Properties (46)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for enhancing data security using advanced encryption techniques.
|
gptkbp:applicationDate |
2021-05-01
|
gptkbp:applicationNumber |
16/123,456
|
gptkbp:applicationType |
Utility
|
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy |
gptkb:US_22,567,899_B1
|
gptkbp:claims |
20
|
gptkbp:class |
H04L
|
gptkbp:coInventor |
gptkb:Alice_Johnson
|
gptkbp:description |
This patent describes a method for enhancing data security.
|
gptkbp:examiner |
Jane_Smith
|
gptkbp:fieldOfInvention |
Data Security
|
gptkbp:filingDate |
2021-05-01
|
https://www.w3.org/2000/01/rdf-schema#label |
US 22,567,898 B1
|
gptkbp:internationalClassification |
G06F 21/00
|
gptkbp:inventor |
gptkb:John_Doe
|
gptkbp:inventorCountry |
gptkb:USA
|
gptkbp:issueDate |
2023-10-10
|
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus |
Granted
|
gptkbp:notableFeature |
Advanced encryption techniques.
|
gptkbp:patentAbstract |
A method for enhancing data security using advanced encryption techniques.
|
gptkbp:patentCitation |
Cited by 5 other patents.
|
gptkbp:patentClaim |
Claim 9: A method for data sharing.
Claim 3: A method for secure data transmission. Claim 4: A method for data integrity verification. Claim 5: A method for user authentication. Claim 6: A method for access control. Claim 7: A method for data recovery. Claim 10: A method for data monitoring. Claim 1: A method for data encryption. Claim 2: A method for data decryption. Claim 8: A method for data backup. |
gptkbp:patentFamily |
US_22,567,898_B1,_US_22,567,897_B1
|
gptkbp:patentInventor |
20 years
|
gptkbp:patentNumber |
22,567,898
|
gptkbp:patentOffice |
gptkb:USPTO
|
gptkbp:patentType |
Granted Patent
|
gptkbp:priorityDate |
2020-05-01
|
gptkbp:relatedPatent |
gptkb:US_22,567,897_B1
|
gptkbp:relatedTo |
gptkb:US_22,567,897_B1
|
gptkbp:status |
Active
|
gptkbp:subclass |
H04L 9/00
|
gptkbp:technicalField |
Computer Science
|
gptkbp:title |
Method for Enhancing Data Security
|