gptkbp:instanceOf
|
Patent
|
gptkbp:covers
|
Method for data encryption
|
gptkbp:hasAbstract
|
A method for encrypting data.
|
gptkbp:hasApplicationNumber
|
10/123,456
|
gptkbp:hasAssignee
|
gptkb:Tech_Innovations_Inc.
|
gptkbp:hasClaim
|
20
A method for data integrity.
A system for data encryption.
A system for data protection.
A method for securely transmitting data.
|
gptkbp:hasCPCClassification
|
G06F21/62
|
gptkbp:hasDescription
|
Detailed description of the encryption method.
|
gptkbp:hasExaminer
|
Jane_Smith
|
gptkbp:hasFeature
|
Paid
Current.
Due.
|
gptkbp:hasFieldOfUse
|
Computer security
Secure communications
Secure data transmission.
Data protection.
|
gptkbp:hasFilingDate
|
February 10, 2004
|
gptkbp:hasGoals
|
Granted
|
gptkbp:hasInternationalClassification
|
G06F21/00
|
gptkbp:hasInventor
|
gptkb:Alice_Johnson
gptkb:Bob_Brown
gptkb:Charlie_Green
gptkb:John_Doe
gptkb:David_White
|
gptkbp:hasLegalEvent
|
Patent maintained.
Patent enforced.
Patent granted on September 14, 2004.
|
gptkbp:hasLegalStatus
|
Active
|
gptkbp:hasPriorityDate
|
February 10, 2003
|
gptkbp:hasPublications
|
A1
B1
B2
September 14, 2004
|
gptkbp:hasRelatedPatent
|
gptkb:US_6,789,825_S17
|
gptkbp:hasTechnicalField
|
Information technology
Data security
Network security
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 6,789,826 S17 Family
|
gptkbp:isAssignedTo
|
Department_of_Technology
|
gptkbp:isCitedBy
|
gptkb:US_10,123,456_B2
gptkb:US_11,234,567_B2
gptkb:US_7,123,456_B2
gptkb:US_8,765,432_B1
gptkb:US_9,876,543_B2
|
gptkbp:isFiledIn
|
gptkb:USPTO
gptkb:United_States
International patent office.
European_patent_office.
|
gptkbp:isFiledUnder
|
Utility patent
|
gptkbp:isInFamilyWith
|
gptkb:US_6,789,831_S17
gptkb:US_6,789,825_S17
gptkb:US_6,789,829_S17
US_6,789,827_S17
|
gptkbp:isPartOf
|
US_Patent_Family
|
gptkbp:isPublishedIn
|
gptkb:US_2004/0123456_A1
|
gptkbp:isRelatedTo
|
gptkb:US_6,789,825_S17
gptkb:US_6,789,830_S17
US_6,789,827_S17
US_6,789,828_S17
US_6,789,832_S17
|
gptkbp:relatedTo
|
Data processing
|
gptkbp:usesTechnology
|
Cryptography
|