Properties (37)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for enhancing data security through encryption.
|
gptkbp:applicationNumber |
14/123,456
|
gptkbp:applicationType |
Utility
|
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy |
US_10,000,000_B2
|
gptkbp:claims |
20
|
gptkbp:class |
G06F21/00
|
gptkbp:coInventor |
gptkb:Alice_Johnson
|
gptkbp:examiner |
Jane_Smith
|
gptkbp:expirationDate |
April 7, 2035
|
gptkbp:fieldOfInvention |
Data Security
|
gptkbp:filedWith |
gptkb:USPTO
|
gptkbp:filingDate |
December 31, 2013
|
gptkbp:firstClaim |
The method of claim 1, wherein the data is stored in a cloud.
A method for encrypting data. The method of claim 1, further comprising a decryption step. The method of claim 1, wherein the encryption key is generated dynamically. The method of claim 1, wherein the data is transmitted over a secure channel. The method of claim 1, wherein the encryption is performed using AES. The method of claim 1, wherein user authentication is required. |
https://www.w3.org/2000/01/rdf-schema#label |
US 900,123,416 B1
|
gptkbp:internationalClassification |
H04L9/00
|
gptkbp:inventor |
gptkb:John_Doe
|
gptkbp:issuedBy |
April 7, 2015
|
gptkbp:legalStatus |
Granted
|
gptkbp:location |
gptkb:United_States
|
gptkbp:maintenanceFee |
Paid
|
gptkbp:ninthClaim |
The method of claim 1, wherein the system logs access attempts.
The method of claim 1, wherein the system is compliant with GDPR. The method of claim 1, wherein alerts are generated for unauthorized access. |
gptkbp:patentType |
B1
|
gptkbp:priorityDate |
June 15, 2012
|
gptkbp:relatedPatent |
gptkb:US_8,765,432_B1
|
gptkbp:status |
Active
|
gptkbp:subclass |
G06F21/62
|
gptkbp:title |
Method for Enhancing Data Security
|