gptkbp:instanceOf
|
patent
|
gptkbp:abstract
|
A method for enhancing data security through encryption and access control.
|
gptkbp:applicationNumber
|
15/123,456
|
gptkbp:applicationType
|
non-provisional
|
gptkbp:assignee
|
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy
|
gptkb:US_51,345,699_B1
|
gptkbp:claims
|
20
|
gptkbp:class
|
H04L
|
gptkbp:examiner
|
Jane_Smith
|
gptkbp:expirationDate
|
2036-06-15
|
gptkbp:fieldOfInvention
|
computer science
|
gptkbp:filingDate
|
2015-06-15
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 51,345,698 B1
|
gptkbp:internationalClassification
|
G06F21/00
|
gptkbp:inventor
|
gptkb:Alice_Johnson
gptkb:John_Doe
|
gptkbp:issueDate
|
2016-09-20
|
gptkbp:issuedBy
|
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus
|
granted
|
gptkbp:maintenanceFee
|
paid
|
gptkbp:patentCitation
|
gptkb:US_51,345,706_B1
gptkb:US_51,345,713_B1
gptkb:US_51,345,739_B1
gptkb:US_51,345,705_B1
gptkb:US_51,345,725_B1
gptkb:US_51,345,740_B1
gptkb:US_51,345,716_B1
gptkb:US_51,345,701_B1
gptkb:US_51,345,702_B1
gptkb:US_51,345,717_B1
gptkb:US_51,345,721_B1
gptkb:US_51,345,703_B1
gptkb:US_51,345,731_B1
gptkb:US_51,345,733_B1
gptkb:US_51,345,738_B1
gptkb:US_51,345,727_B1
gptkb:US_51,345,732_B1
gptkb:US_51,345,735_B1
gptkb:US_51,345,736_B1
gptkb:US_51,345,711_B1
gptkb:US_51,345,734_B1
gptkb:US_51,345,712_B1
gptkb:US_51,345,700_B1
gptkb:US_51,345,737_B1
gptkb:US_51,345,714_B1
gptkb:US_51,345,704_B1
gptkb:US_51,345,709_B1
gptkb:US_51,345,710_B1
gptkb:US_51,345,715_B1
gptkb:US_51,345,730_B1
gptkb:US_51,345,708_B1
gptkb:US_51,345,724_B1
gptkb:US_51,345,729_B1
gptkb:US_51,345,707_B1
gptkb:US_51,345,726_B1
US_51,345,718_B1
US_51,345,719_B1
US_51,345,720_B1
US_51,345,722_B1
US_51,345,723_B1
US_51,345,728_B1
|
gptkbp:patentFamily
|
US_51,345,698
|
gptkbp:patentType
|
utility
|
gptkbp:priorityDate
|
2014-06-15
|
gptkbp:relatedTo
|
data security
|
gptkbp:status
|
active
|
gptkbp:subclass
|
H04L9/00
|
gptkbp:technologyArea
|
cybersecurity
|
gptkbp:title
|
Method for Enhancing Data Security
|