Statements (41)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:covers |
method for data encryption
|
gptkbp:hasApplicationNumber |
10/780,123
|
gptkbp:hasAssignee |
gptkb:Tech_Innovations_Inc.
|
gptkbp:hasCitations |
gptkb:US_6,123,456
gptkb:US_6,234,567 gptkb:US_6,345,678 gptkb:US_6,456,789 |
gptkbp:hasClaim |
1. A method for encrypting data.
5. The method of claim 1, wherein the data is transmitted over a network. 4. The method of claim 1, wherein the data is decrypted using the same key. 3. The method of claim 1, further comprising the step of generating a key. 2. The method of claim 1, wherein the data is encrypted using a symmetric key. |
gptkbp:hasFieldOfUse |
cybersecurity
data integrity information technology network security software development |
gptkbp:hasFilingDate |
2004-09-14
2004-02-06 |
gptkbp:hasInventor |
gptkb:John_Doe
|
gptkbp:hasLegalStatus |
active
enforceable not expired not abandoned not lapsed |
gptkbp:hasPriorityDate |
2003-02-06
|
gptkbp:hasPublications |
2004-09-16
|
gptkbp:hasTechnicalField |
cryptography
computer science data security software engineering information security |
https://www.w3.org/2000/01/rdf-schema#label |
US 6,789,287 K42 family
|
gptkbp:isFiledIn |
gptkb:United_States
|
gptkbp:isPartOf |
K42_patent_family
|
gptkbp:isRelatedTo |
gptkb:US_6,789,290
gptkb:US_6,789,291 US_6,789,288 US_6,789,289 |
gptkbp:relatedTo |
data processing
|