gptkbp:instanceOf
|
patent
|
gptkbp:abstract
|
A method for enhancing data security through encryption and access control.
|
gptkbp:applicationNumber
|
US_13/123,456
|
gptkbp:applicationType
|
Utility
|
gptkbp:assignee
|
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy
|
US_25,000,000_B1
|
gptkbp:claims
|
20
|
gptkbp:class
|
G06F21/00
|
gptkbp:coInventor
|
gptkb:Alice_Johnson
|
gptkbp:examiner
|
Jane_Smith
|
gptkbp:expirationDate
|
2039-06-11
|
gptkbp:fieldOfInvention
|
Computer Security
|
gptkbp:filedIn
|
gptkb:United_States
|
gptkbp:filingDate
|
2011-05-12
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 25,678,981 B1
|
gptkbp:internationalClassification
|
H04L9/00
|
gptkbp:inventor
|
gptkb:John_Doe
|
gptkbp:issueDate
|
2019-06-11
|
gptkbp:issuedBy
|
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus
|
Granted
|
gptkbp:maintenanceFee
|
Paid
|
gptkbp:patentCitation
|
gptkb:US_25,678,993_B1
gptkb:US_25,679,003_B1
gptkb:US_25,678,982_B1
gptkb:US_25,679,010_B1
gptkb:US_25,678,986_B1
gptkb:US_25,678,992_B1
gptkb:US_25,678,999_B1
gptkb:US_25,679,005_B1
gptkb:US_25,679,007_B1
gptkb:US_25,678,997_B1
gptkb:US_25,678,983_B1
gptkb:US_25,678,994_B1
gptkb:US_25,678,988_B1
gptkb:US_25,678,989_B1
gptkb:US_25,679,006_B1
gptkb:US_25,678,990_B1
gptkb:US_25,678,984_B1
gptkb:US_25,678,998_B1
gptkb:US_25,679,004_B1
gptkb:US_25,678,985_B1
gptkb:US_25,679,009_B1
gptkb:US_25,678,995_B1
gptkb:US_25,679,002_B1
gptkb:US_25,679,001_B1
gptkb:US_25,678,996_B1
gptkb:US_25,678,987_B1
gptkb:US_25,679,008_B1
gptkb:US_25,678,991_B1
gptkb:US_25,678,980_B1
US_25,679,000_B1
|
gptkbp:patentFamily
|
US_25,678,981
|
gptkbp:patentType
|
B1
|
gptkbp:priorityDate
|
2010-05-12
|
gptkbp:relatedTo
|
gptkb:US_25,678,980_B1
|
gptkbp:status
|
Active
|
gptkbp:subclass
|
G06F21/62
|
gptkbp:technology
|
Encryption
|
gptkbp:title
|
Method for Enhancing Data Security
|