gptkbp:instanceOf
|
patent
|
gptkbp:abstract
|
A method for enhancing data security through encryption and access control.
|
gptkbp:applicationNumber
|
16/123,456
|
gptkbp:applicationType
|
non-provisional
|
gptkbp:assignee
|
gptkb:New_York
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy
|
gptkb:US_68,123,456_B2
|
gptkbp:claims
|
10
|
gptkbp:class
|
G06F21/00
|
gptkbp:examinationType
|
substantive
|
gptkbp:examiner
|
Jane_Smith
|
gptkbp:fieldOfInvention
|
computer science
|
gptkbp:filingDate
|
2019-05-01
|
https://www.w3.org/2000/01/rdf-schema#label
|
US 67,654,424 B1
|
gptkbp:internationalClassification
|
H04L9/00
|
gptkbp:inventor
|
gptkb:Alice_Johnson
gptkb:John_Doe
|
gptkbp:inventorResidence
|
gptkb:California
|
gptkbp:issueDate
|
2020-02-23
|
gptkbp:issuedBy
|
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus
|
granted
|
gptkbp:maintenanceFee
|
paid
|
gptkbp:market
|
financial services
|
gptkbp:patentCitation
|
gptkb:US_34,321,098_B1
gptkb:US_51,098,765_B2
gptkb:US_65,432,109_B1
gptkb:US_31,098,765_B2
gptkb:US_38,765,432_B1
gptkb:US_42,109,876_B1
gptkb:US_48,765,432_B1
gptkb:US_33,210,987_B2
gptkb:US_37,654,321_B2
gptkb:US_39,876,543_B2
gptkb:US_41,098,765_B2
gptkb:US_43,210,987_B2
gptkb:US_45,432,109_B2
gptkb:US_47,654,321_B2
gptkb:US_49,876,543_B2
gptkb:US_57,654,321_B2
gptkb:US_59,876,543_B2
gptkb:US_44,321,098_B1
gptkb:US_55,432,109_B2
gptkb:US_61,098,765_B2
gptkb:US_54,321,098_B1
gptkb:US_40,987,654_B1
gptkb:US_35,432,109_B2
gptkb:US_63,210,987_B2
gptkb:US_66,543,210_B2
gptkb:US_53,210,987_B2
gptkb:US_60,987,654_B1
gptkb:US_36,543,210_B1
gptkb:US_56,543,210_B1
gptkb:US_32,109,876_B1
gptkb:US_58,765,432_B1
gptkb:US_30,987,654_B1
gptkb:US_64,321,098_B1
gptkb:US_46,543,210_B1
gptkb:US_52,109,876_B1
US 62,109,876 B1
US_50,987,654_B1
|
gptkbp:patentExpiration
|
2040-02-23
|
gptkbp:patentFamily
|
US_67,654,424_B1,_US_68,123,456_B2
|
gptkbp:patentLitigation
|
none
|
gptkbp:patentType
|
utility
|
gptkbp:priorityDate
|
2018-05-01
|
gptkbp:relatedPatent
|
gptkb:US_67,654,425_B1
|
gptkbp:relatedTo
|
data security
|
gptkbp:researchField
|
information technology
|
gptkbp:status
|
active
|
gptkbp:subclass
|
G06F21/62
|
gptkbp:technologyArea
|
cybersecurity
|
gptkbp:title
|
Method for Enhancing Data Security
|