gptkbp:instanceOf
|
Patent
|
gptkbp:covers
|
Method for data encryption
|
gptkbp:hasAbstract
|
A method for secure data transmission.
|
gptkbp:hasApplicationNumber
|
10/123,456
|
gptkbp:hasAssignee
|
gptkb:Tech_Innovations_Inc.
|
gptkbp:hasCitedPatent
|
gptkb:US_6,123,456
|
gptkbp:hasClaim
|
20
Independent
|
gptkbp:hasCountry
|
gptkb:USA
|
gptkbp:hasCPCClassification
|
H04L9/00
|
gptkbp:hasExaminer
|
Jane_Smith
|
gptkbp:hasFeature
|
Paid
|
gptkbp:hasFieldOfUse
|
Computer security
Information security
|
gptkbp:hasFilingDate
|
February 10, 2004
|
gptkbp:hasInternationalClassification
|
G06F21/00
|
gptkbp:hasInventor
|
gptkb:John_Doe
|
gptkbp:hasLegalEvent
|
gptkb:Grant
February 10, 2004
|
gptkbp:hasLegalStatus
|
Active
Granted
|
gptkbp:hasMember
|
5
|
gptkbp:hasPatentNumber
|
6,789,065
|
gptkbp:hasPersonnel
|
US_5,678,901
|
gptkbp:hasPriorityDate
|
February 10, 2003
February 10, 2024
|
gptkbp:hasPublications
|
A1
September 14, 2004
|
gptkbp:hasRelatedPatent
|
Regular
Non-provisional
US_6,789,066
US_6,789,067
|
gptkbp:hasResidence
|
gptkb:California
|
gptkbp:hasTechnicalField
|
Information technology
|
gptkbp:hasTechnology
|
Data integrity
Secure data transmission method.
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 6,789,065 T27 Family
|
gptkbp:isAssignedTo
|
gptkb:Tech_Innovations_Inc.
|
gptkbp:isCitedBy
|
gptkb:US_7,123,456
gptkb:US_7,890,123
|
gptkbp:isCitedIn
|
Research papers
|
gptkbp:isExaminedBy
|
Yes
|
gptkbp:isFiledIn
|
gptkb:United_States
|
gptkbp:isFiledUnder
|
gptkb:John_Doe
gptkb:USPTO
Utility Patent
Data protection.
|
gptkbp:isGranted
|
Yes
|
gptkbp:isInFamilyWith
|
T27
|
gptkbp:isPartOf
|
gptkb:T27_Patent_Family
|
gptkbp:isPublishedIn
|
gptkb:US_2004/0187654_A1
USPTO database
|
gptkbp:isRelatedTo
|
Cybersecurity
|
gptkbp:isSubjectTo
|
Patent law
|
gptkbp:relatedTo
|
Data processing
|
gptkbp:usesTechnology
|
Secure communications
Encryption algorithms
|