Bank of America Corporation
Real-time linear identification of resource distribution breach
Last updated:
Abstract:
Systems, computer products, and methods are described herein for improvements for identifying if an interaction between a user and an entity have been misappropriated. A classical computer may be utilized to analyze data inputs related to a particular interaction and to determine if the interaction is potentially misappropriated based on a trigger activated by one or more of the inputs. If the classical computer identifies that the interaction is potentially misappropriated, then the inputs may be provided to a quantum optimizer to analyze the inputs in greater depth in order to provide a more in depth analysis of the interaction. Because the quantum optimizer is able to analyze more inputs than a classical computer it can provide a more accurate analysis of the interaction. For example, the quantum optimizer assigns qubits to the inputs and analyzes the inputs to determine if the potentially misappropriated interaction is likely misappropriated or not.
Utility
17 Mar 2017
8 Oct 2019