Statements (44)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for enhancing data security through encryption and access control.
|
gptkbp:applicationNumber |
16/123,456
|
gptkbp:applicationPublicationNumber |
US 2019/0123456 A1
|
gptkbp:applicationType |
Utility
|
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy |
US_68,000,000_B2
|
gptkbp:claims |
20
|
gptkbp:class |
H04L
|
gptkbp:coInventor |
gptkb:Alice_Johnson
|
gptkbp:examiner |
Jane_Smith
|
gptkbp:fieldOfInvention |
Data Security
|
gptkbp:filedIn |
gptkb:United_States
|
gptkbp:filingDate |
2019-05-01
|
gptkbp:firstClaim |
The method of claim 1, wherein the data is stored in a cloud.
A method for encrypting data. The method of claim 1, wherein the user is authenticated. The method of claim 1, wherein the encryption key is rotated. The method of claim 1, wherein the data is transmitted securely. The method of claim 1, wherein the encryption is AES. The method of claim 1, further including access control. |
gptkbp:grantDate |
2020-02-25
|
https://www.w3.org/2000/01/rdf-schema#label |
US 67,654,311 B1
|
gptkbp:internationalClassification |
G06F 21/00
|
gptkbp:inventor |
gptkb:John_Doe
|
gptkbp:inventorCountry |
gptkb:USA
|
gptkbp:issueDate |
2020-02-25
|
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus |
Granted
|
gptkbp:ninthClaim |
The method of claim 1, wherein the data is backed up.
The method of claim 1, wherein the system logs access attempts. The method of claim 1, wherein alerts are generated for unauthorized access. |
gptkbp:patentCitation |
US_65,000,000_B1
|
gptkbp:patentFamily |
US_67,654,311_B1,_US_67,654,310_B1
|
gptkbp:patentLength |
20 years
|
gptkbp:patentNumber |
67,654,311
|
gptkbp:patentOffice |
gptkb:USPTO
|
gptkbp:patentType |
Utility Patent
|
gptkbp:priorityDate |
2018-05-01
|
gptkbp:relatedTo |
gptkb:US_67,654,310_B1
|
gptkbp:status |
Active
|
gptkbp:subclass |
H04L 9/00
|
gptkbp:technologyArea |
Information Technology
|
gptkbp:title |
Method for Enhancing Data Security
|