Properties (32)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for securely transmitting data over a network.
|
gptkbp:applicationNumber |
15/123,456
|
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy |
gptkb:US_52,123,456_B2
|
gptkbp:claims |
20
|
gptkbp:classification |
H04L
|
gptkbp:examiner |
Jane_Smith
|
gptkbp:fieldOfInvention |
computer science
|
gptkbp:filingDate |
2016-05-12
|
gptkbp:firstClaim |
A method for encrypting data.
The method of claim 1, wherein the data is transmitted in real-time. The method of claim 1, wherein the data is stored in a cloud environment. The method of claim 1, further comprising a step of data integrity verification. The method of claim 1, wherein the encryption is performed using AES. The method of claim 1, wherein the data is accessed by multiple users. The method of claim 1, wherein the data is transmitted over a wireless network. |
https://www.w3.org/2000/01/rdf-schema#label |
US 51,345,681 B2
|
gptkbp:internationalClassification |
G06F
|
gptkbp:inventor |
gptkb:John_Doe
|
gptkbp:issueDate |
2016-05-31
|
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus |
granted
|
gptkbp:maintenanceFee |
paid
|
gptkbp:ninthClaim |
The method of claim 1, wherein the encryption key is dynamically generated.
The method of claim 1, wherein the data is compressed before transmission. The method of claim 1, wherein the transmission is monitored for anomalies. |
gptkbp:patentType |
utility
|
gptkbp:priorityDate |
2015-05-12
|
gptkbp:relatedTo |
data security
|
gptkbp:status |
active
|
gptkbp:title |
Method for secure data transmission
|