Determining security features for external quantum-level computing processing

ABSTRACT

Systems and method for determining and applying security measures, such as segmentation, obfuscation and/or insertion of dummy data, to data sets determined to require external quantum-level computing processing. In those embodiments in which the data set is segmented, external quantum-level computing processing entities are determined, such that each segment is communicated to a different external entity for subsequent quantum-level computing processing.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation of and claims priority from allowed,co-pending U.S. patent application Ser. No. 15/437,904, filed on Feb.21, 2017 and entitled “Determining Security Features for ExternalQuantum-level Computing Processing”.

FIELD OF THE INVENTION

The present invention related to data security and, more specifically,determining security features for a data set that requires externalquantum-level processing.

BACKGROUND

Quantum computing involves theoretical computation systems that makedirect use of quantum-mechanical phenomena, such as superposition andentanglement, to perform operations on data. Whereas common digitalcomputing requires that the data be encoded into binary digits (i.e.,bits), each of which is always in one of two definite states (0 or 1),quantum computation uses quantum bits, which can be in superpositions ofstates.

While quantum computing is a burgeoning technology, its use is foreseento grow in the near future as a means of solving complex problems moreefficiently. However, technical challenges exist in building large-scalequantum computers and, as such, quantum-capabilities are limited. Thus,in the event that an entity, such as an enterprise, corporation,university or the like has a need or will have a need in the future toimplement quantum-level computing, the entity is likely to rely onthird-party entities (i.e., entities external from the enterprise,corporation, university or the like) to conduct such processing of data.

However, in today's computing environment in which data is entrusted inother entities, data breaches occur at an alarming rate. A data breachis a security incident in which data, typically sensitive, protectedconfidential data is copied, viewed, misappropriated or otherwise usedby individuals/entities other than those authorized to do so. Thebreaching of data may be part of multiple entities acting together(e.g., collusion or conspiracy) or implicate governments or the like(e.g., espionage). Such data breaches may be intentional (i.e.,perpetuated by wrongdoers) or unintentional, but in either instance,once the data has been comprised, the harm to the data owner isunavoidable. In this regard, when an entity provides data to athird-party/external entity, the entity runs the risk that the data maybe breached.

Therefore, a need exists on the behalf of entities who desire to havethird party/external entities perform quantum-level processing of theentity's data to limit the risk related to the possibility of the databeing breached/comprised. In this regard, the desired systems, methods,and the like should lessen, if not eliminate, the risk to the data ownerin the event that the data is breached/comprised by the thirdparty/external entity. Moreover, desired systems, methods and the likeshould apply requisite security features to the data sets that requireexternal quantum-level processing that are consistent with theconfidentiality of the data set and take into account time constraintsassociated with the processing of the data.

SUMMARY

The following presents a simplified summary of one or more embodimentsin order to provide a basic understanding of such embodiments. Thissummary is not an extensive overview of all contemplated embodiments,and is intended to neither identify key or critical elements of allembodiments, nor delineate the scope of any or all embodiments. Its solepurpose is to present some concepts of one or more embodiments in asimplified form as a prelude to the more detailed description that ispresented later.

Embodiments of the present invention address the above needs and/orachieve other advantages by providing apparatus, systems, computerprogram products, for applying security measures to data sets requiringexternal/third-party quantum-level processing. By providing suchsecurity measures to the data sets prior to communicating/transferringthe data to the external/third-party data processors, the presentinvention limits the risk associated with the data beingbreached/comprised, either intentionally or unintentionally, by theexternal/third-party entity.

In specific embodiments of the invention, the data set is segmented intodiscrete data blocks and each individual data block iscommunicated/transferred to a different external/third-party entity forsubsequent quantum-level data processing. As a result, none of theexternal/third-party entities have access to the entire data set and, assuch, in the event that the data possessed by an external/third-partyentity is breached/comprised, the risk posed to the data owner isminimized because the breached/comprised data is only a segment/portionof the entire data set and, as such, may be have limited value in thehands of a wrongdoer.

In other embodiments of the invention, the data set and/or the datablocks are obfuscated, such that asymmetrical cryptography or the likeis implemented to re-arrange, shift or the like the data elements in thedata set and/or data blocks prior to communicating the datasets/segments to the external/third-party entities for quantum-levelprocessing. Once the data set/data blocks have been quantum-levelprocessed and returned to the data owner, the obfuscation isremoved/reversed from the data set/data block.

In still further embodiments of the invention, the data set and/or datablocks may be injected with “dummy” data (i.e., benign information thatdoes not contain any useful data, but serves to reserve space where realdata is nominally present). Insertion of dummy data further preventsbreached data from being read/used by a wrongdoer. In specificembodiments of the invention the “dummy” data may be logicallyprogrammed (i.e., so-called smart “dummy” data) so that the data ownercan forensically discern whether the dummy data has been accessed, reador otherwise manipulated.

In additional embodiments of the invention, the various functions of thesystem are segregated in individual trusted zones, such that processingmay occur in a trusted zone absent knowledge of rules that being appliedto the processing and/or upstream/downstream processing parameters. Forexample, data set segmentation, data set re-formation, the rulesassociated with data segmentation and re-formation and, in someembodiments, the communication/transfer of data sets are segregated inseparate trusted zones. In this regard the trusted zones allow forsegmentation and reformation rules to be applied without thecorresponding segmentation and reformation algorithm being aware ofwhich segmentation/reformation rules are being applied. Additionally, inthose embodiments in which the communication/transfer occurs within aseparate trusted zone, the data segmentation and re-formation may occurabsent knowledge as to which external/third-party entity processed adata segment.

A system for determining security measures for a data set requiringquantum-level computing defines first embodiments of the invention. Thesystem includes a distributed computing network configured tocommunicate data amongst a plurality of computing devices and one ormore external entities, each entity controlling one or more of theplurality of computing devices configured for quantum level-computingprocessing. The system additionally includes a computer platformincluding a memory and one or more processors in communication with thememory. In addition, the system includes a data set security measuredetermining module stored in the memory, executable by the one or moreprocessors and configured to receive the data set determined to requirequantum-level computing and determine one or more security measures toapply to the data set based at least on a level of confidentialityassociated with data in the data set and timing requirements associatedwith processing the data set. Additionally, the system includes aplurality of security measure modules stored in the memory, executableby the one or more processors and configured to apply security measuresto the data set as determined by the data set security measuredetermining module. In addition, the system includes a datacommunication module stored in the memory executable by the processorand configured to initiate communication of at least a portion of thedata set to one or more external quantum-level processing entities. Theexternal entities are configured to process the data block via thecorresponding one or more of the computing devices configured forquantum-level computing processing. Moreover, the system includes asecurity measure removal module stored in the memory, executable by theone or more processors and configured to, in response to receiving thequantum-level processed data from the one or more external quantum-levelprocessing entities, remove the one or more security measures from thedata set.

In specific embodiments of the system, the data communication modulefurther comprises an external entity selection sub-module configured toselect one of the external entities for quantum-level computingprocessing of the data set based on predetermined external entityselection rules, wherein the predetermined external entity selectionrules are based on one or more of type of data in the data block,external entity quantum-level computing processing capabilities andexternal entity security capabilities.

In still further specific embodiments the system includes a dataprocessing level-determining module stored in the memory, executable bythe processor and configured to determine that the data set requiresquantum-level computing.

In additional specific embodiments of the system, the plurality ofsecurity measure modules include a data segmentation module configuredto segment the data set into a plurality of data blocks based onpredetermined data segmentation rules. In specific embodiments of thesystem, the data segmentation module is further configured to segmentthe data set into the plurality of data blocks by at least one ofrandomly determining which data elements to include in the data blocksand systematically determining which data elements to include in thedata blocks based on predetermined tiering criteria. In such embodimentsof the system, the data segmentation rules are further configured todetermine at least one of a size of each data block, and a sequence forthe plurality of data blocks and/or tiering criteria. In further relatedembodiments of the system, the data communication module furthercomprises an external entity selection sub-module configured to select,for each data block, one of the external entities for quantum-levelcomputing processing. In other related embodiments of the system, the asecurity measure removal module is further configured to receive thequantum-level computing processed data blocks from the differentexternal entities and combine the quantum-level computing processed datablocks to re-form the data set be applying re-formation rules. In stillrelated specific embodiments of the system, the data segmentation rulesand data re-formation rules are stored in a first trusted computingzone, the data segmentation module is stored in a second trustedcomputing zone and the security measure removal module is stored in athird trusted computing zone.

In other specific embodiments of the system, the plurality of securitymeasure modules include a data obfuscation module configured to performat least one of rearranging or shifting data elements in the data set.

While in still further specific embodiments of the system, the pluralityof security measure modules include a dummy data module configured togenerate dummy data and insert the dummy data into the data set. Inrelated embodiments of the system, the dummy data module is furtherconfigured to generate the dummy data as logically programmed dummy dataconfigured to record information associated with accessing the dummydata or attempting to access the dummy data.

In other specific embodiments the system includes a forensic analysismodule stored in the memory, executable by the processor and configuredto analyze the received quantum-level computing processed data blocks todetermine whether the data blocks have been accessed or read in anunauthorized manner.

A method for external processing of a data set requiring quantum-levelcomputing defines second embodiments of the invention. The methodincludes receiving the data set requiring quantum-level computingprocessing and determining one or more security measures to apply to thedata set based at least on a level of confidentiality associated withdata in the data set and timing requirements associated with processingthe data set. The method further includes applying, by a computingdevice processor, the one or more security measures to the data set and,in response to applying the one or more security measures to the dataset, electronically communicating at least a portion of the data set toone or more external quantum-level processing entities. In addition, themethod includes, in response to receiving the quantum-level processeddata from the one or more external quantum-level processing entities,removing the one or more security measures from the data set.

In specific embodiments of the method, determining one or more securitymeasures further includes determining a segmentation scheme forsegmenting the data set into a plurality of data blocks. Thesegmentation scheme comprises size of data blocks and sequencing of datablocks. In related embodiments the method may further includedetermining an external entity capable of quantum-level computingprocessing for each of the data blocks. The determination is based atleast one or more of type of data in the data block, external entityquantum-level computing processing capabilities and external entitysecurity capabilities.

In other specific embodiments of the method, determining one or moresecurity measures further includes determining, based on obfuscationrules, an obfuscation scheme for rearranging or shifting the data in thedata set.

In still further specific embodiments of the method, determining one ormore security measures further includes determining a dummy datainsertion scheme for inserting dummy data into the data set.

A computer program product including a non-transitory computer-readablemedium defines third embodiments of the invention. The computer-readablemedium includes a first set of codes for causing a computer to receive adata set requiring quantum-level computing processing and a second setof codes for causing a computer to determine one or more securitymeasures to apply to the data set based at least on a level ofconfidentiality associated with data in the data set and timingrequirements associated with processing the data set. Thecomputer-readable medium additionally includes a third set of codes forcausing a computer to apply the one or more security measures to thedata set and a fourth set of codes for causing a computer to, inresponse to applying the one or more security measures to the data set,electronically communicate at least a portion of the data set to one ormore external quantum-level processing entities. Moreover, thecomputer-readable medium includes a fifth set of codes for causing acomputer to, in response to receiving the quantum-level processed datafrom the one or more external quantum-level processing entities, removethe one or more security measures from the data set.

In specific embodiments of the computer program product, the second setof codes is further configured to cause the computer to determine theone or more security measures, wherein the one or more security measuresinclude (i) segmenting the data set into data blocks, (ii) obfuscatingthe data to rearrange or shift data elements within the data set or thedata blocks, and (iii) generating and inserting dummy data within thedata set or the data blocks.

Thus, systems, apparatus, methods, and computer program products hereindescribed in detail below provide for determining and applying securitymeasures, such as segmentation, obfuscation and/or insertion of dummydata, to data sets determined to require external quantum-levelcomputing processing. The security measures herein described andimplemented lessens the risk associated with the data beingbreached/comprised at the external entity.

The features, functions, and advantages that have been discussed may beachieved independently in various embodiments of the present inventionor may be combined with yet other embodiments, further details of whichcan be seen with reference to the following description and drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

Having thus described embodiments of the invention in general terms,reference will now be made the accompanying drawings, wherein:

FIG. 1 provides a schematic diagram of an exemplary system forimplementing security measures for data sets requiring externalquantum-level computing processing, in accordance with embodiments ofthe present invention;

FIG. 2 provides a block diagram of a quantum optimizer apparatus, inaccordance with embodiments of the present invention;

FIG. 3 provides a block diagram of a system for implementing datasegmentation for data sets requiring external quantum-level computingprocessing, in accordance with embodiments of the present invention;

FIG. 4 provides a block diagram of a system for determining andimplementing security measures for a data set requiring externalquantum-level computing processing, in accordance with embodiments ofthe present invention;

FIG. 5 provides a schematic diagram of system for implementing datasegmentation in a trusted zone environment, in accordance withembodiments of the present invention;

FIG. 6 provides a flow diagram of a method for implementing datasegmentation for data sets requiring external quantum-level computingprocessing, in accordance with embodiments of the present invention; and

FIG. 7 provides a flow diagram of a method for determining andimplementing security features for a data set requiring externalquantum-level computing processing, in accordance with embodiments ofthe present invention.

DETAILED DESCRIPTION OF EMBODIMENTS OF THE INVENTION

Embodiments of the present invention will now be described more fullyhereinafter with reference to the accompanying drawings, in which some,but not all, embodiments of the invention are shown. Indeed, theinvention may be embodied in many different forms and should not beconstrued as limited to the embodiments set forth herein; rather, theseembodiments are provided so that this disclosure will satisfy applicablelegal requirements. Like numbers refer to like elements throughout.

As will be appreciated by one of skill in the art in view of thisdisclosure, the present invention may be embodied as an apparatus (e.g.,a system, computer program product, and/or other device), a method, or acombination of the foregoing. Accordingly, embodiments of the presentinvention may take the form of an entirely hardware embodiment, anentirely software embodiment (including firmware, resident software,micro-code, etc.), or an embodiment combining software and hardwareaspects that may generally be referred to herein as a “system.”Furthermore, embodiments of the present invention may take the form of acomputer program product comprising a computer-usable storage mediumhaving computer-usable program code/computer-readable instructionsembodied in the medium.

Any suitable computer-usable or computer-readable medium may beutilized. The computer usable or computer-readable medium may be, forexample but not limited to, an electronic, magnetic, optical,electromagnetic, infrared, or semiconductor system, apparatus, ordevice. More specific examples (e.g., a non-exhaustive list) of thecomputer-readable medium would include the following: an electricalconnection having one or more wires; a tangible medium such as aportable computer diskette, a hard disk, a time-dependent access memory(RAM), a read-only memory (ROM), an erasable programmable read-onlymemory (EPROM or Flash memory), a compact disc read-only memory(CD-ROM), or other tangible optical or magnetic storage device.

Computer program code/computer-readable instructions for carrying outoperations of embodiments of the present invention may be written in anobject oriented, scripted or unscripted programming language such asJAVA, PERL, SMALLTALK, C++ or the like. However, the computer programcode/computer-readable instructions for carrying out operations of theinvention may also be written in conventional procedural programminglanguages, such as the “C” programming language or similar programminglanguages.

Embodiments of the present invention are described below with referenceto flowchart illustrations and/or block diagrams of methods orapparatuses (the term “apparatus” including systems and computer programproducts). It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer program instructions. These computer program instructions maybe provided to a processor of a general purpose computer, specialpurpose computer, or other programmable data processing apparatus toproduce a particular machine, such that the instructions, which executeby the processor of the computer or other programmable data processingapparatus, create mechanisms for implementing the functions/actsspecified in the flowchart and/or block diagram block or blocks.

These computer program instructions may also be stored in acomputer-readable memory that can direct a computer or otherprogrammable data processing apparatus to function in a particularmanner, such that the instructions stored in the computer-readablememory produce an article of manufacture including instructions, whichimplement the function/act specified in the flowchart and/or blockdiagram block or blocks.

The computer program instructions may also be loaded onto a computer orother programmable data processing apparatus to cause a series ofoperational steps to be performed on the computer or other programmableapparatus to produce a computer implemented process such that theinstructions, which execute on the computer or other programmableapparatus, provide steps for implementing the functions/acts specifiedin the flowchart and/or block diagram block or blocks. Alternatively,computer program implemented steps or acts may be combined with operatoror human implemented steps or acts in order to carry out an embodimentof the invention.

Thus, as described in more detail below, the present invention appliessecurity measures to data sets requiring external/third-partyquantum-level processing. By providing such security measures to thedata sets prior to communicating/transferring the data to theexternal/third-party data processors, the present invention limits, ifnot eliminates, the risk associated with the data beingbreached/comprised, either intentionally or unintentionally, by theexternal/third-party entity.

In specific embodiments of the invention, the security measures that areapplied to the data set are determined based on at least one of thesensitivity/confidentiality of the data set and the timing requirementsfor processing the data (e.g., whether the data set requiresimmediate/real-time processing or whether the data set can be processedin due course). The security measures may include, but are not limitedto, (i) segmenting the data such that a different external entity isassigned to each segment, (ii) obfuscating the data set or data segmentby rearranging the data elements, and (iii) inserting dummy data intothe data set or data segment.

Accordingly, in specific embodiments of the invention, the data set maybe segmented into discrete random or systematic (based on tieringcriteria) data blocks with each individual data block beingcommunicated/transferred to a different external/third-party entity forsubsequent quantum-level data processing. As a result, none of theexternal/third-party entities have access to the entire data set and, assuch, in the event that the data possessed by external/third-partyentity is breached/comprised, the risk posed to the data owner isminimized.

In other embodiments of the invention, the data set and/or the datablocks are obfuscated, such that asymmetrical cryptography or the likeis implemented to re-arrange/shift the data in the data set and/or datablocks prior to communicating/transferring the data sets/segments to theexternal/third-party entities for quantum-level processing. Once thedata set/data blocks have been quantum-level processed and returned tothe data owner, the obfuscation is removed from the data set/data block.

In still further embodiments of the invention, the data set and/or datablocks may be injected with “dummy” data (i.e., benign information thatdoes not contain any useful data, but serves to reserve space where realdata is nominally present). Insertion of dummy data further preventsbreached data from being read/used by a wrongdoer. In specificembodiments of the invention the “dummy” data may be logicallyprogrammed (i.e., so-called smart “dummy” data) so that the data ownercan discern whether the dummy data has been accessed, read or otherwisemanipulated.

In additional embodiments of the invention, the various functions of thesystem are segregated in different trusted zones and, as such,processing occurs in a silo-like fashion without the processing modulebeing cognizant of rules that are being applied and/or upstream anddownstream processing parameters. For example, in specific embodimentsof the invention, data set segmentation, data set re-formation, therules associated with data segmentation and re-formation and, in someembodiments, the communication/transfer of data sets are segregated inseparate trusted zones. Trusted zones allow for segmentation andreformation rules to be applied without the corresponding segmentationand reformation algorithm being aware of which segmentation/reformationrules are being applied. Additionally, in those embodiments in which thecommunication/transfer occurs within a separate trusted zone, the datasegmentation and re-formation may occur absent knowledge as to whichexternal/third-party entity processed a data block.

Referring to FIG. 1, a schematic diagram is provided of a system 100 forimplementing data segmentation for a data sets requiringexternal/third-party entity quantum-level computing processing, inaccordance with embodiments of the present invention. The system 100 isimplemented in a distributed communication environment via computingnetwork 200, which typically comprises the Internet and may includevarious sub-nets and/or intranets. System 100 includes system 300 whichmay comprise one or more computing devices. System 300 includes acomputing platform 302 having a memory 304 and one or more processors306 in communication with the memory. The memory 304 stores datasegmentation module 310 that is executable by processor(s) 306 andconfigured to receive a data set 312 that has been determined to requirequantum-level processing and segment the data set 312 into a pluralityof data blocks by applying segmentation rules.

The memory 304 additionally stores data block communication module 320that is executable by the processor(s) 306 and configured to select, foreach data block 312, an external entity 322-1, 322-2, 322-3 forquantum-level computing processing of the data block 312 and initiatecommunication, via distributed communication network 200, of the datablocks 312 to the corresponding selected external entity 322-1, 322-2,322-3 or the like.

The external entities 322-1, 322-2, 322-3 include a quantum computingapparatus 700-1, 700-2, 700-3 or the like configured to providequantum-level computing. As used herein, a quantum computing apparatus700-1, 700-2, 700-3 or the like is any computer that utilizes theprinciples of quantum physics to perform computational operations.Several variations of quantum computer design are known, includingphotonic quantum computing, superconducting quantum computing, nuclearmagnetic resonance quantum computing, and/or ion-trap quantum computing.Regardless of the particular type of quantum computing apparatusimplementation, all quantum computers encode data onto qubits. Whereasclassical computers encode bits into ones and zeros, quantum computersencode data by placing a qubit into one of two identifiable quantumstates. Unlike conventional bits, however, qubits exhibit quantumbehavior, allowing the quantum computer to process a vast number ofcalculations simultaneously.

A qubit can be formed by any two-state quantum mechanical system. Forexample, in some embodiments, a qubit may be the polarization of asingle photon or the spin of an electron. Qubits are subject to quantumphenomena that cause them to behave much differently than classicalbits. Quantum phenomena include superposition, entanglement, tunneling,superconductivity, and the like.

Two quantum phenomena are especially important to the behavior of qubitsin a quantum computing apparatus: superposition and entanglement.Superposition refers to the ability of a quantum particle to be inmultiple states at the same time. Entanglement refers to the correlationbetween two quantum particles that forces the particles to behave in thesame way even if they are separated by great distances. Together, thesetwo principles allow a quantum computer to process a vast number ofcalculations simultaneously.

In a quantum computer with n qubits, the quantum computer can be in asuperposition of up to 2^(n) states simultaneously. By comparison, aclassical computer can only be in one of the 2^(n) states at a singletime. As such, a quantum computer can perform vastly more calculationsin a given time period than its classical counterpart. For example, aquantum computer with two qubits can store the information of fourclassical bits. This is because the two qubits will be a superpositionof all four possible combinations of two classical bits (00, 01, 10, or11). Similarly, a three qubit system can store the information of eightclassical bits, four qubits can store the information of sixteenclassical bits, and so on. A quantum computer with three hundred qubitscould possess the processing power equivalent to the number of atoms inthe known universe.

Quantum computing apparatus 700-1, 700-2, 700-3 and the like canoutperform classical computers in a specialized set of computationalproblems. Principally, quantum computers have demonstrated superiorityin solving optimization problems. Generally speaking, the term“optimization problem” as used throughout this application describe aproblem of finding the best solution from a set of all feasiblesolutions. In accordance with some embodiments of the present invention,quantum computing apparatus 700-1, 700-2, 700-3 as described herein aredesigned to perform adiabatic quantum computation and/or quantumannealing. Quantum computers designed to perform adiabatic quantumcomputation and/or quantum annealing are able to solve optimizationproblems as contemplated herein in real time or near real time.

Embodiments of the present invention make use of quantum ability ofoptimization by utilizing a quantum computing apparatus in conjunctionwith a classical/binary computer. Such a configuration enables thepresent invention to take advantage of quantum speedup in solvingoptimization problems, while avoiding the drawbacks and difficulty ofimplementing quantum computing to perform non-optimization calculations.Examples of quantum computing apparatus 700-1, 700-2, 700-3 that can beused to solve optimization problems parallel to a classic system aredescribed in, for example, U.S. Pat. No. 9,400,499, 9,207,672, each ofwhich is incorporated herein by reference in its entirety.

FIG. 2 is a block diagram of an exemplary quantum optimizer 710 that canbe used in parallel with a classical computer to solve optimizationproblems. The quantum Optimizer 710 is comprised of a data extractionsubsystem 706, a quantum computing subsystem 702, and an actionsubsystem 704. As used herein, the term “subsystem” generally refers tocomponents, modules, hardware, software, communication links, and thelike of particular components of the system. Subsystems as contemplatedin embodiments of the present invention are configured to perform taskswithin the system as a whole.

As depicted in FIG. 2, the data extraction subsystem 706 communicateswith the network to extract data for optimization. It will be understoodthat any method of communication between the data extraction subsystem706 and the network is sufficient, including but not limited to wiredcommunication, Radiofrequency (RF) communication, BLUETOOTH ®, WIFI ®,and the like. The data extraction subsystem 706 then formats the datafor optimization in the quantum computing subsystem 702.

As further depicted in FIG. 2, the quantum computing subsystem 702comprises a quantum computing infrastructure 714, a quantum memory 712,and a quantum processor 710. The quantum computing infrastructure 702comprises physical components for housing the quantum processor 710 andthe quantum memory 712. The quantum computer infrastructure furthercomprises a cryogenic refrigeration system to keep the quantum computingsubsystem 702 at the desired operating temperatures. In general, thequantum processor 710 is designed to perform adiabatic quantumcomputation and/or quantum annealing to optimize data received from thedata extraction subsystem 706. The quantum memory 712 is comprised of aplurality of qubits used for storing data during operation of thequantum computing subsystem 704. In general, qubits are any two-statequantum mechanical system. It will be understood that the quantum memory712 may be comprised of any such two-state quantum mechanical system,such as the polarization of a single photon, the spin of an electron,and the like.

The action subsystem 704 communicates the optimized data from thequantum computing subsystem 702 over the network. It will be understoodthat any method of communication between the data extraction subsystem706 and the network is sufficient, including but not limited to wiredcommunication, Radiofrequency (RF) communication, BLUETOOTH ®, WIFI ®,and the like.

Returning to FIG. 1, memory 304 of system 300 additionally stores datare-formation module 330 that is executable by the processor(s) 306 andconfigured to receive the data blocks 314 processed by the externalentities 322-1, 322-2, 322-3 and the like implementing the quantumcomputing apparatus 700-1, 700-2, 700-3 and the like described above andcombine the data blocks 314 to re-form the data set 312 by applyingre-formation rules.

Referring to FIG. 3 a block diagram is presented of a system 300, whichis configured for segmenting data sets into data blocks for subsequentexternal quantum-level computing processing, in accordance withembodiments of the present invention. In addition to providing greaterdetail, FIG. 3 highlights various alternate embodiments of theinvention. The system 300 may include one or more of any type ofcomputing device, such as one or more servers, personal computers or thelike. The present systems and methods can accordingly be performed onany form of one or more computing devices.

The system 300 includes a computing platform 302 that can receive andexecute algorithms, such as routines, and applications. Computingplatform 302 includes memory 304, which may comprise volatile andnon-volatile memory, such as read-only and/or random-access memory (RAMand ROM), EPROM, EEPROM, flash cards, or any memory common to computerplatforms. Further, memory 304 may include one or more flash memorycells, or may be any secondary or tertiary storage device, such asmagnetic media, optical media, tape, or soft or hard disk. Moreover,memory 304 may comprise cloud storage, such as provided by a cloudstorage service and/or a cloud connection service.

Further, computing platform 302 also includes one or more processors306, which may be an application-specific integrated circuit (“ASIC”),or other chipset, processor, logic circuit, or other data processingdevice. Processors 306 or other processor such as ASIC may execute anapplication programming interface (“API”) 308 that interfaces with anyresident programs, such as data processing-level determining module 340,data segmentation module 310, data block security module 350, data blockcommunication module 320, data block forensic analysis module 380 anddata set reformation module 330 and routines, sub-modules associatedtherewith or the like stored in the memory 304 of the system 300.

Processor 306 includes various processing subsystems (not shown in FIG.3) embodied in hardware, firmware, software, and combinations thereof,that enable the functionality of system 300 and the operability of thesystem 300 on a network. For example, processing subsystems allow forinitiating and maintaining communications and exchanging data with othernetworked devices, such as those quantum-level computing apparatus700-1, 700-2, 700-3 shown in FIG. 1. For the disclosed aspects,processing subsystems of processor 306 may include any subsystem used inconjunction with data processing-level determining module 340, datasegmentation module 310, data block security module 350, data blockcommunication module 320, data block forensic analysis module 380 anddata set reformation module 330 and related algorithms, sub-algorithms,modules, sub-modules thereof

Computer platform 302 may additionally include communications module(not shown in FIG. 3) embodied in hardware, firmware, software, andcombinations thereof, that enables communications among the variouscomponents of the system 300, as well as between the other networkeddevices. Thus, communication module may include the requisite hardware,firmware, software and/or combinations thereof for establishing andmaintaining a network communication connection.

In specific embodiments of the system 300, the memory 304 stores dataprocessing-level determining module 340 that is configured to determinethe level of processing required of the data set. The level ofprocessing may include, but is not limited to, quantum-level computing342 and conventional binary-level computing 344. In specific embodimentsof the invention, the determination of the level of processing mayinclude a combination of quantum-level computing 342 and binary-levelcomputing 344. In such embodiments of the invention, the dataprocessing-level determining module 340 may determine which processingis to be performed by the quantum-level computing 342 and whichprocessing is to be performed by conventional binary-level computing344. The data processing-level determining module 340 is configured todetermine the level of processing required based on the complexity ofthe computations, the accuracy required of the computations, processingtime requirements and the like.

Further the memory 304 of system 300 stores data segmentation module 310that is configured to receive a data set 312 that have been determinedto require quantum-level computing processing and segment the data set312 into a plurality of data blocks 314 by applying predeterminedsegmentation rules 316. The minimum quantity of data blocks 314 may bebased on the quantity of external entities 322 that the data owner hasengaged in quantum-level computing processing. Segmentation rules 316may be defined that determine the size 317 of the data block 314 (e.g.,defined by a unit of memory size or quantity of data elements) and orthe sequence/order 318 of data blocks 314 and/or the tiering/slicingcriteria 319 (discussed, infra.). The size of the data blocks may beuniform or variable. The size of variable sized data blocks 314 may bebased on the quantum-level computing capabilities of the external entitythat is selected or will be selected to process the data block. In otherembodiments of the invention, the size of variable sized may be randomsubject to a minimum size requirement. The sequencing/order 318 of thedata blocks provides for the data blocks to include a sequence/orderidentifier, which is needed to subsequently reform the data set 312.

In specific embodiments of the system, the data segmentation module 310is configured to randomly determine (through application of “horizontal”analytics) which data from the data set 312 to include in the datablocks 316 (i.e., so-called “chopping” or “blocking” of the data set312).

In other embodiments of the system, the data segmentation module 310 isconfigured to systematically determine (through application of“vertical” analytics which data from the data set in include in the datablocks 316. In such embodiments, predetermined rules 316 definecriteria/requirements 319 as to which data from the data set 312 toinclude in the data blocks 316 (i.e., so-called “slicing” or “tiering”of the data set 312). The criteria 319 may be based on anyclassification or attribute associated with data elements in the dataset 312. For example, in those embodiments in which the data set 312includes data elements associated with individuals, attributesassociated with the individuals, (e.g., age range, gender, region ofphysical location or the like) may be used to slice or tier the data set312 into tiers/slices of data (collectively, referred to herein as datablock 316). In such embodiments of the invention, each tier/slice of thedata set 312 may be subsequently communicated to different externalentities for quantum-level computing processing. It should be noted thatmultiple tiers of data may be employed in the segmentation of the dataset 312. For example, the entire data set 312 may first be segmentedinto first tiers based on age groups of the individuals associated withdata elements, and subsequently one or more of the first tier segmentsmay be segmented into second tiers based on the gender of theindividuals associated with the data elements and so on. In specificembodiments of the system each of the tiered segments may be designatedfor a specific one of the plurality of different external entities forsubsequent quantum-level computing processing.

In other embodiments of the system, the data segmentation module 310 isconfigured to use both random chopping/blocking of the data set 312 andsystematic slicing/tiering of the data set 312 to form the data blocks316. In such embodiments of the system, random chopping/blocking of thedata set 312 may occur first, followed by one or more instances ofsystematic slicing/tiering of the data set 312 based on predeterminedtiering criteria. While in other embodiments of the system, the data set312 may be systematically sliced/tiered first, followed by one or moreinstances of randomly chopping/blocking the data set 312. In thisregard, random chopping/blocking of the data set 312 (i.e., horizontalanalytics) and systematic slicing/tiering of the data set 312 (i.e.,vertical analytics) may be applied to the data set in any order and/orin any number of instances.

Memory 304 of system 300 additionally includes data block securitymodule 350 that is configured to provide additional security measures todata blocks 314 based on predetermined security rules 360. Securityrules 360 may be based on the data sensitivity 362 (i.e., more sensitivedata may provide for heightened security measures), timing requirements364 for processing the data (i.e., immediate/real-time processingrequirements may dictate less security measures, while processing withminimal or no time requirements may provide for more/full securitymeasures) and external entity security capabilities 366 (i.e., lesssecurity capabilities at the external entity may dictate more/fullsecurity measures, while more security measures at the external entitymay provide for less security measures).

The data block security module 350 may include obfuscation sub-module352 that is configured to re-arrange or otherwise shift data elementswithin a data block 314. It should be noted that the obfuscation schemeapplied to the data blocks 314 may vary by data block, such that onedata block may be subject to a first obfuscation scheme, while a seconddata block may be subject to a second obfuscation scheme different thanthe first obfuscation scheme. For example, a first obfuscation schememay provide for shifting certain data elements horizontally to the leftby a certain number of columns, while a second obfuscation scheme mayprovide for shifting certain data elements vertically upward by acertain number of rows. Moreover, while examples herein provide forshifting of data elements, other obfuscation schemes may be implementedthat rearrange data elements by other means.

In further embodiments of the system, data security module 350 mayinclude dummy data sub-module 354 that is configured to insert “dummy”data in the data block. Dummy data as used herein is benign informationthat does not contain any useful data, but serves to reserve space wherereal data is nominally present. Dummy data serves to make the data blockless comprehensible in the event that the data block is compromised(i.e., unauthorized access or use of the data). In specific embodimentsof the invention the dummy data may be logically programmed (i.e.,so-called smart “dummy” data 356) to record or otherwise detectaccessing (or attempted accessing/reading) of the dummy data. In thisregard, the owner of the data may be able to subsequently detectunauthorized accessing of the data block or an attempt to access thedata at the external entity.

The memory 304 of system 300 additionally includes data blockcommunication module 320 that is configured to select an external entity322 for each of the plurality of data blocks 314 based on externalentity selection rules 370 and initiate communication of the data block314 to the selected external entity 322. Any one external entity may beselected to process one or more of the data blocks 314. The externalentity selection rules 370 may be based on data sensitivity 372,security capabilities 374 of the external entity, processing capability376 of the external entity, including processing turnaround times andthe like.

Additionally, system 300 may store data block forensic analysis module380 that is configured to forensically analyze data blocks 314 once thedata blocks 314 have been quantum-level computing processed by theexternal entities 322 and communicated back to the system 300. Forensicanalysis provides for analyzing the data block to determine if the datahas been accessed, read or otherwise used in an unauthorized manner. Inthose embodiments of the invention, in which the data blocks 314 includesmart “dummy” data 356, the forensic analysis may include obtainingrecorded information associated with the smart “dummy' data 356 thatindicated accessing or an attempted access of the dummy data.

Further, system 300 stores data re-formation module 300 that isconfigured to combine the data blocks 314 to re-form the data set inaccordance with data re-formation rules 332. The data re-formation rulesmay be data block or data set specific and take into account the type ofdata segmentation implemented by the data segmentation module 310 andthe security measures applied by the data block security module 350. Inthis regard, the data reformation module 300 may be configured to removesecurity measures from the data blocks 314 (or in some embodiments,after the data set 312 has been re-formed), such as, but not limited to,removing previously applied obfuscation and/or dummy data.

Referring to FIG. 4 a block diagram is presented of a system 400, whichis configured for determining security measures for a data setdetermined to require external quantum-level computing processing, inaccordance with embodiments of the present invention. In addition toproviding greater detail, FIG. 4 highlights various alternateembodiments of the invention. The system 400 may include one or more ofany type of computing device, such as one or more servers, personalcomputers or the like. The present systems and methods can accordinglybe performed on any form of one or more computing devices.

The system 400 includes a computing platform 402 that can receive andexecute algorithms, such as routines, and applications. Computingplatform 402 includes memory 404, which may comprise volatile andnon-volatile memory, such as read-only and/or random-access memory (RAMand ROM), EPROM, EEPROM, flash cards, or any memory common to computerplatforms. Further, memory 404 may include one or more flash memorycells, or may be any secondary or tertiary storage device, such asmagnetic media, optical media, tape, or soft or hard disk. Moreover,memory 404 may comprise cloud storage, such as provided by a cloudstorage service and/or a cloud connection service.

Further, computing platform 402 also includes one or more processors406, which may be an application-specific integrated circuit (“ASIC”),or other chipset, processor, logic circuit, or other data processingdevice. Processors 406 or other processor such as ASIC may execute anapplication programming interface (“API”) 408 that interfaces with anyresident programs, such as data and routines, sub-modules associatedtherewith or the like stored in the memory 404 of the system 400.

Processor 406 includes various processing subsystems (not shown in FIG.3) embodied in hardware, firmware, software, and combinations thereof,that enable the functionality of system 400 and the operability of thesystem 400 on a network. For example, processing subsystems allow forinitiating and maintaining communications and exchanging data with othernetworked devices, such as those quantum-level computing apparatus700-1, 700-2, 700-3 shown in FIG. 1. For the disclosed aspects,processing subsystems of processor 406 may include any subsystem used inconjunction with data processing-level determining module 340 data setsecurity measure determining module 410, data segmentation module 430,obfuscation module 440, dummy data module 450, data block communicationmodule 460, forensic analysis module 480 and security measure removalmodule 490 and related algorithms, sub-algorithms, modules, sub-modulesthereof.

Computer platform 402 may additionally include communications module(not shown in FIG. 4) embodied in hardware, firmware, software, andcombinations thereof, that enables communications among the variouscomponents of the system 400, as well as between the other networkeddevices. Thus, communication module may include the requisite hardware,firmware, software and/or combinations thereof for establishing andmaintaining a network communication connection.

In specific embodiments of the system 400, the memory 404 stores dataprocessing-level determining module 340 that is configured to determinethe level of processing required of the data set. The level ofprocessing may include, but is not limited to, quantum-level computing342 and conventional binary-level computing 344. In specific embodimentsof the invention, the determination of the level of processing mayinclude a combination of quantum-level computing 342 and binary-levelcomputing 344. In such embodiments of the invention, the dataprocessing-level determining module 340 may determine which processingis to be performed by the quantum-level computing 342 and whichprocessing is to be performed by conventional binary-level computing344. The data processing-level determining module 340 is configured todetermine the level of processing required based on the complexity ofthe computations, the accuracy required of the computations, processingtime requirements and the like.

Further the memory 404 of system 400 stores data set security measuredetermining module 410 that is configured to determining which securitymeasures 420 should be applied to a data set requiring external entityquantum-level computing processing. The determination as to whichsecurity measures should be applied may be based on the sensitivity 412of the data in the data set 312 (i.e., more sensitive data may providefor more/full security measures, while less sensitive data may providefor less security measures or less complex/intrusive security measures),the processing time requirements of the data set (i.e.,immediate/real-time processing may provide for less security measures orless complex/intrusive security measures, while processing with minimalor no processing time requirements may provide for more/full securitymeasures). The security measures 420 that may be determined and appliedmay include, but are not limited to, data segmentation, dataobfuscation, insertion of “dummy' data and the like.

As such, system 400 stores data segmentation module 430 that isconfigured to receive a data set 312 that have been determined torequire quantum-level computing processing and segment the data set 312into a plurality of data blocks 314 by applying predeterminedsegmentation rules 432. The minimum quantity of data blocks 314 may bebased on the quantity of external entities 322 that the data owner hasengaged in quantum-level computing processing. Segmentation rules 432may be defined that determine the size 434 of the data block 314 (e.g.,defined by a unit of memory size or quantity of data elements) and orthe sequence/order 436 of data blocks 314 and/or the tiering/slicingcriteria 438. The size of the data blocks may be uniform or variable.The size of variable sized data blocks 314 may be based on thequantum-level computing capabilities of the external entity that isselected or will be selected to process the data block. In otherembodiments of the invention, the size of variable sized may be randomsubject to a minimum size requirement. The sequencing/order 436 of thedata blocks provides for the data blocks to include a sequence/orderidentifier, which is needed to subsequently reform the data set 312.

As previously noted, in specific embodiments of the system, the datasegmentation module 430 may be configured to randomly determine (throughapplication of “horizontal” analytics) which data from the data set 312to include in the data blocks 316 (i.e., so-called “chopping” or“blocking” of the data set 312) and/or systematically determine (throughapplication of “vertical” analytics which data from the data set ininclude in the data blocks 316. In such embodiments, predetermined rules316 may define criteria/requirements 438 as to which data from the dataset 312 to include in the data blocks 316 (i.e., so-called “slicing” or“tiering” of the data set 312). The tiering criteria 438 may be based onany classification or attribute associated with data elements in thedata set 312. In such embodiments of the invention, each random block ofthe data set 312 and/or tier/slice of the data set 312 (eachcollectively referred to herein as data block 316) may be subsequentlycommunicated to different external entities for quantum-level computingprocessing. It should be noted that multiple tiers of data may beemployed in the segmentation of the data set 312 and/or combinations ofrandom chopping/blocking of the data set 312 and systematicslicing/tiering of the data set 312 may be used in unison to form thedata blocks 316. In such embodiments, random chopping/blocking of thedata set 312 (i.e., horizontal analytics) and systematic slicing/tieringof the data set 312 (i.e., vertical analytics) may be applied to thedata set in any order and/or in any number of instances.

Security measures/features 420 additionally includes obfuscation module440 that is configured to re-arrange or otherwise shift data elementswithin the data set 312 or data block 314. It should be noted that theobfuscation scheme applied to the data set 312 or data blocks 314 mayvary by within the data 312 or by data block 314, such that one sectionof a data set 312 or a data block 314 may be subject to a firstobfuscation scheme, while a second section of the data set 312 or seconddata block 314 may be subject to a second obfuscation scheme differentthan the first obfuscation scheme. For example, a first obfuscationscheme may provide for shifting certain data elements horizontally tothe left by a certain number of columns, while a second obfuscationscheme may provide for shifting certain data elements vertically upwardby a certain number of rows. Moreover, while examples herein provide forshifting of data elements, other obfuscation schemes may be implementedthat rearrange data elements by other means.

In further embodiments of the system 400, security measures/features 420may include dummy data module 450 that is configured to insert “dummy”data in the data set 312 or data block 314. In specific embodiments ofthe invention the dummy data may be logically programmed (i.e.,so-called smart “dummy” data 356) to record or otherwise detectaccessing (or attempted accessing/reading) of the dummy data. In thisregard, the owner of the data may be able to subsequently detectunauthorized accessing of the data block or an attempt to access thedata at the external entity.

The memory 404 of system 400 additionally includes data blockcommunication module 320 that is configured to select an external entity464 for the data set 312 or for each of the plurality of data blocks 314based on external entity selection rules 370 and initiate communicationof the data block 314 to the selected external entity 464. In thoseembodiments in which the data set 312 is not subjected to segmentation,a single external entity 464 is selected for quantum-level processing ofthe entire data set 312. In those embodiments in which the data set issubjected to data segmentation, each of the data blocks 314 are assignedto one of the plurality of external entities 464, such that the entiredata 312 is not processed by a single external entity 464. In thisregard, any one external entity may be selected to process one or moreof the data blocks 314. The external entity selection rules 470 may bebased on data sensitivity 472, security capabilities 474 of the externalentity, processing capability 476 of the external entity, includingprocessing turnaround times and the like.

Additionally, system 400 may store data block forensic analysis module480 that is configured to forensically analyze the data set 312 or datablocks 314 once the data set 312 or data blocks 314 have beenquantum-level computing processed by the external entities 322 andcommunicated back to the system 400. Forensic analysis provides foranalyzing the data set 312 or data block 314 to determine if the datahas been accessed, read or otherwise used in an unauthorized manner. Inthose embodiments of the invention, in which the data set 312 or datablocks 314 include smart “dummy” data 452, the forensic analysis mayinclude obtaining recorded information associated with the smart “dummy'data 452 that indicated accessing or an attempted access of the dummydata.

Further, system 300 stores security removal module 490 that isconfigured to remove or reverse the previously applied security measuresfrom the data set 312 or data blocks 314 based on security removal rules492. In specific embodiments of the invention, in which the data set 312was previously segmented into data blocks 314, the security removalmodule 490 is configured to combine the data blocks 314 to re-form thedata set 312 in accordance with data re-formation rules 332. In otherembodiments of the invention, in which obfuscation or dummy data waspreviously applied to the data set 312 or data blocks 314, the securityremoval module 490 is configured to remove previously appliedobfuscation and/or dummy data. The data re-formation rules may be datablock or data set specific and take into account the type of datasegmentation implemented by the data segmentation module 310 and thesecurity measures 420 applied.

Referring to FIG. 5 a schematic diagram is provided of system 100 inwhich the various functions and modules of the system 100 are segregatedin separate trust zones, in accordance with embodiments of the presentinvention. Specifically, data segmentation module 310 is disposed in afirst trusted zone 800-1, segmentation and reformation rules 316 and 322are disposed in a second trusted zone 800-2, data block communicationmodule 320 is disposed in a third trusted zone 800-3 and datare-formation module 330 is disposed in fourth trusted zone 800-4. WhileFIG. 5 depicts the trusted zones 800-1, 800-2, 800-3 and 800-4 as beingembodied in separate apparatus/devices and in communication viadistributed communication network 210, such as an intranet or the like,in other embodiments of the invention two or more of the trusted zones800-1, 800-2, 800-3 and 800-4 may be embodied in the same physicalapparatus/device.

A trusted zone, otherwise referred to as a security zone are logicalentities to which one or more interfaces are bound and serve as thebuilding block for apply policies. Trusted zones provide a means todistinguish groups of hosts (servers or the likes) and their resourcesfrom one another in order to apply different security policies/measuresto the hosts and their resources. In this regard, trusted zones haveactive security policies that enforce rules for the transit traffic, interms of what traffic can be communicated through the firewall and theactions needed to take place when the traffic is communicated throughthe firewall. Further, trusted zones employ screens that allow or denyall connection attempts that require passage from one trusted zone toanother. Thus, for every trusted zone, a predefined set of screenoptions can be set to detect and block various kinds of communicationthat the device determines to be potentially harmful. In addition,trusted zones include IP address books to identify members so thatsecurity policies can be applied to the trusted zone.

In accordance with embodiments of the present invention trusted zonesallow for the data segmentation module 310 and the data reformationmodule 330 to access and implement the segmentation rules 316 andre-formation rules 332 absent knowledge as to which segmentation rules316 or re-formation rules 332 are being applied to a give segmentationor re-formation instance. As a result a further layer of security isrealized, in that, a user gaining access to the data segmentation module310 via the first trusted zone 800-1 or the data re-formation module 330via the fourth trusted zone 800-4 is unable to recreate the datasegmentation scheme or the data re-formation scheme since the rulesapplied to segmentation and reformation are disposed in a separatetrusted zone 800-2.

In addition, in those embodiments of the invention in which the dataclock communication module 320 is disposed in a separate trusted zone,such as third trusted zone 800-3, segmentation and re-formation may beperformed absent knowledge of which external entity performed thequantum-level processing on the associated data block(s).

Referring to FIG. 6 a flow diagram is depicted of a method 500 forsegmenting data sets for subsequent external entity quantum-levelcomputing, in accordance with embodiments of the present invention. AtEvent 502, a data set is determined to require quantum-level computingprocessing, in addition to or in lieu of conventional binary-levelcomputing processing. The determination may be based on the complexityof the computation required, the accuracy required of the computationand/or the time allotted for completing the processing and/or otherfactors.

At Event 504, the data set determined to require quantum-level computingprocessing is segmented into a plurality of data blocks according todata segmentation rules. The data blocks may be generated to includerandom data elements (so-called horizontal analytics) and/or the datablocks may be generated through a systematic tiering/slicing of dataapproach (so-called vertical analytics) to include data elements thatmeet predetermined criteria associated with the data elements. The datasegmentation rules may define the size, in terms of memory storage ordata elements, of the data blocks, which may be uniform or variableand/or the sequencing/order of the data blocks and/or thetiering/slicing criteria

At Event 506, other security measures/features may be applied to thedata blocks bases on security measure rules. The other security measuresmay include, but are not limited to, obfuscation (i.e., rearranging orshifting of data elements within the data block) or insertion of dummydata or the like. The security measure rules may be based on thesensitivity of the data, the timing requirements for processing thedata, the security capabilities of the external entities and the like.

At Event 508, which may occur after of before determining and implantingother security measures/features, external entities are selected forquantum-level processing of the data blocks. The selection of theexternal entities may be based on an external entity selection rulesthat take into account the sensitivity of the data, the securitycapabilities of the external entities and the processing capabilities ofthe external entities. At Event 510, the data blocks are communicated tothe selected external entities.

At Event 512, in response to quantum-level computing processing of thedata blocks by the external entities, the processed data blocks arereceived and, at Event 514, the other security measures are removed fromthe data blocks. For example, the obfuscation is removed and the dummydata is removed from the data blocks. At Event 514, the data set isre-formed by combining the data blocks in accordance with re-formationrules.

Referring to FIG. 7 a flow diagram is depicted of a method 600 fordetermining and applying security measures to data sets for subsequentexternal entity quantum-level computing, in accordance with embodimentsof the present invention. At Event 602, a data set is determined torequire quantum-level computing processing, in addition to or in lieu ofconventional binary-level computing processing. The determination may bebased on the complexity of the computation required, the accuracyrequired of the computation and/or the time allotted for completing theprocessing and/or other factors.

At Event 604, security measures to be applied to the data set aredetermined based on at least one of the level of sensitivity of the dataand timing requirements for processing the data. The security measuresmay include, but are not limited to, segmenting the data into datablocks, obfuscating the data set or data blocks and inserting dummy datainto the data set or data blocks. At Event 606, the determined securitymeasures are applied to the data set.

At Event 608, which may occur after of before determining and implantingother security measures/features, an external entity is selected for thedata set or external entities are selected for the data blocks. Theselection of the external entities may be based on an external entityselection rules that take into account the sensitivity of the data, thesecurity capabilities of the external entities and the processingcapabilities of the external entities. At Event 610, the data set ordata blocks are communicated to the selected external entity/entities.

At Event 612, in response to quantum-level computing processing of thedata set or data blocks by the external entities, the processed data setor data blocks are received and, at Event 614, the security measures areremoved from the data blocks. For example, the data set is re-formed bycombining the data blocks in accordance with re-formation rules, theobfuscation is removed from the data set or data blocks and/or the dummydata is removed from the data set or blocks.

Thus, systems, apparatus, methods, and computer program productsdescribed above provide for determining and applying security measures,such as segmentation, obfuscation and/or insertion of dummy data, todata sets determined to require external quantum-level computingprocessing. The security measures herein described and implementedlessens the risk associated with the data being breached/comprised atthe external entity.

While certain exemplary embodiments have been described and shown in theaccompanying drawings, it is to be understood that such embodiments aremerely illustrative of and not restrictive on the broad invention, andthat this invention not be limited to the specific constructions andarrangements shown and described, since various other changes,combinations, omissions, modifications and substitutions, in addition tothose set forth in the above paragraphs, are possible.

Those skilled in the art may appreciate that various adaptations andmodifications of the just described embodiments can be configuredwithout departing from the scope and spirit of the invention. Therefore,it is to be understood that, within the scope of the appended claims,the invention may be practiced other than as specifically describedherein.

1. A system for determining security measures for data sets determinedto require quantum-level computing, the system comprising: a computerplatform including a memory and one or more processors in communicationwith the memory; a data processing level determining module stored inthe memory, executable by the one or more processors and configured toreceive a plurality of data sets and determine whether each of the datasets require quantum-level computing processing or binary-levelcomputing processing based on a complexity of computations required forprocessing the data set, an accuracy of the computations required of thedata set and processing time requirements for the data set; a data setsecurity measure determining module stored in the memory, executable bythe one or more processors and configured to receive one or more datasets determined to require quantum-level computing processing anddetermine one or more security measures to apply to each of the datasets determined to require quantum-level computing processing based atleast on a level of confidentiality associated with data in each of thedata sets and timing requirements associated with processing each of thedata sets; at least one security measure module stored in the memory,executable by the one or more processors and configured to applysecurity measures to each of the data sets determined to requirequantum-level computing as determined by the data set security measuredetermining module; and a data communication module stored in the memoryexecutable by the processor and configured to initiate communication ofat least a portion of each of the data sets determined to requirequantum-level computing to one or more external entities, wherein theexternal entities are configured to process the data set via thecorresponding one or more of the computing devices configured forquantum-level computing processing.
 2. The system of claim 1, furthercomprising a security measure removal module stored in the memory,executable by the one or more processors and configured to, in responseto receiving the quantum-level processed data from the one or moreexternal quantum-level processing entities, remove the one or moresecurity measures from each of the data sets.
 3. The system of claim 1,wherein the data communication module further comprises an externalentity selection sub-module configured to select one of the externalentities for quantum-level computing processing of the data set based onpredetermined external entity selection rules, wherein the predeterminedexternal entity selection rules are based on one or more of type of datain the data block, external entity quantum-level computing processingcapabilities and external entity security capabilities.
 4. The system ofclaim 1, wherein the plurality of security measure modules include adata segmentation module configured to segment each of the data setsinto a plurality of data blocks based on predetermined data segmentationrules.
 5. The system of claim 4, wherein the data segmentation module isfurther configured to segment each of the data sets into the pluralityof data blocks by at least one of (i) randomly determining which dataelements to include in the data blocks, and (ii) systematicallydetermining which data elements to include in the data blocks based onpredetermined tiering criteria.
 6. The system of claim 4, wherein thedata segmentation rules are further configured to determine at least oneof a size of each data block, a sequence for the plurality of datablocks and tiering criteria.
 7. The system of claim 4, wherein the datacommunication module further comprises an external entity selectionsub-module configured to select, for each data block, one of theexternal entities for quantum-level computing processing.
 8. The systemof claim 4, wherein the security measure removal module is furtherconfigured to receive the quantum-level computing processed data blocksfrom the different external entities and combine the quantum-levelcomputing processed data blocks to re-form a corresponding data set beapplying re-formation rules.
 9. The system of claim 8, wherein the datasegmentation rules and data re-formation rules are stored in a firsttrusted computing zone, the data segmentation module is stored in asecond trusted computing zone and the security measure removal module isstored in a third trusted computing zone.
 10. The system of claim 1,wherein the plurality of security measure modules include a dataobfuscation module configured to perform at least one of rearranging orshifting data elements in at least one of the data sets.
 11. The systemof claim 1, wherein the plurality of security measure modules include adummy data module configured to generate dummy data and insert the dummydata into at least one the data sets.
 12. The system of claim 11,wherein the dummy data module is further configured to generate thedummy data as logically programmed to record information associated withaccessing the dummy data or attempting to access the dummy data.
 13. Thesystem of claim 1, further comprising a forensic analysis module storedin the memory, executable by the processor and configured to analyze thereceived quantum-level computing processed data blocks to determinewhether the data blocks have been accessed or read in an unauthorizedmanner.
 14. A method for external processing of a data sets determinedto require quantum-level computing, the system comprising: receiving, bya computing device processor, a plurality of data sets set; determine,by a computing device processor, whether each of the data sets requirequantum-level computing processing or binary-level computing processingbased on a complexity of computations required for processing the dataset, an accuracy of the computations required of the data set andprocessing time requirements for the data set; determining, by acomputing device processor, one or more security measures to apply toeach of the data sets determined to require quantum-level computingprocessing based at least on (i) a level of confidentiality associatedwith data in the data set and timing requirements associated withprocessing each of the data sets; applying, by a computing deviceprocessor, the one or more security measures to each of the data setsdetermined to require quantum-level computing processing; in response toapplying the one or more security measures to each of the data setsdetermined to require quantum-level computing processing, electronicallycommunicating at least a portion of each of the data sets determined torequire quantum-level computing processing to one or more externalquantum-level processing entities.
 15. The method of claim 14, furthercomprising, in response to receiving the quantum-level processed datafrom the one or more external quantum-level processing entities,removing, by a computing device processor, the one or more securitymeasures from each of the data sets.
 16. The method of claim 14, whereindetermining one or more security measures further comprises determininga segmentation scheme for segmenting each of the data sets into aplurality of data blocks, wherein the segmentation scheme comprises sizeof data blocks and sequencing of data blocks.
 17. The method of claim14, further comprising determining, by a computing device processor, anexternal entity that is capable of quantum-level computing processingfor each of the data blocks, wherein the determination is based at leastone or more of type of data in the data block, external entityquantum-level computing processing capabilities and external entitysecurity capabilities.
 18. The method of claim 14, wherein determiningone or more security measures further comprises determining, based onobfuscation rules, an obfuscation scheme for rearranging the data in atleast one the data sets.
 19. A computer program product comprising: anon-transitory computer-readable medium comprising: a first set of codesfor causing a computer to receive a plurality of data sets; a second setof codes for causing a computer to determine whether each of the datasets require quantum-level computing processing or binary-levelcomputing processing based on a complexity of computations required forprocessing the data set, an accuracy of the computations required of thedata set and processing time requirements for the data set; a third setof codes for causing a computer to determine one or more securitymeasures to apply to each of the data sets determined to requirequantum-level computing processing based at least on a level ofconfidentiality associated with data in the data set and timingrequirements associated with processing each of the data sets; a fourthset of codes for causing a computer to apply the one or more securitymeasures to each of the data sets determined to require quantum-levelcomputing processing; and a fifth set of codes for causing a computerto, in response to applying the one or more security measures to each ofthe data sets determined to require quantum-level computing processing,electronically communicate at least a portion of each of each of thedata sets determined to require quantum-level computing processing toone or more external quantum-level processing entities.
 20. The computerprogram product of claim 19, further comprising a sixth set of codes forcausing a computer to, in response to receiving the quantum-levelprocessed data from the one or more external quantum-level processingentities, remove the one or more security measures from each of the datasets.