Enhanced polymorphic quantum enabled firewall
First Claim
1. A computer system for generating a polymorphic quantum enabled firewall in real-time, comprising:
- a classical computer apparatus comprising;
a processor;
a memory; and
a crypto-security application that is stored in the memory and executable by the processor;
a quantum optimizer in communication with the classical computer apparatus, the quantum optimizer comprising;
a quantum processor; and
a quantum memory;
wherein the crypto-security application is configured for;
identifying an unauthorized attempt to access information by an unidentified source;
collecting a first set of data about the unauthorized attempt in response to identifying the unauthorized attempt to access the information;
determining a type of the unauthorized attempt by analyzing the first set of data, wherein the type of the unauthorized attempt is based on a level of severity of the unauthorized attempt;
transmitting the first set of data and the type of the unauthorized attempt to the quantum optimizer;
receiving from the quantum optimizer a second level of encryption and a new protocol; and
monitoring the unauthorized attempt to detect an event associated with the unauthorized attempt;
wherein the quantum optimizer is configured for;
receiving the first set of data and the type of the unauthorized attempt from the crypto-security application;
modifying a quantum crypto-algorithm to;
generate a second key based on the first set of data and the type of the unauthorized attempt;
generate the second level of encryption using the second key, wherein the second level of encryption is more robust than a first level of encryption; and
generate the new protocol for transferring the second level of encryption over a network;
transferring the second level of encryption and the new protocol to the crypto-security application.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for generating an enhanced polymorphic quantum enabled firewall in real-time typically includes a classical computer apparatus and a quantum optimizer in communication with the classical computer apparatus. The classical computer apparatus is configured to identify an unauthorized attempt to access information by an unidentified source, collect a first set of data about the unauthorized attempt, determine a type of the unauthorized attempt by analyzing the first set of data, and transmit the first set of data and the type of the unauthorized attempt to the quantum optimizer. The quantum optimizer upon receiving the first set of data and the type of the unauthorized attempt, generates a second key and a second level of encryption using the second key, generates a new protocol for transferring the second level of encryption over a network, and transfers the second level of encryption and the new protocol to the classical computer apparatus.
-
Citations
20 Claims
-
1. A computer system for generating a polymorphic quantum enabled firewall in real-time, comprising:
-
a classical computer apparatus comprising; a processor; a memory; and a crypto-security application that is stored in the memory and executable by the processor; a quantum optimizer in communication with the classical computer apparatus, the quantum optimizer comprising; a quantum processor; and a quantum memory; wherein the crypto-security application is configured for; identifying an unauthorized attempt to access information by an unidentified source; collecting a first set of data about the unauthorized attempt in response to identifying the unauthorized attempt to access the information; determining a type of the unauthorized attempt by analyzing the first set of data, wherein the type of the unauthorized attempt is based on a level of severity of the unauthorized attempt; transmitting the first set of data and the type of the unauthorized attempt to the quantum optimizer; receiving from the quantum optimizer a second level of encryption and a new protocol; and monitoring the unauthorized attempt to detect an event associated with the unauthorized attempt; wherein the quantum optimizer is configured for; receiving the first set of data and the type of the unauthorized attempt from the crypto-security application; modifying a quantum crypto-algorithm to; generate a second key based on the first set of data and the type of the unauthorized attempt; generate the second level of encryption using the second key, wherein the second level of encryption is more robust than a first level of encryption; and generate the new protocol for transferring the second level of encryption over a network; transferring the second level of encryption and the new protocol to the crypto-security application. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product for generating a polymorphic quantum enabled firewall in real-time, comprising a non-transitory computer-readable storage medium having computer-executable instructions for causing a classical computer apparatus to:
-
identify an unauthorized attempt to access information by an unidentified source; collect a first set of data about the unauthorized attempt in response to identifying the unauthorized attempt to access the information; determine a type of the unauthorized attempt by analyzing the first set of data, wherein the type of the unauthorized attempt is based on a level of severity of the unauthorized attempt; transmit the first set of data and the type of the unauthorized attempt to a quantum optimizer; receive from the quantum optimizer a second level of encryption and a new protocol; and monitor the unauthorized attempt to detect an event associated with the unauthorized attempt; wherein the quantum optimizer is configured for; receive the first set of data and the type of the unauthorized attempt from the classical computer apparatus; modify a quantum crypto-algorithm to; generate a second key based on the first set of data and the type of the unauthorized attempt; generate the second level of encryption using the second key, wherein the second level of encryption is more robust than a first level of encryption; and
generate the new protocol for transferring the second level of encryption over a network;transfer the second level of encryption and the new protocol to the classical computer apparatus. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A method for generating a polymorphic quantum enabled firewall in real-time, comprising:
-
identifying, via a classical computer apparatus, an unauthorized attempt to access information by an unidentified source; collecting, via the classical computer apparatus, a first set of data about the unauthorized attempt in response to identifying the unauthorized attempt to access the information; determining, via the classical computer apparatus, a type of the unauthorized attempt by analyzing the first set of data, wherein the type of the unauthorized attempt is based on a level of severity of the unauthorized attempt; transmitting, via the classical computer apparatus, the first set of data and the type of the unauthorized attempt to a quantum optimizer; receiving, via the quantum optimizer, the first set of data and the type of the unauthorized attempt from the classical computer apparatus; modifying, via the quantum optimizer, a quantum crypto-algorithm to; generate a second key based on the first set of data and the type of the unauthorized attempt; generate the second level of encryption using the second key, wherein the second level of encryption is more robust than a first level of encryption; and generating, via the quantum optimizer, a new protocol for transferring the second level of encryption over a network; transferring, via the quantum optimizer, the second level of encryption and the new protocol to the classical computer apparatus; receiving, via the classical computer apparatus, a second level of encryption and the new protocol from the quantum optimizer; and monitoring, via the classical computer apparatus, the unauthorized attempt to detect an event associated with the unauthorized attempt. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification