gptkbp:instanceOf
|
patent
|
gptkbp:abstract
|
A method for enhancing data security using advanced encryption techniques.
|
gptkbp:applicationNumber
|
16/123,456
|
gptkbp:applicationType
|
Non-Provisional
|
gptkbp:assignee
|
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy
|
gptkb:US_68,123,456_B2
|
gptkbp:claims
|
20
|
gptkbp:class
|
H04L
|
gptkbp:coInventor
|
gptkb:Alice_Johnson
|
gptkbp:examiner
|
Jane_Smith
|
gptkbp:fieldOfInvention
|
Data Security
|
gptkbp:filedIn
|
gptkb:United_States
|
gptkbp:filingDate
|
2020-05-01
|
gptkbp:firstClaim
|
A method for encrypting data.
A method for decrypting data.
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 67,654,385 B1
|
gptkbp:internationalClassification
|
G06F 21/00
|
gptkbp:inventor
|
gptkb:John_Doe
|
gptkbp:issueDate
|
2023-02-14
|
gptkbp:issuedBy
|
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus
|
Granted
|
gptkbp:maintenanceFee
|
2025-02-14
|
gptkbp:patentCitation
|
gptkb:US_65,432,109_B1
gptkb:US_68,765,432_B2
gptkb:US_75,678,901_B1
gptkb:US_89,012,345_B1
gptkb:US_70,123,456_B2
gptkb:US_82,345,678_B2
gptkb:US_69,876,543_B1
gptkb:US_71,234,567_B1
gptkb:US_77,890,123_B1
gptkb:US_90,123,456_B2
gptkb:US_96,789,012_B2
gptkb:US_97,890,123_B1
gptkb:US_99,012,345_B1
gptkb:US_83,456,789_B1
gptkb:US_66,543,210_B2
gptkb:US_74,567,890_B2
gptkb:US_76,789,012_B2
gptkb:US_92,345,678_B2
gptkb:US_87,890,123_B1
gptkb:US_84,567,890_B2
gptkb:US_94,567,890_B2
gptkb:US_93,456,789_B1
gptkb:US_85,678,901_B1
gptkb:US_86,789,012_B2
gptkb:US_91,234,567_B1
gptkb:US_81,234,567_B1
gptkb:US_95,678,901_B1
gptkb:US_67,890,123_B1
gptkb:US_79,012,345_B1
gptkb:US_73,456,789_B1
US 78,901,234 B2
US 88,901,234 B2
US 98,901,234 B2
US_80,123,456_B2
US_72,345,678_B2
|
gptkbp:patentFamily
|
US_67,654,385_B1,_US_67,654,384_B1
|
gptkbp:patentType
|
Utility Patent
|
gptkbp:priorityDate
|
2019-05-01
|
gptkbp:relatedTo
|
gptkb:US_67,654,384_B1
|
gptkbp:status
|
Active
|
gptkbp:subclass
|
H04L 9/00
|
gptkbp:title
|
Method for Enhancing Data Security
|