Statements (34)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for enhancing data security using encryption techniques.
|
gptkbp:applicationNumber |
16/123,456
|
gptkbp:applicationType |
Utility
|
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy |
gptkb:US_34,123,456_B2
|
gptkbp:claims |
20
|
gptkbp:coInventor |
Jane_Smith
|
gptkbp:examiner |
gptkb:Michael_Johnson
|
gptkbp:fieldOfInvention |
Data Security
|
gptkbp:filingDate |
2018-05-01
|
gptkbp:firstClaim |
A method for encrypting data.
A method for data backup. A method for data integrity verification. A method for decrypting data. A method for user authentication. A method for access control. A method for secure data transmission. |
https://www.w3.org/2000/01/rdf-schema#label |
US 34,678,928 B1
|
gptkbp:internationalClassification |
H04L 9/00
|
gptkbp:inventor |
gptkb:John_Doe
|
gptkbp:issueDate |
2019-05-14
|
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus |
Granted
|
gptkbp:ninthClaim |
A method for data recovery.
A method for compliance monitoring. A method for threat detection. |
gptkbp:nonPatentCitation |
IEEE Paper on Data Security 2017
|
gptkbp:patentCitation |
US_34,567,890_B1
|
gptkbp:patentFamily |
US_34,678,928_B1,_US_34,678,927_B1
|
gptkbp:priorityDate |
2017-05-01
|
gptkbp:relatedTo |
gptkb:US_34,678,927_B1
|
gptkbp:status |
Active
|
gptkbp:title |
Method for Enhancing Data Security
|