US 6,789,973 K20 Family

GPTKB entity

Properties (66)
Predicate Object
gptkbp:instanceOf patent
gptkbp:covers method for data encryption
gptkbp:hasAbstract A method for encrypting data.
gptkbp:hasAssignee gptkb:Tech_Innovations_Inc.
gptkbp:hasCitations gptkb:US_6,123,456
gptkb:US_6,234,567
gptkbp:hasClaim 20 claims.
gptkbp:hasFieldOfUse computer security
gptkbp:hasFilingDate February 3, 2004
gptkbp:hasInternationalClassification G06F21/00
gptkbp:hasInventor gptkb:John_Doe
Jane_Smith
gptkbp:hasLegalStatus active
examined
gptkbp:hasMember gptkb:US_6,789,976
gptkb:US_6,789,977
US_6,789,974
US_6,789,975
US_6,789,978
gptkbp:hasPatentNumber 6,789,973
gptkbp:hasPriorityDate February 3, 2003
gptkbp:hasPublications September 14, 2004
gptkbp:hasTechnicalField cryptography
https://www.w3.org/2000/01/rdf-schema#label US 6,789,973 K20 Family
gptkbp:isAssignedTo gptkb:Tech_Innovations_Inc.
gptkbp:isCitedBy gptkb:US_7,123,456_B2
gptkb:US_8,234,567_B1
gptkbp:isFiledIn gptkb:United_States
gptkbp:isFiledUnder US_patent_law
gptkbp:isPartOf K20_technology
K20_family_of_patents
gptkbp:isPublishedIn gptkb:US_2004/0180001_A1
gptkbp:isRelatedTo access control
cloud computing
cybersecurity
data integrity
information technology
risk management
authentication methods
data protection
data security
identity management
incident response
network monitoring
network security
privacy protection
secure communications
security audits
security policies
software development
secure transactions
penetration testing
vulnerability assessment
compliance standards
malware protection
security awareness training
digital rights management
encryption algorithms
phishing prevention
security frameworks
encryption technology
firewall technology
threat assessment
data breach response
mobile security
gptkbp:relatedTo data processing