Statements (79)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for enhancing data security through encryption and access control.
|
gptkbp:applicationNumber |
15/123,456
|
gptkbp:applicationType |
Non-Provisional
|
gptkbp:assignee |
gptkb:New_York
gptkb:Tech_Innovations_LLC |
gptkbp:citedBy |
US_37,123,902_B1
|
gptkbp:claims |
20
|
gptkbp:class |
H04L
|
gptkbp:examiner |
Jane_Smith
|
gptkbp:fieldOfInvention |
Data Security
|
gptkbp:filedIn |
gptkb:United_States
|
gptkbp:filingDate |
2016-05-10
|
https://www.w3.org/2000/01/rdf-schema#label |
US 37,123,901 B1
|
gptkbp:internationalClassification |
G06F 21/00
|
gptkbp:inventor |
gptkb:Alice_Johnson
gptkb:John_Doe |
gptkbp:inventorResidence |
gptkb:California
|
gptkbp:issueDate |
2018-07-31
|
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus |
Granted
|
gptkbp:maintenanceFee |
Due
|
gptkbp:patentCitation |
US 37,123,909 B1
US_37,123,900_B1 US_37,123,902_B1 US_37,123,903_B1 US_37,123,904_B1 US_37,123,905_B1 US_37,123,906_B1 US_37,123,907_B1 US_37,123,908_B1 US_37,123,910_B1 US_37,123,911_B1 US_37,123,912_B1 US_37,123,913_B1 US_37,123,914_B1 US_37,123,915_B1 US_37,123,916_B1 US_37,123,917_B1 US_37,123,918_B1 US_37,123,919_B1 US_37,123,920_B1 US_37,123,921_B1 US_37,123,922_B1 US_37,123,923_B1 US_37,123,924_B1 US_37,123,925_B1 US_37,123,926_B1 US_37,123,927_B1 US_37,123,928_B1 US_37,123,929_B1 US_37,123,930_B1 US_37,123,931_B1 US_37,123,932_B1 US_37,123,933_B1 US_37,123,934_B1 US_37,123,935_B1 US_37,123,936_B1 US_37,123,937_B1 US_37,123,938_B1 US_37,123,939_B1 US_37,123,940_B1 US_37,123,941_B1 US_37,123,942_B1 US_37,123,943_B1 US_37,123,944_B1 US_37,123,945_B1 US_37,123,946_B1 US_37,123,947_B1 US_37,123,948_B1 US_37,123,949_B1 US_37,123,950_B1 |
gptkbp:patentFamily |
US_37,123,901_B1,_US_37,123,900_B1
|
gptkbp:patentType |
Utility Patent
|
gptkbp:priorityDate |
2015-05-10
|
gptkbp:relatedTo |
US_37,123,900_B1
|
gptkbp:status |
Active
|
gptkbp:subclass |
H04L 9/00
|
gptkbp:title |
Method for Enhancing Data Security
|