Properties (47)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for enhancing data security through encryption and access control.
|
gptkbp:applicationNumber |
14/123,456
|
gptkbp:applicationPublicationNumber |
gptkb:US_2015/0123456_A1
|
gptkbp:applicationType |
utility
|
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy |
gptkb:US_52,123,456_B2
|
gptkbp:claims |
10
|
gptkbp:class |
H04L
|
gptkbp:examiner |
Jane_Smith
|
gptkbp:fieldOfInvention |
computer security
|
gptkbp:filedIn |
gptkb:United_States
|
gptkbp:filingDate |
2015-06-30
|
https://www.w3.org/2000/01/rdf-schema#label |
US 51,345,744 B1
|
gptkbp:internationalClassification |
G06F21/00
|
gptkbp:inventor |
gptkb:Alice_Johnson
gptkb:John_Doe |
gptkbp:inventorCountry |
gptkb:USA
|
gptkbp:issueDate |
2016-05-31
|
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus |
granted
|
gptkbp:patentAbstract |
This patent describes a method for enhancing data security.
|
gptkbp:patentClaim |
1. A method for encrypting data.
3. A method for decrypting data. 2. A method for controlling access to encrypted data. 10. A method for updating encryption protocols. 4. A method for authenticating users. 5. A method for logging access attempts. 6. A method for generating encryption keys. 7. A method for revoking access. 8. A method for auditing access logs. 9. A method for notifying users of access. |
gptkbp:patentClassification |
H04L9/32
|
gptkbp:patentExpiration |
2036-06-30
|
gptkbp:patentFamily |
US_51,345,744_B1,_US_52,123,456_B2
|
gptkbp:patentField |
access control
data encryption |
gptkbp:patentLength |
20 years
|
gptkbp:patentNumber |
51,345,744
|
gptkbp:patentOwner |
gptkb:Tech_Innovations_LLC
|
gptkbp:patentType |
granted patent
|
gptkbp:priorityDate |
2014-06-30
|
gptkbp:relatedTo |
data security
|
gptkbp:status |
active
|
gptkbp:subclass |
H04L9/00
|
gptkbp:technologyArea |
information technology
|
gptkbp:title |
Method for Enhancing Data Security
|