Properties (35)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for enhancing data security through encryption and access control.
|
gptkbp:applicationNumber |
16/123,456
|
gptkbp:applicationType |
Non-Provisional
|
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy |
gptkb:US_44,567,890_B2
|
gptkbp:claims |
20
|
gptkbp:class |
H04L
|
gptkbp:examiner |
Jane_Smith
|
gptkbp:fieldOfInvention |
Data Security
|
gptkbp:filingDate |
2019-05-01
|
gptkbp:firstClaim |
The method of claim 1, wherein the data is stored in a cloud.
A method for encrypting data. The method of claim 1, wherein the access control is role-based. The method of claim 1, wherein the encryption is AES. The method of claim 1, further comprising access control. The method of claim 1, wherein the encryption key is rotated periodically. The method of claim 1, further comprising logging access attempts. |
https://www.w3.org/2000/01/rdf-schema#label |
US 44,123,468 B1
|
gptkbp:internationalClassification |
G06F 21/00
|
gptkbp:inventor |
gptkb:Alice_Johnson
gptkb:John_Doe |
gptkbp:issueDate |
2022-09-20
|
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus |
Granted
|
gptkbp:maintenanceFee |
Paid
|
gptkbp:ninthClaim |
The method of claim 1, wherein the user interface is user-friendly.
The method of claim 1, wherein the data is transmitted over a secure channel. The method of claim 1, wherein the system alerts on unauthorized access. |
gptkbp:patentType |
Utility Patent
|
gptkbp:priorityDate |
2018-05-01
|
gptkbp:relatedTo |
gptkb:US_44,123,467_B1
|
gptkbp:status |
Active
|
gptkbp:subclass |
H04L 9/00
|
gptkbp:title |
Method for Enhancing Data Security
|