Properties (46)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for enhancing data security using advanced encryption techniques.
|
gptkbp:applicationNumber |
16/123,456
|
gptkbp:applicationType |
Non-Provisional
|
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy |
gptkb:US_34,678,946_B2
|
gptkbp:claims |
20
|
gptkbp:coInventor |
Jane_Smith
|
gptkbp:examiner |
gptkb:Michael_Johnson
|
gptkbp:fieldOfInvention |
Data Security
|
gptkbp:filedIn |
gptkb:United_States
|
gptkbp:filingDate |
2020-01-15
|
gptkbp:grantDate |
2022-05-10
|
gptkbp:hasExhibition |
Example 1: Data encryption process.
Example 2: Data decryption process. Example 3: Key management. Example 4: User authentication. Example 5: Data integrity verification. |
gptkbp:hasFigures |
Figure 1
Figure 2 Figure 3 Figure 4 Figure 5 |
gptkbp:hasPrograms |
Flowchart of the method
|
https://www.w3.org/2000/01/rdf-schema#label |
US 34,678,945 B2
|
gptkbp:internationalClassification |
G06F21/00
|
gptkbp:inventor |
gptkb:John_Doe
|
gptkbp:isPartOf |
Patent_family_US_34,678,944_B2
|
gptkbp:isReferencedBy |
Conference Paper on Cybersecurity Trends.
Patent US 34,678,946 B2 Patent US 34,678,947 B2 Research Paper on Data Security Technical Report on Encryption Methods |
gptkbp:isRelatedTo |
Cryptography
Cybersecurity Information Technology Data Protection Data Encryption Techniques |
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus |
Granted
|
gptkbp:patentFamily |
US_34,678,945_B2,_US_34,678,944_B2,_US_34,678,946_B2
|
gptkbp:patentType |
Utility Patent
|
gptkbp:priorityDate |
2019-01-15
|
gptkbp:relatedTo |
gptkb:US_34,678,944_B2
|
gptkbp:status |
Active
|
gptkbp:title |
Method for Enhancing Data Security
|