gptkbp:instanceOf
|
patent
|
gptkbp:abstract
|
A method for enhancing data security through encryption and access control.
|
gptkbp:applicationNumber
|
14/123,456
|
gptkbp:applicationType
|
Utility
|
gptkbp:assignee
|
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy
|
gptkb:US_44,654,324_B1
|
gptkbp:claims
|
20
|
gptkbp:class
|
G06F21/00
|
gptkbp:coInventor
|
gptkb:Alice_Johnson
|
gptkbp:examiner
|
Jane_Smith
|
gptkbp:fieldOfInvention
|
Data Security
|
gptkbp:filedWith
|
gptkb:USPTO
|
gptkbp:filingDate
|
June 15, 2015
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 44,654,323 B1
|
gptkbp:internationalClassification
|
H04L9/00
|
gptkbp:inventor
|
gptkb:John_Doe
|
gptkbp:issueDate
|
March 10, 2021
|
gptkbp:issuedBy
|
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus
|
Granted
|
gptkbp:maintenanceFee
|
Paid
|
gptkbp:patentCitation
|
gptkb:US_44,654,341_B1
gptkb:US_44,654,352_B1
gptkb:US_44,654,360_B1
gptkb:US_44,654,357_B1
gptkb:US_44,654,333_B1
gptkb:US_44,654,334_B1
gptkb:US_44,654,359_B1
gptkb:US_44,654,330_B1
gptkb:US_44,654,335_B1
gptkb:US_44,654,355_B1
gptkb:US_44,654,353_B1
gptkb:US_44,654,342_B1
gptkb:US_44,654,345_B1
gptkb:US_44,654,322_B1
gptkb:US_44,654,337_B1
gptkb:US_44,654,331_B1
gptkb:US_44,654,326_B1
gptkb:US_44,654,327_B1
gptkb:US_44,654,350_B1
gptkb:US_44,654,351_B1
gptkb:US_44,654,348_B1
gptkb:US_44,654,329_B1
gptkb:US_44,654,343_B1
gptkb:US_44,654,356_B1
gptkb:US_44,654,328_B1
gptkb:US_44,654,346_B1
gptkb:US_44,654,324_B1
gptkb:US_44,654,344_B1
gptkb:US_44,654,338_B1
gptkb:US_44,654,332_B1
gptkb:US_44,654,347_B1
gptkb:US_44,654,349_B1
gptkb:US_44,654,340_B1
gptkb:US_44,654,339_B1
gptkb:US_44,654,325_B1
gptkb:US_44,654,336_B1
gptkb:US_44,654,354_B1
US_44,654,358_B1
|
gptkbp:patentFamily
|
US_44,654,323
|
gptkbp:patentType
|
B1
|
gptkbp:priorityDate
|
June 15, 2014
|
gptkbp:relatedTo
|
gptkb:US_44,654,322_B1
|
gptkbp:status
|
Active
|
gptkbp:subclass
|
G06F21/62
|
gptkbp:title
|
Method for Enhancing Data Security
|