US 25,765,506 B1

GPTKB entity

Statements (67)
Predicate Object
gptkbp:instanceOf patent
gptkbp:abstract A method for enhancing data security through encryption and access control.
gptkbp:applicationNumber 16/123,456
gptkbp:applicationPublicationNumber US 2019/0123456 A1
gptkbp:applicationType Utility
gptkbp:assignee gptkb:Tech_Innovations_LLC
gptkbp:assigneeCountry gptkb:USA
gptkbp:citedBy gptkb:US_25,765,507_B1
gptkbp:claims 20
gptkbp:class G06F21/00
gptkbp:coInventor gptkb:Alice_Johnson
gptkbp:examiner Jane_Smith
gptkbp:fieldOfInvention Data Security
gptkbp:filedIn gptkb:USPTO
gptkbp:filingDate 2019-05-01
https://www.w3.org/2000/01/rdf-schema#label US 25,765,506 B1
gptkbp:internationalClassification H04L9/00
gptkbp:inventor gptkb:John_Doe
gptkbp:inventorCountry gptkb:USA
gptkbp:issueDate 2023-09-05
gptkbp:issuedBy gptkb:United_States_Patent_and_Trademark_Office
gptkbp:legalStatus Granted
gptkbp:location gptkb:United_States
gptkbp:patentCitation gptkb:US_25,765,515_B1
gptkb:US_25,765,527_B1
gptkb:US_25,765,540_B1
gptkb:US_25,765,510_B1
gptkb:US_25,765,521_B1
gptkb:US_25,765,507_B1
gptkb:US_25,765,523_B1
gptkb:US_25,765,531_B1
gptkb:US_25,765,514_B1
gptkb:US_25,765,509_B1
gptkb:US_25,765,517_B1
gptkb:US_25,765,534_B1
gptkb:US_25,765,535_B1
gptkb:US_25,765,536_B1
gptkb:US_25,765,539_B1
gptkb:US_25,765,532_B1
gptkb:US_25,765,537_B1
gptkb:US_25,765,511_B1
gptkb:US_25,765,516_B1
gptkb:US_25,765,533_B1
gptkb:US_25,765,524_B1
gptkb:US_25,765,508_B1
gptkb:US_25,765,526_B1
gptkb:US_25,765,518_B1
gptkb:US_25,765,529_B1
gptkb:US_25,765,530_B1
gptkb:US_25,765,520_B1
gptkb:US_25,765,525_B1
gptkb:US_25,765,505_B1
gptkb:US_25,765,513_B1
gptkb:US_25,765,522_B1
gptkb:US_25,765,538_B1
gptkb:US_25,765,528_B1
gptkb:US_25,765,519_B1
gptkb:US_25,765,512_B1
gptkbp:patentExpiration 2039-05-01
gptkbp:patentFamily US_25,765,506_B1,_US_25,765,505_B1
gptkbp:patentLength 20 years
gptkbp:patentType Granted Patent
gptkbp:priorityDate 2018-05-01
gptkbp:relatedTo gptkb:US_25,765,505_B1
gptkbp:status Active
gptkbp:subclass G06F21/62
gptkbp:title Method for Enhancing Data Security