×

ENHANCED POLYMORPHIC QUANTUM ENABLED FIREWALL

  • US 20180254895A1
  • Filed: 03/06/2017
  • Published: 09/06/2018
  • Est. Priority Date: 03/06/2017
  • Status: Active Application
First Claim
Patent Images

1. A computer system for generating a polymorphic quantum enabled firewall in real-time, comprising:

  • a classical computer apparatus comprising;

    a processor;

    a memory; and

    a crypto-security application that is stored in the memory and executable by the processor;

    a quantum optimizer in communication with the classical computer apparatus, the quantum optimizer comprising;

    a quantum processor; and

    a quantum memory;

    wherein the crypto-security application is configured for;

    identifying an unauthorized attempt to access information by an unidentified source;

    collecting a first set of data about the unauthorized attempt in response to identifying the unauthorized attempt to access the information;

    determining a type of the unauthorized attempt by analyzing the first set of data, wherein the type of the unauthorized attempt is based on a level of severity of the unauthorized attempt;

    transmitting the first set of data and the type of the unauthorized attempt to the quantum optimizer;

    receiving from the quantum optimizer a second level of encryption and a new protocol; and

    monitoring the unauthorized attempt to detect an event associated with the unauthorized attempt;

    wherein the quantum optimizer is configured for;

    receiving the first set of data and the type of the unauthorized attempt from the crypto-security application;

    modifying a quantum crypto-algorithm to;

    generate a second key based on the first set of data and the type of the unauthorized attempt;

    generate the second level of encryption using the second key, wherein the second level of encryption is more robust than the first level of encryption; and

    generate the new protocol for transferring the second level of encryption over a network;

    transferring the second level of encryption and the new protocol to the crypto-security application.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×