Properties (40)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for enhancing data security using encryption techniques.
|
gptkbp:applicationNumber |
US_15/123,456
|
gptkbp:applicationStatus |
Granted
|
gptkbp:applicationType |
Non-Provisional
|
gptkbp:assignee |
gptkb:Tech_Innovations_LLC
|
gptkbp:citedBy |
US_1000000_A
|
gptkbp:claims |
20
|
gptkbp:coInventor |
gptkb:Alice_Johnson
|
gptkbp:examiner |
Jane_Smith
|
gptkbp:fieldOfInvention |
Data Security
|
gptkbp:filingDate |
2017-09-15
|
gptkbp:firstClaim |
A method for encrypting data.
The method of claim 1, wherein the data is transmitted over a network. The method of claim 1, wherein the encryption key is stored securely. The method of claim 1, further including a step of data integrity verification. The method of claim 1, wherein the data is decrypted upon user request. The method of claim 1, wherein the encryption is performed using AES. The method of claim 1, wherein user authentication is required. |
gptkbp:grantDate |
2018-06-12
|
https://www.w3.org/2000/01/rdf-schema#label |
US 9995601 A
|
gptkbp:internationalClassification |
G06F21/00
|
gptkbp:inventor |
gptkb:John_Doe
|
gptkbp:inventorCountry |
gptkb:USA
|
gptkbp:issuedBy |
gptkb:United_States_Patent_and_Trademark_Office
|
gptkbp:legalEvent |
Fee payment
|
gptkbp:maintenanceFee |
Required
|
gptkbp:ninthClaim |
The method of claim 1, wherein the system logs all access attempts.
The method of claim 1, wherein the system alerts on unauthorized access. The method of claim 1, wherein the encryption process is automated. |
gptkbp:patentFamily |
US_9995601_A,_US_9995602_A
|
gptkbp:patentLength |
20 years
|
gptkbp:patentNumber |
9995601
|
gptkbp:patentType |
Utility Patent
|
gptkbp:priorityDate |
2016-09-15
|
gptkbp:publicationDate |
2018-06-12
|
gptkbp:relatedTo |
US_9995599_A
|
gptkbp:status |
Active
|
gptkbp:technologyDomain |
Information Technology
|
gptkbp:title |
Method for Enhancing Data Security
|