Properties (50)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Patent
|
gptkbp:covers |
Method for data encryption
|
gptkbp:hasAbstract |
A method for encrypting and decrypting data.
|
gptkbp:hasAssignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:hasCitations |
gptkb:US_6,123,456
gptkb:US_6,234,567 gptkb:US_6,345,678 |
gptkbp:hasClaim |
Claim 1: A method for encrypting data.
Claim 2: A system for secure data transmission. Claim 3: A method for decrypting data. Claim 5: A method for data integrity verification. Claim 4: A method for key exchange. |
gptkbp:hasDescription |
Describes a method for secure data handling.
|
gptkbp:hasFieldOfUse |
Secure communications
|
gptkbp:hasFilingDate |
February 10, 2004
|
gptkbp:hasGoals |
Granted
|
gptkbp:hasInventor |
gptkb:John_Doe
|
gptkbp:hasLegalStatus |
Active
|
gptkbp:hasPriorityDate |
February 10, 2003
February 10, 2024 |
gptkbp:hasPrograms |
Figure 1: Encryption process.
Figure 2: Decryption process. Figure 3: Key exchange process. Figure 4: Data integrity verification. |
gptkbp:hasPublications |
September 7, 2004
|
gptkbp:hasTechnicalField |
Information security
|
https://www.w3.org/2000/01/rdf-schema#label |
US 6,789,927 S5 Family
|
gptkbp:isAssignedTo |
gptkb:Tech_Innovations_LLC
|
gptkbp:isCitedBy |
gptkb:US_7,567,890
gptkb:US_7,123,456 gptkb:US_7,345,678 gptkb:US_7,456,789 gptkb:US_7,234,567 |
gptkbp:isFiledIn |
gptkb:United_States
|
gptkbp:isFiledUnder |
Class 705
Subclass 26 |
gptkbp:isPartOf |
S5_Family_of_patents
S5_Technology |
gptkbp:isRelatedTo |
Computer science
Cryptography Information technology Software development Telecommunications Cryptographic protocols Hardware security Network security Secure data transmission Data integrity methods Data encryption techniques |
gptkbp:relatedTo |
Data processing
|