gptkbp:instanceOf
|
Patent
|
gptkbp:covers
|
Method for data encryption
|
gptkbp:hasAbstract
|
A method for encrypting data.
|
gptkbp:hasAssignee
|
gptkb:Tech_Innovations_Inc.
|
gptkbp:hasClaim
|
20
Method for data authentication.
Method for secure data transmission.
Method for secure communication.
System for data integrity.
System for secure data storage.
Method for data verification.
|
gptkbp:hasCPCClassification
|
H04L9/00
|
gptkbp:hasExaminer
|
Jane_Smith
|
gptkbp:hasFieldOfUse
|
Software development
Computer security
Cybersecurity.
Information security.
Data protection.
|
gptkbp:hasFilingDate
|
February 10, 2004
|
gptkbp:hasInternationalClassification
|
G06F21/00
|
gptkbp:hasInventor
|
gptkb:Alice_Johnson
gptkb:Bob_Brown
gptkb:John_Doe
|
gptkbp:hasLegalEvent
|
Patent granted.
Maintenance fee paid
|
gptkbp:hasLegalStatus
|
Active
Granted
|
gptkbp:hasMember
|
5
|
gptkbp:hasPriorityDate
|
February 10, 2003
September 14, 2004
|
gptkbp:hasPublications
|
gptkb:US_6789290
September 14, 2004
|
gptkbp:hasRelatedPatent
|
gptkb:US_6,789,294
gptkb:US_6,789,291_K10
|
gptkbp:hasTechnicalField
|
Information technology
Cryptography.
Information security technology.
|
gptkbp:hasTechnology
|
Improved data security
Encryption algorithm.
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 6,789,290 K10 Family
|
gptkbp:isAssignedTo
|
gptkb:Tech_Innovations_Corp.
gptkb:Tech_Innovations_LLC
Tech_Innovations_Group.
|
gptkbp:isCitedBy
|
gptkb:US_7,123,456
gptkb:US_7,654,321
gptkb:US_8,123,456
gptkb:US_9,876,543
US_10,123,456
US_11,123,456
|
gptkbp:isExaminedBy
|
Yes
|
gptkbp:isFiledIn
|
gptkb:USPTO
gptkb:United_States
|
gptkbp:isFiledUnder
|
Utility Patent
Patent Law.
Intellectual Property.
|
gptkbp:isGranted
|
Yes
|
gptkbp:isPartOf
|
gptkb:K10_Patent_Family
US_Patent_System
K10_Family_of_patents.
|
gptkbp:isPublishedIn
|
gptkb:US_2004/0187654_A1
|
gptkbp:isRelatedTo
|
gptkb:US_6,789,296
gptkb:US_6,789,297
gptkb:US_6,789,293
gptkb:US_6,789,291
US_6,789,292
US_6,789,295
|
gptkbp:relatedTo
|
Data processing
|