Properties (39)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for enhancing data security using advanced encryption techniques.
|
gptkbp:applicationNumber |
21/999,972
|
gptkbp:applicationPublicationNumber |
US 2021/0270001 A1
|
gptkbp:applicationType |
Utility
|
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy |
gptkb:US_22,000,001_B1
|
gptkbp:claims |
20
|
gptkbp:coInventor |
Jane_Smith
|
gptkbp:examiner |
gptkb:Michael_Johnson
No objections raised. |
gptkbp:fieldOfInvention |
Cybersecurity
|
gptkbp:filingDate |
2021-09-15
|
gptkbp:firstClaim |
The method of claim 1, wherein the data is stored in a cloud.
A method for encrypting data. The method of claim 1, further including a decryption step. The method of claim 1, wherein the data is transmitted over a network. The method of claim 1, wherein the encryption is performed in real-time. The method of claim 1, wherein the encryption uses a symmetric key. The method of claim 1, wherein the encryption uses an asymmetric key. |
https://www.w3.org/2000/01/rdf-schema#label |
US 21,999,972 B1
|
gptkbp:internationalClassification |
H04L 9/00
|
gptkbp:inventor |
gptkb:John_Doe
|
gptkbp:issueDate |
2022-03-01
|
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus |
Active
|
gptkbp:maintenanceFee |
Paid
|
gptkbp:ninthClaim |
The method of claim 1, wherein the encryption is compliant with industry standards.
The method of claim 1, wherein the system includes a user interface. The method of claim 1, wherein the data is accessed by authorized users. |
gptkbp:patentFamily |
US,_EP,_JP
|
gptkbp:patentInventor |
20 years
|
gptkbp:patentType |
Granted Patent
|
gptkbp:priorityDate |
2020-09-15
|
gptkbp:publicationDate |
2022-03-01
|
gptkbp:relatedTo |
gptkb:US_21,999,971_B1
|
gptkbp:status |
Granted
|
gptkbp:technologyDomain |
Information Technology
|
gptkbp:title |
Method for Enhancing Data Security
|