gptkbp:instanceOf
|
patent
|
gptkbp:citedBy
|
gptkb:US_6,123,456
gptkb:US_5,987,654
|
gptkbp:covers
|
method for data encryption
|
gptkbp:hasAbstract
|
A method for encrypting data.
|
gptkbp:hasAssignee
|
gptkb:Tech_Innovations_Inc.
|
gptkbp:hasClaim
|
20
|
gptkbp:hasCountry
|
gptkb:US
|
gptkbp:hasDescription
|
This patent describes a method for secure data transmission.
|
gptkbp:hasExaminer
|
Jane_Smith
|
gptkbp:hasFieldOfUse
|
cybersecurity
|
gptkbp:hasFilingDate
|
2004-02-06
|
gptkbp:hasInventor
|
gptkb:Alice_Johnson
gptkb:Bob_Brown
gptkb:John_Doe
|
gptkbp:hasLegalEvent
|
patent granted
patent expired
patent reissued
patent transferred
maintenance fee paid
patent assigned
patent litigation appealed
patent litigation dismissed
patent litigation initiated
patent litigation resolved
patent litigation settled
patent reexamination requested
patent reinstated
patent lapsed
|
gptkbp:hasLegalStatus
|
active
|
gptkbp:hasPatentNumber
|
6,789,793
|
gptkbp:hasPriorityDate
|
2004-09-14
2003-02-06
|
gptkbp:hasPublications
|
granted patent
|
gptkbp:hasRelatedPatent
|
US_60/123,456
|
gptkbp:hasTechnicalField
|
computer science
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 6,789,793 H8 family
|
gptkbp:isAssignedTo
|
gptkb:Tech_Innovations_LLC
|
gptkbp:isCitedBy
|
gptkb:US_7,123,456_B2
gptkb:US_7,654,321_B1
|
gptkbp:isFiledIn
|
gptkb:United_States
|
gptkbp:isFiledUnder
|
gptkb:Title_35_of_the_United_States_Code
|
gptkbp:isInFamilyWith
|
gptkb:US_6,789,797
gptkb:US_6,789,799
US_6,789,794
US_6,789,795
US_6,789,796
US_6,789,798
|
gptkbp:isPartOf
|
H8 patent family
|
gptkbp:isPublishedIn
|
gptkb:US_2004/0123456_A1
|
gptkbp:isRelatedTo
|
encryption technology
|
gptkbp:relatedTo
|
data processing
|