Properties (69)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:covers |
method for data encryption
|
gptkbp:hasAbstract |
A method for encrypting data.
|
gptkbp:hasAssignee |
gptkb:Tech_Innovations_Inc.
|
gptkbp:hasCitations |
gptkb:US_6,123,456
gptkb:US_6,234,567 gptkb:US_6,345,678 |
gptkbp:hasClaim |
20
|
gptkbp:hasDescription |
This patent describes a method for secure data transmission.
|
gptkbp:hasFieldOfUse |
computer technology
|
gptkbp:hasFilingDate |
February 10, 2004
|
gptkbp:hasInternationalClassification |
G06F21/00
H04L9/00 H04L9/32 G06F7/00 H04L9/06 |
gptkbp:hasInventor |
gptkb:John_Doe
Jane_Smith |
gptkbp:hasLegalStatus |
Active
|
gptkbp:hasPriorityDate |
February 10, 2003
|
gptkbp:hasPublications |
September 14, 2004
|
gptkbp:hasTechnicalField |
Information technology
|
https://www.w3.org/2000/01/rdf-schema#label |
US 6,789,349 Y2 Family
|
gptkbp:isAssignedTo |
gptkb:Tech_Innovations_Inc.
|
gptkbp:isCitedBy |
gptkb:US_9,012,345
gptkb:US_7,890,123 US 8,901,234 |
gptkbp:isFiledIn |
gptkb:United_States
|
gptkbp:isFiledUnder |
US_Patent_Law
|
gptkbp:isGranted |
Yes
|
gptkbp:isPartOf |
US_patent_system
US_patent_family |
gptkbp:isPublishedIn |
USPTO database
|
gptkbp:isRelatedTo |
cryptography
access control cybersecurity data integrity data loss prevention risk management authentication cloud security data governance data security incident response network protocols network security privacy protection secure communications secure data storage security audits security compliance security policies secure transactions threat intelligence penetration testing vulnerability assessment malware protection cyber threats information security security awareness training digital rights management security frameworks data breach prevention encryption technology secure coding practices firewall technology mobile security cybersecurity insurance |
gptkbp:relatedTo |
data processing
|