TENCENT SECURITY RESPONSE CENTER Trademark

Trademark Overview


On Monday, May 21, 2018, a trademark application was filed for TENCENT SECURITY RESPONSE CENTER with the United States Patent and Trademark Office. The USPTO has given the TENCENT SECURITY RESPONSE CENTER trademark a serial number of 87930200. The federal status of this trademark filing is REGISTERED as of Tuesday, October 8, 2019. This trademark is owned by Tencent Holdings Limited. The TENCENT SECURITY RESPONSE CENTER trademark is filed in the Computer & Software Products & Electrical & Scientific Products, Advertising, Business and Retail Services, Education & Entertainment Services, and Computer & Software Services & Scientific Services categories with the following description:

Education, namely, educational classes in the field of computer security, IT security and internet security; Providing of training, namely, IT training services, computer security training services and internet security training services; Organizing community sporting and cultural activities; Arranging and conducting of colloquiums in the field of computer security and IT training; Arranging and conducting of educational conferences; Arranging and conducting of educational congresses; Arranging and conducting of seminars in the field of computer security and IT training; Arranging and conducting of educational symposiums; Arranging and conducting of professional training workshops; Electronic desktop publishing; Providing on-line electronic publications, not downloadable, in the nature of books, pamphlets, brochures, newsletters, journals, magazines and periodicals in the field of internet security, computer security and computer virus protection; Publication of electronic books and jo...

Apparatus for recording, transmission or reproduction of sound or images; Blank magnetic data carriers in the nature of recording discs; compact discs and DVDs featuring computer software, namely, computer anti-virus software, computer security software, computer network security software, software for ensuring the security of electronic mails, software for reporting security vulnerabilities in other software, software for reporting bugs in other software, software for analysing security threats and vulnerabilities in other software and computer networks, software for recovering computer data and software for tracing the origin of computer viruses and spyware, software for identity security, software for use in analysis and reporting of firewall log data, software for detecting, blocking and intercepting malware and other threats to computer hardware and software, software for use in vulnerability scanning of networks, websites, computer hardware and other computer software; data proce...

Advertising; business management; business administration; Providing office functions; arranging subscriptions to telecommunication services for others; Professional business consultancy; business networking; Consumer advice ship in the nature of providing commercial information and advice for consumers in the choice of products and services; compilation of information into computer databases; file management, namely, computerized file management; organization of exhibitions for commercial or advertising purposes; organization of trade fairs for commercial or advertising purposes; systemization of information into computer databases; business data analysis; compiling and maintaining online business and commercial information directories; computerized file management; consumer research; consumer response analysis in the nature of consumer survey services and consumer trend analysis; public opinion surveys; conducting market surveys; customer feedback programmes in the nature of respondi...

Design and development of computer hardware and software; Computer programming; Computer software consultancy; Computer software design; Updating of computer software; Computer system analysis; Computer system design; Computer virus protection services; computer security services, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Consultancy in the design and development of computer hardware; Creating and maintaining web sites for others; Data conversion of computer programs and data, not physical conversion; Duplication of computer programs; Installation of computer software; Maintenance of computer software; Monitoring of computer systems by remote access to ensure proper functioning; Providing search engines for the internet; Recovery of computer data; Rental of computer software; Rental of web servers; designing, maintenance, testing and analysis of computer software and computer programs; designing, testing ...
tencent security response center

General Information


Serial Number87930200
Word MarkTENCENT SECURITY RESPONSE CENTER
Filing DateMonday, May 21, 2018
Status700 - REGISTERED
Status DateTuesday, October 8, 2019
Registration Number5877276
Registration DateTuesday, October 8, 2019
Mark Drawing3000 - Illustration: Drawing or design which also includes word(s) / letter(s) / number(s)
Published for Opposition DateTuesday, July 23, 2019

Trademark Statements


Goods and ServicesEducation, namely, educational classes in the field of computer security, IT security and internet security; Providing of training, namely, IT training services, computer security training services and internet security training services; Organizing community sporting and cultural activities; Arranging and conducting of colloquiums in the field of computer security and IT training; Arranging and conducting of educational conferences; Arranging and conducting of educational congresses; Arranging and conducting of seminars in the field of computer security and IT training; Arranging and conducting of educational symposiums; Arranging and conducting of professional training workshops; Electronic desktop publishing; Providing on-line electronic publications, not downloadable, in the nature of books, pamphlets, brochures, newsletters, journals, magazines and periodicals in the field of internet security, computer security and computer virus protection; Publication of electronic books and journals on-line; Publication of texts, other than publicity texts; education in the nature of providing classes and training in the field of cyber security, security software, internet security, computer virus protection and computer security vulnerabilities; Arranging and conducting of educational colloquiums, conferences, congresses, seminars, symposiums and workshops in the nature of training in the field of cyber security, security software, internet security, computer virus protection and computer security vulnerabilities; Providing a website featuring on-line non-downloadable publications, namely, magazines, magazines supplements, magazine sections, newsletters, pamphlets, brochures, exhibition programs, reports, books and directories in the field of computer technology, computer programming, computer virus protection and computer security; information, advisory and consultancy services relating to all the aforesaid
Description of MarkThe mark consists of stylized wording "TENCENT SECURITY RESPONSE CENTER" in blue to the right of a blue triangle with a white horizontal line across the top half and a white vertical line in the center of the bottom half forming a disjointed letter "T". All other instances of the color white represent background and/or transparent areas and are not part of the mark.
Goods and ServicesApparatus for recording, transmission or reproduction of sound or images; Blank magnetic data carriers in the nature of recording discs; compact discs and DVDs featuring computer software, namely, computer anti-virus software, computer security software, computer network security software, software for ensuring the security of electronic mails, software for reporting security vulnerabilities in other software, software for reporting bugs in other software, software for analysing security threats and vulnerabilities in other software and computer networks, software for recovering computer data and software for tracing the origin of computer viruses and spyware, software for identity security, software for use in analysis and reporting of firewall log data, software for detecting, blocking and intercepting malware and other threats to computer hardware and software, software for use in vulnerability scanning of networks, websites, computer hardware and other computer software; data processing equipment, computers, computer terminals, computer peripherals; Computer hardware; computer software, namely, computer anti-virus software, computer security software, computer network security software, software for ensuring the security of electronic mails, software for reporting security vulnerabilities in other software, software for reporting bugs in other software, software for analysing security threats and vulnerabilities in other software and computer networks, software for recovering computer data and software for tracing the origin of computer viruses and spyware, software for identity security, software for use in analysis and reporting of firewall log data, software for detecting, blocking and intercepting malware and other threats to computer hardware and software, software for use in vulnerability scanning of networks, websites, computer hardware and other computer software; alarms, namely, fire alarms, sound alarms and burglar alarms; computer memory devices; computer operating programs, recorded; computer peripheral devices; computer programs in the nature of downloadable software, namely, computer anti-virus software, computer security software, software for reporting security vulnerabilities in other software, software for reporting bugs in other software, software for analysing security threats and vulnerabilities in other software and computer networks, software for recovering computer data and software for tracing the origin of computer viruses and spyware; computer software, recorded, namely, computer anti-virus software, computer security software, software for reporting security vulnerabilities in other software, software for reporting bugs in other software, software for analysing security threats and vulnerabilities in other software and computer networks, software for recovering computer data and software for tracing the origin of computer viruses and spyware; computer network security software; computer security software; USB computer security keys; anti-spyware software; computer anti-virus software; software for ensuring the security of electronic mail; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; computer software for identity security, namely, software for authenticating user identification and software for detecting identity fraud; computer software for authentication and identity management information security; computer software for detecting identity fraud; computer software and firmware for the management, transmission, and storage of data and information; computer software for use in vulnerability scanning of networks, websites and electronic devices; sound recording, video recordings and data recordings in the nature of audio and video recording all featuring instructions of internet security, computer security, and computer virus protection information; software for detecting, eradicating and preventing computer viruses; software for data encryption; software for analysing and recovering data; software for computer system backup, data processing, data storage, file management and database management; pre-recorded computer programs for personal information management, database management software, character recognition software, telephony management software, electronic mail and messaging software, mobile telephone software, namely, mobile telephone anti-virus software, mobile telephone security software and mobile telephone operating software; database synchronization software; computer programs for accessing, browsing and searching online databases; computer software for the synchronization of data between a remote station or device and a fixed or remote station or device; Downloadable electronic publications in the nature of books, pamphlets, brochures, newsletters, journals, magazines and periodicals in the field of internet security, computer security and computer virus protection; Cyber security software in the nature of anti-spyware software, software for secure network operations and software for protecting personal details on the internet; software for reporting, monitoring, analysing and tracing computer viruses; computer software for recovery of computer data; computer software for warning of computer and internet security threats and viruses; computer software to enhance the capabilities of other computer software, mobile phone software, computer operating software, mobile phone operating software; software to analyse and monitor the security vulnerabilities of other software; computer software for testing vulnerability in computers and computer networks; computer software to allow users to reports bugs, viruses and security vulnerabilities in other software; computer software to allow users to provide feedback on other software; software to allow users to identify and report issues with other software
Indication of Colors claimedThe color(s) blue and white is/are claimed as a feature of the mark.
Goods and ServicesAdvertising; business management; business administration; Providing office functions; arranging subscriptions to telecommunication services for others; Professional business consultancy; business networking; Consumer advice ship in the nature of providing commercial information and advice for consumers in the choice of products and services; compilation of information into computer databases; file management, namely, computerized file management; organization of exhibitions for commercial or advertising purposes; organization of trade fairs for commercial or advertising purposes; systemization of information into computer databases; business data analysis; compiling and maintaining online business and commercial information directories; computerized file management; consumer research; consumer response analysis in the nature of consumer survey services and consumer trend analysis; public opinion surveys; conducting market surveys; customer feedback programmes in the nature of responding to customer inquiries for others in the field of computers; retail store services featuring apparatus for recording, transmission or reproduction of sound or images, magnetic data carriers, recording discs, compact discs, DVDs and other digital recording media, data processing equipment, computers, computer terminals, computer peripherals, Computer hardware, computer software, alarms, computer memory devices, computer operating programs, recorded, computer peripheral devices, computer programmes in the nature of programs, recorded, computer programs in the nature of downloadable software, computer software, recorded, network security software, security software, network security keys, USB security keys, anti-spyware software, anti-virus software, software for ensuring the security of electronic mail, computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices, computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services, computer software for use in analysis and reporting of firewall log data, computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software, computer software for identity security, computer software for authentication and identity management information security, computer software for detecting identity fraud, computer software and firmware for the management, transmission, and storage of data and information, computer software for use in vulnerability scanning of networks, websites and electronic devices, sound, video and data recordings, software for detecting, eradicating and preventing computer viruses, software for data encryption, software for analysing and recovering data, software for computer system backup, data processing, data storage, file management and database management, pre-recorded computer programs for personal information management, database management software, character recognition software, telephony management software, electronic mail and messaging software, mobile telephone software, database synchronization software, computer programs for accessing, browsing and searching online databases, computer software for the synchronization of data between a remote station or device and a fixed or remote station or device, Downloadable electronic publications, Cyber security software, software for reporting, monitoring, analysing and tracing computer viruses, computer software for recovery of computer data, computer software for warning of computer and internet security threats and viruses, computer software to enhance the capabilities of other computer software, mobile phone software, computer operating software, mobile phone operating software, software to analyse and monitor the security vulnerabilities of other software, computer software for testing vulnerability in computers and computer networks; Arranging and conducting of business colloquiums; Arranging and conducting of business conferences; Arranging and conducting of business congresses; information, advisory and consultancy services relating to all the aforesaid
Disclaimer with Predetermined Text"SECURITY RESPONSE CENTER"
Goods and ServicesDesign and development of computer hardware and software; Computer programming; Computer software consultancy; Computer software design; Updating of computer software; Computer system analysis; Computer system design; Computer virus protection services; computer security services, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Consultancy in the design and development of computer hardware; Creating and maintaining web sites for others; Data conversion of computer programs and data, not physical conversion; Duplication of computer programs; Installation of computer software; Maintenance of computer software; Monitoring of computer systems by remote access to ensure proper functioning; Providing search engines for the internet; Recovery of computer data; Rental of computer software; Rental of web servers; designing, maintenance, testing and analysis of computer software and computer programs; designing, testing and analysis of computer systems; monitoring of computer systems and computer networks of others to ensure proper functioning and to detect breakdowns; integration of computer database systems; application service provider (ASP), namely, hosting computer software applications of others; providing temporary use of online non-downloadable software development tools; software as a service (SaaS) services featuring software, namely, computer anti-virus software, computer security software, computer network security software, software for ensuring the security of electronic mails, software for reporting security vulnerabilities in other software, software for reporting bugs in other software, software for analysing security threats and vulnerabilities in other software and computer networks, software for recovering computer data and software for tracing the origin of computer viruses and spyware, software for identity security, software for use in analysis and reporting of firewall log data, software for detecting, blocking and intercepting malware and other threats to computer hardware and software, software for use in vulnerability scanning of networks, websites, computer hardware and other computer software; platform as a service (PaaS) featuring computer software platforms for reporting bugs in other software, computer software platforms for reporting security threats and vulnerabilities in other software and computer networks, computer software platforms for fixing bugs and security vulnerabilities in other software and computer software platforms for alerting customs to security threats and vulnerabilities in other software and computer networks; encryption and decryption and authentication of electronic documents; research and design of network security software; computer software research; design of computer software for use with wireless networks and devices; development of software for secure network operations; development, design, and implementation of software in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; design of software for protection of computer network firewalls, servers and other network devices from unauthorized access; design of software for the purpose of scanning, detection and removal of viruses, worms, adware and spyware or any other type of malware; software as a service (SAAS) services featuring software for use in scanning networks and websites to detect and identify vulnerabilities and malware; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; provision of security services for computer networks, computer access and computerised transactions, namely, computer security consultancy, data security consulting, computer security threat analysis for protecting data; data security services, namely, data security consulting and computer security threat analysis for protecting data; internet security services, namely, internet security consultancy; monitoring of computer systems for security purposes, namely, for detecting unauthorised access or data breach; maintenance of computer software relating to computer security and prevention of computer risks; computer software technical support services, namely, troubleshooting of computer software problems; provision of technical support in the operation of computing networks, namely, monitoring technological functions of computer systems; IT support services, namely, help desk services, 24/7 service desk services for IT infrastructure and operating systems; support in the nature of repair, updating and installation of computer software and maintenance services for computer software; provision of on-line support services for computer program users, namely, help desk services; software as a service (SAAS) services featuring software to enhance the capabilities and features of other software and nondownloadable online software; preparation of technology reports relating to computing; expert reporting services relating to technology; providing a website featuring online non-downloadable software that enables users to create, modify, update, collect, maintain, analyse, report and transfer online surveys, questionnaires and other data collection formats; software as a service (SAAS) services featuring software which allows users to reports bugs, viruses and security vulnerabilities in other software; software as a service (SAAS) services featuring software which allows users to provide feedback on other software; software as a service (SAAS) services featuring software which allows users to identify and report issues with other software; computer security services, namely, providing a website featuring online non-downloadable software that enables users to identify and report security issues and vulnerabilities of computer software; information, advisory and consultancy services relating to all the aforesaid

Classification Information


International Class009 - Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire extinguishing apparatus.
US Class Codes021, 023, 026, 036, 038
Class Status Code6 - Active
Class Status DateWednesday, May 30, 2018
Primary Code009
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class035 - Advertising; business management; business administration; office functions.
US Class Codes100, 101, 102
Class Status Code6 - Active
Class Status DateWednesday, May 30, 2018
Primary Code035
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class041 - Education; providing of training; entertainment; sporting and cultural activities.
US Class Codes100, 101, 107
Class Status Code6 - Active
Class Status DateWednesday, May 30, 2018
Primary Code041
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

International Class042 - Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software.
US Class Codes100, 101
Class Status Code6 - Active
Class Status DateWednesday, May 30, 2018
Primary Code042
First Use Anywhere DateNOT AVAILABLE
First Use In Commerce DateNOT AVAILABLE

Trademark Owner History


Party NameTencent Holdings Limited
Party Type30 - Original Registrant
Legal Entity Type99 - Other
AddressGrand Cayman
KY

Party NameTencent Holdings Limited
Party Type20 - Owner at Publication
Legal Entity Type99 - Other
AddressGrand Cayman
KY

Party NameTencent Holdings Limited
Party Type10 - Original Applicant
Legal Entity Type99 - Other
AddressGrand Cayman
KY

Trademark Events


Event DateEvent Description
Monday, September 25, 2023TEAS CHANGE OF CORRESPONDENCE RECEIVED
Monday, September 25, 2023ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED
Monday, September 25, 2023TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED
Tuesday, October 8, 2019REGISTERED-PRINCIPAL REGISTER
Tuesday, July 23, 2019OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED
Tuesday, July 23, 2019PUBLISHED FOR OPPOSITION
Wednesday, July 3, 2019NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED
Thursday, June 20, 2019APPROVED FOR PUB - PRINCIPAL REGISTER
Thursday, May 30, 2019TEAS/EMAIL CORRESPONDENCE ENTERED
Thursday, May 30, 2019CORRESPONDENCE RECEIVED IN LAW OFFICE
Thursday, May 23, 2019TEAS RESPONSE TO OFFICE ACTION RECEIVED
Tuesday, February 19, 2019NOTIFICATION OF NON-FINAL ACTION E-MAILED
Tuesday, February 19, 2019NON-FINAL ACTION E-MAILED
Tuesday, February 19, 2019NON-FINAL ACTION WRITTEN
Monday, January 28, 2019TEAS/EMAIL CORRESPONDENCE ENTERED
Monday, January 28, 2019CORRESPONDENCE RECEIVED IN LAW OFFICE
Monday, January 28, 2019APPLICANT/CORRESPONDENCE CHANGES (NON-RESPONSIVE) ENTERED
Friday, January 25, 2019ASSIGNED TO LIE
Friday, January 18, 2019TEAS CHANGE OF CORRESPONDENCE RECEIVED
Friday, January 18, 2019TEAS RESPONSE TO OFFICE ACTION RECEIVED
Wednesday, September 19, 2018NOTIFICATION OF NON-FINAL ACTION E-MAILED
Wednesday, September 19, 2018NON-FINAL ACTION E-MAILED
Wednesday, September 19, 2018NON-FINAL ACTION WRITTEN
Wednesday, September 12, 2018ASSIGNED TO EXAMINER
Thursday, May 31, 2018NOTICE OF DESIGN SEARCH CODE E-MAILED
Wednesday, May 30, 2018NEW APPLICATION OFFICE SUPPLIED DATA ENTERED
Thursday, May 24, 2018NEW APPLICATION ENTERED