Distractional variable identification for authentication of resource distribution

ABSTRACT

A system for capturing communication variables associated with a communication between two or more parties and implementing a quantum optimizer to analyze the communication variables to determine the actual context of a communication held by one or more parties to the communication. Once the actual context is determined, a further determination is made as to whether the actual context poses or potentially poses a security threat to one or more parties to the communication or a third-party and, if so, notifies the party of the security threat. In this regard, parties to a communication that are unaware of the actual context of the communication held by another party are made aware of that actual context poses a security threat and, in some embodiments, notifies the parties while the communication is still occurring.

FIELD OF THE INVENTION

The present invention embraces a system for analyzing contextualinformation associated with a communication to determine an actualcontext of a communication. The quantum optimizer is configured toanalyze the contextual information to determine an actual context of thecommunication and whether the perceived context of the communicationposes a potential security threat. By employing a quantum optimizer,instead of a classical computer, to verify analyze the contextualinformation and make the determinations, the system is able toconstantly analyze all contextual information associated withcommunications and determine, in real-time or otherwise, the actualcontext of the communication.

BACKGROUND

In many instances individuals may be unaware that the communicationenvironment in which they are involved in is not what they perceive itto be. This is because the other party to the communication isattempting an act of deception in order to gain information and/ormisappropriate resources from the unknowing individuals or otherwiseposes a threat to the unknowing individuals.

Quantum computing involves theoretical computation systems that makedirect use of quantum-mechanical phenomena, such as superposition andentanglement, to perform operations on data. Whereas common digitalcomputing, otherwise referred to herein as classical computer apparatus,requires that the data be encoded into binary digits (i.e., bits), eachof which is always in one of two definite states (0 or 1), quantumcomputation uses quantum bits, which can be in superpositions of states.In this regard, quantum computing allows for a more robust computingenvironment, in which much larger volumes of data can be processed inshorter periods of time than would otherwise be realized by a classicalcomputer apparatus.

Therefore, a need exists to able to able determine the actual context ofa communication and, in the event, the actual context of thecommunication poses a potential security threat to one or more partiesto the communication, notify the parties and/or take other appropriateactions to circumvent the potential security threat. Specifically, aneed exists to implement quantum computing as a means of constantlyanalyzing all of the available contextual information associated withvarious different communication channels to able to identify, inreal-time or otherwise, the actual context of a communication and assessthe threat posed by the actual context.

SUMMARY

The following presents a simplified summary of one or more embodimentsin order to provide a basic understanding of such embodiments. Thissummary is not an extensive overview of all contemplated embodiments,and is intended to neither identify key or critical elements of allembodiments, nor delineate the scope of any or all embodiments. Its solepurpose is to present some concepts of one or more embodiments in asimplified form as a prelude to the more detailed description that ispresented later.

Embodiments of the present invention address the above needs and/orachieve other advantages by providing systems, apparatus, computerprogram products, methods and the like for implementing a quantumoptimizer to determine the actual context of a communication between twoor more parties and determine whether the actual context of thecommunication poses the potential for a security threat to one or moreparties to the communication.

The present invention operates under the assumption that in certaininstances, a party to a communication may perceive the context of thecommunication to be different from the actual context/intention ofanother party to the communication. This may be because one of theparties to the communication is attempting to deceive another party intobelieving that the context of the communication is different than theactual context of the communication. For example, the deceiving partymay be attempting to obtain confidential information from the otherparty and/or misappropriate financial resources from the other party.However, all too often, human perception is unable to comprehend thatthe perceived context is different from the actual context of thecommunication.

The present invention implements a plurality of sensors that capturecommunication variables associated with a communication (e.g.,microphones that capture the audio of a communication, image capturingdevices that capture images and/or video of a communication, OpticalCharacter Recognition (OCR) means to capture/read text of acommunication and the like). The various communication variables aretransmitted to a quantum optimizer which is configured to analyze thecommunication variables, typically in real-time or near real-time, anddetermine the actual context of the communication. In this regard, thequantum optimizer may be configured to compare the communicationvariable to known context patterns to determine the actual context ofthe communication. For example, known context patterns may be associatedwith voice patterns that indicate nervousness or truthfulness of thespeaker, such certain hesitations and/or inflections in the voicepattern. Additionally, known context patterns may be associated withcertain audible or visual distraction techniques (i.e., introducingintentional background noises and/or visuals to distract a party to thecommunication). Once the actual context of the communication has beendetermined, a further determination is undertaken to assess whether theactual context poses or potentially poses a security threat to a partyto the communication or a third-party to the communication, and, if so,serves to notify the party and/or third-party.

The quantum optimizer is implemented in the present invention tofacilitate real-time or near real-time analysis of the communicationvariables and to insure the accuracy of the resulting actual contextdetermination. By providing for real-time or near real-time processing,the present invention is capable of notifying a party to thecommunication of the security threat or potential for the securitythreat while the communication is still occurring. Thus, allowing theparty to the communication to avoid further communication (i.e., avoidor at least lessen the security threat). In addition, the level ofaccuracy imparted by a quantum optimizer limits or eliminates thelikelihood of false positives occurring (i.e., determining an inaccurateactual context and subsequently notifying a party of a security threatwhen in fact no security threat exists).

A system for determining an actual context of a communication definesfirst embodiments of the invention. The system includes a classicalcomputing apparatus having a memory, at least one processor incommunication with the memory, and one or more sensors executable by theprocessor and configured to capture communication variables associatedwith an environment in which a communication is occurring and transmitthe communication variables to a quantum optimizer. In specificembodiments of the system the sensors may include, but are not limitedto, (i) a microphone configured to capture audio of at least one of thecommunication or the environment in which the communication occurs, (ii)an image capturing device configured to capture at least one of stillimages of an environment in which a communication occurs or a videostream of the an environment in which a communication occurs, (iii) anoptical character recognition sensor configured to capture text in anelectronic communication file and (iv) one or device sensors configuredto capture a state of a corresponding device associated with the devicesensor. In other specific embodiments of the system, the communicationmay include, but is not limited to, (i) a telephone conversion betweentwo or more parties, (ii) an interaction between one or more parties anda computing device, (iii) a face-to-face communication amongst two ormore parties, and (iv) an electronic communication transmitted from oneparty to one or more parties.

The system further includes a quantum optimizer that is in communicationwith the classical computer apparatus and includes a quantum memory anda quantum processor in communication with the quantum memory. Thequantum processor is configured to receive the communication variablesfrom the classical computing apparatus, and analyze the communicationvariables to determine an actual context of the communication as held byone or more of communication parties.

Additionally, either classic computing processor(s) or the quantumprocessor are configured to (i) determine that the actual context of thecommunication poses at least potential for a security threat to one ormore of the communication parties, and (ii) in response to determiningthat the actual context poses the security threat, transmit anindication of the at least potential for the security threat to theclassical computing apparatus.

In specific embodiments of the system, the quantum processor is furtherconfigured to analyze the communication variables to determine an actualcontext of the communication by comparing one or more of thecommunication variables to predetermined context patterns to determineat least one match between one or more of the communication variablesand one or more of the predetermined context patterns. In suchembodiments of the system, the quantum processor is further configuredto resolve conflict between two or more matches of the one or morecommunication variables and the predetermined context patterns. In stillfurther related embodiments of the system, the quantum processor isfurther configured to determine a confidence level to assign to thedetermined actual context, wherein the confidence level defines anaccuracy of the actual context. In such embodiments of the system,either the classical computing processor(s) or the quantum processor isfurther configured to determine that the actual context of thecommunication poses a security threat based at least on the confidencelevel assigned to the actual context.

In other specific embodiments of the system, the classical computingprocessor(s) is configured to pre-analyze one or more of the capturedcommunication variables to determine that the communication variablesrequire processing by the quantum processor of the quantum optimizer. Insuch embodiments of the system, transmitting the communication variablesto the quantum optimizer occurs based on the determination that thecommunication variables require processing by the quantum processor.

In still further specific embodiments of the system, (i) capturing thecommunication variables by the one or more sensors, (ii) transmittingthe communication variables to the quantum optimizer, (iii) analyzingthe communication variables to determine an actual context of thecommunication, (iv) determining that the actual context of thecommunication poses the security threat to one or more of the parties tothe communication, and (v) transmitting the indication of the securitythreat to the classical computing apparatus, occur in real-time or nearreal-time, such that the indication of the security threat istransmitted to a classical computing device associated with the one ormore parties to the communication while the communication is occurring.

In additional embodiments of the system, the classical computingapparatus includes a mobile communication device having a communicationcontext determining application stored in the memory and executable bythe processor. The application is configured to (i) receive a user inputthat activates the one or more sensors to capture the communicationvariables associated with the environment in which the user is a partyto the communication, (ii) and transmit the communication variables tothe quantum optimizer, and (iii) in response to the quantum optimizerdetermining an actual context of the communication and (iv) the actualcontext poses at least the potential for the security threat, receivethe indication of the at least the potential of the security threat. Inspecific related embodiments of the system, the communication contextdetermining application is further configured to receive the indicationwhile the communication is occurring.

A computer program product for determining an actual context of acommunication defines second embodiments of the invention. The computerprogram product includes a non-transitory computer-readable storagemedium having computer-executable instructions. The instructions areconfigured for capturing communication variables associated with anenvironment in which a communication is occurring and transmitting thecommunication variables to a quantum optimizer and, in response totransferring the communication variables to the quantum optimizer,receiving an indication that an actual context of the communication heldby one or more parties to the communication poses at least a potentialfor a security threat. The quantum optimizer is configured for receivingthe communication variables and analyzing the communication variables todetermine an actual context of the communication as held by one or moreof communication parties. Moreover, either the computer-readable storagemedium further includes computer-executable instructions or the quantumoptimizer is configured for determining that the actual context of thecommunication poses at least potential for a security threat to one ormore of the parties to the communication, and in response to determiningthat the actual context poses the security threat, transmitting theindication that the actual context of the communication held by the oneor more parties to the communication poses at least the potential forthe security threat.

In specific embodiments of the computer program product, thecomputer-readable storage medium further includes computer-executableinstructions for pre-analyzing one or more of the captured communicationvariables to determine that the communication variables requireprocessing by the quantum optimizer.

A method for determining an actual context of a communication definesthird embodiments of the invention. The method includes capturing, by aclassical computing device processor, communication variables associatedwith an environment in which a communication is occurring andtransmitting, by the classical computing device processor, thecommunication variables to a quantum optimizer. The method furtherincludes receiving, by the quantum optimized device processor, thecommunication variables and analyzing, by the quantum optimizer device,the communication variables to determine an actual context of thecommunication as held by one or more of communication parties. Inaddition, the method includes determining, by the classical computingdevice processor or the quantum optimizer device, that the actualcontext of the communication poses at least potential for a securitythreat to one or more of the parties to the communication, and, inresponse to determining that the actual context poses the securitythreat, transmitting, by the classical computing device processor or thequantum optimizer, an indication of the at least potential for thesecurity threat.

In further specific embodiments of the method, analyzing furthercomprises comparing, by the quantum optimizer device, one or more of thecommunication variables to predetermined context patterns to determineat least one match between one or more of the communication variablesand one or more of the predetermined context patterns. In suchembodiments the method may further include resolving, by the quantumoptimizer device, conflict between two or more matches of the one ormore communication variables and the predetermined context patterns.

In further related embodiments the method includes determining, by thequantum optimizer device, a confidence level to assign to the determinedactual context. The confidence level defines an accuracy of the actualcontext. In such embodiments of the method, the classical computingdevice processor or the quantum device is further configured todetermine that the actual context of the communication poses a securitythreat based at least on the confidence level assigned to the actualcontext.

In still further embodiments the method includes pre-analyzing, by theclassical computing device processor, one or more of the capturedcommunication variables to determine that the communication variablesrequire processing by the quantum processor of the quantum optimizer. Insuch embodiments of the method, transmitting the communication variablesto the quantum optimizer occurs based on the determination that thecommunication variables require processing by the quantum processor.

Thus, systems, apparatus, methods, and computer program products hereindescribed in detail below provide for implementing a quantum optimizerto analyze communication variables to determine the actual context of acommunication held by one or more parties to the communication. Once theactual context is determined, a determination is made as to whether theactual context poses or potentially poses a security threat to one ormore parties to the communication or a third-party and, if so, notifiesthe party of the security threat. In this regard, parties to acommunication that are unaware of the actual context of thecommunication held by another party are made aware of the actual contextand, in some embodiments, while the communication is still occurring.

The features, functions, and advantages that have been discussed may beachieved independently in various embodiments of the present inventionor may be combined with yet other embodiments, further details of whichcan be seen with reference to the following description and drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

Having thus described embodiments of the invention in general terms,reference will now be made the accompanying drawings, wherein:

FIG. 1 is a schematic diagram of an exemplary quantum optimizer that canbe used in parallel with a classical computer to solve optimizationproblems;

FIG. 2 depicts a method of solving optimization problems by using aclassical computer in conjunction with a quantum optimizer;

FIG. 3 depicts an operating environment in accordance with an aspect ofthe present invention;

FIG. 4 schematically depicts a system for determining an actual contextof a communication, in accordance with an aspect of the presentinvention;

FIG. 5 is a schematic diagram of classical computing device comprising amobile communication device, in accordance with embodiments of thepresent invention; and

FIGS. 6A-6B depict a method for determining an actual context of acommunication in accordance with an aspect of the present invention.

DETAILED DESCRIPTION OF EMBODIMENTS OF THE INVENTION

Embodiments of the present invention will now be described more fullyhereinafter with reference to the accompanying drawings, in which some,but not all, embodiments of the invention are shown. Indeed, theinvention may be embodied in many different forms and should not beconstrued as limited to the embodiments set forth herein; rather, theseembodiments are provided so that this disclosure will satisfy applicablelegal requirements. Like numbers refer to like elements throughout.

As will be appreciated by one of skill in the art in view of thisdisclosure, the present invention may be embodied as an apparatus (e.g.,a system, computer program product, and/or other device), a method, or acombination of the foregoing. Accordingly, embodiments of the presentinvention may take the form of an entirely hardware embodiment, anentirely software embodiment (including firmware, resident software,micro-code, etc.), or an embodiment combining software and hardwareaspects that may generally be referred to herein as a “system.”Furthermore, embodiments of the present invention may take the form of acomputer program product comprising a computer-usable storage mediumhaving computer-usable program code/computer-readable instructionsembodied in the medium.

Any suitable computer-usable or computer-readable medium may beutilized. The computer usable or computer-readable medium may be, forexample but not limited to, an electronic, magnetic, optical,electromagnetic, infrared, or semiconductor system, apparatus, ordevice. More specific examples (e.g., a non-exhaustive list) of thecomputer-readable medium would include the following: an electricalconnection having one or more wires; a tangible medium such as aportable computer diskette, a hard disk, a time-dependent access memory(RAM), a read-only memory (ROM), an erasable programmable read-onlymemory (EPROM or Flash memory), a compact disc read-only memory(CD-ROM), or other tangible optical or magnetic storage device.

Computer program code/computer-readable instructions for carrying outoperations of embodiments of the present invention may be written in anobject oriented, scripted or unscripted programming language such asJAVA, PERL, SMALLTALK, C++ or the like. However, the computer programcode/computer-readable instructions for carrying out operations of theinvention may also be written in conventional procedural programminglanguages, such as the “C” programming language or similar programminglanguages.

Embodiments of the present invention are described below with referenceto flowchart illustrations and/or block diagrams of methods orapparatuses (the term “apparatus” including systems and computer programproducts). It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer program instructions. These computer program instructions maybe provided to a processor of a general purpose computer, specialpurpose computer, or other programmable data processing apparatus toproduce a particular machine, such that the instructions, which executeby the processor of the computer or other programmable data processingapparatus, create mechanisms for implementing the functions/actsspecified in the flowchart and/or block diagram block or blocks.

These computer program instructions may also be stored in acomputer-readable memory that can direct a computer or otherprogrammable data processing apparatus to function in a particularmanner, such that the instructions stored in the computer-readablememory produce an article of manufacture including instructions, whichimplement the function/act specified in the flowchart and/or blockdiagram block or blocks.

The computer program instructions may also be loaded onto a computer orother programmable data processing apparatus to cause a series ofoperational events to be performed on the computer or other programmableapparatus to produce a computer implemented process such that theinstructions, which execute on the computer or other programmableapparatus, provide events for implementing the functions/acts specifiedin the flowchart and/or block diagram block or blocks. Alternatively,computer program implemented events or acts may be combined withoperator or human implemented events or acts in order to carry out anembodiment of the invention.

As the phrase is used herein, a processor may be “configured to” performa certain function in a variety of ways, including, for example, byhaving one or more general-purpose circuits perform the function byexecuting particular computer-executable program code embodied incomputer-readable medium, and/or by having one or moreapplication-specific circuits perform the function.

Thus, embodiments of the invention provide for implementing a quantumoptimizer to determine the actual context of a communication between twoor more parties and determine whether the actual context of thecommunication poses the potential for a security threat to one or moreparties to the communication and/or third party entities associated withthe communication.

The present invention operates under the assumption that in certaininstances, a party to a communication may perceive the context of thecommunication to be different from the actual context/intention ofanother party to the communication. This may be because one of theparties to the communication is attempting to deceive another party intobelieving that the context of the communication is different than theactual context of the communication. For example, the deceiving partymay be attempting to obtain confidential information from the otherparty and/or misappropriate financial resources from the other party.However, all too often, human perception is unable to comprehend thatthe perceived context is different from the actual context of thecommunication. In accordance with embodiments of the invention, thecommunication may be, but is not limited to, (i) a telephone conversionbetween two or more parties, (ii) an interaction between one or moreparties and a computing device, (iii) a face-to-face communicationamongst two or more parties, and (iv) an electronic communicationtransmitted from one party to one or more parties. The present inventionimplements a plurality of sensors that capture communication variablesassociated with a communication (e.g., microphones that capture theaudio of a communication, image capturing devices that capture imagesand/or video of a communication, Optical Character Recognition (OCR)means to capture/read text of a communication and the like). The variouscommunication variables are transmitted to a quantum optimizer which isconfigured to analyze the communication variables, typically inreal-time or near real-time, and determine the actual context of thecommunication. In this regard, the quantum optimizer may be configuredto compare the communication variable to known context patterns todetermine the actual context of the communication. For example, knowncontext patterns may be associated with voice patterns that indicatenervousness or truthfulness of the speaker, such certain hesitationsand/or inflections in the voice pattern. Additionally, known contextpatterns may be associated with certain audible or visual distractiontechniques (i.e., introducing intentional background noises and/orvisuals to distract a party to the communication). Once the actualcontext of the communication has been determined, a furtherdetermination is undertaken to assess whether the actual context posesor potentially poses a security threat to a party to the communicationor a third-party to the communication, and, if so, serves to notify theparty and/or third-party.

The quantum optimizer is implemented in the present invention tofacilitate real-time or near real-time analysis of the communicationvariables and to insure the accuracy of the resulting actual contextdetermination. By providing for real-time or near real-time processing,the present invention is capable of notifying a party to thecommunication of the security threat or potential for the securitythreat while the communication is still occurring. Thus, allowing theparty to the communication to avoid further communication (i.e., avoidor at least lessen the security threat). In addition, the level ofaccuracy imparted by a quantum optimizer limits or eliminates thelikelihood of false positives occurring (i.e., determining an inaccurateactual context and subsequently notifying a party of a security threatwhen in fact no security threat exists).

As used herein, a quantum computer is any computer that utilizes theprinciples of quantum physics to perform computational operations.Several variations of quantum computer design are known, includingphotonic quantum computing, superconducting quantum computing, nuclearmagnetic resonance quantum computing, and/or ion-trap quantum computing.Regardless of the particular type of quantum computer implementation,all quantum computers encode data onto qubits. Whereas classicalcomputers encode bits into ones and zeros, quantum computers encode databy placing a qubit into one of two identifiable quantum states. Unlikeconventional bits, however, qubits exhibit quantum behavior, allowingthe quantum computer to process a vast number of calculationssimultaneously.

A qubit can be formed by any two-state quantum mechanical system. Forexample, in some embodiments, a qubit may be the polarization of asingle photon or the spin of an electron. Qubits are subject to quantumphenomena that cause them to behave much differently than classicalbits. Quantum phenomena include superposition, entanglement, tunneling,superconductivity, and the like.

Two quantum phenomena are especially important to the behavior of qubitsin a quantum computer: superposition and entanglement. Superpositionrefers to the ability of a quantum particle to be in multiple states atthe same time. Entanglement refers to the correlation between twoquantum particles that forces the particles to behave in the same wayeven if they are separated by great distances. Together, these twoprinciples allow a quantum computer to process a vast number ofcalculations simultaneously.

In a quantum computer with n qubits, the quantum computer can be in asuperposition of up to 2n states simultaneously. By comparison, aclassical computer can only be in one of the 2n states at a single time.As such, a quantum computer can perform vastly more calculations in agiven time period than its classical counterpart. For example, a quantumcomputer with two qubits can store the information of four classicalbits. This is because the two qubits will be a superposition of all fourpossible combinations of two classical bits (00, 01, 10, or 11).Similarly, a three qubit system can store the information of eightclassical bits, four qubits can store the information of sixteenclassical bits, and so on. A quantum computer with three hundred qubitscould possess the processing power equivalent to the number of atoms inthe known universe.

Despite the seemingly limitless possibilities of quantum computers,present quantum computers are not yet substitutes for general purposecomputers. Instead, quantum computers can outperform classical computersin a specialized set of computational problems. Principally, quantumcomputers have demonstrated superiority in solving optimizationproblems. Generally speaking, the term “optimization problem” as usedthroughout this application describe a problem of finding the bestsolution from a set of all feasible solutions. In accordance with someembodiments of the present invention, quantum computers as describedherein are designed to perform adiabatic quantum computation and/orquantum annealing. Quantum computers designed to perform adiabaticquantum computation and/or quantum annealing are able to solveoptimization problems as contemplated herein in real-time or nearreal-time.

Embodiments of the present invention make use of quantum ability ofoptimization by utilizing a quantum computer in conjunction with aclassical computer. Such a configuration enables the present inventionto take advantage of quantum speedup in solving optimization problems,while avoiding the drawbacks and difficulty of implementing quantumcomputing to perform non-optimization calculations. Examples of quantumcomputers that can be used to solve optimization problems parallel to aclassic system are described in, for example, U.S. Pat. No. 9,400,499,U.S. Pat. No. 9,207,672, each of which is incorporated by reference asif set forth fully herein.

FIG. 1 is a schematic diagram of an exemplary quantum optimizer 100 thatcan be used in parallel with a classical computer to solve optimizationproblems. The quantum optimizer 100 typically includes a data extractionsubsystem 104, a quantum computing subsystem 101, and an actionsubsystem 105. As used herein, the term “subsystem” generally refers tocomponents, modules, hardware, software, communication links, and thelike of particular components of the system. Subsystems as contemplatedin embodiments of the present invention are configured to perform taskswithin the system as a whole.

As depicted in FIG. 1, the data extraction subsystem 104 communicateswith the network to extract data for optimization. It will be understoodthat any method of communication between the data extraction subsystem104 and the network is sufficient, including but not limited to wiredcommunication, Radiofrequency (RF) communication, BLUETOOTH®, WIFI®, andthe like. The data extraction subsystem 104 then formats the data foroptimization in the quantum computing subsystem. In accordance withembodiments of the present invention data extraction subsystem 104 maybe configured to extract communication variables from sensors and formatthe communication variables for optimization (i.e., analysis todetermine actual context).

As further depicted in FIG. 1, the quantum computing subsystem 101includes a quantum computing infrastructure 123, a quantum memory 122,and a quantum processor 121. The quantum computing infrastructure 123includes physical components for housing the quantum processor 121 andthe quantum memory 122. The quantum computer infrastructure 123 furtherincludes a cryogenic refrigeration system to keep the quantum computingsubsystem 101 at the desired operating temperatures. In general, thequantum processor 121 is designed to perform adiabatic quantumcomputation and/or quantum annealing to optimize data received from thedata extraction subsystem 104. In accordance with embodiments of thepresent invention, the quantum processor is configured to analyze thecommunication variables to determine an actual context of acommunication held by one or more parties to the communication.

The quantum memory 122 typically includes a plurality of qubits used forstoring data during operation of the quantum computing subsystem 101. Ingeneral, qubits are any two-state quantum mechanical system. It will beunderstood that the quantum memory 122 may include any such two-statequantum mechanical system, such as the polarization of a single photon,the spin of an electron, and the like.

The action subsystem 102 communicates the optimized data from thequantum computing subsystem 101 over the network. In embodiments of thepresent invention, the action subsystem 102 may communicate thedetermined actual context and/or, in some embodiments of the inventionan indication that the actual context poses or potentially poses athreat to one of the parties to the communication or a third-partyassociated with the communication. It will be understood that any methodof communication between the action subsystem 102 and the network issufficient, including but not limited to wired communication,Radiofrequency (RF) communication, BLUETOOTH®, WIFI®, and the like.

FIG. 2 depicts a method of solving optimization problems by using aclassical computer in conjunction with a quantum optimizer. As depictedin FIG. 2, a classical computer begins the method at event 201 bycollecting data from a plurality of inputs. In accordance withembodiments of the present invention, capturing communication variablesfrom a plurality of sensors. At event 202, the classical computer thendetermines from the set of data collected at event 201 a subset a datato be optimized. In accordance with embodiments of the invention, theclassical computer pre-analyzes the variables to determine whetherquantum optimization is warranted and/or which communication variablesare relevant for quantum optimization.

The classical computer then formats the subset of data for optimizationat event 203. At event 204, the classical computer transmits theformatted subset of data to the quantum optimizer. The quantum optimizerruns the data to obtain the optimized solution at 205. In accordancewith embodiments of the present invention, analyzes the communicationvariables to determine an actual context of a communication held by oneor more parties to the communication. The quantum optimizer thentransmits the optimized data back to the classical computer at event206. Finally, the classical computer can perform actions based onreceiving the optimized solution at event 207.

In accordance with embodiments of the present invention, determining anactual context of a communication and subsequently notifying a party orparties to the communication or third-parties associated with thecommunication of a security threat associated with the actual contextoccurs in real-time or near-real time. In such embodiments of theinvention, the party or parties to the communication or third-partiesmay be notified while the communication is occurring, thus, allowing forthe party/parties and/or third-party to prevent the security threat,such as by ending the communication or the like. Real-time or near-realtime processing is made possible through implementation of the quantumoptimizer which is capable of processing/analyzing a vast amount andcombination of communication variables as they are received by thequantum optimizer (i.e., in real-time or near real-time).

In accordance with other embodiments of the present invention,determining an actual context of a communication and subsequentlynotifying a party or parties to the communication or third-partiesassociated with the communication of a security threat associated withthe actual context may occur at a later point in time (i.e., aftercompletion of the communication) based on circumstances that dictatesuch (e.g., the communication has become a communication of interest).

FIG. 3 provides a block diagram illustrating an operating environment300, in accordance with an embodiment of the present invention. Asillustrated in FIG. 3, the operating environment 300 typically includesa classical computing apparatus 310 and a quantum computing device 330.The classical computing apparatus 310 which will typically include aplurality of classical computing devices includes one or more, typicallya plurality of sensors 320 configured for capturing communicationvariables associated with a communication and/or communicationenvironment. The sensors, which comprise microphones, image-capturingdevices (e.g., cameras), OCR devices, location determining devices,clocks and the like, may be stand-alone devices or may be includedwithin another classical computing device, such as within a mobilecommunication device or the like.

The classical computing device 310 is configured to transmit/communicatethe captured communication variables over a network 350 to the quantumcomputing device 330 for processing by the quantum optimizer 100. Thenetwork 350 may include a local area network (LAN), a wide area network(WAN), and/or a global area network (GAN). The network 350 may providefor wireline, wireless, or a combination of wireline and wirelesscommunication between devices in the network. In one embodiment, thenetwork 350 includes the Internet. In one embodiment, the network 350includes a wireless telephone network.

The quantum optimizer 100 is configured to analyze the communicationvariables to determine a actual context of a communication held by oneor more parties to the communication and, in some embodiments of theinvention, determine that the actual context poses a security threat ora potential security threat to one or more parties to the communicationand/or a third party associated with the communication and provide anindication of the security threat to the classical computing apparatus310. In turn, the classical computing apparatus 310 is configured togenerate and initiate communication of a notification/alert to one ormore parties to the communication 340 and/or one or more third-partyentities 360 associated with the communication. In alternate embodimentsof the invention, the quantum optimizer 100 is configured totransmit/communicate the actual context of the communication to theclassical computing apparatus 310. In turn, the classical computingapparatus 310 is configured to determine that the actual context poses asecurity threat or a potential security threat to one or more parties tothe communication and/or a third party associated with the communicationand generate and initiate communication of a notification/alert to oneor more parties to the communication 340 and/or one or more third-partyentities 360 associated with the communication.

Referring now to FIG. 4, classical computing apparatus 310 includesvarious features, such as a network communication interface 620, aprocessing device 610, a memory device 630 and sensors 650. The networkcommunication interface 620 includes a device that allows the classicalcomputing apparatus 310 to communicate over the network 350 (shown inFIG. 3

As used herein, a “processing device,” such as the processing device610, generally refers to a device or combination of devices havingcircuitry used for implementing the communication and/or logic functionsof a particular system. For example, a processing device 610 may includea digital signal processor device, a microprocessor device, and variousanalog-to-digital converters, digital-to-analog converters, and othersupport circuits and/or combinations of the foregoing. Control andsignal processing functions of the system are allocated between theseprocessing devices according to their respective capabilities. Theprocessing device 610 may further include functionality to operate oneor more software programs based on computer-executable program codethereof, which may be stored in a memory. As the phrase is used herein,a processing device 610 may be “configured to” perform a certainfunction in a variety of ways, including, for example, by having one ormore general-purpose circuits perform the function by executingparticular computer-executable program code embodied incomputer-readable medium, and/or by having one or moreapplication-specific circuits perform the function.

As used herein, a “memory device” 630 generally refers to a device orcombination of devices that store one or more forms of computer-readablemedia for storing data and/or computer-executable programcode/instructions. Computer-readable media is defined in greater detailbelow. For example, in one embodiment, the memory device 630 includesany computer memory that provides an actual or virtual space totemporarily or permanently store data and/or commands provided to theprocessing device 610 when it carries out its functions describedherein.

In one embodiment of the invention, a communication context determiningapplication 640 stored in memory 630 is configured to determine anactual context of communication and receive notification of a securitythreat associated with the actual context. In this regard, thecommunication context determining application 640 is typically incommunication with a quantum optimizer 670. The quantum optimizer istypically configured to perform analysis of the communication variablescaptured by sensors 650 to determine an actual context of acommunication as held by one or more parties to the communication asdescribed herein. An exemplary quantum optimizer is depicted in moredetail in FIG. 1.

Referring to FIG. 5 a block diagram is provided that depicts a classicalcomputing device in the form of a mobile communication device 500, inaccordance with embodiments of the invention. The mobile communicationdevice 500, may comprise a mobile telephone, a portable digitalassistant (PDAs), pager, mobile television, gaming device, laptopcomputer, camera, video recorder, audio/video player, radio, GPS device,or any combination of the aforementioned.

In such embodiments of the invention, the mobile communication device500 may include one or more of the sensors (described below) that areconfigured to capture communication variables associated with theenvironment of a communication. In other specific embodiments of theinvention, the mobile communication device may include a communicationcontext determining application 521 configured to determine the actualcontext of an ongoing communication and notify the user of a securitythreat associated with the actual context.

The mobile communication device 500 typically includes a processor 510communicably coupled to such devices as a memory 520, user outputdevices 536, user input devices 540 (e.g., a microphone), acommunication interface 560, a power source 515, a clock or other timer550, a camera 580, and a positioning system device and other sensors575. The clock 550, camera 580, microphone 540, and positioning systemdevice and other sensors 575 may serve as sensors for capturingcommunication variables associated with a communication environment,such as time of the communication, location of the communication andaudio/video of the communication.

The processor 510, and other processors described herein, typicallyincludes circuitry for implementing communication and/or logic functionsof the mobile communication device 500. For example, the processor 510may include a digital signal processor device, a microprocessor device,and various analog to digital converters, digital to analog converters,and/or other support circuits. Control and signal processing functionsof the mobile communication device 500 are allocated between thesedevices according to their respective capabilities. The processor 510thus may also include the functionality to encode and interleavemessages and data prior to modulation and transmission. The processor510 can additionally include an internal data modem. Further, theprocessor 510 may include functionality to operate one or more softwareprograms, which may be stored in the memory 520. For example, theprocessor 510 may be capable of operating a connectivity program, suchas a web browser application 522. The web browser application 522 maythen allow the mobile communication device 500 to transmit and receiveweb content, such as, for example, location-based content and/or otherweb page content, according to a Wireless Application Protocol (WAP),Hypertext Transfer Protocol (HTTP), and/or the like.

The processor 510 is typically configured to use the communicationinterface 560 to communicate with one or more other devices on thenetwork 350. In this regard, the communication interface 560 typicallyincludes an antenna 576 operatively coupled to a transmitter 574 and areceiver 572 (together a “transceiver”). The processor 510 is typicallyconfigured to provide signals to and receive signals from thetransmitter 574 and receiver 572, respectively. The signals may includesignaling information in accordance with the air interface standard ofthe applicable cellular system of the wireless telephone network. Inthis regard, the mobile communication device 500 may be configured tooperate with one or more air interface standards, communicationprotocols, modulation types, and access types. By way of illustration,the mobile communication device 500 may be configured to operate inaccordance with any of a number of first, second, third, and/orfourth-generation communication protocols and/or the like. For example,the mobile communication device 500 may be configured to operate inaccordance with second-generation (2G) wireless communication protocolsIS-136 (time division multiple access (TDMA)), GSM (global system formobile communication), and/or IS-95 (code division multiple access(CDMA)), or with third-generation (3G) wireless communication protocols,such as Universal Mobile Telecommunications System (UMTS), CDMA2000,wideband CDMA (WCDMA) and/or time division-synchronous CDMA (TD-SCDMA),with fourth-generation (4G) wireless communication protocols, and/or thelike. The mobile communication device 500 may also be configured tooperate in accordance with non-cellular communication mechanisms, suchas via a wireless local area network (WLAN) or other communication/datanetworks.

The communication interface 560 may also include a near fieldcommunication (NFC) interface 570. As used herein, the phrase “NFCinterface” generally refers to hardware and/or software that isconfigured to contactlessly and/or wirelessly send and/or receiveinformation over relatively short ranges (e.g., within four inches,within three feet, within fifteen feet, and the like). The NFC interface570 may include a smart card, key card, proximity card, Bluetooth®device, radio frequency identification (RFID) tag and/or reader,transmitter, receiver, and/or the like. In some embodiments, the NFCinterface 570 communicates information via radio, infrared (IR), and/oroptical transmissions. In some embodiments, the NFC interface 570 isconfigured to operate as an NFC transmitter and/or as an NFC receiver(e.g., an NFC reader). Also, it will be understood that the NFCinterface 570 may be embedded, built, carried, and/or otherwisesupported in and/or on the mobile communication device 500. In someembodiments, the NFC interface 570 is not supported in and/or on themobile communication device 500, but the NFC interface 570 is otherwiseoperatively connected to the mobile communication device 500 (e.g.,where the NFC interface 570 is a peripheral device plugged into themobile communication device 500). Other apparatuses having NFCinterfaces mentioned herein may be configured similarly. In someembodiments, the NFC interface 570 of the mobile communication device500 is configured to contactlessly and/or wirelessly communicateinformation to and/or from a corresponding NFC interface of anotherapparatus (e.g., another mobile or computing device).

The mobile communication device 500 typically has a user interface thatis, like other user interfaces described herein, made up of user outputdevices 536 and/or user input devices 540. The user output devices 536include a display 530 (e.g., a liquid crystal display or the like) and aspeaker 532 or other audio device, which are operatively coupled to theprocessor 510. The user input devices 540, which allow the mobilecommunication device 500 to receive data from a user, may include any ofa number of devices allowing the mobile communication device 500 toreceive data from a user, such as a keypad, keyboard, touch-screen,touchpad, microphone, mouse, joystick, other pointer device, button,soft key, and/or other input device(s).

The mobile communication device 500 may also include a positioningsystem device 575 that is configured to be used by a positioning systemto determine a location of the mobile communication device 500. Forexample, the positioning system device 575 may include a GPStransceiver. In some embodiments, the positioning system device 575 isat least partially made up of the antenna 576, transmitter 574, andreceiver 572 described above. For example, in one embodiment,triangulation of cellular signals may be used to identify theapproximate location of the mobile communication device 500. In otherembodiments, the positioning system device 575 includes a proximitysensor or transmitter, such as an RFID tag, that can sense or be sensedby devices known to be located proximate a location to determine thatthe mobile communication device 500 is located proximate these knowndevices.

The mobile communication device 500 further includes a power source 515,such as a battery, for powering various circuits and other devices thatare used to operate the mobile communication device 500. Embodiments ofthe mobile communication device 500 may also include a clock or othertimer 550 configured to determine and, in some cases, communicate actualor relative time to the processor 510 or one or more other devices.

The mobile communication device 500 also includes a memory 520operatively coupled to the processor 510. As used herein, memoryincludes any computer readable medium (as defined herein below)configured to store data, code, or other information. The memory 520 mayinclude volatile memory, such as volatile Random Access Memory (RAM)including a cache area for the temporary storage of data. The memory 520may also include non-volatile memory, which can be embedded and/or maybe removable. The non-volatile memory can additionally or alternativelyinclude an electrically erasable programmable read-only memory (EEPROM),flash memory or the like.

The memory 520 can store any of a number of applications which includecomputer-executable instructions/code executed by the processor 510 toimplement the functions of the mobile communication device 500 describedherein. For example, the memory 520 may include such applications as aconventional web browser application 522. These applications alsotypically provide a graphical user interface (GUI) on the display 530that allows the user to communicate with the mobile communication device500, and/or other devices or systems.

In accordance with specific embodiments of the invention, the memory 520stores communication context determining application 521 that isconfigured to determine the actual context of a communication as held bya party (i.e., a party other than the user of the mobile communicationdevice 500) and notify the user of security threats associated with theactual context. In this regard, context determining application 521 mayprovide the user a GUI configured to receive user input that activatesone or more of the sensors (e.g., microphone 540, image capturing device580, position determining device & other sensors 575 or the like) tocapture communication variables associated with a communicationenvironment. For example, a user that is or is about to enter into aface-to-face communication with another party that they are unfamiliarwith may desire to determine if the intent/context of the other party isdifferent than what they perceive the intent/context to be (in otherwords, the user may desire to determine if the actual context of theother party is deceptive/dishonest so as to pose a security threat tothe user). The user input may activate a predetermined configuration ofsensors or the user input may select which sensors to activate.

Once the communication variables have been captured, communicationcontext determining application 521 transmits the communicationvariables to the quantum optimizer, which, in turn, analyzes thecommunication variables to determine an actual context of thecommunication held by the opposing party. If the actual context isdetermined to pose a security threat (or the potential for a securitythreat), a notification/indication is transmitted to the communicationcontext determining application 521 and is communicated to the user viauser output device 536. For example, a notification may be displayed ondisplay 530 indicating a security threat and/or the speaker 532 mayprovide a predetermined audible sound that the user recognizes as beingassociated with a communication security threat.

The memory 520 can also store any of a number of pieces of information,and data, used by the mobile communication device 500 and theapplications and devices that make up the mobile communication device500 or are in communication with the mobile communication device 500 toimplement the functions of the mobile communication device 500 and/orthe other systems described herein. For example, the memory 520 mayinclude such data as user authentication information.

Referring now to FIGS. 6A-6B a method 600 is provided for determining anactual context of a communication, in accordance with embodiments of theinvention. As previously discussed the communication may be, but is notlimited to, (i) a telephone conversion between two or more parties, (ii)an interaction between one or more parties and a computing device,(e.g., a transaction at an Automated Teller Machine), (iii) aface-to-face communication amongst two or more parties, and (iv) anelectronic communication transmitted from one party to one or moreparties (e.g., an email or the like).

Initially, at event 601, the classical computer (e.g., a binary, digitalelectronic computer), captures communication variables associated withthe communication and/or communication environment. In this regard, theclassical computer relies on one or more sensors to capture thecommunication variables, otherwise referred to as parameters orattributes. As previously noted the sensors may comprise, but are notlimited to, microphones that capture the audio of a communication (e.g.,the audio of telephone or live face-to-face communication), imagecapturing devices that capture images and/or video of a communication(e.g., the video of a face-to-face communication or the interaction of aparty with a computing device), Optical Character Recognition (OCR)means to capture/read text of a communication (e.g., read the text ofthe email or the like), other sensors within a device associated with aparty to the communication (e.g., sensors within a mobile communicationdevice that indicate the current state of the device and/or environment)and the like). It should be noted that the processing capabilities ofthe quantum optimizer allow for the sensors to capture and transmit thecommunication variables to the quantum optimizer on a continuous basis,regardless of the volume of communications and/or the duration acommunication.

At optional event 602, the communication variables are pre-analyzed atthe classical computing level. Such pre-analyzing of the communicationvariable may be conducted to determine if the communication variablesrequire quantum optimization (i.e., whether the communication variablesare capable of being analyzed by the quantum computing device todetermine an actual context and/or whether the pre-analysis issufficient to determine an actual context of the communication, thusobviating the need for quantum optimizer analysis). In other embodimentsof the invention, pre-analysis is performed to determine a subset of thecommunication variables that require quantum optimization. For example,the subset of communication variables may comprise only the portion ofthe audio or video file that contains the actual communication or onlythe portion of the actual communication that is relevant to determiningan actual context (e.g., only the portions in which the party inquestion is communicating).

At optional event 603, the communication variables may be formatted bythe classical computing apparatus in a format conducive to subsequentquantum optimization/processing and, at event 604, the communicationsvariables are transmitted to the quantum optimizer. As previouslydiscussed the communication variables may be transmitted continuously,as captured, for a given communication, such that the analysis by thequantum optimizer occurs in real-time or near real-time, in order forthe actual context of the communication to occur while the communicationis occurring. Such real-time or near real-time determination of theactual context and potential security threats allows for parties to thecommunication or associated third-parties to be notified of thepotential security threat while the communication is ongoing. Thus,providing the party to the communication the ability to avoid thesecurity threat.

At event 605, the quantum optimizer receives the communication variablesfrom the classical computer apparatus and, at event 606 analyzes thecommunication variables to determine an actual context of thecommunication held by one or more parties to the communication. Theactual context may be consistent with or may deviate from the perceivedcontext of one or more parties to the communication. In other words, aparty to the communication may perceive that a communication is beingconducted with their best interests in mind, while the actual context isthat the party is being deceived by one or more other parties to thecommunication. Such deception may involve attempting to receiveconfidential/non-public information and/or misappropriate financialresources.

In specific embodiments of the invention, the quantum optimizer isconfigured to compare the communication variables to predeterminedcontext patterns to determine matches between the communicationvariables and the predetermined context patterns. For example, the audiofile may be analyzed to determine matches between portions of the audiofile and predetermined audio patterns that indicate an actual context(e.g., voice patterns, such as hesitations and inflections that wouldindicate a likelihood of deception/dishonesty) or the video file may beanalyzed to determine matches between portions of the video file andpredetermined video patterns that indicate the actual context (e.g.,physical mannerisms of a party to the communication that would indicatea likelihood of deception/dishonesty). It should be noted that thepredetermined context patterns may not only indicatedeception/dishonesty, but also may indicate lack of deception/honesty(i.e., the actual context of the communication being consistent with theperceived context of the communication). In addition, patterns mayconsist of a predetermined number of similar communications occurringsubstantially simultaneously or within a predetermined period of time.The predetermined context patterns may be learned over time based oncommunications that have, in fact, been verified as beingdeceptive/dishonest communications.

In such embodiments of the invention, the quantum optimizer, or in someembodiments the classical computing apparatus, may be further configuredto resolve conflict between matches of the communication variables andpredetermined context patterns. Conflict exists when one or matchesindicate deception/dishonesty while one or more other matches mayindicate lack of deception/dishonesty. In such embodiments of theinvention, a rules engine may be employed to resolve the conflict.

In other specific embodiments of the invention, the quantum optimizer,or in some embodiments the classical computing apparatus, may be furtherconfigured to determine a confidence level to assign the determinedactual context. The confidence level may take into account thetype/nature of the matched context patterns (i.e., some of the matchedcontext patterns being deemed more indicative of an actual context thanothers). In addition, the confidence level may take into accountconflicting matches (i.e., some of the matches for a given communicationindicate deception/dishonesty, while others indicate a lack ofdeception/dishonesty). A weighting system may be implemented to assessthe relative importance of a matched context pattern in terms ofindicating the actual context of the communication.

At optional event 607, if subsequent processing is performed by theclassical computing apparatus, the actual context is transmitted fromthe quantum optimizer to the classical computing and, at optional event608, the classical computing apparatus receives the actual context (ifthe subsequent processing is performed by the quantum optimizer, events607 and 608 are obviated and omitted).

At Event 609, the quantum optimizer or the classical computing device,determines that the actual context of the communication poses at leastthe potential for a security threat to a party of the communication or athird-party associated with the communication. In specific embodimentsof the invention, the actual context may be consistent with theperceived context and therefore no security threat may be evident. Inother embodiments of the invention, the actual context may differ fromthe perceived context and the actual context may be associated with oneor more predetermined security threats. In other embodiments of theinvention determining whether the actual context poses a security threatmay depend upon the accuracy of the determined actual context. In thisregard, in those embodiments of the invention in which a confidencelevel is determined, the confidence level may be used to determine if asecurity threat is posed. For example, the confidence level of thedetermined actual context may need to reach or exceed a predeterminedthreshold for a positive determination of a security threat. As such,through use of a confidence level or some other means of determiningaccuracy of the actual context, the invention guards againstfalse-positives (i.e., a party to a communication being notified of asecurity threat, when in fact, no security threat exists).

At optional event 610, if the security threat is determined by thequantum optimizer, the quantum computing device transmits the indicationof the security threat to the classical computing apparatus. At event611, the classical computing apparatus, generates and communicates anotification of the security threat to a party to the communication or athird-party associated with the communication. In specific embodimentsof the invention, the processing occurs in real-time or near real-time,such that, the notification is communicated to a party during thecommunication. As such, the party to the communication can be affordedthe opportunity to end the communication and, thereby, lessen oreliminate the security threat. In other embodiments of the invention, inwhich the communication variables are processed after the capturing ofthe communication variables, the communication of the notification mayoccur at a later point in time (i.e., not in real-time or nearreal-time).

As evident from the preceding description, the system described hereinrepresents an improvement in technology by implementing a quantumoptimizer to analyze communication variables to determine the actualcontext of a communication held by one or more parties to thecommunication. Once the actual context is determined, a determination ismade as to whether the actual context poses or potentially poses asecurity threat to one or more parties to the communication or athird-party and, if so, notifies the party of the security threat. Inthis regard, parties to a communication that are unaware of the actualcontext of the communication held by another party are made aware of theactual context and, in some embodiments, while the communication isstill occurring.

As the phrase is used herein, a processor may be “configured to” performa certain function in a variety of ways, including, for example, byhaving one or more general-purpose circuits perform the function byexecuting particular computer-executable program code embodied incomputer-readable medium, and/or by having one or moreapplication-specific circuits perform the function.

While certain exemplary embodiments have been described and shown in theaccompanying drawings, it is to be understood that such embodiments aremerely illustrative of and not restrictive on the broad invention, andthat this invention not be limited to the specific constructions andarrangements shown and described, since various other changes,combinations, omissions, modifications and substitutions, in addition tothose set forth in the above paragraphs, are possible.

Those skilled in the art may appreciate that various adaptations andmodifications of the just described embodiments can be configuredwithout departing from the scope and spirit of the invention. Therefore,it is to be understood that, within the scope of the appended claims,the invention may be practiced other than as specifically describedherein.

1. A system for determining an actual context of a communication,comprising: a classical computing apparatus comprising: a memory, atleast one processor in communication with the memory, and one or moresensors executable by the processor and configured to: capturecommunication variables associated with an environment in which acommunication is occurring, and transmit the communication variables toa quantum optimizer; and the quantum optimizer in communication with theclassical computer apparatus, the quantum optimizer comprising: aquantum memory, a quantum processor in communication with the quantummemory and configured to: receive the communication variables from theclassical computing apparatus, and analyze the communication variablesto determine an actual context of the communication as held by one ormore of communication parties, wherein either the at least one processoror the quantum processor are configured to: determine that the actualcontext of the communication poses at least potential for a securitythreat to one or more of the communication parties, and in response todetermining that the actual context poses the security threat, transmitan indication of the at least potential for the security threat.
 2. Thesystem of claim 1, wherein the quantum processor is further configuredto analyze the communication variables to determine an actual context ofthe communication by comparing one or more of the communicationvariables to predetermined context patterns to determine at least onematch between one or more of the communication variables and one or moreof the predetermined context patterns.
 3. The system of claim 2, whereinthe quantum processor is further configured to resolve conflict betweentwo or more matches of the one or more communication variables and thepredetermined context patterns, wherein resolving the conflict providesfor determining the actual context of the communication.
 4. The systemof claim 1, wherein the quantum processor is further configured todetermine a confidence level to assign to the determined actual context,wherein the confidence level defines an accuracy of the actual context.5. The system of claim 4, wherein either the at least one processor orthe quantum processor is further configured to determine that the actualcontext of the communication poses a security threat based at least onthe confidence level assigned to the actual context.
 6. The system ofclaim 1, wherein the at least one processor of the classical computingapparatus is configured to pre-analyze one or more of the capturedcommunication variables to determine that the communication variablesrequire processing by the quantum processor of the quantum optimizer,wherein transmitting the communication variables to the quantumoptimizer occurs based on the determination that the communicationvariables require processing by the quantum processor.
 7. The system ofclaim 1, wherein (i) capturing the communication variables by the one ormore sensors, (ii) transmitting the communication variables to thequantum optimizer, (iii) analyzing the communication variables todetermine an actual context of the communication, (iv) determining thatthe actual context of the communication poses the security threat to oneor more of the parties to the communication, and (v) transmitting theindication of the security threat to the classical computing apparatus,occur in real-time or near real-time, such that the indication of thesecurity threat is transmitted to a classical computing deviceassociated with the one or more parties to the communication while thecommunication is occurring.
 8. The system of claim 1, wherein thecommunication comprises one of (i) a telephone conversion between two ormore parties, (ii) an interaction between one or more parties and acomputing device, (iii) a face-to-face communication amongst two or moreparties, and (iv) an electronic communication transmitted from one partyto one or more parties.
 9. The system of claim 1, wherein the one ormore sensors comprise at least one of (i) a microphone configured tocapture audio of at least one of the communication or the environment inwhich the communication occurs, (ii) an image capturing deviceconfigured to capture at least one of still images of an environment inwhich a communication occurs or a video stream of the an environment inwhich a communication occurs, (iii) an optical character recognitionsensor configured to capture text in an electronic communication fileand (iv) one or device sensors configured to capture a state of acorresponding device associated with the device sensor.
 10. The systemof claim 1, wherein the classical computing apparatus further comprisesa mobile communication device including a communication contextdetermining application stored in the memory, executable by theprocessor and configured to: receive a user input that activates the oneor more sensors to capture the communication variables associated withthe environment in which the user is a party to the communication; andin response to (i) capturing the communication variables, (ii)transmitting the communication variables to the quantum optimizer, (iii)the quantum optimizer determining an actual context of the communicationand (iv) the actual context poses at least the potential for thesecurity threat, receive the indication of the at least the potential ofthe security threat.
 11. The system of claim 10, wherein thecommunication context determining application is further configured toreceive the indication while the communication is occurring.
 12. Acomputer program product for determining an actual context of acommunication, comprising a non-transitory computer-readable storagemedium having computer-executable instructions for: capturingcommunication variables associated with an environment in which acommunication is occurring; and transmitting the communication variablesto a quantum optimizer; in response to transferring the communicationvariables to the quantum optimizer, receiving an indication that anactual context of the communication held by one or more parties to thecommunication poses at least a potential for a security threat, whereinthe quantum optimizer is configured for: receiving the communicationvariables, analyzing the communication variables to determine an actualcontext of the communication as held by one or more of communicationparties, wherein either the computer-readable storage medium furtherincludes computer-executable instructions or the quantum optimizer isconfigured for: determining that the actual context of the communicationposes at least potential for a security threat to one or more of theparties to the communication, and in response to determining that theactual context poses the security threat, transmitting the indicationthat the actual context of the communication held by the one or moreparties to the communication poses at least the potential for thesecurity threat.
 13. The computer program product of claim 12, whereinthe computer-readable storage medium further includescomputer-executable instructions for pre-analyzing one or more of thecaptured communication variables to determine that the communicationvariables require processing by the quantum optimizer.
 14. A method fordetermining an actual context of a communication, the method comprising:capturing, by a classical computing device processor, communicationvariables associated with an environment in which a communication isoccurring; transmitting, by the classical computing device processor,the communication variables to a quantum optimizer; receiving, by thequantum optimized device processor, the communication variables;analyzing, by the quantum optimizer device, the communication variablesto determine an actual context of the communication as held by one ormore of communication parties; determining, by the classical computingdevice processor or the quantum optimizer device, that the actualcontext of the communication poses at least potential for a securitythreat to one or more of the parties to the communication; and inresponse to determining that the actual context poses the securitythreat, transmitting, by the classical computing device processor or thequantum optimizer, an indication of the at least potential for thesecurity threat.
 15. The method of claim 14, wherein analyzing furthercomprises comparing, by the quantum optimizer device, one or more of thecommunication variables to predetermined context patterns to determineat least one match between one or more of the communication variablesand one or more of the predetermined context patterns.
 16. The method ofclaim 15, further comprising resolving, by the quantum optimizer device,conflict between two or more matches of the one or more communicationvariables and the predetermined context patterns, wherein resolving theconflict provides for determining the actual context of thecommunication.
 17. The method of claim 14, further comprisingdetermining, by the quantum optimizer device, a confidence level toassign to the determined actual context, wherein the confidence leveldefines an accuracy of the actual context.
 18. The method of claim 17,wherein the classical computing device processor or the quantum deviceis further configured to determine that the actual context of thecommunication poses a security threat based at least on the confidencelevel assigned to the actual context.
 19. The method of claim 14,wherein the at least one processor of the classical computing apparatusis configured to pre-analyze one or more of the captured communicationvariables to determine that the communication variables requireprocessing by the quantum processor of the quantum optimizer, whereintransmitting the communication variables to the quantum optimizer occursbased on the determination that the communication variables requireprocessing by the quantum processor.
 20. The method of claim 14, wherein(i) capturing the communication variables by the one or more sensors,(ii) transmitting the communication variables to the quantum optimizer,(iii) analyzing the communication variables to determine an actualcontext of the communication, (iv) determining that the actual contextof the communication poses the security threat to one or more of theparties to the communication, and (v) transmitting the indication of thesecurity threat to the classical computing apparatus, occur in real-timeor near real-time, such that the indication of the security threat istransmitted to a classical computing device associated with the one ormore parties to the communication while the communication is occurring.