databases of information and data; Downloadable computer software for database management; Downloadable computer software for document management; Downloadable computer software for encryption; Downloadable computer software for managing and validating cryptocurrency transactions using blockchain-based smart contracts; Downloadable computer software for managing cryptocurrency transactions using blockchain technology; Downloadable computer software for organizing and viewing digital images and photographs; Downloadable computer software for processing digital images; Downloadable computer software for providing an on-line database in the field of transaction processing to upload transactional data, provide statistical analysis, and produce notifications and reports; Downloadable computer software for redistricting, namely, aggregating smaller geographical areas into multiple larger areas; Downloadable computer software for the collection, editing, organizing, modifying, book marking, transmission, storage and sharing of data and information; Downloadable computer software for the creation of firewalls; Downloadable computer software for use as a cryptocurrency wallet; Downloadable computer software for use in computer access control; Downloadable computer software for use in database management; Downloadable computer software for use in programming facsimile machines; Downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Downloadable computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Downloadable computer software for visualization in the nature of graphical representation and analysis of satellites; Downloadable computer software for securing and auditing computer network operations and instructional user guides sold as a unit; Downloadable computer software for securing and auditing computer network operations that may be downloaded from a global computer network; Downloadable computer software for securing and auditing computer network operations; Downloadable computer software platforms for securing and auditing computer network operations; Downloadable computer software that allows people or organizations to create a voting event, vote on the issue, change their vote at will and track the input and display it in a unique graphical way; Downloadable computer software that assists computers in deploying parallel applications and performing parallel computations; Downloadable computer software that provides real-time, integrated business management intelligence by combining information from various databases and presenting it in an easy-to-understand user interface; Downloadable computer software to automate data warehousing; Downloadable computer software to maintain and operate computer system; Downloadable computer software, namely, software development tools for the creation of mobile internet applications and client interfaces; Downloadable computer software, namely, an application allowing sales and field service employees to update and receive data stored in an enterprise's computer databases in real time, using a mobile device, with full telephony integration with the telephone and/or software features of the mobile device; Downloadable computer anti-virus software; Downloadable computer application software for mobile phones, namely, software for securing and auditing computer network operations; Downloadable computer application software for security, namely, software for auditing computer network operations; Downloadable computer e-commerce software to allow users to perform electronic business transactions via a global computer network; Computer hardware and recorded software for setting up and configuring local area networks sold as a unit; Computer hardware and recorded software for setting up and configuring wide area networks sold as a unit; Computer hardware and software sold as a unit for testing of embedded computer systems; Computer hardware and recorded software system for remotely monitoring environmental conditions and controlling devices within a building, facility, grounds, or designated spatial area; Computer hardware and recorded software systems for securing and auditing computer network operations; Computer hardware and recorded software sold as unit for use with medical patient monitoring equipment, for receiving, processing, transmitting and displaying data; Computer hardware and peripheral devices and recorded computer software for data communication and translating and transmitting data sold therewith; Downloadable computer operating software; Downloadable computer programs and computer software for electronically trading securities; Downloadable computer search engine software; Downloadable computer telephony software; Control system for the remote observation, management and operation of cranes, comprising computers, software, electromechanical controls, and video display screens; Downloadable data compression software; Downloadable database management software for securing and auditing computer network operations; Day and night vision systems primarily comprising day and night sensors, day and night cameras, power sources, communication means, monitors and operating software; Downloadable decoder software; Dongles being computer hardware for preventing the unauthorized copying or use of computer software; Downloadable software for connecting, operating, and managing computer network security in the internet of things (IoT); Downloadable software for securing and auditing global computer network operations; Downloadable software in the nature of a mobile application for the securing and auditing communication between computers and automated machine systems; Downloadable cloud-based software for securing and auditing computer network operations; Downloadable cloud-computing software for securing and auditing computer network operations; Downloadable computer software for securing and auditing global computer network operations; Downloadable geographic information system (GIS) software; Downloadable middleware for software application integration; Downloadable middleware for securing and auditing computer network operations; Downloadable educational software featuring instruction for securing and auditing computer network operations; Electrical leak detection hardware and recorded operating software sold as a unit; Electronic security and surveillance devices, namely, electronic security tags and labels, acoustic tags, magnetic tags; Electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication; Electronic software updates, namely, downloadable computer software and associated data files for updating computer software in the fields of securing and auditing computer network operations, provided via computer and communication networks; Electronic charging devices for tablet PCs that also include features to secure and disinfect the tablet PCs; Electronic communications systems comprised of computer hardware and software for the transmission of data between two points; Electronic device to charge and secure tablet PCs; Electronic equipment for point-of-sales (POS) systems, namely, point-of-sale terminals, bar code readers, optical readers, advertisement display monitors, keyboards, printers, scanners, radio transmitters, radio receivers, computer hardware, and computer operating software; Electronic video surveillance products, namely, electronic components of security systems; Electronically operated high security lock cylinders; Downloadable enterprise software in the nature of a database for non-transactional data and a search engine for database content; Entry/exit security portal comprised of an electronic passageway equipped with biometric devices for identification verification and detection of impermissible items being carried through; Environmentally friendly automation systems, namely, embedded operating systems and pc based software, for monitoring specified conditions and controlling respective innovative devices within a designated area; External computer hard drives featuring software for securing and auditing computer network operations; Downloadable facilities management software, namely, software to control building environment, access and security systems; Downloadable factory automation software, namely, software to integrate manufacturing machine operations, track problems and generate production reports; Free-space optics transmission systems, Ethernet switches and routers, and software sold both as components thereof and separately, namely, software adapted and arranged for operating, installing, testing, diagnosing and managing the forgoing telecommunication equipment; Global positioning system (GPS) consisting of computers, computer software, transmitters, receivers, and network interface devices; Downloadable graphical user interface software; Hand-held security device that disables assailants using flashing light emitting diodes; Home and office automation systems comprising wireless and wired controllers, controlled devices, and software for lighting, HVAC, security, safety and other home and office monitoring and control applications; Home and office electrical power automation systems comprising wireless and wired controllers, controlled devices, and software for appliances, lighting, HVAC, security and other home and office electrical power monitoring and control applications; Home automation hubs comprised of voice-activated speakers, computer hardware, and software for home security monitoring; Home automation hubs using artificial intelligence comprised of voice-activated speakers, computer hardware, and software for home security monitoring; Downloadable industrial process control software; Downloadable intelligent personal assistant software for securing and auditing computer network operations; Interactive computer kiosks comprising computers, computer hardware, computer peripherals, and computer operating software, for securing and auditing computer network operations; Iris recognition security devices; Downloadable LAN (local area network) operating software; LCD monitors for security purposes; Downloadable medical software for health security and monitoring; Motion sensitive security lights; Motion sensors for security lights; Downloadable network access server operating software; Optical apparatus, namely, a non-lethal security device that uses a light source to detect, warn, repel, temporarily blind, disorient, nauseate, disable, confuse, debilitate, stun, subdue, stop, or incapacitate persons or animals; Pattern recognition systems composed of computer chips, computer hardware and software; Downloadable payment gateway software for linking e-commerce websites to credit card processing networks; Personal security alarms; Personal security alarms that connect to a wireless communications network; Plastic case used as a security device for protecting and securing DVDs and other magnetic and electronic media from theft; Reed switches for use with security control panels; Simulators for the steering and control of vehicles; Downloadable software for ensuring the security of electronic mail; Telecommunications hardware and recorded software for monitoring and alerting remote sensor status via the Internet sold as a unit; Traffic management equipment, namely, display monitors, computers, auto compasses, and software to manage traffic; Downloadable USB (universal serial bus) operating software; USB computer security key; Vehicle detection equipment, namely, display monitors, computers, image sensors, video cameras, and operating system and application software to detect vehicle location; Vehicle locating, tracking and security system comprised of an antenna and radio transmitter to be placed in a vehicle; Vehicle tracking devices comprised of cellular radio modules, computer software and computer hardware, sensors, transmitters, receivers and global positioning satellite receivers, all for use in connection with vehicle tracking, vehicle monitoring and anti-theft vehicle alarms; Video injection system, namely, optical and electronic hardware and computer software, simulating the effects of tracer round fly-outs and bursts on target, which allows for on-vehicle precision gunnery without expending actual ammunition; Downloadable VPN (virtual private network) operating software; Downloadable WAN (wide area network) operating software; Watchman's time recorders, namely, a device for recording the activities of security guards to insure that the security guard arrives at scheduled checkpoints; Downloadable web site development software; Wireless controllers to remotely monitor and control the function and status of other electrical, electronic, and mechanical devices or systems, namely, computer networks; Wireless digital electronic apparatus to secure and protect data and images on all forms of wireless equipment including mobile telecommunications equipment using an automatic synchronization process and alarm notification of the loss or theft of the wireless equipment including mobile telecommunications equipment; X-ray security scanners; X-ray full body security scanners
Goods and Services
Software authoring; Software design and development; Software development in the framework of software publishing; Software porting; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security consultancy in the field of penetration testing; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services in the nature of administering digital certificates; Computer security services in the nature of administering digital keys; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer security services, namely, restricting unauthorized access to computer hardware and networks; Computer security services, namely, restricting unauthorized network access by outside parties; Computer security threat analysis for protecting data; Computer software consultancy; Computer software consulting; Computer software design and updating; Computer software design for others; Computer software design, computer programming, and maintenance of computer software; Computer software development; Computer software development and computer programming development for others; Computer software development in the field of mobile applications; Computer software development in the field of security and monitoring; Computer software development, computer programming and maintenance of computer software for audit; Computer software installation and maintenance; Computer programming and software design; Computer services, namely, integration of computer software into multiple systems and networks; Consultancy in the field of software design; Customizing computer software; Data security consultancy; Design and development of software in the field of mobile applications; Design and development of computer software; Design and development of electronic data security systems; Design and writing of computer software; Design, development and implementation of software; Design, development, and implementation of software for monitoring and auditing; Design, development, installation and maintenance of computer software; Design, installation, updating and maintenance of computer software; Design, maintenance, development and updating of computer software; Design, updating and rental of computer software; Design, upgrading and rental of computer software; Developing and updating computer software; Developing computer software; Developing of driver and operating system software; Development of security systems and contingency planning for information systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of software for secure network operations; Installation and maintenance of computer software; Installation of computer software; Installation of security and monitoring software; Installation, maintenance, and updating of computer software; Internet security consultancy; Maintenance and updating of computer software; Maintenance of computer software relating to computer security and prevention of computer risks; Preparation, update, installation and maintenance of computer software; Providing a secure electronic online system featuring technology which allows penetration testing; Providing technology information updates for home security systems via the global computer network; Rental of application software; Renting computer software; Repair of software; Research and development of computer software; Research, development, design and upgrading of computer software; Services for maintenance of computer software; Smartphone software design; Technical support services, namely, troubleshooting of industrial process control computer software problems; Testing of security systems; Troubleshooting of computer software problems; Updating and design of computer software; Updating and maintenance of computer software; Updating and rental of software for data processing; Updating of computer software; Updating of computer software for others; Updating of computer software relating to computer security and prevention of computer risks; Writing and updating computer software
Goods and Services
Security threat analysis for protecting personal property; Computer software licensing; Consultancy relating to computer software licensing; Licensing of computer software; Personal security consultation; Providing a web site featuring information on the development of privacy, security and data governance law
Pseudo Mark
BLACK LANTERN SECURITY GOVERNMENT SERVICES
Classification Information
International Class
042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software; legal services. - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software; legal services.
US Class Codes
100, 101
Class Status Code
6 - Active
Class Status Date
2019-02-05
Primary Code
042
First Use Anywhere Date
2019-01-01
First Use In Commerce Date
2019-01-01
Current Trademark Owners
Party Type
30 - Original Registrant
Address
Please log in with your Justia account to see this address.
Trademark Owner History
Party Type
30 - Original Registrant
Address
Please log in with your Justia account to see this address.
Party Type
20 - Owner at Publication
Address
Please log in with your Justia account to see this address.
Party Name
Party Type
10 - Original Applicant
Address
Please log in with your Justia account to see this address.
Correspondences
Name
Clay M. Grayson
Address
Please log in with your Justia account to see this address.
Trademark Events
Event DateEvent Description
2019-01-17NEW APPLICATION ENTERED IN TRAM
2019-02-05NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM
2019-03-27ASSIGNED TO EXAMINER
2019-03-29NON-FINAL ACTION WRITTEN
2019-03-29NON-FINAL ACTION E-MAILED
2019-03-29NOTIFICATION OF NON-FINAL ACTION E-MAILED
2019-04-11EXAMINERS AMENDMENT -WRITTEN
2019-04-11EXAMINERS AMENDMENT E-MAILED
2019-04-11NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED
2019-04-11EXAMINER'S AMENDMENT ENTERED
2019-04-11APPROVED FOR PUB - PRINCIPAL REGISTER
2019-04-25ASSIGNED TO LIE
2019-05-15NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
2019-06-04PUBLISHED FOR OPPOSITION
2019-06-04OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
2019-07-30NOA E-MAILED - SOU REQUIRED FROM APPLICANT
2020-01-30TEAS STATEMENT OF USE RECEIVED
2020-02-14CASE ASSIGNED TO INTENT TO USE PARALEGAL
2020-01-30USE AMENDMENT FILED
2020-02-14STATEMENT OF USE PROCESSING COMPLETE
2020-05-04SU - NON-FINAL ACTION - WRITTEN
2020-05-04NON-FINAL ACTION E-MAILED
2020-05-04NOTIFICATION OF NON-FINAL ACTION E-MAILED
2020-10-30TEAS RESPONSE TO OFFICE ACTION RECEIVED
2020-11-09CORRESPONDENCE RECEIVED IN LAW OFFICE
2020-11-09TEAS/EMAIL CORRESPONDENCE ENTERED
2020-11-27ALLOWED PRINCIPAL REGISTER - SOU ACCEPTED
2020-11-28NOTICE OF ACCEPTANCE OF STATEMENT OF USE E-MAILED
2021-01-05REGISTERED-PRINCIPAL REGISTER