one SECURITY (DEVICE OF TRIANGLE)
Tencent Holdings Limited
one SECURITY (DEVICE OF TRIANGLE)
By: Tencent Holdings Limited
[class : 9] Computer Hardware; Computer Software; Network Security Software; Security Software For Use With Wireless Devices; Network Security Keys; Usb Security Keys; Anti-spyware Software; Anti-virus Software; Software For Ensuring The Security Of Electronic Mail; Computer Software, Namely, Encryption Software To Enable Secure Transmission Of Digital Information, Namely, Confidential, Financial And Credit Card Information Over The Internet, As Well As Over Other Modes Of Communication Between Computing Devices; Computer Software To Integrate Managed Security Services, Namely, Public Key Infrastructure (pki) Services, Digital Certificate Issuance, Verification, Management And Enterprise Software Integration, With Existing Communications Networks, Software And Services; Computer Software For Use In Analysis And Reporting Of Firewall Log Data; Computer Software For Detecting, Blocking And Intercepting Malware And Other Threats To Computer Hardware And Software; Computer Software For Identity Security; Computer Software For Authentication And Identity Management Information Security; Computer Software For Detecting Identity Fraud; Computer Software And Firmware For The Management, Transmission, And Storage Of Data And Information; Computer Software For Use In Vulnerability Scanning Of Networks, Websites And Electronic Devices; Security Devices For Computer Software[class : 42] Advisory Services Relating To Computer Software; Computer Hardware And Software Consultancy Services; Computer Programming And Software Design; Research And Design Services Relating To Network Security Software; Computer Software Research; Design Of Computer Software For Use With Wireless Networks And Devices; Development Of Software For Secure Network Operations; Development, Design, And Implementation Services In The Field Of Security, Access, Authorization, Authentication Encryption, And Identification Systems For Computers, And Computer Networks; Computer Systems Analysis In The Field Of Security, Access, Authorization, Authentication Encryption And Identification Systems For Computers And Computer Networks; Design Of Software For Protection Of Computer Network Firewalls, Servers And Other Network Devices From Unauthorized Access; Design Of Software For The Purpose Of Scanning, Detection And Removal Of Viruses, Worms, Trojan Horses, Adware And Spyware Or Any Other Type Of Malware; Software For Use In Scanning Networks And Websites To Detect And Identify Vulnerabilities And Malware; Computer Security Consultancy In The Field Of Scanning And Penetration Testing Of Computers And Networks To Assess Information Security Vulnerability; Computer Security Service, Namely, Restricting Access To And By Computer Networks To And Of Undesired Web Sites, Media And Individuals And Facilities; Provision Of Security Services For Computer Networks, Computer Access And Computerized Transactions; Computer Security Services (design And Development Of Secure Computer Hardware, Software And Systems); Computer Security Services (programming And Software Installation, Repair And Maintenance Services).
Trademark Details
This Brand Name one SECURITY (DEVICE OF TRIANGLE) is applied by Tencent Holdings Limited
This Trademark was applied on date 27 November 2012
This Application has been filed by their agent KRISHNA & SAURASTRI.
Trademark | one SECURITY (DEVICE OF TRIANGLE) |
Application No | 2433933 |
Filing Dte | 27-11-2012 |
User Detail | Proposed to be used |
Certificate Number | 1339243 |
Valid Until | 27-11-2032 |
Goods and Service | [class : 9] Computer Hardware; Computer Software; Network Security Software; Security Software For Use With Wireless Devices; Network Security Keys; Usb Security Keys; Anti-spyware Software; Anti-virus Software; Software For Ensuring The Security Of Electronic Mail; Computer Software, Namely, Encryption Software To Enable Secure Transmission Of Digital Information, Namely, Confidential, Financial And Credit Card Information Over The Internet, As Well As Over Other Modes Of Communication Between Computing Devices; Computer Software To Integrate Managed Security Services, Namely, Public Key Infrastructure (pki) Services, Digital Certificate Issuance, Verification, Management And Enterprise Software Integration, With Existing Communications Networks, Software And Services; Computer Software For Use In Analysis And Reporting Of Firewall Log Data; Computer Software For Detecting, Blocking And Intercepting Malware And Other Threats To Computer Hardware And Software; Computer Software For Identity Security; Computer Software For Authentication And Identity Management Information Security; Computer Software For Detecting Identity Fraud; Computer Software And Firmware For The Management, Transmission, And Storage Of Data And Information; Computer Software For Use In Vulnerability Scanning Of Networks, Websites And Electronic Devices; Security Devices For Computer Software[class : 42] Advisory Services Relating To Computer Software; Computer Hardware And Software Consultancy Services; Computer Programming And Software Design; Research And Design Services Relating To Network Security Software; Computer Software Research; Design Of Computer Software For Use With Wireless Networks And Devices; Development Of Software For Secure Network Operations; Development, Design, And Implementation Services In The Field Of Security, Access, Authorization, Authentication Encryption, And Identification Systems For Computers, And Computer Networks; Computer Systems Analysis In The Field Of Security, Access, Authorization, Authentication Encryption And Identification Systems For Computers And Computer Networks; Design Of Software For Protection Of Computer Network Firewalls, Servers And Other Network Devices From Unauthorized Access; Design Of Software For The Purpose Of Scanning, Detection And Removal Of Viruses, Worms, Trojan Horses, Adware And Spyware Or Any Other Type Of Malware; Software For Use In Scanning Networks And Websites To Detect And Identify Vulnerabilities And Malware; Computer Security Consultancy In The Field Of Scanning And Penetration Testing Of Computers And Networks To Assess Information Security Vulnerability; Computer Security Service, Namely, Restricting Access To And By Computer Networks To And Of Undesired Web Sites, Media And Individuals And Facilities; Provision Of Security Services For Computer Networks, Computer Access And Computerized Transactions; Computer Security Services (design And Development Of Secure Computer Hardware, Software And Systems); Computer Security Services (programming And Software Installation, Repair And Maintenance Services). |
Business Name | Tencent Holdings Limited |
Business Type | Private Limited Company |
Business Sector | Service |
What trademarKing.in Does
TrademarKing help you to register trademark in India. Every year many business use TrademarKing.in to register & protect their brands with smooth filing process. TrademarKing also monitors your Brand name if TrademarK Registration is done through TrademarKing.in. Now you can Register TrademarK Through TrademarKing.in.
In India we have filed 100000+ Trademark Registration , so start now! to register your trademark.
TrademarKing is a free trademark search engine developend by PCNR Trademarks Management Pvt Ltd, India.
Trademark Monitoring