U.S. patent number D803,247 [Application Number D/569,716] was granted by the patent office on 2017-11-21 for display screen with graphical user interface. This patent grant is currently assigned to Symantec Corporation. The grantee listed for this patent is Symantec Corporation. Invention is credited to Deepti Sawant Deori, Nisha Mistry.
United States Patent | D803,247 |
Mistry , et al. | November 21, 2017 |
Inventors: | Mistry; Nisha (Pune, IN), Deori; Deepti Sawant (Mumbai, IN) | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Applicant: |
|
||||||||||
Assignee: | Symantec Corporation (Mountain
View, CA) |
||||||||||
Appl. No.: | D/569,716 | ||||||||||
Filed: | June 29, 2016 |
Current U.S. Class: | D14/486 |
Current International Class: | 1404 |
Field of Search: | ;D14/485-495 ;345/1.1,1.2,2.1-2.3,3.1,902 ;715/763,810,836,837,846,847,977 |
D143419 | January 1946 | Freel |
D294043 | February 1988 | Haines |
5798760 | August 1998 | Vayda |
D566722 | April 2008 | Jackson |
D614192 | April 2010 | Takano |
8230339 | July 2012 | Watanabe |
D684586 | June 2013 | Plesnicher |
D690720 | October 2013 | Waldman |
8707211 | April 2014 | Yasui |
D712911 | September 2014 | Pearson |
D716325 | October 2014 | Brudnicki |
D763265 | August 2016 | Trujillo |
D766309 | September 2016 | Wang |
D768646 | October 2016 | Master |
D772241 | November 2016 | Capano |
D781878 | March 2017 | Butcher |
D788141 | May 2017 | Kim |
2005/0210402 | September 2005 | Gunn |
2013/0339904 | December 2013 | Geithner |
Colon, Alex. "The Orange Chef Co. Prep Pad." pcmag.com. Dec. 4, 2014. Accessed Jul. 3, 2017. Available online at URL: http://www.pcmag.com/article2/0,2817,2472999,00.asp. cited by examiner . Fontana, Luca. "Clue." behance.net. Published Apr. 8, 2014. Accessed Jul. 3, 2017. Available online at URL: https://www.behance.net/gallery/15918433/Clue. cited by examiner . Deepti Sawant Deori, et al; Systems and Methods for Data Visualization; U.S. Appl. No. 15/231,732, filed Aug. 8, 2016. cited by applicant . Big Data Visualizations: A Good Use of the Chord; https://web.archive.org/web/20150114081210/http://kromerbigdata.com/2013/- 11/25/big-data-visualizations-a-good-use-of-the-chord/comment-page-1/; as accessed on Jun. 15, 2016. cited by applicant . 5 Absolutely Stunning Big-Data Visualizations; http://www.customerintelligence360.com/5-absolutely-stunning-big-data-vis- ualizations/; as accessed on Jun. 15, 2016. cited by applicant . Biggs-Smith Graph; https://en.wikipedia.org/wiki/Biggs%E2%80%93Smith.sub.--graph; as accessed on Jun. 15, 2016. cited by applicant . Cybermap; https://cybermap.kaspersky.com; as accessed on Jun. 15, 2016. cited by applicant . Spotlight: Threat Visualizations; http://www.softwareadvice.com/security/spotlight/threat-visualizations-20- 14/; as accessed on Jun. 15, 2016. cited by applicant . Visualizing OSX Threat Internet Distribution; http://secviz.org/content/visualizing-os-x-threat-internet-distribution; as accessed on Jun. 15, 2016. cited by applicant . Application Usage & Threat Report; http://researchcenter.paloaltonetworks.com/app-usage-risk-report-visualiz- ation/#; as accessed on Jun. 15, 2016. cited by applicant . Draw Deeper Insights; https://quid.com/; as accessed on Jun. 15, 2016. cited by applicant . Enterprise Trend Visualization and the Potential of OSINT; http://blogs.csc.com/2015/02/17/enterprise-trend/visualization-and-the-po- tential-of-osint/; as accessed on Jun. 15, 2016; Feb. 17, 2015. cited by applicant . Understanding Link Analysis From the Analytic Workshop; http://linkanalysisnow.com/2011/07/using-visual-analysis-for-network.html- ; as accessed on Jun. 15, 2016. cited by applicant . Pravail; https://www.pravail.com/; as accessed on Jun. 15, 2016. cited by applicant . 6 ways big data is helping reinvent enterprise security; https://gigaom.com/2012/11/15/6-ways-big-data-is-helping-reinvent-enterpr- ise-security/; as accessed on Jun. 15, 2016. cited by applicant . Multi-Touch Visualization Reveals the Max Planck Research Network; http://infosthetics.com/archives/2011/09/multi-touch.sub.--visualization.- sub.--reveals.sub.--max.sub.--planck.sub.--research.sub.--networks.html; as accessed on Jun. 15, 2016; Sep. 12, 2011. cited by applicant . Max Planck Research Networks; http://max-planck-research-networks.net/; as accessed on Jun. 15, 2016. cited by applicant . Using NVivo: An Unofficial and Unauthorized Primer; http://scalar.usc.edu/works/using-nvivo-an-unofficial-and-unauthorized-pr- imer/types-of-data-visualizations-in-nvivo; as accessed on Jun. 15, 2016. cited by applicant . Bottlenose; https://bottlenose.com/products; as accessed on Jun. 15, 2016. cited by applicant . Ch. 11: Information Visualization for Text Analysis; http://searchuserinterfaces.com/book/sui.sub.--ch11.sub.--text.sub.--anal- ysis.sub.--visualization.html; as accessed on Jun. 15, 2016. cited by applicant . Visualization--Big Data--Analytics--BlackHat US Workshop; http://raffy.ch/blog/category/log-analysis/; as accessed on Jun. 15, 2016. cited by applicant . Visualization of the Week: Clustering your social graph; http://radar.oreilly.com/2012/04/facebook-visualization-app-friends-exper- iences.html; as accessed on Jun. 15, 2016; Apr. 6, 2012. cited by applicant . Visualize your LinkedIn network with InMaps; https://blog.linkedin.com/2011/01/24/linkedin-inmaps; as accessed on Jun. 15, 2016; Jan. 24, 2011. cited by applicant . Why Visualization Matters in CRM; http://blog.pipelinersales.com/sales-effectiveness/why-visualization-matt- ers-in-crm/; as accessed on Jun. 15, 2016; Jan. 26, 2015. cited by applicant . Capano et al.; Techniques for Presenting Information on a Graphical User Interface; U.S. Appl. No. 14/219,573, filed Mar. 19, 2014. cited by applicant . Capano et al.; Techniques for Presenting Information on a Graphical User Interface; U.S. Appl. No. 14/219,584, filed Mar. 19, 2014. cited by applicant . Capano et al.; Transitional Graphical User Interface for a Display Screen or a Portion Thereof; U.S. Appl. No. 29/485,487, filed Mar. 19, 2014. cited by applicant . Timothy Holl et al.; Systems and Methods for Providing Interfaces for Visualizing Threats Within Networked Control Systems; U.S. Appl. No. 15/368,542, filed Dec. 2, 2016. cited by applicant . NexDefense; http://www.nexdefense.com/, as retrieved on Dec. 7, 2016. cited by applicant . Darktrace; http://www.darktrace.com/, as retrieved on Dec. 7, 2016. cited by applicant . CyberX; http://cyberx-labs.com/en/home/, as retrieved on Dec. 7, 2016. cited by applicant . Timothy Holl; Display Screen With Graphical User Interface; U.S. Appl. No. 29/586,413, filed Dec. 2, 2016. cited by applicant. |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.