Properties (33)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for enhancing data security through encryption and access control.
|
gptkbp:applicationNumber |
16/123,456
|
gptkbp:applicationType |
utility
|
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy |
US_35,000,000_B1
|
gptkbp:claims |
20
|
gptkbp:class |
G06F21/00
|
gptkbp:examiner |
Jane_Smith
|
gptkbp:fieldOfInvention |
computer science
|
gptkbp:filingDate |
2019-05-01
|
gptkbp:firstClaim |
A method for encrypting data.
The method of claim 1, further comprising access control. The method of claim 4, further comprising logging access attempts. The method of claim 3, wherein the access control is role-based. The method of claim 2, wherein the encryption is AES. The method of claim 6, further comprising alerting on unauthorized access. The method of claim 5, wherein the logging is stored in a secure database. |
https://www.w3.org/2000/01/rdf-schema#label |
US 34,987,655 B1
|
gptkbp:internationalClassification |
H04L9/00
|
gptkbp:inventor |
gptkb:John_Doe
|
gptkbp:issueDate |
2022-07-12
|
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus |
granted
|
gptkbp:maintenanceFee |
paid
|
gptkbp:ninthClaim |
The method of claim 8, further comprising user authentication.
The method of claim 9, wherein the authentication is two-factor. The method of claim 7, wherein the alert is sent via email. |
gptkbp:priorityDate |
2018-05-01
|
gptkbp:relatedTo |
data security
|
gptkbp:status |
active
|
gptkbp:subclass |
G06F21/62
|
gptkbp:title |
Method for Enhancing Data Security
|