Properties (32)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for securely transmitting data over a network.
|
gptkbp:applicationNumber |
10/123,456
PCT/US2003/012345 |
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy |
gptkb:US_7,123,456_B2
|
gptkbp:claims |
20
|
gptkbp:classification |
H04L 29/06
|
gptkbp:examiner |
Jane_Smith
|
gptkbp:fieldOfInvention |
computer science
|
gptkbp:filingDate |
2004-01-30
|
gptkbp:firstClaim |
The method of claim 1, wherein the data is stored in a cloud.
The method of claim 1, wherein the transmission is monitored. The method of claim 1, wherein the data is compressed. A method for encrypting data. The method of claim 1, wherein the data is transmitted over the internet. The method of claim 1, wherein the encryption is performed using AES. The method of claim 1, further comprising a step of authentication. |
https://www.w3.org/2000/01/rdf-schema#label |
US 6,789,522 C1
|
gptkbp:inventor |
gptkb:John_Doe
|
gptkbp:issueDate |
2004-09-14
|
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus |
granted
|
gptkbp:maintenanceFee |
paid
|
gptkbp:ninthClaim |
The method of claim 1, wherein the encryption key is dynamically generated.
The method of claim 1, wherein the data is verified for integrity. The method of claim 1, wherein the user is authenticated via two-factor authentication. |
gptkbp:patentType |
utility
|
gptkbp:priorityDate |
2003-01-30
|
gptkbp:relatedTo |
data security
|
gptkbp:status |
active
|
gptkbp:title |
Method for secure data transmission
|