Statements (66)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for enhancing data security through encryption and access control.
|
gptkbp:applicationNumber |
14/123,456
|
gptkbp:applicationPublication |
gptkb:US_2015/0123456_A1
|
gptkbp:applicationType |
Utility
|
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy |
US_27,050,031_B1
|
gptkbp:claims |
10
|
gptkbp:class |
H04L
|
gptkbp:examiner |
Jane_Smith
|
gptkbp:fieldOfInvention |
Data Security
|
gptkbp:fieldOfUse |
Cybersecurity
|
gptkbp:filingDate |
2015-05-15
|
https://www.w3.org/2000/01/rdf-schema#label |
US 27,050,030 B1
|
gptkbp:internationalClassification |
G06F 21/00
|
gptkbp:inventor |
gptkb:Alice_Johnson
gptkb:John_Doe |
gptkbp:issueDate |
2016-07-12
|
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus |
Granted
|
gptkbp:location |
gptkb:United_States
|
gptkbp:patentCitation |
US_27,050,034_B1
US_27,050,035_B1 US_27,050,036_B1 US_27,050,037_B1 US_27,050,038_B1 US_27,050,039_B1 US_27,050,040_B1 US_27,050,041_B1 US_27,050,042_B1 US_27,050,043_B1 US_27,050,044_B1 US_27,050,045_B1 US_27,050,046_B1 US_27,050,047_B1 US_27,050,048_B1 US_27,050,049_B1 US_27,050,050_B1 US_27,050,051_B1 US_27,050,052_B1 US_27,050,053_B1 US_27,050,054_B1 US_27,050,055_B1 US_27,050,056_B1 US_27,050,057_B1 US_27,050,058_B1 US_27,050,059_B1 US_27,050,060_B1 US_27,050,061_B1 US_27,050,062_B1 US_27,050,063_B1 US_27,050,064_B1 US_27,050,065_B1 US_27,050,066_B1 US_27,050,067_B1 US_27,050,068_B1 US_27,050,069_B1 US_27,050,070_B1 |
gptkbp:patentFamily |
US_27,050,030
|
gptkbp:patentType |
B1
|
gptkbp:priorityDate |
2014-05-15
|
gptkbp:relatedPatent |
US_27,050,033_B1
|
gptkbp:relatedTo |
US_27,050,032_B1
|
gptkbp:status |
Active
|
gptkbp:subclass |
H04L 9/00
|
gptkbp:title |
Method for Enhancing Data Security
|