Statements (33)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for enhancing data security through encryption and access control.
|
gptkbp:applicationNumber |
US_69,876,543
|
gptkbp:applicationType |
Utility
|
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy |
gptkb:US_70,123,456_B2
|
gptkbp:claims |
20
|
gptkbp:coInventor |
Jane_Smith
|
gptkbp:examiner |
gptkb:Michael_Johnson
|
gptkbp:fieldOfInvention |
Data Security
|
gptkbp:filingDate |
2018-05-01
|
gptkbp:firstClaim |
The method of claim 1, wherein the data is stored in a cloud.
A method for encrypting data. The method of claim 1, wherein the data is transmitted over a secure channel. The method of claim 1, wherein the access control is role-based. The method of claim 1, wherein the encryption is performed using AES. The method of claim 1, further comprising access control. The method of claim 1, wherein the encryption key is rotated periodically. |
https://www.w3.org/2000/01/rdf-schema#label |
US 69,876,543 B1
|
gptkbp:internationalClassification |
H04L 9/00
|
gptkbp:inventor |
gptkb:John_Doe
|
gptkbp:issueDate |
2021-01-12
|
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus |
Granted
|
gptkbp:maintenanceFee |
Paid
|
gptkbp:ninthClaim |
The method of claim 1, wherein the system logs access attempts.
The method of claim 1, wherein the system is compliant with GDPR. The method of claim 1, wherein unauthorized access is reported. |
gptkbp:patentFamily |
US_69,876,543_B1,_US_69,876,542_B1
|
gptkbp:priorityDate |
2017-05-01
|
gptkbp:relatedTo |
gptkb:US_69,876,542_B1
|
gptkbp:status |
Active
|
gptkbp:title |
Method for Enhancing Data Security
|