Statements (37)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for securely transmitting data over a network.
|
gptkbp:applicationNumber |
09/123,456
|
gptkbp:applicationType |
Non-Provisional
|
gptkbp:assignee |
gptkb:Tech_Innovations_Inc.
|
gptkbp:citedBy |
gptkb:US_555,000,222_B1
|
gptkbp:claims |
10
|
gptkbp:classification |
H04L 29/06
|
gptkbp:documentType |
Utility Patent
|
gptkbp:examiner |
Jane_Smith
|
gptkbp:fieldOfInvention |
Computer Science
|
gptkbp:filingDate |
October 1, 2000
|
gptkbp:firstClaim |
A method for encrypting data.
A method for decrypting data. A method for authenticating users. A method for securing data transmission. A method for establishing secure connections. A method for managing encryption keys. A method for verifying data integrity. |
https://www.w3.org/2000/01/rdf-schema#label |
US 444,000,111 B2
|
gptkbp:inventor |
gptkb:John_Doe
|
gptkbp:inventorCountry |
gptkb:USA
|
gptkbp:issueDate |
April 10, 2001
|
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:language |
English
|
gptkbp:legalStatus |
Granted
|
gptkbp:location |
gptkb:United_States
|
gptkbp:maintenanceFee |
Required
|
gptkbp:ninthClaim |
A method for detecting unauthorized access.
A method for logging data access. A method for monitoring data transmission. |
gptkbp:patentFamily |
US_444,000,111_B2,_US_555,000,222_B1
|
gptkbp:patentInventor |
20 years
|
gptkbp:priorityDate |
March 1, 2000
|
gptkbp:relatedTo |
data security
|
gptkbp:status |
Active
|
gptkbp:title |
Method for secure data transmission
|