Properties (48)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for enhancing data security using advanced encryption techniques.
|
gptkbp:applicationNumber |
20,210,124
|
gptkbp:applicationType |
utility
|
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy |
gptkb:US_20,210,125_A1
|
gptkbp:claims |
20
|
gptkbp:coInventor |
Jane_Smith
|
gptkbp:description |
This patent describes a method for enhancing data security.
|
gptkbp:examiner |
gptkb:Michael_Johnson
|
gptkbp:fieldOfTechnology |
Information Technology
|
gptkbp:filingDate |
2021-03-15
|
gptkbp:filingLocation |
gptkb:Washington,_D.C.
|
gptkbp:firstClaim |
A method for encrypting data.
A method for data integrity verification. A method for decrypting data. A method for user authentication. A system for managing encryption keys. A method for access control. A method for secure data transmission. |
https://www.w3.org/2000/01/rdf-schema#label |
US 20,210,124 A1
|
gptkbp:internationalClassification |
G06F21/00
|
gptkbp:inventiveStep |
Yes
|
gptkbp:inventor |
gptkb:John_Doe
|
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus |
active
|
gptkbp:ninthClaim |
A method for data recovery.
A method for data classification. A method for network security. A method for compliance monitoring. A method for incident reporting. A method for incident response. A method for risk assessment. A method for security audits. A method for security policy enforcement. A method for security training. A method for threat detection. A method for data loss prevention. A method for vulnerability management. |
gptkbp:novelty |
Yes
|
gptkbp:patentFamily |
US_20,210,124_A1,_US_20,210,125_A1
|
gptkbp:patentType |
A1
|
gptkbp:priorityDate |
2020-03-15
|
gptkbp:publicationDate |
2021-07-01
|
gptkbp:relatedTo |
gptkb:US_20,210,123_A1
|
gptkbp:status |
granted
|
gptkbp:technicalField |
Cybersecurity
|
gptkbp:title |
Method for Enhancing Data Security
|