gptkbp:instanceOf
|
patent
|
gptkbp:abstract
|
A method for enhancing data security using encryption techniques.
|
gptkbp:applicationNumber
|
15/123,456
|
gptkbp:applicationType
|
Utility
|
gptkbp:assignee
|
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy
|
gptkb:US_29,123,456_B2
|
gptkbp:claims
|
20
|
gptkbp:class
|
G06F21/00
|
gptkbp:examiner
|
Jane_Smith
|
gptkbp:expirationDate
|
2037-06-02
|
gptkbp:fieldOfInvention
|
Data Security
|
gptkbp:filingDate
|
2016-05-12
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 28,987,599 B1
|
gptkbp:internationalClassification
|
H04L9/00
|
gptkbp:inventor
|
gptkb:Alice_Johnson
gptkb:Bob_Brown
gptkb:John_Doe
|
gptkbp:issueDate
|
2020-06-02
|
gptkbp:issuedBy
|
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus
|
Granted
|
gptkbp:maintenanceFee
|
Paid
|
gptkbp:patentCitation
|
gptkb:US_20,987,599_B1
gptkb:US_27,987,599_B1
gptkb:US_23,987,599_B1
gptkb:US_2,987,599_B1
gptkb:US_4,987,599_B1
gptkb:US_18,987,599_B1
gptkb:US_26,987,599_B1
gptkb:US_15,987,599_B1
gptkb:US_21,987,599_B1
gptkb:US_16,987,599_B1
gptkb:US_22,987,599_B1
gptkb:US_7,987,599_B1
gptkb:US_5,987,599_B1
gptkb:US_10,987,599_B1
gptkb:US_12,987,599_B1
gptkb:US_24,987,599_B1
gptkb:US_6,987,599_B1
gptkb:US_13,987,599_B1
gptkb:US_8,987,599_B1
gptkb:US_1,987,599_B1
gptkb:US_9,987,599_B1
gptkb:US_11,987,599_B1
gptkb:US_14,987,599_B1
gptkb:US_17,987,599_B1
gptkb:US_25,987,599_B1
gptkb:US_19,987,599_B1
US 3,987,599 B1
|
gptkbp:patentFamily
|
US_28,987,599_B1,_US_29,123,456_B2
|
gptkbp:priorityDate
|
2015-05-12
|
gptkbp:relatedTo
|
gptkb:US_28,987,598_B1
|
gptkbp:status
|
Active
|
gptkbp:subclass
|
G06F21/62
|
gptkbp:technologyArea
|
Information Technology
|
gptkbp:title
|
Method for Enhancing Data Security
|