Brands and Their Owners
Cortez, Jessie S. contact information is shown below | |
Owner: | CORTEZ, JESSIE S. |
---|---|
Owner Address: | 25420 Pierson Rd. Homeland CA 92548 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
C T Z |
---|---|
Description: | The mark consist of the letters CTZ in which the TZ and within the opening of the letter C, the letter T has two notches in the cross of the letter. The colors of the C begin with white at the top and then subtly change to grey, then black, then navy blue, light blue and then back to white at the bottom. The colors of the letters TZ begin with white at the top and then subtly change to grey, then black, then navy blue, light blue, white, navy blue, and finally black. All of the letters have a black outlining and grey shading. All of the above is on a white background that is not being claimed as part of the mark.;Computer security software for restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files;CORTEZ;The color(s) white, gray, black, navy blue, and light blue is/are claimed as a feature of the mark.; |
Category: | MARK CONSIST |
Brand: |
CENTER ZERO |
---|---|
Description: | Computer security software for restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; |
Category: | COMPUTER SECURITY SOFTWARE RESTRICTING |
Brand: |
CTZ CENTER ZERO |
---|---|
Description: | Computer security software for restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; |
Category: | COMPUTER SECURITY SOFTWARE RESTRICTING |