Search All Patents in Quantum Computing
Patent US10437991
Issued 2019-10-08
Distractional Variable Identification For Authentication Of Resource Distribution
A system for capturing communication variables associated with a communication between two or more parties and implementing a quantum optimizer to analyze the communication variables to determine the actual context of a communication held by one or more parties to the communication. Once the actual context is determined, a further determination is made as to whether the actual context poses or potentially poses a security threat to one or more parties to the communication or a third-party and, if so, notifies the party of the security threat. In this regard, parties to a communication that are unaware of the actual context of the communication held by another party are made aware of that actual context poses a security threat and, in some embodiments, notifies the parties while the communication is still occurring.
Much More than Average Length Specification
View the Patent Matrix® Diagram to Explore the Claim Relationships
USPTO Full Text Publication >
- 1. A system for determining an actual context of a communication, comprising:
a classical computing apparatus comprising:
a memory,
at least one processor in communication with the memory, and
one or more sensors executable by the processor and configured to:
capture communication variables associated with an environment in which a communication is occurring,
pre-analyze one or more of the captured communication variables to (i) determine whether the communication variables are capable of being analyzed by the quantum computing device to determine an actual context and (ii) in response to determining that the communication variables are capable of being analyzed by the quantum computing device, determine a subset of communication variables from the captured communication variables that require processing by the quantum processor of the quantum optimizer, and
transmit the subset of communication variables to a quantum optimizer; and
the quantum optimizer in communication with the classical computer apparatus, the quantum optimizer comprising:
a quantum memory,
a quantum processor in communication with the quantum memory and configured to:
receive the subset of communication variables from the classical computing apparatus, and
analyze the subset communication variables to determine an actual context of the communication as held by one or more of communication parties,
wherein either the at least one processor or the quantum processor are configured to:
determine that the actual context of the communication poses at least potential for a security threat to one or more of the communication parties, and
in response to determining that the actual context poses the security threat, transmit an indication of the at least potential for the security threat.
- 11. A computer program product for determining an actual context of a communication, comprising a non-transitory computer-readable storage medium having computer-executable instructions for:
capturing communication variables associated with an environment in which a communication is occurring; determining whether the communication variables are capable of being analyzed by the quantum computing device to determine an actual context; in response to determining that the communication variables are capable of being analyzed by the quantum computing device, determining a subset of communication variables; and transmitting the subset of communication variables to a quantum optimizer; in response to transferring the communication variables to the quantum optimizer, receiving an indication that an actual context of the communication held by one or more parties to the communication poses at least a potential for a security threat, wherein the quantum optimizer is configured for:
receiving the subset of communication variables,
analyzing the subset of communication variables to determine an actual context of the communication as held by one or more of communication parties,
wherein either the computer-readable storage medium further includes computer-executable instructions or the quantum optimizer is configured for:
determining that the actual context of the communication poses at least potential for a security threat to one or more of the parties to the communication, and
in response to determining that the actual context poses the security threat, transmitting the indication that the actual context of the communication held by the one or more parties to the communication poses at least the potential for the security threat.
- 12. A method for determining an actual context of a communication, the method comprising:
capturing, by a classical computing device processor, communication variables associated with an environment in which a communication is occurring; determining, by the classical computing device processor, whether the communication variables are capable of being analyzed by the quantum computing device to determine an actual context; in response to determining that the communication variables are capable of being analyzed by the quantum computing device, determining, by the classical computing device processor, a subset of communication variables; transmitting, by the classical computing device processor, the subset of communication variables to a quantum optimizer; loathed receiving, by the quantum optimized device processor, the subset of communication variables; analyzing, by the quantum optimizer device, the subset of communication variables to determine an actual context of the communication as held by one or more of communication parties; determining, by the classical computing device processor or the quantum optimizer device, that the actual context of the communication poses at least potential for a security threat to one or more of the parties to the communication; and in response to determining that the actual context poses the security threat, transmitting, by the classical computing device processor or the quantum optimizer, an indication of the at least potential for the security threat.