US 20,000,089 B1

GPTKB entity

Statements (72)
Predicate Object
gptkbp:instanceOf patent
gptkbp:covers method for data processing
gptkbp:hasAbstract A method for processing data securely.
gptkbp:hasApplicationNumber 16/000,000
gptkbp:hasAssignee gptkb:Tech_Innovations_LLC
gptkbp:hasCitations US_19,000,000_B1
gptkbp:hasClaim 10 claims
Claim 1: A method for secure data processing.
Claim 2: A system for secure data processing.
Claim 3: A method for data encryption.
Claim 4: A system for data integrity.
Claim 5: A method for data access control.
gptkbp:hasDescription This patent describes a method for secure data processing.
gptkbp:hasFacility family of related patents.
gptkbp:hasFieldOfUse software development
computer technology
cloud computing.
gptkbp:hasFilingDate 2020-01-01
gptkbp:hasInternationalClassification G06F
gptkbp:hasInventor gptkb:John_Doe
Jane_Smith
gptkbp:hasLegalEvent patent granted
patent maintained.
patent renewed.
gptkbp:hasLegalStatus active
approved
enforceable.
gptkbp:hasPriorityDate 2021-01-01
2019-01-01
gptkbp:hasPublications 2020-01-15
2021-01-15
20,000,089 B1
B1 patent.
gptkbp:hasRelatedPatent gptkb:US_20,000,088_B1
granted patent
gptkbp:hasResearchInterest computer science
gptkbp:hasTechnicalField information technology
data management.
gptkbp:hasTechnology describes algorithms for data encryption.
includes methods for data verification.
https://www.w3.org/2000/01/rdf-schema#label US 20,000,089 B1
gptkbp:isAssignedTo gptkb:Tech_Innovations_LLC
gptkbp:isCitedBy US_21,000,000_B1
US_22,000,000_B1
US_23,000,000_B1
US_24,000,000_B1
gptkbp:isExaminedBy gptkb:John_Smith
gptkb:Robert_Brown
gptkb:USPTO_examiner
gptkb:Mary_Johnson
gptkbp:isFiledIn gptkb:California
gptkb:USPTO
gptkb:United_States
federal court.
gptkbp:isFiledUnder utility patent
intellectual property.
US_patent_law
gptkbp:isPartOf technology sector
innovation ecosystem.
patent landscape.
patent database.
US_patent_system
patent_portfolio_of_Tech_Innovations_LLC
gptkbp:isPublishedIn gptkb:USPTO
gptkbp:isRelatedTo cybersecurity
data integrity
data privacy
data security
encryption technology
data governance.
data compliance.
data authentication.