Properties (52)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Patent
|
gptkbp:covers |
Method for data encryption
|
gptkbp:hasAbstract |
A method for secure data transmission.
|
gptkbp:hasApplicationNumber |
10/123,456
|
gptkbp:hasAssignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:hasCitedPatent |
US_6,789,970_S29_Family
|
gptkbp:hasClaim |
20
Data integrity. Data recovery. User authentication. Compliance with regulations. Access control. Audit trail. Data confidentiality. Encryption method. Secure data storage. Secure key exchange. |
gptkbp:hasCountry |
gptkb:USA
|
gptkbp:hasDescription |
Detailed description of the invention.
|
gptkbp:hasExaminer |
Jane_Smith
|
gptkbp:hasFieldOfUse |
Data protection
Computer security Secure communications |
gptkbp:hasFilingDate |
March 15, 2004
February 10, 2004 |
gptkbp:hasGoals |
Granted
|
gptkbp:hasInventor |
gptkb:Alice_Johnson
gptkb:Bob_Brown gptkb:John_Doe |
gptkbp:hasLegalEvent |
Maintenance fee paid
|
gptkbp:hasLegalStatus |
Active
|
gptkbp:hasPriorityDate |
February 10, 2003
|
gptkbp:hasPublications |
gptkb:US_6,789,968_S27
September 14, 2004 October 20, 2004 |
gptkbp:hasRelatedPatent |
US_6,789,969_S28_Family
|
gptkbp:hasTechnicalField |
Cryptography
Information technology |
https://www.w3.org/2000/01/rdf-schema#label |
US 6,789,968 S27 Family
|
gptkbp:isAssignedTo |
gptkb:Tech_Innovations_LLC
|
gptkbp:isCitedBy |
gptkb:US_7,123,456_B2
gptkb:US_7,456,789_B1 gptkb:US_8,123,456_B2 gptkb:US_9,012,345_B3 US_10,123,456_B4 US_11,234,567_B5 |
gptkbp:isFiledIn |
gptkb:United_States
|
gptkbp:isFiledUnder |
Class 713
|
gptkbp:isPartOf |
Patent family
US_Patent_Classification |
gptkbp:isRelatedTo |
US_6,789,967_S26_Family
|
gptkbp:relatedTo |
Data processing
|