US 12,450,376 B2
Qubit-implemented role-based access control
Leigh Griffin, Waterford (IE); and Stephen Coady, Waterford (IE)
Assigned to Red Hat, Inc., Raleigh, NC (US)
Filed by Red Hat, Inc., Raleigh, NC (US)
Filed on Jul. 29, 2022, as Appl. No. 17/876,947.
Prior Publication US 2024/0037260 A1, Feb. 1, 2024
Int. Cl. G06F 21/62 (2013.01); G06N 10/20 (2022.01); G06N 10/40 (2022.01)
CPC G06F 21/6218 (2013.01) [G06N 10/20 (2022.01); G06N 10/40 (2022.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
receiving, by a quantum computing system from a requestor, a first access request that identifies a subject, an action, and a resource;
accessing a mapping structure that identifies a plurality of qubits that are in superposition and encoded with a plurality of rules that govern access to the resource;
determining, based on the mapping structure, a set of qubits of the plurality of qubits that applies to the access request; and
providing data encoded in the set of qubits or a reference to each qubit in the set of qubits to the requestor.