gptkbp:instanceOf
|
patent
|
gptkbp:abstract
|
A method for enhancing data security through encryption and access control.
|
gptkbp:applicationNumber
|
US_15/123,456
|
gptkbp:applicationType
|
Utility
|
gptkbp:assignee
|
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy
|
gptkb:US_42,109,898_B1
|
gptkbp:claims
|
10
|
gptkbp:class
|
G06F21/00
|
gptkbp:examiner
|
Jane_Smith
|
gptkbp:fieldOfInvention
|
Data Security
|
gptkbp:filedWith
|
gptkb:USPTO
|
gptkbp:filingDate
|
2018-05-01
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 42,109,897 B1
|
gptkbp:internationalClassification
|
H04L9/00
|
gptkbp:inventor
|
gptkb:Alice_Johnson
gptkb:John_Doe
|
gptkbp:issueDate
|
2019-09-10
|
gptkbp:issuedBy
|
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus
|
Granted
|
gptkbp:patentCitation
|
gptkb:US_42,109,898_B1
gptkb:US_42,109,925_B1
gptkb:US_42,109,921_B1
gptkb:US_42,109,902_B1
gptkb:US_42,109,906_B1
gptkb:US_42,109,903_B1
gptkb:US_42,109,916_B1
gptkb:US_42,109,899_B1
gptkb:US_42,109,911_B1
gptkb:US_42,109,923_B1
gptkb:US_42,109,915_B1
gptkb:US_42,109,922_B1
gptkb:US_42,109,928_B1
gptkb:US_42,109,910_B1
gptkb:US_42,109,912_B1
gptkb:US_42,109,926_B1
gptkb:US_42,109,904_B1
gptkb:US_42,109,930_B1
gptkb:US_42,109,905_B1
gptkb:US_42,109,919_B1
gptkb:US_42,109,920_B1
gptkb:US_42,109,913_B1
gptkb:US_42,109,927_B1
gptkb:US_42,109,908_B1
gptkb:US_42,109,929_B1
gptkb:US_42,109,918_B1
gptkb:US_42,109,914_B1
gptkb:US_42,109,901_B1
gptkb:US_42,109,924_B1
gptkb:US_42,109,907_B1
gptkb:US_42,109,917_B1
US 42,109,909 B1
US_42,109,900_B1
|
gptkbp:patentFamily
|
US_42,109,897
|
gptkbp:patentType
|
B1
|
gptkbp:priorityDate
|
2017-05-01
|
gptkbp:relatedTo
|
US_42,109,896_B1
|
gptkbp:status
|
Active
|
gptkbp:subclass
|
G06F21/62
|
gptkbp:title
|
Method for Enhancing Data Security
|