Properties (40)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for securely transmitting data over a network.
|
gptkbp:applicationNumber |
14/123,456
|
gptkbp:applicationType |
utility
|
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy |
gptkb:US_61,234,567_B2
gptkb:US_60,123,456_B1 |
gptkbp:claims |
20
|
gptkbp:classification |
H04L 29/08
|
gptkbp:documentType |
granted patent
|
gptkbp:examiner |
Jane_Smith
|
gptkbp:fieldOfInvention |
computer science
|
gptkbp:filingDate |
2015-06-15
|
gptkbp:firstClaim |
A method for encrypting data.
The method of claim 1, wherein the data is stored in a cloud environment. The method of claim 1, further comprising a step of data integrity verification. The method of claim 1, wherein the encryption key is dynamically generated. The method of claim 1, wherein the encryption is performed using AES. The method of claim 1, wherein the data is transmitted over a wireless network. The method of claim 1, wherein the data is compressed before encryption. |
gptkbp:hasFieldOfUse |
telecommunications
|
https://www.w3.org/2000/01/rdf-schema#label |
US 55,432,131 B2
|
gptkbp:inventor |
gptkb:Alice_Johnson
gptkb:John_Doe |
gptkbp:issueDate |
2016-09-27
|
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:language |
English
|
gptkbp:legalStatus |
patent granted
|
gptkbp:location |
gptkb:United_States
|
gptkbp:maintenanceFee |
paid
|
gptkbp:ninthClaim |
The method of claim 1, wherein the transmission is monitored for security breaches.
The method of claim 1, wherein the user is authenticated before data transmission. The method of claim 1, wherein the data is logged for auditing purposes. |
gptkbp:patentFamily |
US_55,432,131_B2,_EP_1234567,_WO_2015/123456
|
gptkbp:patentInventor |
20 years
|
gptkbp:priorityDate |
2014-06-15
|
gptkbp:relatedTo |
data security
|
gptkbp:status |
active
|
gptkbp:technology |
encryption
|
gptkbp:title |
Method for secure data transmission
|