gptkbp:instanceOf
|
Patent
|
gptkbp:covers
|
Method for data encryption
|
gptkbp:hasAssignee
|
gptkb:XYZ_Corporation
|
gptkbp:hasCitations
|
gptkb:US_6,123,456
gptkb:US_6,234,567
|
gptkbp:hasClaim
|
20
|
gptkbp:hasFieldOfUse
|
Telecommunications
Computer security
|
gptkbp:hasFilingDate
|
February 10, 2004
|
gptkbp:hasInternationalClassification
|
H04L
H04N
|
gptkbp:hasInventor
|
gptkb:John_Doe
Jane_Smith
|
gptkbp:hasLegalEvent
|
Patent granted
Patent expired
Patent application filed
Patent maintained
|
gptkbp:hasLegalStatus
|
Active
Substantive examination
|
gptkbp:hasPriorityDate
|
February 10, 2003
|
gptkbp:hasPublications
|
gptkb:Grant
September 14, 2004
|
gptkbp:hasTechnicalField
|
Information technology
Data security
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 6,789,932 S19 Family
|
gptkbp:isAssignedTo
|
gptkb:XYZ_Corporation
|
gptkbp:isCitedBy
|
gptkb:US_7,123,456
gptkb:US_7,234,567
|
gptkbp:isExaminedBy
|
gptkb:USPTO
|
gptkbp:isFiledIn
|
gptkb:United_States
|
gptkbp:isFiledUnder
|
Utility patent
|
gptkbp:isGranted
|
Yes
|
gptkbp:isInFamilyWith
|
gptkb:US_6,789,933_S19
gptkb:US_6,789,944_S19
gptkb:US_6,789,945_S19
gptkb:US_6,789,941_S19
gptkb:US_6,789,936_S19
gptkb:US_6,789,940_S19
gptkb:US_6,789,939_S19
gptkb:US_6,789,931_S19
gptkb:US_6,789,942_S19
gptkb:US_6,789,943_S19
gptkb:US_6,789,938_S19
gptkb:US_6,789,937_S19
|
gptkbp:isPartOf
|
Patent family
S19_Family_of_patents
|
gptkbp:isPublishedIn
|
gptkb:US_2004/0187654_A1
|
gptkbp:isRelatedTo
|
gptkb:US_6,789,933
gptkb:US_6,789,934
gptkb:US_6,789,931
US_6,789,935
|
gptkbp:relatedTo
|
Data processing
|