gptkbp:instanceOf
|
patent
|
gptkbp:abstract
|
A method for enhancing data security using encryption techniques.
|
gptkbp:applicationNumber
|
15/123,456
|
gptkbp:applicationType
|
non-provisional
|
gptkbp:assignee
|
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy
|
US_51,000,000_B2
|
gptkbp:claims
|
10
|
gptkbp:class
|
G06F21/00
|
gptkbp:contains
|
detailed description
abstract section
background section
claims section
summary section
|
gptkbp:examiner
|
Jane_Smith
|
gptkbp:fieldOfInvention
|
computer science
|
gptkbp:filedIn
|
gptkb:United_States
|
gptkbp:filingDate
|
2016-05-12
|
gptkbp:hasFigures
|
Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
|
gptkbp:hasPrograms
|
Flowchart of the method
|
gptkbp:hasPublications
|
gptkb:US_2016/0123457_A1
gptkb:US_2016/0123456_A1
gptkb:US_2016/0123459_A1
gptkb:US_2016/0123458_A1
US_2016/0123460_A1
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 51,345,736 B1
|
gptkbp:internationalClassification
|
H04L9/00
|
gptkbp:inventor
|
gptkb:Alice_Johnson
gptkb:John_Doe
|
gptkbp:isCitedBy
|
gptkb:US_51,000,004_B2
gptkb:US_51,000,003_B2
gptkb:US_51,000,002_B2
gptkb:US_51,000,005_B2
US_51,000,001_B2
|
gptkbp:isPartOf
|
patent_portfolio_of_Tech_Innovations_LLC
|
gptkbp:isRelatedTo
|
cybersecurity
|
gptkbp:issueDate
|
2016-10-18
|
gptkbp:issuedBy
|
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus
|
granted
|
gptkbp:patentFamily
|
US_51,345,736_B1,_US_51,345,737_B1
|
gptkbp:patentType
|
utility
|
gptkbp:priorityDate
|
2015-05-12
|
gptkbp:relatedTo
|
data security
|
gptkbp:status
|
active
|
gptkbp:subclass
|
G06F21/62
|
gptkbp:title
|
Method for Enhancing Data Security
|