gptkbp:instanceOf
|
patent
|
gptkbp:fieldOfStudy
|
computer science
|
gptkbp:fieldOfTechnology
|
information technology.
|
gptkbp:filingCountry
|
USA.
|
gptkbp:hasAbstract
|
A method for processing data securely.
|
gptkbp:hasApplicationNumber
|
10/123,456
|
gptkbp:hasAssignee
|
gptkb:XYZ_Corporation
|
gptkbp:hasClaim
|
20
method for data integrity.
method for secure data transmission.
system for secure data storage.
|
gptkbp:hasCountry
|
gptkb:United_States
|
gptkbp:hasCPCClassification
|
G06F21/62
|
gptkbp:hasDescription
|
This patent describes a method for secure data processing.
|
gptkbp:hasFeature
|
paid
|
gptkbp:hasFieldOfUse
|
data security
software development
computer technology
|
gptkbp:hasFilingDate
|
February 10, 2004
|
gptkbp:hasInternationalClassification
|
G06F21/00
|
gptkbp:hasInventor
|
gptkb:John_Doe
Jane_Smith
|
gptkbp:hasJurisdictionOver
|
gptkb:USPTO
|
gptkbp:hasLegalEvent
|
patent granted
patent granted.
patent issued.
|
gptkbp:hasLegalStatus
|
active
examined
|
gptkbp:hasMember
|
gptkb:US_6,789,984_T73
|
gptkbp:hasPatentNumber
|
6,789,983
|
gptkbp:hasPriorityDate
|
February 10, 2003
|
gptkbp:hasPublications
|
September 14, 2004
granted patent
|
gptkbp:hasRelatedPatent
|
utility
US 10/123,457.
US_6,789,982_T73
|
gptkbp:hasTechnicalField
|
information security
cybersecurity.
|
gptkbp:hasTechnology
|
A secure method for processing sensitive data.
secure data processing method.
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 6,789,983 T73
|
gptkbp:isAssignedTo
|
gptkb:XYZ_Corporation
|
gptkbp:isCitedBy
|
gptkb:US_10,123,456_B2
gptkb:US_11,234,567_B2
gptkb:US_7,123,456_B2
gptkb:US_7,654,321_B1
gptkb:US_8,123,456_B2
gptkb:US_9,876,543_B1
|
gptkbp:isExaminedBy
|
true
|
gptkbp:isFiledIn
|
gptkb:United_States
|
gptkbp:isFiledUnder
|
gptkb:John_Doe
utility patent
intellectual property.
US_patent_law
|
gptkbp:isGranted
|
true
|
gptkbp:isPartOf
|
gptkb:US_6,789,983
patent family
XYZ Corporation portfolio.
US_patent_system.
|
gptkbp:isPublishedIn
|
true
|
gptkbp:isRelatedTo
|
data encryption
data protection techniques
|
gptkbp:isUsedBy
|
technology
|
gptkbp:relatedTo
|
method for data processing
|
gptkbp:usesTechnology
|
encryption algorithms
|