gptkbp:instanceOf
|
Patent
|
gptkbp:covers
|
Method for data encryption
|
gptkbp:hasAbstract
|
A method for encrypting data.
|
gptkbp:hasApplicationNumber
|
10/123,456
|
gptkbp:hasAssignee
|
gptkb:Tech_Innovations_Inc.
|
gptkbp:hasCitations
|
15
|
gptkbp:hasClaim
|
2
1
10
11
12
13
14
15
16
17
18
19
20
3
4
5
6
7
8
9
|
gptkbp:hasCountry
|
gptkb:US
|
gptkbp:hasExaminer
|
Jane_Smith
|
gptkbp:hasFieldOfUse
|
Computer Security
Cryptography
|
gptkbp:hasFilingDate
|
2004-02-06
|
gptkbp:hasGoals
|
Yes
Granted
|
gptkbp:hasInternationalClassification
|
G06F21/00
|
gptkbp:hasInventor
|
gptkb:Alice_Johnson
gptkb:John_Doe
|
gptkbp:hasLegalEvent
|
Maintenance Fee Paid
|
gptkbp:hasLegalStatus
|
Active
|
gptkbp:hasMember
|
5
|
gptkbp:hasPriorityDate
|
2004-09-09
2003-02-06
|
gptkbp:hasPublications
|
B1
2004-09-09
|
gptkbp:hasRelatedPatent
|
gptkb:US_6,789,087_S47
|
gptkbp:hasTechnicalField
|
Information Technology
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 6,789,086 S46 Family
|
gptkbp:isAssignedTo
|
gptkb:Tech_Innovations_LLC
|
gptkbp:isCitedBy
|
gptkb:US_7,123,456_B2
|
gptkbp:isFiledIn
|
gptkb:United_States
|
gptkbp:isFiledUnder
|
Utility Patent
|
gptkbp:isPartOf
|
S46 Family
US_Patent_Family
|
gptkbp:isPublishedIn
|
USPTO Database
|
gptkbp:isRelatedTo
|
US_6,789,085_S45_Family
|
gptkbp:relatedTo
|
Data Processing
|