Device for network security and management

Judge , et al. January 23, 2

Patent Grant D808389

U.S. patent number D808,389 [Application Number D/561,797] was granted by the patent office on 2018-01-23 for device for network security and management. This patent grant is currently assigned to Luma Home, Inc.. The grantee listed for this patent is Luma Home, Inc.. Invention is credited to Paul Qantas Judge, Joshua Rand Terrell.


United States Patent D808,389
Judge ,   et al. January 23, 2018

Device for network security and management

Claims

CLAIM The ornamental design for a device for network security and management, as shown and described.
Inventors: Judge; Paul Qantas (Atlanta, GA), Terrell; Joshua Rand (Charlotte, NC)
Applicant:
Name City State Country Type

Luma Home, Inc.

Atlanta

GA

US
Assignee: Luma Home, Inc. (Atlanta, GA)
Appl. No.: D/561,797
Filed: April 20, 2016

Current U.S. Class: D14/240; D10/104.1
Current International Class: 1402
Field of Search: ;D14/356,357,358,361,362,365,367,370,388,432,434,203.1,203.6,204,205,216,240,242,299,125,129,130,140,155,168,188,195,300,302,314,348,351,496 ;D13/103,107,108,123,162,162.1,163,168,184,199 ;D10/46,49,104.1,106.1,106.3,106.6,106.9,116.1,61,75,96

References Cited [Referenced By]

U.S. Patent Documents
D262625 January 1982 Genaro
D292926 November 1987 Gillespie
D340199 October 1993 Taylor
D343387 January 1994 Keene
D404830 January 1999 Childs
D406542 March 1999 Mik
D438856 March 2001 Uehara
D481704 November 2003 Shindo
D493169 July 2004 Cheng
D513610 January 2006 Bhakta
D518777 April 2006 Christianson
D532780 November 2006 Proctor, Jr.
D561921 February 2008 Aleksjew
D617667 June 2010 Penix
D673512 January 2013 Huang
D702686 April 2014 Gerber
D709396 July 2014 Eidelman
D716290 October 2014 Lim
D719507 December 2014 Ogihara
D737165 August 2015 Bjorklund
D737825 September 2015 Kumar
D740262 October 2015 Hasegawa
D744883 December 2015 Roberts
D744884 December 2015 Roberts
D745865 December 2015 Hsu
D746165 December 2015 Li
D746166 December 2015 Li
D747229 January 2016 Perez
D773947 December 2016 Scarcella
D784307 April 2017 Yoon
D785608 May 2017 Weaver
2014/0145890 May 2014 Ramberg

Other References

Routers and Modems. (Design--.COPYRGT. Questel). orbit.com. [online PDF] 10 pgs. Print Dates range Oct. 4, 2000through Mar. 15, 2017 [retrieved on Jun. 20, 2017] https://sobjprd.questel.fr/export/QPTUJ214/pdf2/72b86993-ac93-4cf1-8f81-8- 045adca12cf-170959.pdf. cited by examiner .
Lumas Mesh-Network Router Lets You Monitor Connections--Recode. recode.net. (online) 1 pg. posted Nov. 5, 2015, [retrieved on Dec. 4, 2016] http://www.recode.net/2015/11/5/11620400/lumas-mesh-network-router-- lets-you-monitor-connections. cited by examiner .
Luma The All-In-One WiFi Solution.sub.--Computer Hardware Reviews--ThinkComputers.org. (online) 8pgs. posted Jan. 2016, [retrieved on Jun. 20, 2017] http://www.thinkcomputers.org/luma-the-all-in-one-wifi-solution/. cited by examiner .
Luma Surround WiFi review. cnet.com. (online) 1pg. posted Feb. 14, 2017, [retrieved on Jun. 20, 2017]. https://www.cnet.com/products/luma-surround-wifi/review/. cited by examiner.

Primary Examiner: Hattan; Susan Bennett
Assistant Examiner: Fast Horse; Marie D.
Attorney, Agent or Firm: Meunier Carlin & Curfman LLC

Description



FIG. 1 is a perspective view of an device for network security and management showing a top and portions of the sides of our new design.

FIG. 2 is a perspective view showing the top thereof.

FIG. 3 is a perspective view showing the top and another portion of the sides thereof.

FIG. 4 is a perspective view showing a back and portion of the sides thereof.

FIG. 5 is a perspective view showing the top and another portion of the sides thereof with the device in a vertical orientation.

FIG. 6 is a perspective view showing the bottom and another portion of the sides thereof with the device in a vertical orientation.

FIG. 7 is a bottom plan view thereof.

FIG. 8 is a top plan view thereof.

FIG. 9 is a side elevational view thereof; and,

FIG. 10 is a side elevational view thereof with the device in a vertical orientation.

The broken lines in the drawings depict portions of the device for network security and management that form no part of the claim.

* * * * *

References


uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed