gptkbp:instanceOf
|
patent
|
gptkbp:abstract
|
A method for enhancing data security through encryption and access control.
|
gptkbp:applicationNumber
|
15/123,456
|
gptkbp:applicationType
|
Utility
|
gptkbp:assignee
|
gptkb:Data_Secure_Inc.
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy
|
US_51,345,722_B1
|
gptkbp:claims
|
20
|
gptkbp:classification
|
H04L9/00
|
gptkbp:examiner
|
Jane_Smith
|
gptkbp:fieldOfInvention
|
Data Security
|
gptkbp:filingDate
|
2016-05-12
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 51,345,721 B1
|
gptkbp:internationalClassification
|
G06F21/00
|
gptkbp:inventor
|
gptkb:Alice_Johnson
gptkb:John_Doe
|
gptkbp:issueDate
|
2016-10-18
|
gptkbp:issuedBy
|
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalEvent
|
Patent granted
|
gptkbp:location
|
gptkb:United_States
|
gptkbp:maintenanceFee
|
Due
|
gptkbp:patentCitation
|
gptkb:US_51,345,743_B1
gptkb:US_51,345,744_B1
gptkb:US_51,345,739_B1
gptkb:US_51,345,725_B1
gptkb:US_51,345,740_B1
gptkb:US_51,345,731_B1
gptkb:US_51,345,733_B1
gptkb:US_51,345,738_B1
gptkb:US_51,345,727_B1
gptkb:US_51,345,732_B1
gptkb:US_51,345,735_B1
gptkb:US_51,345,741_B1
gptkb:US_51,345,745_B1
gptkb:US_51,345,736_B1
gptkb:US_51,345,734_B1
gptkb:US_51,345,748_B1
gptkb:US_51,345,746_B1
gptkb:US_51,345,737_B1
gptkb:US_51,345,750_B1
gptkb:US_51,345,730_B1
gptkb:US_51,345,747_B1
gptkb:US_51,345,724_B1
gptkb:US_51,345,729_B1
gptkb:US_51,345,749_B1
gptkb:US_51,345,742_B1
gptkb:US_51,345,726_B1
US_51,345,720_B1
US_51,345,722_B1
US_51,345,723_B1
US_51,345,728_B1
|
gptkbp:patentFamily
|
US_51,345,721_B1_family
|
gptkbp:priorityDate
|
2015-05-12
|
gptkbp:relatedTo
|
US_51,345,720_B1
|
gptkbp:status
|
Active
|
gptkbp:title
|
Method for Enhancing Data Security
|