QQDOCTOR
Mark Identification

QQDOCTOR

Serial Number

85600137

Filing Date

Apr 17, 2012

Registration Date

Oct 21, 2014

Trademark by

TENCENT HOLDINGS LIMITED

Classification Information

Computer hardware; computer software for the purposes of enabling the access to, transmission of, provision of, organisation of, and management of text messaging, instant messaging, voice messaging, hold-to-talk voice messaging, broadcast messaging, one-to-many messaging, photo and video sharing, location sharing, online blog journals, text messages, voice messages, web links and images via the Internet and other communications networks; software for accessing information on a global computer network; downloadable software via the Internet for accessing, sending and receiving information on a global computer network; communications software for the facilitation of communication and data transmission in the field of social networking; computer software for playing computer games; computer software for the purposes of playback of audio and video materials; computer software for the purposes of playback of audio and video materials stored via cloud data storage; computer software for recording, organising, transmitting, receiving, manipulating, playing and reviewing text, data, image, audio and video files; computer software for use in organising, transmitting, receiving, manipulating, playing and reviewing text, data, image, audio and video files on portable and handheld digital electronic devices; computer software to enable the playback of audio, visual, video and audio-visual computer media files; computer software for the purposes of producing animated graphic interchange files; computer software for optimising the speed of core processors; software for providing single user and multiple user access to a global computer network; software to enhance the audio visual capabilities of multimedia applications, namely, the integration of text, audio, graphics, still images and moving pictures; software for use in creating, editing and delivering textual and graphic information via computer communication networks; network security software; security software for use with wireless devices; network security keys; USB security keys; anti-spyware software; anti-virus software; software for ensuring the security of electronic mail; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; computer software for identity security; computer software for authentication and identity management information security; computer software for detecting identity fraud; computer software and firmware for the management, transmission, and storage of data and information; computer software for use in vulnerability scanning of networks, websites and electronic devices

Electrical and Scientific Apparatus

Computer hardware consultancy services, namely, provision of advice and consultation services in relation to the maintenance and optimization of computer hardware; troubleshooting services in relation to computer hardware

Building Construction and Repair

Advisory services relating to computer software; computer software consultancy services, namely, provision of advice and consultation services in relation to the maintenance and optimization of computer software; troubleshooting services in relation to computer software; computer programming and software design; research and design services relating to network security software; computer software research; design of computer software for use with wireless networks and devices; development of software for secure network operations; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; design of software for protection of computer network firewalls, servers and other network devices from unauthorized access; design of software for the purpose of scanning, detection and removal of viruses, worms, Trojan horses, adware and spyware or any other type of malware; software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; provision of security services for computer networks, computer access and computerised transactions, namely, the provision of consultation and advice in relation to the protection of computer systems, computer networks, computer access and computerised transactions from computer viruses, Trojan horses, spyware, spam software, adware and phishing software; provision of security services for computer networks, computer access and computerised transactions, namely, the provision of consultation and advice in relation to the use, installation and implementation of computer anti-virus software, computer software for ensuring Internet security, intrusion detection software, firewall software, privacy control software, content filtering software, computer software for scanning, detection and removal of viruses, worms, Trojan horses, adware and spyware, and computer software for performing file maintenance and data recovery functions

Computer and Scientific