Home Patent Forecast® Sectors Log In   Contact  
How it works Patent Forecast® Sectors Insights
Menu
Enjoy your FREE PREVIEW which shows only 2022 data and 25 documents. Contact Patent Forecast for full access.        

Quantum Computing

Search All Patents in Quantum Computing


Patent US10437991


Issued 2019-10-08

Distractional Variable Identification For Authentication Of Resource Distribution

A system for capturing communication variables associated with a communication between two or more parties and implementing a quantum optimizer to analyze the communication variables to determine the actual context of a communication held by one or more parties to the communication. Once the actual context is determined, a further determination is made as to whether the actual context poses or potentially poses a security threat to one or more parties to the communication or a third-party and, if so, notifies the party of the security threat. In this regard, parties to a communication that are unaware of the actual context of the communication held by another party are made aware of that actual context poses a security threat and, in some embodiments, notifies the parties while the communication is still occurring.



Much More than Average Length Specification


View the Patent Matrix® Diagram to Explore the Claim Relationships

USPTO Full Text Publication >

3 Independent Claims

  • 1. A system for determining an actual context of a communication, comprising: a classical computing apparatus comprising: a memory, at least one processor in communication with the memory, and one or more sensors executable by the processor and configured to: capture communication variables associated with an environment in which a communication is occurring, pre-analyze one or more of the captured communication variables to (i) determine whether the communication variables are capable of being analyzed by the quantum computing device to determine an actual context and (ii) in response to determining that the communication variables are capable of being analyzed by the quantum computing device, determine a subset of communication variables from the captured communication variables that require processing by the quantum processor of the quantum optimizer, and transmit the subset of communication variables to a quantum optimizer; and the quantum optimizer in communication with the classical computer apparatus, the quantum optimizer comprising: a quantum memory, a quantum processor in communication with the quantum memory and configured to: receive the subset of communication variables from the classical computing apparatus, and analyze the subset communication variables to determine an actual context of the communication as held by one or more of communication parties, wherein either the at least one processor or the quantum processor are configured to: determine that the actual context of the communication poses at least potential for a security threat to one or more of the communication parties, and in response to determining that the actual context poses the security threat, transmit an indication of the at least potential for the security threat.

  • 11. A computer program product for determining an actual context of a communication, comprising a non-transitory computer-readable storage medium having computer-executable instructions for: capturing communication variables associated with an environment in which a communication is occurring; determining whether the communication variables are capable of being analyzed by the quantum computing device to determine an actual context; in response to determining that the communication variables are capable of being analyzed by the quantum computing device, determining a subset of communication variables; and transmitting the subset of communication variables to a quantum optimizer; in response to transferring the communication variables to the quantum optimizer, receiving an indication that an actual context of the communication held by one or more parties to the communication poses at least a potential for a security threat, wherein the quantum optimizer is configured for: receiving the subset of communication variables, analyzing the subset of communication variables to determine an actual context of the communication as held by one or more of communication parties, wherein either the computer-readable storage medium further includes computer-executable instructions or the quantum optimizer is configured for: determining that the actual context of the communication poses at least potential for a security threat to one or more of the parties to the communication, and in response to determining that the actual context poses the security threat, transmitting the indication that the actual context of the communication held by the one or more parties to the communication poses at least the potential for the security threat.

  • 12. A method for determining an actual context of a communication, the method comprising: capturing, by a classical computing device processor, communication variables associated with an environment in which a communication is occurring; determining, by the classical computing device processor, whether the communication variables are capable of being analyzed by the quantum computing device to determine an actual context; in response to determining that the communication variables are capable of being analyzed by the quantum computing device, determining, by the classical computing device processor, a subset of communication variables; transmitting, by the classical computing device processor, the subset of communication variables to a quantum optimizer; loathed receiving, by the quantum optimized device processor, the subset of communication variables; analyzing, by the quantum optimizer device, the subset of communication variables to determine an actual context of the communication as held by one or more of communication parties; determining, by the classical computing device processor or the quantum optimizer device, that the actual context of the communication poses at least potential for a security threat to one or more of the parties to the communication; and in response to determining that the actual context poses the security threat, transmitting, by the classical computing device processor or the quantum optimizer, an indication of the at least potential for the security threat.