Properties (37)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for enhancing the efficiency of data processing systems.
|
gptkbp:applicationNumber |
60/555,573
|
gptkbp:applicationType |
Non-Provisional
|
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy |
gptkb:US_70,123,456_B2
|
gptkbp:claims |
20
|
gptkbp:coInventor |
gptkb:Alice_Johnson
|
gptkbp:examiner |
No objections raised.
Jane_Smith |
gptkbp:fieldOfInvention |
Computer Science
|
gptkbp:filingDate |
2004-04-30
|
gptkbp:firstClaim |
The method of claim 1, wherein the data is processed in real-time.
A method for processing data. The method of claim 1, wherein the data is analyzed using machine learning. The method of claim 1, wherein the data processing is optimized for speed. The method of claim 1, wherein the data is visualized in a user interface. The method of claim 1, further comprising the step of data encryption. The method of claim 1, wherein the data is stored in a cloud environment. |
https://www.w3.org/2000/01/rdf-schema#label |
US 60,555,573 B2
|
gptkbp:internationalClassification |
G06F 17/30
|
gptkbp:inventor |
gptkb:John_Doe
|
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus |
Granted
|
gptkbp:maintenanceFee |
Paid
|
gptkbp:ninthClaim |
The method of claim 1, wherein the data is sourced from multiple databases.
The method of claim 1, wherein the data processing is scalable. The method of claim 1, wherein the data is secured against unauthorized access. |
gptkbp:patentCitation |
US_50,000,000_B2
|
gptkbp:patentExpiration |
2024-04-30
|
gptkbp:patentFamily |
US_60,555,573_B2_family
|
gptkbp:patentType |
Utility Patent
|
gptkbp:priorityDate |
2003-04-30
|
gptkbp:publicationDate |
2006-05-02
|
gptkbp:relatedTo |
gptkb:US_60,555,572_B2
|
gptkbp:status |
Active
|
gptkbp:title |
Method for improving data processing
|