gptkbp:instanceOf
|
patent
|
gptkbp:abstract
|
A method for enhancing data security through encryption and access control.
|
gptkbp:applicationNumber
|
US_16/123,456
|
gptkbp:applicationType
|
utility
|
gptkbp:assignee
|
gptkb:Innovative_Technologies_Inc.
|
gptkbp:citedBy
|
gptkb:US_400,123,479_B1
|
gptkbp:claims
|
20
|
gptkbp:examiner
|
Jane_Smith
|
gptkbp:fieldOfInvention
|
Data Security
|
gptkbp:figure
|
Flowchart of the encryption process.
System architecture.
User interface for data security.
Example of data encryption.
Diagram_of_access_control_mechanism.
|
gptkbp:filingDate
|
2021-01-10
|
gptkbp:firstClaim
|
A method for encrypting data.
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 400,123,478 B1
|
gptkbp:internationalClassification
|
G06F21/00
|
gptkbp:inventor
|
gptkb:Alice_Johnson
gptkb:John_Doe
|
gptkbp:issuedBy
|
2022-05-10
|
gptkbp:issueFeePaid
|
true
|
gptkbp:legalStatus
|
granted
|
gptkbp:maintenanceFee
|
paid
|
gptkbp:numberOfFigures
|
5
|
gptkbp:patentCitation
|
gptkb:US_400,123,489_B1
gptkb:US_400,123,481_B1
gptkb:US_400,123,492_B1
gptkb:US_400,123,482_B1
gptkb:US_400,123,476_B1
gptkb:US_400,123,486_B1
gptkb:US_400,123,493_B1
gptkb:US_400,123,483_B1
gptkb:US_400,123,491_B1
gptkb:US_400,123,495_B1
gptkb:US_400,123,485_B1
gptkb:US_400,123,488_B1
gptkb:US_400,123,477_B1
gptkb:US_400,123,497_B1
gptkb:US_400,123,496_B1
gptkb:US_400,123,480_B1
gptkb:US_400,123,494_B1
gptkb:US_400,123,484_B1
gptkb:US_400,123,490_B1
gptkb:US_400,123,498_B1
gptkb:US_400,123,487_B1
gptkb:US_400,123,499_B1
|
gptkbp:patentFamily
|
US_400,123,478
|
gptkbp:priorityDate
|
2020-11-15
|
gptkbp:publicationDate
|
2022-05-10
|
gptkbp:relatedTo
|
gptkb:US_400,123,477_B1
|
gptkbp:status
|
active
|
gptkbp:title
|
Method for Enhancing Data Security
|