gptkbp:instanceOf
|
patent
|
gptkbp:covers
|
method for data encryption
|
gptkbp:hasAbstract
|
A method for encrypting data.
|
gptkbp:hasApplicationNumber
|
10/123,456
|
gptkbp:hasAssignee
|
gptkb:XYZ_Corporation
|
gptkbp:hasCitedPatent
|
gptkb:US_6,789,010_C1
gptkb:US_6,789,020_A
gptkb:US_6,789,022_C1
gptkb:US_6,789,007_B2
gptkb:US_6,789,014_A
gptkb:US_5,678,901_A
gptkb:US_6,543,210_B1
gptkb:US_6,789,001_B2
gptkb:US_6,789,004_B2
gptkb:US_6,789,011_A
gptkb:US_6,789,012_B2
gptkb:US_6,789,021_B2
gptkb:US_6,789,027_B2
gptkb:US_6,789,013_C1
gptkb:US_6,789,016_C1
gptkb:US_6,789,026_A
gptkb:US_6,789,028_C1
gptkb:US_6,789,009_B1
gptkb:US_6,789,015_B2
gptkb:US_6,789,017_A
gptkb:US_6,789,019_C1
gptkb:US_6,789,003_A
gptkb:US_6,789,023_A
gptkb:US_6,789,005_A
gptkb:US_6,789,008_A
gptkb:US_6,789,018_B2
gptkb:US_6,789,025_C1
gptkb:US_6,789,030_B2
gptkb:US_6,789,029_A
gptkb:US_6,789,002_C1
gptkb:US_6,789,006_C1
US 6,789,024 B2
US_6,789,000_A
|
gptkbp:hasClaim
|
20
|
gptkbp:hasCountry
|
gptkb:US
|
gptkbp:hasExaminer
|
Jane_Smith
|
gptkbp:hasFieldOfUse
|
computer security
|
gptkbp:hasFilingDate
|
2004-02-06
|
gptkbp:hasInternationalClassification
|
G06F21/00
|
gptkbp:hasInventor
|
gptkb:Alice_Johnson
gptkb:John_Doe
|
gptkbp:hasLegalStatus
|
active
|
gptkbp:hasPriorityDate
|
2024-02-06
2003-02-06
|
gptkbp:hasPublications
|
2004-09-14
|
gptkbp:hasRelatedPatent
|
utility
US_6,789,906_S28
|
gptkbp:hasTechnicalField
|
information technology
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 6,789,905 S27 family
|
gptkbp:isCitedBy
|
gptkb:US_7,123,456_B2
gptkb:US_7,654,321_C1
|
gptkbp:isFiledIn
|
gptkb:United_States
|
gptkbp:isPartOf
|
S27_patent_family
|
gptkbp:isRelatedTo
|
gptkb:US_6,789,905_B2
|
gptkbp:pageCount
|
15
|
gptkbp:relatedTo
|
data processing
|