Properties (34)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for enhancing data security through encryption and access control.
|
gptkbp:applicationNumber |
16/123,456
|
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy |
gptkb:US_60,123,456_B2
|
gptkbp:claims |
20
|
gptkbp:class |
H04L
|
gptkbp:examinationType |
substantive examination
|
gptkbp:expirationDate |
2038-05-01
|
gptkbp:fieldOfUse |
data security
|
gptkbp:filingDate |
2018-05-01
|
gptkbp:firstClaim |
A method for encrypting data.
The method of claim 1, wherein the data is stored in a cloud environment. The method of claim 1, wherein the data is transmitted over a secure channel. The method of claim 1, wherein the encryption is performed using AES. The method of claim 1, wherein the user authentication is multi-factor. The method of claim 1, further comprising access control measures. The method of claim 1, wherein the encryption key is periodically changed. |
https://www.w3.org/2000/01/rdf-schema#label |
US 59,876,519 B1
|
gptkbp:internationalClassification |
G06F 21/00
|
gptkbp:inventor |
gptkb:John_Doe
|
gptkbp:issueDate |
2020-05-05
|
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus |
granted
|
gptkbp:maintenanceFee |
required
|
gptkbp:ninthClaim |
The method of claim 1, wherein the system is monitored for breaches.
The method of claim 1, wherein the access control is role-based. The method of claim 1, wherein the data is logged for auditing. |
gptkbp:patentType |
utility patent
|
gptkbp:priorityDate |
2017-05-01
|
gptkbp:relatedTo |
gptkb:US_59,876,518_B1
|
gptkbp:status |
active
|
gptkbp:subclass |
H04L 9/00
|
gptkbp:title |
Method for Enhancing Data Security
|