Properties (34)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for enhancing data security through encryption and access control.
|
gptkbp:applicationNumber |
15/123,456
|
gptkbp:applicationType |
Non-Provisional
|
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy |
gptkb:US_300,123,438_B1
|
gptkbp:claims |
20
|
gptkbp:class |
G06F21/00
|
gptkbp:examiner |
Jane_Smith
|
gptkbp:fieldOfInvention |
Data Security
|
gptkbp:filingDate |
2015-06-01
|
gptkbp:firstClaim |
The method of claim 1, wherein the data is stored in a cloud.
A method for encrypting data. The method of claim 1, wherein the user is authenticated. The method of claim 1, wherein the encryption key is rotated. The method of claim 1, wherein the data is transmitted securely. The method of claim 1, wherein the encryption is AES. The method of claim 1, further including access control. |
https://www.w3.org/2000/01/rdf-schema#label |
US 300,123,437 B1
|
gptkbp:internationalClassification |
H04L9/00
|
gptkbp:inventor |
gptkb:John_Doe
|
gptkbp:issueDate |
2018-07-10
|
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus |
Granted
|
gptkbp:maintenanceFee |
Paid
|
gptkbp:ninthClaim |
The method of claim 1, wherein the data is logged.
The method of claim 1, wherein the access control is role-based. The method of claim 1, wherein the system is monitored. |
gptkbp:patentType |
Utility Patent
|
gptkbp:priorityDate |
2014-06-01
|
gptkbp:relatedTo |
gptkb:US_300,123,436_B1
|
gptkbp:status |
Active
|
gptkbp:subclass |
G06F21/62
|
gptkbp:title |
Method for Enhancing Data Security
|