gptkbp:instanceOf
|
patent
|
gptkbp:abstract
|
A method for enhancing data security through encryption and access control.
|
gptkbp:applicationNumber
|
16/123,456
|
gptkbp:applicationType
|
Utility
|
gptkbp:assignee
|
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy
|
gptkb:US_25,600,020_B1
|
gptkbp:claims
|
10
|
gptkbp:class
|
H04L
|
gptkbp:coInventor
|
gptkb:Alice_Johnson
|
gptkbp:documentType
|
B1
|
gptkbp:examiner
|
Jane_Smith
|
gptkbp:fieldOfInvention
|
Data Security
|
gptkbp:filingDate
|
2018-05-01
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 25,600,019 B1
|
gptkbp:internationalClassification
|
G06F 21/00
|
gptkbp:inventor
|
gptkb:John_Doe
|
gptkbp:issueDate
|
2023-02-14
|
gptkbp:issuedBy
|
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus
|
Granted
|
gptkbp:patentCitation
|
gptkb:US_25,600,030_B1
gptkb:US_25,600,042_B1
gptkb:US_25,600,049_B1
gptkb:US_25,600,040_B1
gptkb:US_25,600,044_B1
gptkb:US_25,600,021_B1
gptkb:US_25,600,033_B1
gptkb:US_25,600,039_B1
gptkb:US_25,600,046_B1
gptkb:US_25,600,048_B1
gptkb:US_25,600,027_B1
gptkb:US_25,600,045_B1
gptkb:US_25,600,029_B1
gptkb:US_25,600,032_B1
gptkb:US_25,600,038_B1
gptkb:US_25,600,035_B1
gptkb:US_25,600,036_B1
gptkb:US_25,600,043_B1
gptkb:US_25,600,047_B1
gptkb:US_25,600,028_B1
gptkb:US_25,600,050_B1
gptkb:US_25,600,034_B1
gptkb:US_25,600,022_B1
gptkb:US_25,600,018_B1
gptkb:US_25,600,020_B1
gptkb:US_25,600,023_B1
gptkb:US_25,600,037_B1
gptkb:US_25,600,031_B1
US 25,600,024 B1
US 25,600,025 B1
US_25,600,026_B1
US_25,600,041_B1
|
gptkbp:patentFamily
|
US_25,600,019_B1_family
|
gptkbp:priorityDate
|
2017-05-01
|
gptkbp:relatedTo
|
gptkb:US_25,600,018_B1
|
gptkbp:status
|
Active
|
gptkbp:subclass
|
H04L 9/00
|
gptkbp:title
|
Method for Enhancing Data Security
|