gptkbp:instanceOf
|
Patent
|
gptkbp:covers
|
Method for enhancing data security
|
gptkbp:hasAbstract
|
A method for enhancing data security through encryption.
|
gptkbp:hasAssignee
|
gptkb:K20_Technologies,_Inc.
|
gptkbp:hasCitations
|
Cited by 10 patents
|
gptkbp:hasClaim
|
Yes
20 claims
|
gptkbp:hasFieldOfUse
|
Data encryption
Information technology
|
gptkbp:hasFilingDate
|
February 10, 2004
September 14, 2004
|
gptkbp:hasInternationalClassification
|
G06F21/00
|
gptkbp:hasInventor
|
gptkb:Alice_Johnson
gptkb:John_Doe
Jane_Smith
|
gptkbp:hasLegalEvent
|
Patent granted.
Maintenance fee paid
|
gptkbp:hasLegalStatus
|
Active
Pending
|
gptkbp:hasLocation
|
gptkb:Washington,_D.C.
|
gptkbp:hasMember
|
US_6,789,584,_US_6,789,585
|
gptkbp:hasPatentNumber
|
6,789,584
|
gptkbp:hasPriorityDate
|
February 10, 2004
|
gptkbp:hasPublications
|
A1
September 14, 2004
|
gptkbp:hasRelatedPatent
|
Utility patent
Non-provisional
US_6,789,585_K20_Family
|
gptkbp:hasTechnicalField
|
Computer science
Data security
|
gptkbp:hasTechnology
|
Encryption algorithm details.
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 6,789,584 K20 Family
|
gptkbp:isAssignedTo
|
gptkb:K20_Technologies,_Inc.
|
gptkbp:isCitedBy
|
gptkb:US_7,123,456_B2
gptkb:US_7,654,321_B1
|
gptkbp:isExaminedBy
|
gptkb:USPTO
Yes
|
gptkbp:isFiledIn
|
gptkb:USPTO
gptkb:United_States
|
gptkbp:isFiledUnder
|
gptkb:K20_Technologies,_Inc.
Patent Cooperation Treaty (PCT)
US_Patent_Law
|
gptkbp:isGranted
|
Yes
|
gptkbp:isPartOf
|
gptkb:K20_Patent_Family
K20 Patent Portfolio
|
gptkbp:isPublishedIn
|
gptkb:US_2004/0199999_A1
|
gptkbp:isRelatedTo
|
gptkb:K20_Technology
Cybersecurity
Data integrity.
Data protection technology
|