Predicate |
Object |
classificationCPCAdditional |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2221-2123 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-12 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-08 |
classificationCPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-3836 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-85 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G09C1-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-755 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-72 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-003 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-30101 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-3001 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-321 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-30181 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0625 |
classificationIPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F9-38 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F9-30 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F1-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F11-30 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-10 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-06 |
filingDate |
2011-12-27-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
grantDate |
2014-02-12-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationDate |
2014-02-12-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber |
JP-5414780-B2 |
titleOfInvention |
Cryptographic architecture with instruction masks and other techniques that interfere with differential power analysis |
priorityDate |
2004-06-08-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type |
http://data.epo.org/linked-data/def/patent/Publication |