Properties (35)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for enhancing data security through encryption and access control.
|
gptkbp:applicationNumber |
15/123,456
|
gptkbp:applicationType |
Non-Provisional
|
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy |
gptkb:US_093,456,789_B2
|
gptkbp:claims |
20
|
gptkbp:class |
G06F21/00
|
gptkbp:examiner |
Jane_Smith
|
gptkbp:expirationDate |
2036-05-10
|
gptkbp:fieldOfInvention |
Data Security
|
gptkbp:filingDate |
2016-05-10
|
gptkbp:firstClaim |
The method of claim 1, wherein the data is stored in a cloud.
A method for encrypting data. The method of claim 1, wherein the encryption key is rotated. The method of claim 1, wherein the data is transmitted over a secure channel. The method of claim 1, wherein the access control is role-based. The method of claim 1, wherein the encryption is AES. The method of claim 1, further comprising access control. |
https://www.w3.org/2000/01/rdf-schema#label |
US 092,567,890 B2
|
gptkbp:internationalClassification |
H04L9/00
|
gptkbp:inventor |
gptkb:John_Doe
|
gptkbp:issueDate |
2021-03-02
|
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus |
Granted
|
gptkbp:maintenanceFee |
Paid
|
gptkbp:ninthClaim |
The method of claim 1, wherein the data is decrypted upon access.
The method of claim 1, wherein the system logs access attempts. The method of claim 1, wherein the user authentication is multi-factor. |
gptkbp:patentType |
Utility Patent
|
gptkbp:priorityDate |
2015-05-10
|
gptkbp:relatedTo |
gptkb:US_091,234,567_B2
|
gptkbp:status |
Active
|
gptkbp:subclass |
G06F21/62
|
gptkbp:title |
Method for Enhancing Data Security
|