Properties (32)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for enhancing data security using encryption techniques.
|
gptkbp:applicationNumber |
15/123,456
PCT/US2016/123456 |
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy |
gptkb:US_40,123,456_B2
|
gptkbp:claims |
10
|
gptkbp:classification |
H04L9/00
|
gptkbp:examiner |
Jane_Smith
|
gptkbp:fieldOfInvention |
Computer security
|
gptkbp:filingDate |
2017-05-15
|
gptkbp:firstClaim |
A method for encrypting data.
The method of claim 1, wherein the data is stored in a database. The method of claim 1, wherein the data is transmitted over a network. The method of claim 1, wherein the encryption is reversible. The method of claim 1, wherein the encryption key is generated dynamically. The method of claim 1, further comprising a step of key management. The method of claim 1, wherein the encryption is performed using AES. |
https://www.w3.org/2000/01/rdf-schema#label |
US 35,987,321 S1
|
gptkbp:inventor |
gptkb:John_Doe
|
gptkbp:issueDate |
2019-01-15
|
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus |
Granted
|
gptkbp:maintenanceFee |
2024-01-15
|
gptkbp:ninthClaim |
The method of claim 1, wherein the system is cloud-based.
The method of claim 1, wherein the data is sensitive information. The method of claim 1, wherein the encryption process is automated. |
gptkbp:priorityDate |
2016-05-15
|
gptkbp:publicationNumber |
gptkb:US_2017/0123456_A1
|
gptkbp:relatedTo |
data encryption
|
gptkbp:status |
Active
|
gptkbp:title |
Method for Enhancing Data Security
|