Properties (43)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for establishing a secure communication channel between two parties.
|
gptkbp:applicationNumber |
10/123,456
|
gptkbp:applicationType |
utility
|
gptkbp:assignee |
gptkb:K48_Technologies,_Inc.
|
gptkbp:citedBy |
gptkb:US_7,123,456_B2
|
gptkbp:claims |
20
|
gptkbp:class |
H04L 9/00
|
gptkbp:examiner |
Jane_Smith
|
gptkbp:fieldOfInvention |
secure communications
|
gptkbp:filingDate |
April 1, 2003
|
gptkbp:firstClaim |
A method for encrypting data.
A method for decrypting data. A method for generating encryption keys. A system for secure data transmission. A method for authenticating users. A method for transmitting encrypted data. A device for establishing a secure connection. |
https://www.w3.org/2000/01/rdf-schema#label |
US 6,789,871 K48
|
gptkbp:internationalClassification |
H04L 9/32
|
gptkbp:inventor |
gptkb:John_Doe
|
gptkbp:issueDate |
September 7, 2004
|
gptkbp:issuedBy |
September 7, 2004
|
gptkbp:legalStatus |
granted
|
gptkbp:maintenanceFee |
paid
|
gptkbp:ninthClaim |
A method for ensuring data integrity.
A method for ensuring compliance with regulations. A method for integrating with existing systems. A method for providing user training. A method for revoking access. A method for updating security protocols. A method for managing user permissions. A method for managing encryption keys. A method for preventing unauthorized access. A method for auditing secure communications. A method for establishing user identities. A method for logging communication activities. A method for securing a communication channel. |
gptkbp:patentFamily |
K48_secure_communication_patents
|
gptkbp:priorityDate |
March 15, 2002
|
gptkbp:relatedPatent |
gptkb:US_6,123,456_A1
|
gptkbp:status |
active
|
gptkbp:title |
Method and apparatus for providing a secure communication channel
|