gptkbp:instanceOf
|
Patent
|
gptkbp:covers
|
Method for data encryption
|
gptkbp:hasAbstract
|
A method for encrypting data.
|
gptkbp:hasAssignee
|
gptkb:Tech_Innovations_Inc.
|
gptkbp:hasCitedPatent
|
gptkb:US_5,678,901_A
IEEE papers on encryption.
|
gptkbp:hasClaim
|
20
A system for data encryption.
A method for securely transmitting data.
|
gptkbp:hasCountry
|
10/123,456
|
gptkbp:hasDescription
|
This patent describes a novel approach to data encryption.
|
gptkbp:hasExaminer
|
Jane_Smith
|
gptkbp:hasFeature
|
Paid
|
gptkbp:hasFieldOfUse
|
Cybersecurity
Financial transactions.
Healthcare data.
Personal data.
|
gptkbp:hasFilingDate
|
February 10, 2004
|
gptkbp:hasInternationalClassification
|
G06F21/00
|
gptkbp:hasInventor
|
gptkb:Alice_Johnson
gptkb:John_Doe
|
gptkbp:hasLegalEvent
|
Patent granted.
Patent expiration.
Maintenance fee reminder.
|
gptkbp:hasLegalStatus
|
Active
|
gptkbp:hasPriorityDate
|
February 10, 2003
|
gptkbp:hasPublications
|
B1
September 14, 2004
|
gptkbp:hasRelatedPatent
|
US 10/123,457.
|
gptkbp:hasTechnicalField
|
Information technology
|
gptkbp:hasTechnology
|
Data integrity.
User authentication.
Encryption algorithm.
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 6,789,990 J8 Family
|
gptkbp:isAssignedTo
|
gptkb:Tech_Innovations_Inc.
|
gptkbp:isCitedBy
|
gptkb:US_7,123,456_B2
gptkb:US_7,890,123_B1
gptkb:US_8,123,456_B2
|
gptkbp:isFiledIn
|
gptkb:United_States
|
gptkbp:isFiledUnder
|
Utility patent.
|
gptkbp:isGranted
|
Yes
|
gptkbp:isPartOf
|
gptkb:US_Patent_Classification_705
Information security.
Data security.
Encryption technology.
Patent_family_US_6,789,990.
|
gptkbp:isPublishedIn
|
USPTO_database.
|
gptkbp:isRelatedTo
|
gptkb:US_6,789,991_J8
gptkb:US_6,789,992_J8
|
gptkbp:isSubjectTo
|
Patent law.
|
gptkbp:isUsedIn
|
Cloud computing.
Secure communications.
Data storage.
|
gptkbp:relatedTo
|
Data processing
|