Changeflow GovPing Telecom & Technology Secure Data Authorization Using Cryptographic H...
Routine Notice Added Final

Secure Data Authorization Using Cryptographic Hash Tokens

Favicon for changeflow.com USPTO Patent Applications - Networking (H04L)
Published
Detected
Email

Summary

USPTO published patent application US20260099619A1 by inventor Bhagyeshkumar Joshi for secure data authorization using cryptographic hash tokens. The invention describes receiving data characterizing database access requests and authorization tokens, then determining access permissions by validating tokens using data attributes. The authorization token generation involves producing hash values for database records and generating bit arrays.

What changed

USPTO published patent application US20260099619A1 disclosing methods and apparatus for secure data authorization using cryptographic hash tokens. The invention covers receiving data characterizing database record access requests, data attributes, and authorization tokens, then determining access permissions by validating tokens using the data attributes. Token generation involves producing hash values for database records and generating bit arrays for those hash values.

This publication affects technology companies developing database access control systems, authentication systems, and security protocols. Entities implementing cryptographic authorization mechanisms should review the disclosed techniques for potential patent considerations or licensing implications.

What to do next

  1. Monitor for patent grant status

Archived snapshot

Apr 9, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

← USPTO Patent Applications

Data Authorization Using Controlled Access Techniques

Application US20260099619A1 Kind: A1 Apr 09, 2026

Inventors

Bhagyeshkumar Joshi

Abstract

Data characterizing a request to access a database record, a data attribute of the database record, and an authorization token are received. Based on the received data, permission to access the database record is determined by at least validating the authorization token using the data attribute. The authorization token can be generated by producing hash values for the database record and generating a bit array for the hash values. Related apparatus, systems, techniques, and articles are also described.

CPC Classifications

G06F 21/6218 H04L 9/3213 H04L 9/3239 H04L 9/3268 H04L 9/3297

Filing Date

2024-10-09

Application No.

18910877

View original document →

Get daily alerts for USPTO Patent Applications - Networking (H04L)

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from USPTO.

What's AI-generated?

The plain-English summary, classification, and "what to do next" steps are AI-generated from the original text. Cite the source document, not the AI analysis.

Last updated

Classification

Agency
USPTO
Published
April 9th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Minor
Document ID
US20260099619A1

Who this affects

Applies to
Technology companies Manufacturers
Industry sector
5112 Software & Technology
Activity scope
Patent application filing Database access control
Geographic scope
United States US

Taxonomy

Primary area
Intellectual Property
Operational domain
Legal
Topics
Cybersecurity Data Privacy

Get alerts for this source

We'll email you when USPTO Patent Applications - Networking (H04L) publishes new changes.

Optional. Personalizes your daily digest.

Free. Unsubscribe anytime.