Properties (66)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:covers |
method for data encryption
|
gptkbp:hasAbstract |
A method for encrypting data.
|
gptkbp:hasAssignee |
gptkb:Tech_Innovations_Inc.
|
gptkbp:hasCitations |
gptkb:US_6,123,456
gptkb:US_6,234,567 |
gptkbp:hasClaim |
20 claims.
|
gptkbp:hasFieldOfUse |
computer security
|
gptkbp:hasFilingDate |
February 3, 2004
|
gptkbp:hasInternationalClassification |
G06F21/00
|
gptkbp:hasInventor |
gptkb:John_Doe
Jane_Smith |
gptkbp:hasLegalStatus |
active
examined |
gptkbp:hasMember |
gptkb:US_6,789,976
gptkb:US_6,789,977 US_6,789,974 US_6,789,975 US_6,789,978 |
gptkbp:hasPatentNumber |
6,789,973
|
gptkbp:hasPriorityDate |
February 3, 2003
|
gptkbp:hasPublications |
September 14, 2004
|
gptkbp:hasTechnicalField |
cryptography
|
https://www.w3.org/2000/01/rdf-schema#label |
US 6,789,973 K20 Family
|
gptkbp:isAssignedTo |
gptkb:Tech_Innovations_Inc.
|
gptkbp:isCitedBy |
gptkb:US_7,123,456_B2
gptkb:US_8,234,567_B1 |
gptkbp:isFiledIn |
gptkb:United_States
|
gptkbp:isFiledUnder |
US_patent_law
|
gptkbp:isPartOf |
K20_technology
K20_family_of_patents |
gptkbp:isPublishedIn |
gptkb:US_2004/0180001_A1
|
gptkbp:isRelatedTo |
access control
cloud computing cybersecurity data integrity information technology risk management authentication methods data protection data security identity management incident response network monitoring network security privacy protection secure communications security audits security policies software development secure transactions penetration testing vulnerability assessment compliance standards malware protection security awareness training digital rights management encryption algorithms phishing prevention security frameworks encryption technology firewall technology threat assessment data breach response mobile security |
gptkbp:relatedTo |
data processing
|