Properties (56)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:covers |
method for data encryption
|
gptkbp:hasAssignee |
gptkb:Tech_Innovations_Inc.
|
gptkbp:hasCitations |
gptkb:US_6,123,456
gptkb:US_6,234,567 gptkb:US_6,345,678 |
gptkbp:hasClaim |
20
|
gptkbp:hasFieldOfUse |
data integrity
information technology network security software development computer security |
gptkbp:hasFilingDate |
February 10, 2004
|
gptkbp:hasInventor |
gptkb:John_Doe
|
gptkbp:hasLegalStatus |
active
|
gptkbp:hasPriorityDate |
August 10, 2002
February 10, 2024 |
gptkbp:hasPublications |
September 14, 2004
|
gptkbp:hasTechnicalField |
cryptography
data protection secure communications |
https://www.w3.org/2000/01/rdf-schema#label |
US 6,789,561 F4 Family
|
gptkbp:isAssignedTo |
gptkb:Tech_Innovations_Inc.
|
gptkbp:isCitedBy |
gptkb:US_7,123,456
gptkb:US_7,345,678 gptkb:US_7,234,567 |
gptkbp:isExaminedBy |
gptkb:USPTO
|
gptkbp:isFiledIn |
gptkb:United_States
|
gptkbp:isFiledUnder |
US_patent_law
|
gptkbp:isGranted |
true
|
gptkbp:isPartOf |
technology sector
software industry cybersecurity field encryption market data protection industry patent_family_US_6,789,561 patent_portfolio_of_Tech_Innovations_Inc. |
gptkbp:isPublishedIn |
USPTO database
|
gptkbp:isRelatedTo |
licensing agreements
intellectual property patent infringement encryption technology technology transfer patent litigation |
gptkbp:isUsedIn |
data storage solutions
secure data transmission digital rights management network security protocols cloud computing security secure communications systems enterprise security solutions mobile security applications data encryption software information security systems |
gptkbp:isVisitedBy |
false
|
gptkbp:relatedTo |
data processing
|