gptkbp:instanceOf
|
patent
|
gptkbp:abstract
|
A method for enhancing data security through encryption and access control.
|
gptkbp:applicationNumber
|
16/123,456
|
gptkbp:applicationPublicationNumber
|
gptkb:US_2018/0123456_A1
|
gptkbp:applicationType
|
Utility
|
gptkbp:assignee
|
gptkb:New_York,_USA
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy
|
gptkb:US_60,123,456_B2
|
gptkbp:claims
|
20
|
gptkbp:class
|
G06F21/00
|
gptkbp:description
|
This patent describes a method for enhancing data security.
|
gptkbp:examiner
|
Jane_Smith
|
gptkbp:fieldOfInvention
|
Data Security
|
gptkbp:filingDate
|
2018-05-01
|
gptkbp:filingLocation
|
gptkb:Washington,_D.C.
|
gptkbp:firstClaim
|
A method for encrypting data.
A method for auditing access to data.
A method for controlling access to encrypted data.
A method for generating encryption keys.
A method for logging access attempts.
A method for revoking access to data.
A method for notifying users of access.
|
gptkbp:grantDate
|
2020-01-14
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 59,876,541 B1
|
gptkbp:internationalClassification
|
H04L9/00
|
gptkbp:inventor
|
gptkb:John_Doe
|
gptkbp:inventorResidence
|
gptkb:California,_USA
|
gptkbp:issueDate
|
2020-01-14
|
gptkbp:issuedBy
|
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus
|
Granted
|
gptkbp:maintenanceFee
|
Required
|
gptkbp:ninthClaim
|
A method for ensuring compliance with regulations.
A method for integrating with existing systems.
A method for providing user training.
|
gptkbp:nonPatentCitation
|
IEEE Paper on Data Security 2017
|
gptkbp:patentCitation
|
gptkb:US_58,765,432_B1
|
gptkbp:patentFamily
|
gptkb:US_59,876,540_B1
|
gptkbp:patentInventor
|
20 years
|
gptkbp:patentNumber
|
gptkb:US_59,876,541_B1
|
gptkbp:patentType
|
Utility Patent
|
gptkbp:priorityDate
|
2017-05-01
|
gptkbp:relatedApplication
|
US_16/123,457
|
gptkbp:relatedTo
|
gptkb:US_59,876,540_B1
|
gptkbp:status
|
Active
|
gptkbp:subclass
|
G06F21/62
|
gptkbp:title
|
Method for Enhancing Data Security
|