US 6,789,201 S67

GPTKB entity

Statements (89)
Predicate Object
gptkbp:instanceOf patent
gptkbp:abstract A method for securely transmitting data over a network.
gptkbp:applicationNumber 10/123,456
gptkbp:applicationPublicationNumber 2004-02-12
gptkbp:applicationType non-provisional
gptkbp:assignee gptkb:Tech_Innovations_LLC
gptkbp:citedBy gptkb:US_7,123,456_B2
gptkbp:claims 20
gptkbp:classification H04L 12/28
gptkbp:examiner Jane_Smith
gptkbp:expirationDate 2024-02-06
gptkbp:fieldOfInvention computer science
gptkbp:fieldOfUse telecommunications
gptkbp:filingDate 2004-02-06
https://www.w3.org/2000/01/rdf-schema#label US 6,789,201 S67
gptkbp:internationalClassification G06F 21/00
gptkbp:inventor gptkb:Alice_Johnson
gptkb:Bob_Brown
gptkb:John_Doe
gptkbp:issueDate 2004-09-14
gptkbp:issuedBy gptkb:United_States_Patent_and_Trademark_Office
gptkbp:legalEvent maintenance fee paid
gptkbp:location gptkb:United_States
gptkbp:patentAbstract A method for securely transmitting data over a network using encryption.
gptkbp:patentCitation gptkb:US_5,987,123
gptkb:US_6,123,456
gptkb:US_6,789,200
gptkb:US_6,789,100
US_6,789,000
gptkbp:patentClaim A method for encrypting data.
A method for ensuring data integrity.
A method for decrypting data.
A method for ensuring data privacy.
A method for logging access attempts.
A method for ensuring compliance with regulations.
A method for integrating with existing systems.
A method for authenticating users.
A method for collaborating with law enforcement.
A method for conducting risk assessments.
A method for ensuring business continuity.
A method for reporting security incidents.
A method for revoking access.
A method for securing mobile devices.
A method for conducting security audits.
A method for ensuring compliance with standards.
A method for updating security protocols.
A method for assessing security risks.
A method for auditing data access.
A method for securing data at rest.
A method for securing data in transit.
A method for managing user permissions.
A method for managing encryption keys.
A method for generating secure tokens.
A method for preventing unauthorized access.
A method for conducting penetration testing.
A method for developing security strategies.
A method for educating employees on security.
A method for ensuring data backup.
A method for evaluating security technologies.
A method for implementing security frameworks.
A method for implementing security policies.
A method for managing security incidents.
A method for managing security policies.
A method for managing security updates.
A method for monitoring network traffic.
A method for protecting against malware.
A method for protecting against phishing.
A method for protecting intellectual property.
A method for responding to security threats.
A method for restoring data after a breach.
A method for securing IoT devices.
A method for securing cloud services.
A method for securing remote access.
A method for securing web applications.
A method for training users on security.
A method for implementing two-factor authentication.
gptkbp:patentDescription This patent describes a method for secure data transmission.
gptkbp:patentFamily gptkb:US_6,789,201
gptkbp:patentField data transmission
gptkbp:patentNumber 6,789,201
gptkbp:patentOwner gptkb:Tech_Innovations_LLC
gptkbp:patentStatus granted
gptkbp:patentType utility
gptkbp:priorityDate 2003-02-06
gptkbp:relatedPatent US_6,789,200_S66
gptkbp:relatedTo data security
gptkbp:status active
gptkbp:technologyArea network security
gptkbp:title Method for secure data transmission