gptkbp:instanceOf
|
Patent
|
gptkbp:covers
|
Method for data encryption
|
gptkbp:hasAbstract
|
A method for encrypting data.
|
gptkbp:hasAssignee
|
gptkb:Tech_Innovations_LLC
|
gptkbp:hasCitedPatent
|
gptkb:US_5,987,123
|
gptkbp:hasClaim
|
20
A method for encrypting data.
A method for data recovery.
A method for data integrity.
A method for secure data storage.
A method for secure communication.
A method for secure data sharing.
A method for secure data transmission.
A method for data authentication.
A method for data encryption and decryption.
|
gptkbp:hasDescription
|
This patent describes a method for secure data transmission.
|
gptkbp:hasExaminer
|
Jane_Smith
|
gptkbp:hasFieldOfUse
|
Telecommunications
Computer security
|
gptkbp:hasFilingDate
|
February 3, 2004
|
gptkbp:hasInternationalClassification
|
G06F21/00
|
gptkbp:hasInventor
|
gptkb:Alice_Johnson
gptkb:John_Doe
|
gptkbp:hasLegalEvent
|
Patent granted.
|
gptkbp:hasLegalStatus
|
Active
|
gptkbp:hasLocation
|
gptkb:Washington,_D.C.
|
gptkbp:hasPatentNumber
|
6,789,926
|
gptkbp:hasPriorityDate
|
February 3, 2003
|
gptkbp:hasPublications
|
B1
September 7, 2004
|
gptkbp:hasRelatedPatent
|
gptkb:US_6,789,925_K27
|
gptkbp:hasTechnicalField
|
Cybersecurity
Information technology
|
gptkbp:hasTechnology
|
Improved data security.
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 6,789,926 K27 Family
|
gptkbp:isAssignedTo
|
gptkb:Tech_Innovations_LLC
|
gptkbp:isCitedBy
|
gptkb:US_7,123,456
gptkb:US_7,654,321
gptkb:US_11,234,567
gptkb:US_8,123,456
gptkb:US_9,876,543
US_10,123,456
|
gptkbp:isFiledIn
|
gptkb:USPTO
gptkb:United_States
|
gptkbp:isFiledUnder
|
Utility patent
Patent law.
|
gptkbp:isGranted
|
Yes
|
gptkbp:isPartOf
|
K27 Family
K27 Patent Family
K27 innovation.
K27 patent series.
K27 technology.
K27_Family_of_patents.
|
gptkbp:isPublishedIn
|
USPTO database
|
gptkbp:isRelatedTo
|
gptkb:US_6,789,925
gptkb:US_6,789,927
|
gptkbp:relatedTo
|
Data processing
|