A cloud platform and platform operation method for docking a quantum computer with a user
A quantum computer and operating method technology, applied in the field of quantum computing, can solve problems such as difficult popularization, incompatibility, and harsh operating environment of quantum computers, and achieve the effect of increasing computing efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0048] Example 1
[0049] This solution proposes a cloud platform for docking quantum computers and users, including sequentially connected user information and task interface modules, quantum cloud platform user information manager, quantum cloud platform computing resource memory, task scheduler, and quantum computer . Such as figure 1 As shown in the overall structure diagram of the quantum cloud platform system, each module operates independently, and each module communicates in a form agreed upon within the system. For example, the user information and task interface module and the quantum cloud platform user information manager can communicate using the https protocol;
[0050] User information and task interface module, connected to user equipment, user equipment is used to submit user information and calculation tasks, user information and task interface module is used to receive user information and calculation tasks submitted by user equipment, and submit user informatio...
Example Embodiment
[0057] Example 2
[0058] Such as figure 2 As shown, a method for operating a cloud platform for connecting quantum computers and users is shown. The steps are as follows:
[0059] Step 1: The user logs in, and the user requests identity authentication from the cloud platform through a browser, etc. The browser here is the user information and task interface module, and the cloud platform queries related data through the Quantum Cloud Platform User Information Manager to verify that the data is sent Whether the user has login permission, if not prompted, let him register as a new user.
[0060] The identity authentication mentioned in step one refers to the desensitization of sensitive information such as the unique identity mark, user name, and password of the user before submitting the data to ensure the security of the user’s transmission of information. The authentication background is performed according to the agreed encryption and decryption algorithm. For decryption, the co...
Example Embodiment
[0065] Example 3
[0066] Such as image 3 As shown, in order to facilitate developers to use an ordinary computer for code input under the premise of no quantum computer, and after the development of the quantum program is completed, it can be reused in the quantum computer without modification. The user information and task interface module includes an external interface module, and the external interface module is connected to the quantum computer.
[0067] The external interface module includes: a loading interface, which is connected to an external traditional computer system, and loads a quantum program input by a traditional ordinary computer corresponding to the input of an external computer user device; an interface system analysis module, which analyzes the quantum program into a quantum instruction linked list, and analyzes the quantum program; quantum The program is composed of a quantum instruction set, which corresponds to various quantum logic gates. The interface ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap