Brands and Their Owners
Welcome to the Brand page for “CENTURIONITS”, which is offered here for The mark consists of a head of a soldier over the word centurionits. there are 3 different sized crescents appearing to the upper-right of the soldier's head.;computer hardware and software for communications from confinement facilities;centurion its;color is not claimed as a feature of the mark.;analyzing telephone call information and data of inmates for criminal activity; analyzing inmate telephone call information and data, for confinement facilities, to certify call recordings as being unaltered from their original content; analyzing voice biometric identification data of inmates for criminal activity; analyzing the telephone communication system to detect pre-identified inmate activities; monitoring telephone calls of inmates and notifying law enforcement when appropriate; analyzing communication system account data and other historical system information of inmates for potential links to criminal activity or other suspects or criminals; monitoring confinement facilities using wired sensors for detecting unauthorized use of wireless devices within the facility;platform as a service (paas) featuring computer software platforms for providing communications from confinement facilities;.
Its status is currently believed to be active. Its class is unavailable. “CENTURIONITS” is believed to be currently owned by “PAY TEL COMMUNICATIONS, INC.”
Owner: |
PAY TEL COMMUNICATIONS, INC.
Owner Details |
---|---|
Description: |
The mark consists of a head of a soldier over the word CENTURIONITS. There are 3 different sized crescents appearing to the upper-right of the soldier's head.;Computer hardware and software for communications from confinement facilities;CENTURION ITS;Color is not claimed as a feature of the mark.;Analyzing telephone call information and data of inmates for criminal activity; analyzing inmate telephone call information and data, for confinement facilities, to certify call recordings as being unaltered from their original content; analyzing voice biometric identification data of inmates for criminal activity; analyzing the telephone communication system to detect pre-identified inmate activities; monitoring telephone calls of inmates and notifying law enforcement when appropriate; analyzing communication system account data and other historical system information of inmates for potential links to criminal activity or other suspects or criminals; monitoring confinement facilities using wired sensors for detecting unauthorized use of wireless devices within the facility;Platform as a service (PAAS) featuring computer software platforms for providing communications from confinement facilities;
|
Categories: |