gptkbp:instanceOf
|
patent
|
gptkbp:abstract
|
A method for enhancing data security through encryption and access control.
|
gptkbp:applicationNumber
|
15/123,456
|
gptkbp:applicationStatus
|
Granted
|
gptkbp:applicationType
|
Utility
|
gptkbp:assignee
|
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy
|
gptkb:US_51,234,571_B1
|
gptkbp:claims
|
20
|
gptkbp:classification
|
H04L9/00
|
gptkbp:examiner
|
Jane_Smith
|
gptkbp:expirationDate
|
2036-12-20
|
gptkbp:fieldOfInvention
|
Data Security
|
gptkbp:fieldOfUse
|
Cybersecurity
|
gptkbp:filingDate
|
2016-05-12
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 51,234,570 B1
|
gptkbp:inventor
|
gptkb:Alice_Johnson
gptkb:Bob_Brown
gptkb:John_Doe
|
gptkbp:issueDate
|
2016-12-20
|
gptkbp:issuedBy
|
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalEvent
|
Maintenance Fee Paid
|
gptkbp:location
|
gptkb:United_States
|
gptkbp:patentCitation
|
gptkb:US_51,234,600_B1
gptkb:US_51,234,592_B1
gptkb:US_51,234,584_B1
gptkb:US_51,234,573_B1
gptkb:US_51,234,587_B1
gptkb:US_51,234,578_B1
gptkb:US_51,234,594_B1
gptkb:US_51,234,589_B1
gptkb:US_51,234,574_B1
gptkb:US_51,234,597_B1
gptkb:US_51,234,582_B1
gptkb:US_51,234,569_B1
gptkb:US_51,234,575_B1
gptkb:US_51,234,598_B1
gptkb:US_51,234,591_B1
gptkb:US_51,234,586_B1
gptkb:US_51,234,599_B1
gptkb:US_51,234,595_B1
gptkb:US_51,234,590_B1
gptkb:US_51,234,580_B1
gptkb:US_51,234,572_B1
gptkb:US_51,234,593_B1
gptkb:US_51,234,579_B1
gptkb:US_51,234,576_B1
gptkb:US_51,234,585_B1
gptkb:US_51,234,577_B1
gptkb:US_51,234,571_B1
gptkb:US_51,234,583_B1
gptkb:US_51,234,581_B1
gptkb:US_51,234,596_B1
US_51,234,588_B1
|
gptkbp:patentFamily
|
US_51,234,570_B1_Family
|
gptkbp:patentNumber
|
51,234,570
|
gptkbp:patentType
|
Granted
|
gptkbp:priorityDate
|
2015-05-12
|
gptkbp:relatedPatent
|
gptkb:US_51,234,572_B1
|
gptkbp:relatedTo
|
gptkb:US_51,234,569_B1
|
gptkbp:status
|
Active
|
gptkbp:technologyArea
|
Information Technology
|
gptkbp:title
|
Method for Enhancing Data Security
|