Statements (89)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for securely transmitting data over a network.
|
gptkbp:applicationNumber |
10/123,456
|
gptkbp:applicationPublicationNumber |
2004-02-12
|
gptkbp:applicationType |
non-provisional
|
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy |
gptkb:US_7,123,456_B2
|
gptkbp:claims |
20
|
gptkbp:classification |
H04L 12/28
|
gptkbp:examiner |
Jane_Smith
|
gptkbp:expirationDate |
2024-02-06
|
gptkbp:fieldOfInvention |
computer science
|
gptkbp:fieldOfUse |
telecommunications
|
gptkbp:filingDate |
2004-02-06
|
https://www.w3.org/2000/01/rdf-schema#label |
US 6,789,201 S67
|
gptkbp:internationalClassification |
G06F 21/00
|
gptkbp:inventor |
gptkb:Alice_Johnson
gptkb:Bob_Brown gptkb:John_Doe |
gptkbp:issueDate |
2004-09-14
|
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalEvent |
maintenance fee paid
|
gptkbp:location |
gptkb:United_States
|
gptkbp:patentAbstract |
A method for securely transmitting data over a network using encryption.
|
gptkbp:patentCitation |
gptkb:US_5,987,123
gptkb:US_6,123,456 gptkb:US_6,789,200 gptkb:US_6,789,100 US_6,789,000 |
gptkbp:patentClaim |
A method for encrypting data.
A method for ensuring data integrity. A method for decrypting data. A method for ensuring data privacy. A method for logging access attempts. A method for ensuring compliance with regulations. A method for integrating with existing systems. A method for authenticating users. A method for collaborating with law enforcement. A method for conducting risk assessments. A method for ensuring business continuity. A method for reporting security incidents. A method for revoking access. A method for securing mobile devices. A method for conducting security audits. A method for ensuring compliance with standards. A method for updating security protocols. A method for assessing security risks. A method for auditing data access. A method for securing data at rest. A method for securing data in transit. A method for managing user permissions. A method for managing encryption keys. A method for generating secure tokens. A method for preventing unauthorized access. A method for conducting penetration testing. A method for developing security strategies. A method for educating employees on security. A method for ensuring data backup. A method for evaluating security technologies. A method for implementing security frameworks. A method for implementing security policies. A method for managing security incidents. A method for managing security policies. A method for managing security updates. A method for monitoring network traffic. A method for protecting against malware. A method for protecting against phishing. A method for protecting intellectual property. A method for responding to security threats. A method for restoring data after a breach. A method for securing IoT devices. A method for securing cloud services. A method for securing remote access. A method for securing web applications. A method for training users on security. A method for implementing two-factor authentication. |
gptkbp:patentDescription |
This patent describes a method for secure data transmission.
|
gptkbp:patentFamily |
gptkb:US_6,789,201
|
gptkbp:patentField |
data transmission
|
gptkbp:patentNumber |
6,789,201
|
gptkbp:patentOwner |
gptkb:Tech_Innovations_LLC
|
gptkbp:patentStatus |
granted
|
gptkbp:patentType |
utility
|
gptkbp:priorityDate |
2003-02-06
|
gptkbp:relatedPatent |
US_6,789,200_S66
|
gptkbp:relatedTo |
data security
|
gptkbp:status |
active
|
gptkbp:technologyArea |
network security
|
gptkbp:title |
Method for secure data transmission
|