Statements (29)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for securely transmitting data over a network.
|
gptkbp:applicationNumber |
15/123,456
|
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy |
gptkb:US_70,654,321_B2
gptkb:US_70,123,456_B2 |
gptkbp:claims |
20
|
gptkbp:classification |
H04L 29/08
|
gptkbp:examiner |
Jane_Smith
|
gptkbp:fieldOfInvention |
computer science
|
gptkbp:filingDate |
2016-05-12
|
gptkbp:firstClaim |
The method of claim 1, wherein the data is stored in a cloud.
A method for encrypting data. The method of claim 1, wherein the data is transmitted over the internet. The method of claim 1, wherein the encryption is performed using AES. The method of claim 1, further comprising a step of authentication. The method of claim 3, wherein the authentication is two-factor. The method of claim 1, wherein the data is accessed by a mobile device. |
https://www.w3.org/2000/01/rdf-schema#label |
US 70,321,631 B2
|
gptkbp:inventor |
gptkb:John_Doe
|
gptkbp:issueDate |
2016-10-31
|
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalStatus |
active
|
gptkbp:ninthClaim |
The method of claim 1, wherein the data is logged for auditing.
The method of claim 1, wherein the encryption key is shared securely. The method of claim 1, wherein the data is decrypted at the receiver's end. |
gptkbp:priorityDate |
2015-05-12
|
gptkbp:relatedTo |
data security
|
gptkbp:title |
Method for secure data transmission
|