US 6,789,983 T73

GPTKB entity

Properties (65)
Predicate Object
gptkbp:instanceOf patent
gptkbp:fieldOfStudy computer science
gptkbp:fieldOfTechnology information technology.
gptkbp:filingCountry USA.
gptkbp:hasAbstract A method for processing data securely.
gptkbp:hasApplicationNumber 10/123,456
gptkbp:hasAssignee gptkb:XYZ_Corporation
gptkbp:hasClaim 20
method for data integrity.
method for secure data transmission.
system for secure data storage.
gptkbp:hasCountry gptkb:United_States
gptkbp:hasCPCClassification G06F21/62
gptkbp:hasDescription This patent describes a method for secure data processing.
gptkbp:hasFeature paid
gptkbp:hasFieldOfUse data security
software development
computer technology
gptkbp:hasFilingDate February 10, 2004
gptkbp:hasInternationalClassification G06F21/00
gptkbp:hasInventor gptkb:John_Doe
Jane_Smith
gptkbp:hasJurisdictionOver gptkb:USPTO
gptkbp:hasLegalEvent patent granted
patent granted.
patent issued.
gptkbp:hasLegalStatus active
examined
gptkbp:hasMember gptkb:US_6,789,984_T73
gptkbp:hasPatentNumber 6,789,983
gptkbp:hasPriorityDate February 10, 2003
gptkbp:hasPublications September 14, 2004
granted patent
gptkbp:hasRelatedPatent utility
US 10/123,457.
US_6,789,982_T73
gptkbp:hasTechnicalField information security
cybersecurity.
gptkbp:hasTechnology A secure method for processing sensitive data.
secure data processing method.
https://www.w3.org/2000/01/rdf-schema#label US 6,789,983 T73
gptkbp:isAssignedTo gptkb:XYZ_Corporation
gptkbp:isCitedBy gptkb:US_10,123,456_B2
gptkb:US_11,234,567_B2
gptkb:US_7,123,456_B2
gptkb:US_7,654,321_B1
gptkb:US_8,123,456_B2
gptkb:US_9,876,543_B1
gptkbp:isExaminedBy true
gptkbp:isFiledIn gptkb:United_States
gptkbp:isFiledUnder gptkb:John_Doe
utility patent
intellectual property.
US_patent_law
gptkbp:isGranted true
gptkbp:isPartOf gptkb:US_6,789,983
patent family
XYZ Corporation portfolio.
US_patent_system.
gptkbp:isPublishedIn true
gptkbp:isRelatedTo data encryption
data protection techniques
gptkbp:isUsedBy technology
gptkbp:relatedTo method for data processing
gptkbp:usesTechnology encryption algorithms