gptkbp:instanceOf
|
patent
|
gptkbp:abstract
|
A method for enhancing data security through encryption and access control.
|
gptkbp:applicationNumber
|
15/123,456
|
gptkbp:applicationPublicationNumber
|
gptkb:US_2017/0123456_A1
|
gptkbp:applicationType
|
non-provisional
|
gptkbp:assignee
|
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy
|
US_36,000,001_B1
|
gptkbp:claims
|
20
|
gptkbp:class
|
G06F21/00
|
gptkbp:coInventor
|
gptkb:Alice_Johnson
|
gptkbp:examiner
|
Jane_Smith
|
gptkbp:fieldOfInvention
|
computer science
|
gptkbp:filedWith
|
gptkb:USPTO
|
gptkbp:filingDate
|
2017-05-15
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 35,999,967 B1
|
gptkbp:internationalClassification
|
H04L9/00
|
gptkbp:inventor
|
gptkb:John_Doe
|
gptkbp:issueDate
|
2018-12-25
|
gptkbp:issuedBy
|
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus
|
granted
|
gptkbp:patentAbstract
|
A method for enhancing data security through encryption and access control.
|
gptkbp:patentAssignee
|
gptkb:Tech_Innovations_LLC
|
gptkbp:patentCitation
|
US_35,000,000_B1
|
gptkbp:patentClaim
|
4.
3.
20.
5.
13.
15.
19.
2.
6.
16.
1.
11.
12.
14.
7.
8.
10.
9.
17.
18.
|
gptkbp:patentExpiration
|
2038-12-25
|
gptkbp:patentFamily
|
US_35,999,967_B1,_US_35,999,968_B1
|
gptkbp:patentField
|
data security
|
gptkbp:patentInventor
|
gptkb:John_Doe
|
gptkbp:patentNumber
|
35,999,967
|
gptkbp:patentType
|
utility
|
gptkbp:priorityDate
|
2016-05-15
|
gptkbp:relatedPatent
|
US_35,999,968_B1
|
gptkbp:relatedTo
|
data security
|
gptkbp:status
|
active
|
gptkbp:subclass
|
G06F21/62
|
gptkbp:technologyDomain
|
information technology
|
gptkbp:title
|
Method for Enhancing Data Security
|