Properties (31)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for enhancing data security through encryption and access control.
|
gptkbp:applicationNumber |
16/123,456
|
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy |
gptkb:US_40,000,000_B2
|
gptkbp:claims |
20
|
gptkbp:classification |
H04L 9/00
|
gptkbp:examiner |
Jane_Smith
|
gptkbp:fieldOfInvention |
Data Security
|
gptkbp:filingDate |
2018-05-01
|
gptkbp:firstClaim |
The method of claim 1, wherein the data is stored in a cloud.
A method for encrypting data. The method of claim 1, wherein the user is authenticated. The method of claim 1, wherein the encryption is AES. The method of claim 1, further comprising access control. The method of claim 3, wherein access control is role-based. The method of claim 5, further comprising data backup. |
https://www.w3.org/2000/01/rdf-schema#label |
US 39,876,516 B1
|
gptkbp:internationalClassification |
G06F 21/00
|
gptkbp:inventor |
gptkb:John_Doe
|
gptkbp:issueDate |
2021-05-04
|
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus |
Granted
|
gptkbp:maintenanceFee |
Paid
|
gptkbp:ninthClaim |
The method of claim 1, wherein the system is scalable.
The method of claim 9, further comprising load balancing. The method of claim 7, wherein authentication is two-factor. |
gptkbp:priorityDate |
2017-05-01
|
gptkbp:relatedTo |
US_39,876,515_B1
|
gptkbp:status |
Active
|
gptkbp:title |
Method for Enhancing Data Security
|