US 55,432,131 B2

GPTKB entity

Properties (40)
Predicate Object
gptkbp:instanceOf patent
gptkbp:abstract A method for securely transmitting data over a network.
gptkbp:applicationNumber 14/123,456
gptkbp:applicationType utility
gptkbp:assignee gptkb:Tech_Innovations_LLC
gptkbp:citedBy gptkb:US_61,234,567_B2
gptkb:US_60,123,456_B1
gptkbp:claims 20
gptkbp:classification H04L 29/08
gptkbp:documentType granted patent
gptkbp:examiner Jane_Smith
gptkbp:fieldOfInvention computer science
gptkbp:filingDate 2015-06-15
gptkbp:firstClaim A method for encrypting data.
The method of claim 1, wherein the data is stored in a cloud environment.
The method of claim 1, further comprising a step of data integrity verification.
The method of claim 1, wherein the encryption key is dynamically generated.
The method of claim 1, wherein the encryption is performed using AES.
The method of claim 1, wherein the data is transmitted over a wireless network.
The method of claim 1, wherein the data is compressed before encryption.
gptkbp:hasFieldOfUse telecommunications
https://www.w3.org/2000/01/rdf-schema#label US 55,432,131 B2
gptkbp:inventor gptkb:Alice_Johnson
gptkb:John_Doe
gptkbp:issueDate 2016-09-27
gptkbp:issuedBy gptkb:United_States_Patent_and_Trademark_Office
gptkbp:language English
gptkbp:legalStatus patent granted
gptkbp:location gptkb:United_States
gptkbp:maintenanceFee paid
gptkbp:ninthClaim The method of claim 1, wherein the transmission is monitored for security breaches.
The method of claim 1, wherein the user is authenticated before data transmission.
The method of claim 1, wherein the data is logged for auditing purposes.
gptkbp:patentFamily US_55,432,131_B2,_EP_1234567,_WO_2015/123456
gptkbp:patentInventor 20 years
gptkbp:priorityDate 2014-06-15
gptkbp:relatedTo data security
gptkbp:status active
gptkbp:technology encryption
gptkbp:title Method for secure data transmission