Properties (38)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:covers |
method for data encryption
|
gptkbp:hasAssignee |
gptkb:XYZ_Corporation
|
gptkbp:hasCitations |
gptkb:US_6,123,456
gptkb:US_6,234,567 gptkb:US_6,345,678 |
gptkbp:hasClaim |
Claim 1
Claim 2 Claim 3 Claim 4 Claim 5 |
gptkbp:hasFieldOfUse |
telecommunications
network security software development computer security data management |
gptkbp:hasFilingDate |
2004-02-06
|
gptkbp:hasGoals |
granted
|
gptkbp:hasInventor |
gptkb:Alice_Johnson
gptkb:Bob_Brown gptkb:John_Doe gptkb:Charlie_Davis Jane_Smith |
gptkbp:hasPriorityDate |
2003-02-06
|
gptkbp:hasPublications |
2004-09-02
|
https://www.w3.org/2000/01/rdf-schema#label |
US 6,789,168 S27 family
|
gptkbp:isAssignedTo |
gptkb:XYZ_Corporation
|
gptkbp:isFiledIn |
gptkb:United_States
|
gptkbp:isPartOf |
US_patent_system
|
gptkbp:isPublishedIn |
USPTO database
Google Patents Espacenet Free Patents Online WIPO_database |
gptkbp:isRelatedTo |
gptkb:US_6,789,170_S27
gptkb:US_6,789,169_S27 US_6,789,171_S27 |
gptkbp:relatedTo |
data processing
|