×

Enhanced polymorphic quantum enabled firewall

  • US 10,270,594 B2
  • Filed: 03/06/2017
  • Issued: 04/23/2019
  • Est. Priority Date: 03/06/2017
  • Status: Active Grant
First Claim
Patent Images

1. A computer system for generating a polymorphic quantum enabled firewall in real-time, comprising:

  • a classical computer apparatus comprising;

    a processor;

    a memory; and

    a crypto-security application that is stored in the memory and executable by the processor;

    a quantum optimizer in communication with the classical computer apparatus, the quantum optimizer comprising;

    a quantum processor; and

    a quantum memory;

    wherein the crypto-security application is configured for;

    identifying an unauthorized attempt to access information by an unidentified source;

    collecting a first set of data about the unauthorized attempt in response to identifying the unauthorized attempt to access the information;

    determining a type of the unauthorized attempt by analyzing the first set of data, wherein the type of the unauthorized attempt is based on a level of severity of the unauthorized attempt;

    transmitting the first set of data and the type of the unauthorized attempt to the quantum optimizer;

    receiving from the quantum optimizer a second level of encryption and a new protocol; and

    monitoring the unauthorized attempt to detect an event associated with the unauthorized attempt;

    wherein the quantum optimizer is configured for;

    receiving the first set of data and the type of the unauthorized attempt from the crypto-security application;

    modifying a quantum crypto-algorithm to;

    generate a second key based on the first set of data and the type of the unauthorized attempt;

    generate the second level of encryption using the second key, wherein the second level of encryption is more robust than a first level of encryption; and

    generate the new protocol for transferring the second level of encryption over a network;

    transferring the second level of encryption and the new protocol to the crypto-security application.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×