gptkbp:instanceOf
|
patent
|
gptkbp:abstract
|
A method for enhancing data security through encryption.
|
gptkbp:applicationDate
|
2004-01-30
|
gptkbp:applicationNumber
|
10/123,456
|
gptkbp:applicationStatus
|
published
|
gptkbp:applicationType
|
utility
|
gptkbp:assignee
|
gptkb:K5_Technologies,_Inc.
|
gptkbp:citedBy
|
gptkb:US_7,123,456_B2
|
gptkbp:claims
|
20
|
gptkbp:country
|
gptkb:United_States
|
gptkbp:examiner
|
Jane_Smith
|
gptkbp:expirationDate
|
2024-01-30
|
gptkbp:fieldOfInvention
|
data security
|
gptkbp:filingDate
|
2004-01-30
|
gptkbp:filingLocation
|
gptkb:USPTO
|
gptkbp:grantDate
|
2004-09-14
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 6,789,921 K5 Family
|
gptkbp:internationalClassification
|
G06F21/00
|
gptkbp:inventor
|
gptkb:Alice_Johnson
gptkb:Bob_Brown
gptkb:John_Doe
|
gptkbp:issueDate
|
2004-09-14
|
gptkbp:language
|
English
|
gptkbp:legalStatus
|
active
|
gptkbp:patentAbstract
|
A method for enhancing data security through encryption and access control.
|
gptkbp:patentAssignee
|
gptkb:K5_Technologies,_Inc.
|
gptkbp:patentCitation
|
gptkb:US_7,123,456_B2
5
|
gptkbp:patentClassification
|
H04L
|
gptkbp:patentExpiration
|
2024-01-30
|
gptkbp:patentFamily
|
K5_Family
|
gptkbp:patentFamilyMembers
|
3
|
gptkbp:patentField
|
Information Technology
data encryption
|
gptkbp:patentFilingDate
|
2004-09-14
2004-01-30
|
gptkbp:patentInventor
|
gptkb:Alice_Johnson
gptkb:Bob_Brown
gptkb:John_Doe
|
gptkbp:patentNumber
|
6,789,921
|
gptkbp:patentOwner
|
gptkb:K5_Technologies,_Inc.
|
gptkbp:patentStatus
|
active
|
gptkbp:patentType
|
gptkb:US_6,789,920_K5_Family
granted
utility patent
|
gptkbp:priorityDate
|
2003-01-30
|
gptkbp:publicationNumber
|
gptkb:US_2004/0123456_A1
|
gptkbp:relatedPatent
|
gptkb:US_6,789,920_K5_Family
|
gptkbp:relatedTo
|
gptkb:US_6,789,920_K5_Family
|
gptkbp:status
|
granted
|
gptkbp:subclass
|
G06F
|
gptkbp:technologyArea
|
cybersecurity
|
gptkbp:title
|
Method for enhancing data security
|