Home Patent Forecast® Sectors Log In   Contact  
How it works Patent Forecast® Sectors Insights
Menu
Enjoy your FREE PREVIEW which shows only 2022 data and 25 documents. Contact Patent Forecast for full access.        

Quantum Computing

Search All Patents in Quantum Computing


Patent US10243976


Issued 2019-03-26

Information Securities Resource Propagation For Attack Prevention

A system for verifying resource propagations in real-time typically includes a classical computer apparatus and a quantum optimizer in communication with the classical computer apparatus. The quantum optimizer is configured to analyze resource propagation information related to previous resource propagations and confirmed attacks to generate a model for verifying resource propagations or mitigating potential attacks. When the classical computer apparatus receives indication of a present resource propagation, the classical computer apparatus transfers attributes of the present resource propagation to the quantum optimizer, which analyzes the resource propagation using the model to determine whether the resource propagation involves a potential attack. Based on the indication from the quantum optimizer, the classical computer apparatus attempts to mitigate the potential attack or allows the resource propagation to proceed. By employing a quantum optimizer to verify resource propagation, the system is able to verify the resource propagation request in real-time.



Much More than Average Length Specification


View the Patent Matrix® Diagram to Explore the Claim Relationships

USPTO Full Text Publication >

3 Independent Claims

  • 1. A computer system for information securities resource propagation analysis for attack prevention, comprising: a classical computer apparatus comprising: a processor; a memory; and a resource propagation processing application that is stored in the memory and executable by the processor; a quantum optimizer in operative communication with the classical computer apparatus, the quantum optimizer comprising: a quantum processor; and a quantum memory; wherein the resource propagation processing application is configured for: transmitting historical resource propagation information and historical attack information to the quantum optimizer; receiving, from one or more resource propagation devices, present attributes; and transmitting the present attributes to the quantum optimizer; wherein the quantum optimizer is configured for: receiving the historical resource propagation information and historical attack information; analyzing the historical resource propagation information and historical attack information to determine one or more indicative attributes that may be indicative of attacks; receiving the present attributes transmitted from the resource propagation processing application; comparing the present attributes to the indicative attributes to identify an identified potential attack; identifying a first resource propagation device from amongst the one or more resource propagation devices corresponding to the identified potential attack; and transmitting, to the classical computing apparatus, an identity of the first resource propagation device for mitigation of the identified potential attack.

  • 18. A computer system for information securities resource propagation analysis for attack prevention, comprising: a classical computer apparatus comprising: a processor; a memory; and a resource propagation processing application that is stored in the memory and executable by the processor; a quantum optimizer in operative communication with the classical computer apparatus, the quantum optimizer comprising: a quantum processor; and a quantum memory; wherein the resource propagation processing application is configured for: receiving historical resource propagation information and historical attack information from one or more resource propagation devices; and transmitting the historical resource propagation information and the historical attack information to the quantum optimizer; wherein the quantum optimizer is configured for: receiving the historical resource propagation information and historical attack information; and analyzing the historical resource propagation information and historical attack information to generate a first model for verifying resource propagations, wherein the first model is configured for real-time processing by the quantum processor; wherein the resource propagation processing application is further configured for: receiving an indication of a present resource propagation from one of the one or more resource propagation devices; identifying present attributes of the present resource propagation; and transmitting the present attributes to the quantum optimizer; wherein the quantum optimizer is further configured for: analyzing the present attributes using the first model to determine (i) whether the present resource propagation is verified and (ii) a confidence of whether the present resource propagation is verified; based on analyzing the present attributes using the first model to determine (i) whether the present resource propagation is verified, and (ii) the confidence of whether the present resource propagation is verified, determining a conclusion indicating whether attack mitigation should be initiated or the present resource propagation should be allowed to proceed without attack mitigation; and transmitting the conclusion to the classical computer apparatus.

  • 19. A computer system for information securities resource propagation analysis for attack prevention, comprising: a classical computer apparatus comprising: a processor; a memory; and a resource propagation processing application that is stored in the memory and executable by the processor; a quantum optimizer in operative communication with the classical computer apparatus, the quantum optimizer comprising: a quantum processor; and a quantum memory; wherein the resource propagation processing application is configured for: receiving an indication of a present resource propagation from one of one or more resource propagation devices; identifying present attributes of the present resource propagation; and transmitting the present attributes to the quantum optimizer; wherein the quantum optimizer is configured for: analyzing the present attributes using a first model to determine (i) whether the present resource propagation is verified and (ii) a confidence of whether the present resource propagation is verified, wherein the first model was generated by correlating historical resource propagation information and historical attack information to identify resource propagation attributes indicative of potential attacks; based on analyzing the present attributes using the first model to determine (i) whether the present resource propagation is verified and (ii) the confidence of whether the present resource propagation is verified, determining a conclusion indicating whether attack mitigation should be initiated or the present resource propagation should be allowed to proceed without attack mitigation; and transmitting the conclusion to the classical computer apparatus.