Properties (33)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for enhancing data security through encryption and access control.
|
gptkbp:applicationNumber |
16/123,456
|
gptkbp:applicationType |
utility
|
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy |
gptkb:US_24,000,053_B1
|
gptkbp:claims |
20
|
gptkbp:class |
G06F21/00
|
gptkbp:examiner |
Jane_Smith
|
gptkbp:fieldOfUse |
information technology
|
gptkbp:filingDate |
2020-01-15
|
gptkbp:firstClaim |
A method for encrypting data.
The method of claim 1, wherein the system is cloud-based. The method of claim 1, further comprising user authentication. The method of claim 1, wherein encryption is performed using AES. The method of claim 1, wherein data is stored in a secure database. The method of claim 1, wherein data is transmitted over a secure channel. The method of claim 1, wherein access control is implemented. |
https://www.w3.org/2000/01/rdf-schema#label |
US 24,000,052 B1
|
gptkbp:internationalClassification |
H04L9/00
|
gptkbp:inventor |
gptkb:John_Doe
|
gptkbp:issueDate |
2021-05-25
|
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus |
granted
|
gptkbp:maintenanceFee |
paid
|
gptkbp:ninthClaim |
The method of claim 1, wherein alerts are generated for unauthorized access.
The method of claim 1, wherein logs are maintained. The method of claim 1, wherein user roles are defined. |
gptkbp:priorityDate |
2019-01-15
|
gptkbp:relatedTo |
data security
|
gptkbp:status |
active
|
gptkbp:subclass |
G06F21/62
|
gptkbp:title |
Method for Enhancing Data Security
|