Statements (33)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for securely transmitting data over a network.
|
gptkbp:applicationNumber |
14/123,456
|
gptkbp:applicationType |
non-provisional
|
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy |
gptkb:US_10,123,456_B2
|
gptkbp:claims |
20
|
gptkbp:classification |
H04L 12/28
|
gptkbp:examiner |
Jane_Smith
|
gptkbp:fieldOfInvention |
computer science
|
gptkbp:filingDate |
2015-06-01
|
gptkbp:firstClaim |
A method for encrypting data.
The method of claim 1, wherein the data is transmitted in real-time. The method of claim 1, further comprising a step of data integrity verification. The method of claim 1, wherein the encryption is performed using AES. The method of claim 1, wherein the data is transmitted over a wireless network. The method of claim 1, wherein the transmission is monitored for security breaches. The method of claim 1, wherein the data is compressed before transmission. |
https://www.w3.org/2000/01/rdf-schema#label |
US 52,345,726 B1
|
gptkbp:internationalClassification |
G06F 21/00
|
gptkbp:inventor |
gptkb:John_Doe
|
gptkbp:issueDate |
2016-08-02
|
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus |
granted
|
gptkbp:maintenanceFee |
paid
|
gptkbp:ninthClaim |
The method of claim 1, wherein the encryption key is dynamically generated.
The method of claim 1, wherein the data is stored in a secure database. The method of claim 1, wherein the user is authenticated before data transmission. |
gptkbp:patentType |
utility
|
gptkbp:priorityDate |
2014-06-01
|
gptkbp:relatedTo |
data security
|
gptkbp:status |
active
|
gptkbp:title |
Method for secure data transmission
|