Properties (65)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for enhancing data security through encryption and access control.
|
gptkbp:applicationNumber |
13/470,123
|
gptkbp:applicationType |
Non-Provisional
|
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:associatedWith |
gptkb:Security_Operations_Center
gptkb:Intrusion_Detection_Systems Access Control Data Encryption Incident Response Network Security Risk Management Threat Detection Vulnerability Assessment Data Integrity Data Governance Incident Management Threat Intelligence Security Awareness Training Cloud Security Mobile Security Security Protocols Compliance Standards Privacy Protection Secure Communication Security Policies User Authentication Security Audits Data Classification Encryption Algorithms Data Loss Prevention Endpoint Security Security Frameworks Data_Backup_Solutions Identity_Management Access_Management Firewall_Technologies |
gptkbp:citedBy |
gptkb:US_29,123,456_B2
|
gptkbp:claims |
20
|
gptkbp:class |
H04L
|
gptkbp:coInventor |
gptkb:Alice_Johnson
|
gptkbp:examiner |
Jane_Smith
|
gptkbp:expirationDate |
2036-04-05
|
gptkbp:fieldOfInvention |
Data Security
|
gptkbp:filingDate |
2012-05-15
|
gptkbp:hasFieldOfUse |
Information Technology
|
https://www.w3.org/2000/01/rdf-schema#label |
US 28,987,632 B1
|
gptkbp:internationalClassification |
G06F21/00
|
gptkbp:inventiveStep |
Yes
|
gptkbp:inventor |
gptkb:John_Doe
|
gptkbp:issueDate |
2016-04-05
|
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus |
Granted
|
gptkbp:maintenanceFee |
Due
|
gptkbp:nonPatentCitation |
IEEE Paper on Data Security
|
gptkbp:novelty |
Yes
|
gptkbp:patentCitation |
gptkb:US_27,987,631_B1
|
gptkbp:patentFamily |
US_28,987,632_B1,_US_29,123,456_B2
|
gptkbp:patentType |
Utility Patent
|
gptkbp:priorityDate |
2011-05-15
|
gptkbp:relatedTo |
gptkb:US_28,987,631_B1
|
gptkbp:status |
Active
|
gptkbp:subclass |
H04L9/00
|
gptkbp:technologyArea |
Cybersecurity
|
gptkbp:title |
Method for Enhancing Data Security
|