gptkbp:instanceOf
|
patent
|
gptkbp:abstract
|
A method for enhancing data security using encryption techniques.
|
gptkbp:applicationNumber
|
16/123,456
|
gptkbp:applicationPublicationNumber
|
US 2019/0123456 A1
|
gptkbp:applicationType
|
Utility
|
gptkbp:assignee
|
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy
|
US_68,000,000_B1
|
gptkbp:claims
|
10
|
gptkbp:class
|
H04L
|
gptkbp:examiner
|
Jane_Smith
|
gptkbp:fieldOfInvention
|
Data Security
|
gptkbp:filedIn
|
gptkb:United_States
|
gptkbp:filingDate
|
2019-05-01
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 67,654,397 B1
|
gptkbp:internationalClassification
|
G06F 21/00
|
gptkbp:inventor
|
gptkb:Alice_Johnson
gptkb:John_Doe
|
gptkbp:inventorCountry
|
gptkb:USA
|
gptkbp:issueDate
|
2020-02-23
|
gptkbp:issuedBy
|
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus
|
Granted
|
gptkbp:patentCitation
|
gptkb:US_67,654,421_B1
gptkb:US_67,654,403_B1
gptkb:US_67,654,416_B1
gptkb:US_67,654,402_B1
gptkb:US_67,654,405_B1
gptkb:US_67,654,410_B1
gptkb:US_67,654,419_B1
gptkb:US_67,654,399_B1
gptkb:US_67,654,420_B1
gptkb:US_67,654,407_B1
gptkb:US_67,654,408_B1
gptkb:US_67,654,418_B1
gptkb:US_67,654,417_B1
gptkb:US_67,654,396_B1
gptkb:US_67,654,398_B1
gptkb:US_67,654,404_B1
gptkb:US_67,654,412_B1
gptkb:US_67,654,415_B1
gptkb:US_67,654,414_B1
gptkb:US_67,654,422_B1
gptkb:US_67,654,424_B1
gptkb:US_67,654,406_B1
gptkb:US_67,654,401_B1
gptkb:US_67,654,425_B1
gptkb:US_67,654,426_B1
gptkb:US_67,654,411_B1
gptkb:US_67,654,427_B1
gptkb:US_67,654,428_B1
gptkb:US_67,654,400_B1
gptkb:US_67,654,413_B1
gptkb:US_67,654,423_B1
gptkb:US_67,654,409_B1
gptkb:US_67,654,429_B1
US 67,654,430 B1
|
gptkbp:patentFamily
|
US_67,654,397_B1,_US_67,654,398_B1
|
gptkbp:patentLength
|
20 years
|
gptkbp:patentNumber
|
67,654,397
|
gptkbp:patentType
|
B1
|
gptkbp:priorityDate
|
2018-05-01
|
gptkbp:relatedTo
|
gptkb:US_67,654,396_B1
|
gptkbp:status
|
Active
|
gptkbp:subclass
|
H04L 9/00
|
gptkbp:technologyArea
|
Information Technology
|
gptkbp:title
|
Method for Enhancing Data Security
|