gptkbp:instanceOf
|
Patent
|
gptkbp:covers
|
Method for data encryption
|
gptkbp:hasAbstract
|
A method for encrypting data.
|
gptkbp:hasAssignee
|
gptkb:Tech_Innovations_Inc.
|
gptkbp:hasCitations
|
gptkb:US_6,123,456
gptkb:US_6,234,567
gptkb:US_6,345,678
|
gptkbp:hasClaim
|
20
|
gptkbp:hasDescription
|
A detailed description of the encryption method.
|
gptkbp:hasFeature
|
Paid
|
gptkbp:hasFieldOfUse
|
Computer security
|
gptkbp:hasFilingDate
|
February 10, 2004
|
gptkbp:hasInternationalClassification
|
G06F21/00
705/26
|
gptkbp:hasInventor
|
gptkb:John_Doe
Jane_Smith
|
gptkbp:hasLegalStatus
|
gptkb:Tech_Innovations_Inc.
Active
|
gptkbp:hasPatentNumber
|
6,789,271
|
gptkbp:hasPriorityDate
|
February 10, 2003
February 10, 2024
|
gptkbp:hasPublications
|
September 14, 2004
|
gptkbp:hasRelatedPatent
|
gptkb:US_6,789,270
gptkb:US_6,789,272
|
gptkbp:hasTechnicalField
|
Cryptography
Information technology
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 6,789,271 N4 Family
|
gptkbp:isAssignedTo
|
gptkb:Tech_Innovations_Inc.
|
gptkbp:isCitedBy
|
gptkb:US_7,123,456
gptkb:US_7,345,678
gptkb:US_7,234,567
|
gptkbp:isExaminedBy
|
gptkb:USPTO
|
gptkbp:isFiledIn
|
gptkb:Australia
gptkb:Canada
gptkb:China
gptkb:Japan
gptkb:United_States
Europe
|
gptkbp:isFiledUnder
|
gptkb:USPTO
Utility patent
|
gptkbp:isGranted
|
Yes
|
gptkbp:isMonitoredBy
|
gptkb:John_Doe
|
gptkbp:isPartOf
|
N4 patent family
N4_Family
|
gptkbp:isPublishedIn
|
gptkb:USPTO
USPTO database
|
gptkbp:isRelatedTo
|
gptkb:US_6,789,270
gptkb:US_6,789,272
|
gptkbp:isSubjectTo
|
Patent law
Patent litigation
|
gptkbp:relatedTo
|
Data processing
|