US 6,789,905 S27 family

GPTKB entity

Statements (61)
Predicate Object
gptkbp:instanceOf patent
gptkbp:covers method for data encryption
gptkbp:hasAbstract A method for encrypting data.
gptkbp:hasApplicationNumber 10/123,456
gptkbp:hasAssignee gptkb:XYZ_Corporation
gptkbp:hasCitedPatent gptkb:US_6,789,010_C1
gptkb:US_6,789,020_A
gptkb:US_6,789,022_C1
gptkb:US_6,789,007_B2
gptkb:US_6,789,014_A
gptkb:US_5,678,901_A
gptkb:US_6,543,210_B1
gptkb:US_6,789,001_B2
gptkb:US_6,789,004_B2
gptkb:US_6,789,011_A
gptkb:US_6,789,012_B2
gptkb:US_6,789,021_B2
gptkb:US_6,789,027_B2
gptkb:US_6,789,013_C1
gptkb:US_6,789,016_C1
gptkb:US_6,789,026_A
gptkb:US_6,789,028_C1
gptkb:US_6,789,009_B1
gptkb:US_6,789,015_B2
gptkb:US_6,789,017_A
gptkb:US_6,789,019_C1
gptkb:US_6,789,003_A
gptkb:US_6,789,023_A
gptkb:US_6,789,005_A
gptkb:US_6,789,008_A
gptkb:US_6,789,018_B2
gptkb:US_6,789,025_C1
gptkb:US_6,789,030_B2
gptkb:US_6,789,029_A
gptkb:US_6,789,002_C1
gptkb:US_6,789,006_C1
US 6,789,024 B2
US_6,789,000_A
gptkbp:hasClaim 20
gptkbp:hasCountry gptkb:US
gptkbp:hasExaminer Jane_Smith
gptkbp:hasFieldOfUse computer security
gptkbp:hasFilingDate 2004-02-06
gptkbp:hasInternationalClassification G06F21/00
gptkbp:hasInventor gptkb:Alice_Johnson
gptkb:John_Doe
gptkbp:hasLegalStatus active
gptkbp:hasPriorityDate 2024-02-06
2003-02-06
gptkbp:hasPublications 2004-09-14
gptkbp:hasRelatedPatent utility
US_6,789,906_S28
gptkbp:hasTechnicalField information technology
https://www.w3.org/2000/01/rdf-schema#label US 6,789,905 S27 family
gptkbp:isCitedBy gptkb:US_7,123,456_B2
gptkb:US_7,654,321_C1
gptkbp:isFiledIn gptkb:United_States
gptkbp:isPartOf S27_patent_family
gptkbp:isRelatedTo gptkb:US_6,789,905_B2
gptkbp:pageCount 15
gptkbp:relatedTo data processing