Properties (44)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for enhancing data security through encryption and access control.
|
gptkbp:applicationNumber |
15/623,456
|
gptkbp:applicationType |
Utility
|
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy |
gptkb:US_48,123,456_B2
|
gptkbp:claims |
20
|
gptkbp:class |
H04L
|
gptkbp:examiner |
gptkb:Michael_Johnson
|
gptkbp:fieldOfInvention |
Data Security
|
gptkbp:filedIn |
gptkb:United_States
|
gptkbp:filingDate |
2017-05-15
|
gptkbp:firstClaim |
A method for encrypting data.
A system for implementing the method. A method for auditing access to data. A method for controlling access to encrypted data. A method for generating encryption keys. A user interface for managing data security. A computer program product for executing the method. |
gptkbp:grantType |
B1
|
https://www.w3.org/2000/01/rdf-schema#label |
US 47,890,262 B1
|
gptkbp:internationalClassification |
G06F 21/00
|
gptkbp:inventiveStep |
Yes
|
gptkbp:inventor |
gptkb:John_Doe
Jane_Smith |
gptkbp:issueDate |
2019-01-15
|
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus |
Granted
|
gptkbp:maintenanceFee |
Required
|
gptkbp:ninthClaim |
A method for logging access attempts.
A method for notifying users of access. A method for revoking access. |
gptkbp:nonPatentCitation |
IEEE Security Journal
|
gptkbp:novelty |
Yes
|
gptkbp:patentCitation |
US_45,678,901_B1
|
gptkbp:patentFamily |
US_47,890,262_B1,_US_48,123,456_B2
|
gptkbp:patentInventor |
20 years
|
gptkbp:patentNumber |
47,890,262
|
gptkbp:priorityDate |
2016-05-15
|
gptkbp:relatedTo |
gptkb:US_47,890,261_B1
|
gptkbp:status |
Active
|
gptkbp:subclass |
H04L 9/00
|
gptkbp:technologyDomain |
Information Technology
|
gptkbp:title |
Method for Enhancing Data Security
|