Properties (36)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for enhancing data security using encryption techniques.
|
gptkbp:applicationNumber |
16/123,456
|
gptkbp:applicationType |
Utility
|
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy |
US_23,456,789_B2
|
gptkbp:claims |
20
|
gptkbp:coInventor |
Jane_Smith
|
gptkbp:description |
This patent describes a method for enhancing data security.
|
gptkbp:examiner |
gptkb:Alice_Johnson
|
gptkbp:fieldOfInvention |
Data Security
|
gptkbp:filingDate |
2020-05-15
|
gptkbp:filingLocation |
gptkb:United_States
|
gptkbp:firstClaim |
A method for encrypting data.
The method of claim 1, wherein the data is stored in a cloud environment. The method of claim 1, further comprising a step of data integrity verification. The method of claim 1, wherein the encryption key is generated dynamically. The method of claim 1, wherein the data is transmitted over a secure channel. The method of claim 1, wherein the encryption is performed using AES. The method of claim 1, wherein user authentication is required. |
gptkbp:grantDate |
2022-08-30
|
https://www.w3.org/2000/01/rdf-schema#label |
US 23,890,202 B2
|
gptkbp:internationalClassification |
G06F21/00
|
gptkbp:inventor |
gptkb:John_Doe
|
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus |
Granted
|
gptkbp:maintenanceFee |
Required
|
gptkbp:ninthClaim |
The method of claim 1, wherein the system is implemented on a server.
The method of claim 1, wherein the data is accessed by authorized users only. The method of claim 1, wherein the encryption process is reversible. |
gptkbp:patentFamily |
US_23,890,202_B2,_US_23,890,201_B2
|
gptkbp:patentInventor |
20 years
|
gptkbp:priorityDate |
2019-05-15
|
gptkbp:relatedTo |
US_23,890,201_B2
|
gptkbp:status |
Active
|
gptkbp:title |
Method for Enhancing Data Security
|