US 23,210,003 B1

GPTKB entity

Statements (71)
Predicate Object
gptkbp:instanceOf patent
gptkbp:abstract A method for enhancing data security through encryption and access control.
gptkbp:applicationNumber 16/123,456
gptkbp:applicationType utility
gptkbp:assignee gptkb:Tech_Innovations_LLC
gptkbp:citedBy US_23,000,001_B1
gptkbp:claims 20
gptkbp:class G06F21/00
gptkbp:description This patent describes a method for enhancing data security.
gptkbp:examiner Jane_Smith
gptkbp:fieldOfInvention computer science
gptkbp:filingDate 2020-05-15
https://www.w3.org/2000/01/rdf-schema#label US 23,210,003 B1
gptkbp:internationalClassification H04L9/00
gptkbp:inventor gptkb:Alice_Johnson
gptkb:Bob_Brown
gptkb:John_Doe
gptkbp:issueDate 2023-05-10
gptkbp:issuedBy gptkb:United_States_Patent_and_Trademark_Office
gptkbp:legalStatus granted
gptkbp:patentCitation gptkb:US_23,300,008_B1
gptkb:US_24,600,021_B1
gptkb:US_23,700,012_B1
gptkb:US_27,000,045_B1
gptkb:US_25,400,029_B1
gptkb:US_26,500,040_B1
gptkb:US_26,400,039_B1
gptkb:US_22,000,001_B1
gptkb:US_24,700,022_B1
gptkb:US_25,300,028_B1
gptkb:US_26,300,038_B1
gptkb:US_24,000,015_B1
gptkb:US_25,500,030_B1
gptkb:US_25,700,032_B1
gptkb:US_23,600,011_B1
gptkb:US_23,500,010_B1
gptkb:US_23,800,013_B1
gptkb:US_26,700,042_B1
gptkb:US_23,900,014_B1
gptkb:US_25,100,026_B1
gptkb:US_24,500,020_B1
gptkb:US_24,800,023_B1
gptkb:US_25,000,025_B1
gptkb:US_23,400,009_B1
gptkb:US_26,600,041_B1
gptkb:US_25,800,033_B1
gptkb:US_26,100,036_B1
gptkb:US_25,900,034_B1
gptkb:US_22,900,004_B1
gptkb:US_23,000,005_B1
gptkb:US_26,000,035_B1
gptkb:US_22,750,003_B1
gptkb:US_24,400,019_B1
gptkb:US_25,200,027_B1
gptkb:US_26,200,037_B1
gptkb:US_26,900,044_B1
gptkb:US_23,200,007_B1
gptkb:US_24,100,016_B1
gptkb:US_26,800,043_B1
gptkb:US_22,500,002_B1
gptkb:US_25,600,031_B1
gptkb:US_23,100,006_B1
gptkb:US_24,200,017_B1
US 24,300,018 B1
US 24,900,024 B1
gptkbp:patentFamily US_23,210,003_B1,_US_23,210,004_B1
gptkbp:priorityDate 2019-05-15
gptkbp:relatedTo data security
gptkbp:status active
gptkbp:subclass G06F21/62
gptkbp:title Method for Enhancing Data Security