Encrypted Command Authentication via Cloud Network
Summary
USPTO published patent application US20260100081A1 for security systems and methods related to encrypted command authentication via cloud networks. The application, filed October 8, 2025, by inventors Chris Bouchat and Shawn Zabel, covers encrypted command messages with timestamps, validity durations, use counts, user authentication, session key establishment, and command execution security protocols.
What changed
USPTO published patent application US20260100081A1 for security systems and methods related to encrypted command authentication via cloud networks. The application includes claims for encrypted command messages with timestamps, validity durations, use counts, user authentication, session key establishment, and command execution.
This publication provides public notice of the patent application for informational purposes only. No compliance obligations are created by this document. Parties interested in the technology should monitor for further USPTO proceedings and potential patent grant.
What to do next
- Monitor for updates
Archived snapshot
Apr 13, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
Security Systems and Methods
Application US20260100081A1 Kind: A1 Apr 09, 2026
Inventors
Chris Bouchat, Shawn Zabel
Abstract
Security systems and methods are provided. In one example, a method includes providing an encrypted command message to a computing device via a cloud network. The command message may include a timestamp, a validity duration, a use count, and a command. The method may further includes authenticating a user of the computing device and sending the command message from the computing device to a security device if the user is authenticated. In addition, the method includes determining whether the command message is authenticated and if the command message is authenticated, determining whether the timestamp, validity duration, and use count are valid. If the time stamp and validity duration are valid, the method also includes initiating at least one session key between the security device and the computing device. Moreover, the method includes executing the command based on successful completion of the at least one session key.
CPC Classifications
G07C 9/00309 G07C 9/00896 H04L 9/3226 H04L 9/3242 H04L 63/0435 G07C 2009/00769 G07C 2209/02 G07C 2209/08
Filing Date
2025-10-08
Application No.
19352848
Related changes
Get daily alerts for USPTO Patent Applications - Networking (H04L)
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from USPTO.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when USPTO Patent Applications - Networking (H04L) publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.