20240031170. SYSTEMS AND METHODS FOR POST-QUANTUM CRYPTOGRAPHY OPTIMIZATION simplified abstract (Wells Fargo Bank, N.A.)

From WikiPatents
Jump to navigation Jump to search

SYSTEMS AND METHODS FOR POST-QUANTUM CRYPTOGRAPHY OPTIMIZATION

Organization Name

Wells Fargo Bank, N.A.

Inventor(s)

Ravi K. Maganti of Waxhaw NC (US)

Robert L. Carter, Jr. of Pleasant Hill IA (US)

Bradford A. Shea of Mint Hill NC (US)

M. Erik Meinholz of Charlotte NC (US)

Jeff J. Stapleton of O'Fallon MO (US)

Peter Bordow of Fountain Hills AZ (US)

Pierre Arbajian of Matthews NC (US)

Abhijit Rao of Irvine CA (US)

SYSTEMS AND METHODS FOR POST-QUANTUM CRYPTOGRAPHY OPTIMIZATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240031170 titled 'SYSTEMS AND METHODS FOR POST-QUANTUM CRYPTOGRAPHY OPTIMIZATION

Simplified Explanation

The patent application describes a method for detecting quantum computing (qc) and generating a qc detection alert control signal. The method involves generating qc detection data and a pair of asymmetric cryptographic keys (public and private). The qc detection data is encrypted using the cryptographic keys, and the private key is destroyed. The method also includes monitoring data environments for electronic information related to the encrypted qc detection data. If electronic information related to the encrypted qc detection data is detected, a qc detection alert control signal is generated.

  • The method involves generating qc detection data and encrypting it using asymmetric cryptographic keys.
  • The private cryptographic key is destroyed to ensure security.
  • Data environments are monitored for electronic information related to the encrypted qc detection data.
  • A qc detection alert control signal is generated if electronic information related to the encrypted qc detection data is detected.

Potential applications of this technology:

  • Quantum computing detection and security systems
  • Protection against unauthorized access to quantum computing systems

Problems solved by this technology:

  • Detection of quantum computing activities
  • Protection of sensitive information from quantum computing attacks

Benefits of this technology:

  • Enhanced security against quantum computing threats
  • Early detection of potential quantum computing activities
  • Protection of sensitive information from quantum computing attacks


Original Abstract Submitted

systems, apparatuses, methods, and computer program products are disclosed for quantum computing (qc) detection. an example method includes generating qc detection data. the example method further includes generating a pair of asymmetric cryptographic keys comprising a public cryptographic key and a private cryptographic key, generating encrypted qc detection data based on the pair of asymmetric cryptographic keys, and destroying the private cryptographic key. the example method further includes monitoring a set of data environments for electronic information related to the encrypted qc detection data. subsequently, the example method may include generating a qc detection alert control signal in response to detection of the electronic information related to the encrypted qc detection data.