Properties (45)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
This_patent_describes_a_method_for_utilizing_X7_technology.
|
gptkbp:applicationNumber |
10/123,456
|
gptkbp:assignee |
gptkb:XYZ_Corporation
|
gptkbp:citedBy |
gptkb:US_7,123,456_B2
|
gptkbp:claims |
20
|
gptkbp:classification |
G06F 17/30
|
gptkbp:description |
A detailed description of the invention.
|
gptkbp:drawings |
included
|
gptkbp:examiner |
Jane_Smith
|
gptkbp:expirationDate |
2024-09-14
|
gptkbp:fieldOfInvention |
computer science
|
gptkbp:fieldOfUse |
technology
|
gptkbp:filingDate |
2004-02-06
|
gptkbp:firstClaim |
A method for processing data.
A computer program product. A method for data encryption. A method for data storage. A method for data transmission. A system for implementing the method. A user interface for the system. |
https://www.w3.org/2000/01/rdf-schema#label |
US 6,789,981 X7
|
gptkbp:internationalClassification |
H04L 29/06
|
gptkbp:inventor |
gptkb:John_Doe
|
gptkbp:issueDate |
2004-09-14
|
gptkbp:legalStatus |
granted
|
gptkbp:maintenanceFee |
paid
|
gptkbp:ninthClaim |
A method for data analysis.
A method for data backup. A method for data compression. A method for data recovery. A method for data retrieval. A method for data synchronization. A method for data visualization. A method for network security. A method for user authentication. A method for system integration. A method for performance optimization. A method for system monitoring. A method for error detection. |
gptkbp:patentNumber |
6,789,981
|
gptkbp:priorityDate |
2003-02-06
|
gptkbp:relatedPatent |
gptkb:US_6,789,980_X6
|
gptkbp:status |
active
|
gptkbp:title |
Method_for_X7_technology
|