gptkbp:instanceOf
|
patent
|
gptkbp:abstract
|
A method for secure data transmission.
|
gptkbp:applicationNumber
|
10/123,456
|
gptkbp:applicationType
|
non-provisional
|
gptkbp:assignee
|
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy
|
gptkb:US_7,123,456_B2
|
gptkbp:claims
|
20
|
gptkbp:classification
|
H04L
|
gptkbp:coInventor
|
gptkb:Bob_Brown
|
gptkbp:examiner
|
Jane_Smith
|
gptkbp:fieldOfInvention
|
computer science
|
gptkbp:filingDate
|
2004-02-06
|
gptkbp:firstClaim
|
A method for transmitting data securely.
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 6,789,592 C-31
|
gptkbp:internationalClassification
|
H04L 9/00
|
gptkbp:inventor
|
gptkb:Alice_Johnson
gptkb:John_Doe
|
gptkbp:issueDate
|
2004-09-14
|
gptkbp:issuedBy
|
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalEvent
|
maintenance fee paid
|
gptkbp:location
|
gptkb:USA
|
gptkbp:patentCitation
|
gptkb:US_6,789,012_C1
gptkb:US_5,678,901_A
gptkb:US_6,123,456_B1
gptkb:US_7,000,000_B2
gptkb:US_7,111,111_B1
gptkb:US_7,444,444_B2
gptkb:US_7,555,555_B2
gptkb:US_7,777,777_B2
gptkb:US_7,999,999_B2
gptkb:US_8,000,000_B2
gptkb:US_8,444,444_B2
gptkb:US_8,888,888_B2
gptkb:US_8,999,999_B2
gptkb:US_9,555,555_B2
gptkb:US_9,999,999_B2
gptkb:US_8,333,333_B2
gptkb:US_8,777,777_B2
gptkb:US_9,444,444_B2
gptkb:US_7,222,222_B2
gptkb:US_7,888,888_B2
gptkb:US_8,111,111_B2
gptkb:US_8,666,666_B2
gptkb:US_9,111,111_B2
gptkb:US_9,222,222_B2
gptkb:US_9,666,666_B2
gptkb:US_9,777,777_B2
gptkb:US_7,666,666_B2
gptkb:US_8,222,222_B2
gptkb:US_8,555,555_B2
gptkb:US_9,888,888_B2
US 7,333,333 B2
US 9,333,333 B2
US_9,000,000_B2
|
gptkbp:patentFamily
|
US_6,789,592
|
gptkbp:patentInventor
|
20 years
|
gptkbp:patentType
|
utility
|
gptkbp:priorityDate
|
2003-02-06
|
gptkbp:relatedTo
|
data security
|
gptkbp:status
|
active
|
gptkbp:technology
|
encryption
|