Statements (38)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for enhancing data security using encryption techniques.
|
gptkbp:applicationNumber |
16/123,456
|
gptkbp:applicationType |
Utility
|
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy |
gptkb:US_061,098,794_B2
|
gptkbp:claims |
10
|
gptkbp:class |
G06F21/00
|
gptkbp:coInventor |
gptkb:Alice_Johnson
|
gptkbp:examiner |
Jane_Smith
|
gptkbp:fieldOfInvention |
Data Security
|
gptkbp:filingDate |
2018-09-15
|
gptkbp:filingLocation |
gptkb:USPTO
|
gptkbp:firstClaim |
The method of claim 1, wherein the data is encrypted.
The method of claim 1, wherein the data is stored in a cloud. The method of claim 1, wherein the data is transmitted over a network. The method of claim 1, wherein the encryption is symmetric. The method of claim 1, further including a verification step. A method for securing data. The method of claim 1, wherein the encryption key is generated dynamically. |
gptkbp:grantDate |
2020-04-07
|
https://www.w3.org/2000/01/rdf-schema#label |
US 061,098,793 B2
|
gptkbp:internationalClassification |
H04L9/00
|
gptkbp:inventor |
gptkb:John_Doe
|
gptkbp:issuedBy |
2020-04-07
|
gptkbp:issueFeePaid |
Yes
|
gptkbp:legalStatus |
Granted
|
gptkbp:maintenanceFee |
Paid
|
gptkbp:ninthClaim |
The method of claim 1, wherein the user is authenticated.
The method of claim 1, wherein the data is decrypted upon access. The method of claim 1, wherein the system logs access attempts. |
gptkbp:patentFamily |
US_061,098,793_B2,_US_061,098,794_B2
|
gptkbp:patentType |
B2
|
gptkbp:priorityDate |
2017-09-15
|
gptkbp:relatedTo |
gptkb:US_061,098,795_B2
|
gptkbp:status |
Active
|
gptkbp:subclass |
G06F21/62
|
gptkbp:title |
Method for Enhancing Data Security
|