gptkbp:instanceOf
|
patent
|
gptkbp:abstract
|
A method for enhancing data security using advanced encryption techniques.
|
gptkbp:applicationNumber
|
16/123,456
|
gptkbp:applicationType
|
Utility
|
gptkbp:assignee
|
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy
|
gptkb:US_67,654,387_B1
|
gptkbp:claims
|
20
|
gptkbp:class
|
H04L
|
gptkbp:examiner
|
Jane_Smith
|
gptkbp:fieldOfInvention
|
Data Security
|
gptkbp:filedIn
|
gptkb:United_States
|
gptkbp:filingDate
|
2020-05-15
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 67,654,386 B1
|
gptkbp:internationalClassification
|
G06F 21/00
|
gptkbp:inventor
|
gptkb:Alice_Johnson
gptkb:John_Doe
|
gptkbp:issueDate
|
2023-02-14
|
gptkbp:issuedBy
|
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus
|
Granted
|
gptkbp:patentCitation
|
gptkb:US_67,654,403_B1
gptkb:US_67,654,416_B1
gptkb:US_67,654,402_B1
gptkb:US_67,654,405_B1
gptkb:US_67,654,410_B1
gptkb:US_67,654,419_B1
gptkb:US_67,654,385_B1
gptkb:US_67,654,392_B1
gptkb:US_67,654,399_B1
gptkb:US_67,654,420_B1
gptkb:US_67,654,407_B1
gptkb:US_67,654,395_B1
gptkb:US_67,654,408_B1
gptkb:US_67,654,418_B1
gptkb:US_67,654,390_B1
gptkb:US_67,654,417_B1
gptkb:US_67,654,387_B1
gptkb:US_67,654,396_B1
gptkb:US_67,654,398_B1
gptkb:US_67,654,404_B1
gptkb:US_67,654,412_B1
gptkb:US_67,654,415_B1
gptkb:US_67,654,414_B1
gptkb:US_67,654,397_B1
gptkb:US_67,654,388_B1
gptkb:US_67,654,406_B1
gptkb:US_67,654,401_B1
gptkb:US_67,654,393_B1
gptkb:US_67,654,411_B1
gptkb:US_67,654,391_B1
gptkb:US_67,654,400_B1
gptkb:US_67,654,413_B1
gptkb:US_67,654,409_B1
US_67,654,389_B1
US_67,654,394_B1
|
gptkbp:patentFamily
|
US_67,654,386_B1,_US_67,654,385_B1
|
gptkbp:priorityDate
|
2019-05-15
|
gptkbp:relatedTo
|
gptkb:US_67,654,385_B1
|
gptkbp:status
|
Active
|
gptkbp:subclass
|
H04L 9/00
|
gptkbp:technologyArea
|
Information Technology
|
gptkbp:title
|
Method for Enhancing Data Security
|