Room-Temperature Quantum Secure Networks

Quantum network devices, systems, and methods that are used in various quantum communication applications Background: Quantum communication technologies have the potential to completely change how information is stored, transmitted, and processed. This is due to the fact that it can enable 100% fully secure communication lines between communicators. This is possible because, contrary to cryptographic communication which uses mathematical functions that can be cracked, quantum communication uses quantum physics to communicate information. It is impossible to eavesdrop on a quantum communication line; measuring the system itself disturbs it which alerts the communicators that an intruder has tried to intercept information. If this technology is implemented, the communications industry can be completely revolutionized. However, despite its extreme advantages, quantum communication techniques have the disadvantages of transmission loss in fibers and storing (or buffering) of the quantum information. Technology Overview: This procedure of quantum communication involves separately storing 4 photons and making the first and second photons, and the third and fourth photons entangled photon pairs. Then, a synchronized retrieval is initiated such that the first photon is propagated to the first node, the second and third photons are propagated to the second node, and the fourth photon is propagated to the third node. The second node is then measured, and the entanglement swapping of information encoded within the second and third photons at the second node, and the first and fourth photons within the first and third nodes, respectively, is performed. This process can be modified depending on whether path differences want to be compensated for by converting them in storage time differences. This can be done in a number of ways, including making the second node an intermediate node, polarization within the nodes, making the first or third node an end node, among others. Thus, the transmission length, or fiber length, of the photons doesn't matter as long as it goes through a transmission length that has a Hong-Ou-Mandel visibility depth above the threshold tested depending on the method used. This can be checked by sending simple signals showing a negative or positive indication of whether it was below the threshold or above. The thresholds are usually around 40-50%. Advantages: - 100% secure communication lines. - Minimizes the amount of information that can be lost in fibers or storage of quantum information. - Can be done at room temperature Applications: Quantum communication techniques can be used to successfully transfer, store, or transmit information within a secure environment. Intellectual Property Summary: Patent application submitted Stage of Development: PCT/US19/24601 Licensing Potential: Development partner,Licensing,Commercial partner Licensing Status: Available for Partnership. 050-8987 Additional Information: quantum,communication,quantum networks,networks,quantum communication,secure,secure communication,transmission,fibers,quantum information,photon,nodes,polarization,quantum efficiency,quantum processing,quantum computer,quantum memory,quantum technology,quantum processor,quantum ram,large data storage,big data storage,digital storage,large data,information processing,information systems,information technology Source: Massimo Botturi,, Unsplash License.

Patent Information:
Technology/Start-up ID: