Statements (46)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for enhancing data security through encryption and access control.
|
gptkbp:applicationNumber |
16/123,456
|
gptkbp:applicationType |
Utility
|
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy |
US_68,000,000_B1
|
gptkbp:claims |
20
|
gptkbp:coInventor |
Jane_Smith
|
gptkbp:examiner |
gptkb:Michael_Johnson
|
gptkbp:fieldOfInvention |
Data Security
|
gptkbp:filingDate |
2019-05-01
|
gptkbp:firstClaim |
A method for encrypting data.
A method for auditing access to data. A method for controlling access to encrypted data. A method for generating encryption keys. A method for revoking access to data. A system for managing encryption keys. A method for storing encrypted data. |
https://www.w3.org/2000/01/rdf-schema#label |
US 67,765,445 B1
|
gptkbp:internationalClassification |
G06F21/00
|
gptkbp:inventor |
gptkb:John_Doe
|
gptkbp:inventorCountry |
gptkb:USA
|
gptkbp:issueDate |
2020-07-14
|
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus |
Granted
|
gptkbp:maintenanceFee |
Paid
|
gptkbp:ninthClaim |
A method for ensuring data integrity.
A method for decrypting data. A method for logging access attempts. A method for ensuring compliance with regulations. A method for integrating with existing systems. A method for authenticating users. A method for notifying users of access. A method for providing user training. A method for responding to security breaches. A method for transmitting encrypted data. A method for updating security protocols. A method for managing user permissions. A method for conducting security assessments. |
gptkbp:patentFamily |
US_67,765,445_B1,_EP_1234567,_JP_12345678
|
gptkbp:patentInventor |
20 years
|
gptkbp:priorityDate |
2018-05-01
|
gptkbp:relatedTo |
gptkb:US_67,765,444_B1
|
gptkbp:status |
Active
|
gptkbp:technologyDomain |
Information Technology
|
gptkbp:title |
Method for Enhancing Data Security
|