gptkbp:instanceOf
|
Patent
|
gptkbp:covers
|
Method for data encryption
|
gptkbp:hasAbstract
|
A method for encrypting data.
|
gptkbp:hasApplicationNumber
|
10/123,456
|
gptkbp:hasAssignee
|
gptkb:Tech_Innovations_LLC
|
gptkbp:hasCitedPatent
|
gptkb:US_6,123,456_B1
|
gptkbp:hasClaim
|
20
|
gptkbp:hasCPCClassification
|
G06F21/62
|
gptkbp:hasDescription
|
This patent describes a method for secure data transmission.
|
gptkbp:hasExaminer
|
Jane_Smith
|
gptkbp:hasFeature
|
$1,600
|
gptkbp:hasFieldOfUse
|
Computer security
|
gptkbp:hasFilingDate
|
February 10, 2004
|
gptkbp:hasGoals
|
Active
|
gptkbp:hasInternationalClassification
|
G06F21/00
|
gptkbp:hasInventor
|
gptkb:Alice_Johnson
gptkb:Bob_Brown
gptkb:John_Doe
|
gptkbp:hasLegalEvent
|
Fee payment
|
gptkbp:hasLegalStatus
|
Granted
|
gptkbp:hasMember
|
gptkb:US_6,789,999_U8
gptkb:US_6,789,981_U8
gptkb:US_6,789,993_U8
gptkb:US_6,789,976_U8
gptkb:US_6,789,989_U8
gptkb:US_6,789,990_U8
gptkb:US_6,789,994_U8
gptkb:US_6,789,992_U8
gptkb:US_6,789,984_U8
gptkb:US_6,789,985_U8
gptkb:US_6,789,991_U8
gptkb:US_6,789,974_U8
gptkb:US_6,789,987_U8
gptkb:US_6,789,995_U8
gptkb:US_6,789,983_U8
gptkb:US_6,789,979_U8
gptkb:US_6,789,980_U8
gptkb:US_6,789,997_U8
gptkb:US_6,789,978_U8
gptkb:US_6,789,975_U8
gptkb:US_6,789,998_U8
gptkb:US_6,789,986_U8
gptkb:US_6,789,977_U8
gptkb:US_6,789,982_U8
gptkb:US_6,789,988_U8
US_6,789,973_U8
US_6,789,996_U8
|
gptkbp:hasPriorityDate
|
February 10, 2003
February 10, 2024
|
gptkbp:hasPublications
|
September 14, 2004
|
gptkbp:hasRelatedPatent
|
gptkb:US_6,789,970_U8
|
gptkbp:hasTechnicalField
|
Information technology
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 6,789,972 U8 Family
|
gptkbp:isAssignedTo
|
gptkb:Tech_Innovations_LLC
|
gptkbp:isCitedBy
|
gptkb:US_7,123,456_B2
|
gptkbp:isFiledIn
|
gptkb:United_States
|
gptkbp:isFiledUnder
|
Utility patent
|
gptkbp:isPartOf
|
US_Patent_Family
|
gptkbp:isPublishedIn
|
USPTO database
|
gptkbp:isRelatedTo
|
gptkb:US_6,789,971_U8
|
gptkbp:relatedTo
|
Data processing
|