Changeflow GovPing Telecom & Technology Encrypted Command Authentication via Cloud Network
Routine Notice Added Final

Encrypted Command Authentication via Cloud Network

Email

Summary

USPTO published patent application US20260100081A1 for security systems and methods related to encrypted command authentication via cloud networks. The application, filed October 8, 2025, by inventors Chris Bouchat and Shawn Zabel, covers encrypted command messages with timestamps, validity durations, use counts, user authentication, session key establishment, and command execution security protocols.

What changed

USPTO published patent application US20260100081A1 for security systems and methods related to encrypted command authentication via cloud networks. The application includes claims for encrypted command messages with timestamps, validity durations, use counts, user authentication, session key establishment, and command execution.

This publication provides public notice of the patent application for informational purposes only. No compliance obligations are created by this document. Parties interested in the technology should monitor for further USPTO proceedings and potential patent grant.

What to do next

  1. Monitor for updates

Archived snapshot

Apr 13, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

← USPTO Patent Applications

Security Systems and Methods

Application US20260100081A1 Kind: A1 Apr 09, 2026

Inventors

Chris Bouchat, Shawn Zabel

Abstract

Security systems and methods are provided. In one example, a method includes providing an encrypted command message to a computing device via a cloud network. The command message may include a timestamp, a validity duration, a use count, and a command. The method may further includes authenticating a user of the computing device and sending the command message from the computing device to a security device if the user is authenticated. In addition, the method includes determining whether the command message is authenticated and if the command message is authenticated, determining whether the timestamp, validity duration, and use count are valid. If the time stamp and validity duration are valid, the method also includes initiating at least one session key between the security device and the computing device. Moreover, the method includes executing the command based on successful completion of the at least one session key.

CPC Classifications

G07C 9/00309 G07C 9/00896 H04L 9/3226 H04L 9/3242 H04L 63/0435 G07C 2009/00769 G07C 2209/02 G07C 2209/08

Filing Date

2025-10-08

Application No.

19352848

View original document →

Get daily alerts for USPTO Patent Applications - Networking (H04L)

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from USPTO.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
USPTO
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Minor
Document ID
US20260100081A1
Docket
19352848

Who this affects

Applies to
Technology companies Manufacturers
Industry sector
5112 Software & Technology
Activity scope
Patent application Security systems development
Geographic scope
United States US

Taxonomy

Primary area
Intellectual Property
Operational domain
Legal
Topics
Cybersecurity

Get alerts for this source

We'll email you when USPTO Patent Applications - Networking (H04L) publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!