Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter five hundred and fortieth technology other than technology

After seeing the controlled power armor, a guest who knew a little bit of technology asked strangely: "Isn't this right?"

Someone who didn't understand asked, "Electronic invasion is not something new. ±, is there anything strange about this?"

"It's not about electronic invasion." The guest who spoke was probably a person who specialized in business related to power armor, so he understood a lot and was very in-depth. He opened his mouth and was a bunch of professional terms. "In theory, power armor uses McAllen's anti-replication technology. In theory, it is impossible to be controlled by the enemy because of electronic invasion? Besides, even if the McAllen system does not take effect, the mechanical self-discipline system should be activated! Could it be that it was broken in the previous battle? But that shouldn't be! Even if there were broken ones, one or two were broken, and all were broken. This is not right?"

"Hey... what kind of technology is the Mai Lun you are talking about? What kind of self-discipline system?" The young man next to him asked awkwardly. He belongs to the half-jealous type. He usually likes to use the things he knows to mock others ignorance everywhere, but today he finds that the person around him seems to be a real industry insider.

The person next to him did not notice the embarrassment of the person next to him. He just explained seriously: "McCarran anti-replication technology is a silicon crystal encryption programming technology invented by a scientist named McCarran. This is a multi-layer security encryption technology across hardware and software. Its principle is actually very simple. It is to add mandatory rules to the starting guide information of the address code at the software level. Before each pre-reading the data, it will first check the Gates Changs Changshu, which encodes the lattice. If the Gates Changshu encodes and address code..."

"Stop, stop, stop," said the guest next to him who quickly grabbed the technology expert mode: "We are all amateurs, and some people can't even play the functional software on their mobile phones. Can you explain it in a simple way?"

The next person is obviously not the kind of complete technical mate. He just knows a lot. He is not the kind of worldly rigid scientist. Of course, if that kind of person is really not there, he would not appear at such parties. He also reacted when he heard the words of the people around him. These people around him are not the group of technical tycoons under his command, but some tycoons or family agents. It is estimated that they can understand those technical terms basically equal to teaching orangutans to speak dove language.

"A simple explanation is that the operating software inside the power armor is not installed in the computer disk. Instead, it is recorded directly in the silicon crystal and exists in a physical printing manner. Compared with the disks in civilian computers, the advantages of this crystal storage medium are: fast reading speed, strong earthquake resistance, small size, low failure rate without mechanical components, low power consumption, and the most important point is that the content cannot be simply modified."

"Will you not be able to modify data and write information? What if the user needs to add some settings?"

"The information is just difficult to modify, not that it cannot be modified. Modifying this kind of information requires special encoding to modify. Otherwise, the written information will be a mess and cannot be stored in the storage lattice. Because the key to the information is not recorded in the device, but is remembered by the operator with his brain before the task begins, so every time the information is modified, you need to enter a password, otherwise the information will not be written into the recorder. Because of the principle of McAllen's anti-replication technology, this kind of writing restriction information is actually a semi-physical software protection technology. Therefore, no matter how high the hacking technology is, as long as there is no password, you will not be able to write the information anyway, because this is a semi-physical protection measure."

"What if the enemy gets the password through torture or other methods?" asked the guest who was arrested.

"That's why there is a mechanical self-discipline system." The industry insider who is very knowledgeable explained: "In fact, this kind of thing not only has power armor and robots. The so-called self-discipline system is a self-management system used to restrain robots or automatic weapons and other automation equipment that have high self-control and damage to humans. The reason why this self-discipline system is called a mechanic self-discipline system is not because it is mechanical, but because it does not simulate human emotions like artificial intelligence. This self-discipline system is very dialect. Just like the robots in the first generation of science fiction films, it is extremely rigid.

The main program of this self-discipline system and automation equipment uses completely independent chips and control circuits. All information of the main operating system will be transmitted to the self-discipline system in one-way, and the self-discipline system will not send any information to the main program. You can understand the main program as a government staff member. This self-discipline system is like a counter-espionage department. This counter-espionage department will always monitor the government personnel, but the government personnel will not know the work status of the counter-espionage department at all. The information between the two is one-way. As long as the basic working status of the government personnel does not change, the counter-espionage department will never take the initiative to do anything to him. However, once this government official is bought by foreign forces, his behavior will definitely change, such as selling intelligence, or not following the instructions of superiors or the original position requirements when doing things, but working under the instructions given by foreign forces. Once this happens, it proves that the person has been bribed and no longer works for the country. Then at this time the counter-espionage organization will take action to arrest the government personnel.

Of course, I am a metaphor. The self-discipline system in power armor and armed robots is like the counter-espionage department. Once the program of power armor or armed robot is invaded, its behavior will inevitably be different from the previous settings. The self-discipline system has the original operating system settings, so the self-discipline system can always understand the working conditions of the main system. Once the behavior of the main system is abnormal and exceeds the fault tolerance range of the self-discipline system, it means that it has been invaded or rewritten. At this time, the self-discipline system will begin to intervene. It will format the entire operating system, and then copy its internal backup system to the main program location to replace the original operating system to start working again.

Because this self-discipline system is a completely independent system, unless you can grab the power armor or armed robot, then disassemble it and remove it slowly, it will be difficult to tamper with the self-discipline system. Although this method cannot guarantee that the power armor and armed robot will never be controlled by the enemy, at least on the battlefield, the enemy will definitely have no time and equipment to control their own power armor and armed robots, and this achieves the design purpose of the self-discipline system."

Guests who had thought we had controlled those power armors before were normal and began to wonder when they heard this person's explanation. "No! Then if this self-discipline system can prevent information from being tampered with, then how are those power armors controlled?"

The guest with very good professional skills frowned and said, "I can't figure it out, so I will ask questions! As long as I still suspect that the self-discipline system has been broken, it is understandable even if one or two power armors have been broken, but so many power armors have all broken self-discipline systems, it is obviously impossible. In other words, the other party has a way to invade the self-discipline system in a short time to make the self-discipline system paralyzed together with the main system."

Although this person is very well-informed and in-depth, the guess he said is very different from what we do. I guess if he knew how we bypassed the self-discipline system and McAllen anti-copy technology to replace the operating system, he might have fainted.

In fact, in his opinion, the McAllen anti-replication technology that is easy to solve for price comparison is a troublesome thing for us. As for the self-discipline system that he thinks is almost unsolvable, it is not a problem at all.

This self-discipline system is actually like using a single computer to build an automatic restore software. Once this independent computer determines that there is a problem with the monitored computer, it will automatically format the computer in full disk, then run the restore software, and restore the data originally recorded on the computer to that computer. In this way, no matter whether it is a virus or a hacker intrusion, it is useless, because the inside of the computer has been completely cleaned. As for directly invading this computer with an automatic restore system... Sorry, that kind of thing is too difficult. It is easier to think of other methods than to have that skill.

Because of this setting, most people feel it is very difficult to bypass this mechanical self-discipline system, and then think that it is impossible to bypass it and rewrite the information of the main system. However, these people are considering it from the software aspect, while we use hardware methods.

We actually didn't move the software content of this automatic restore system at all. What we did was to unplug the network cable.

Yes, the method we used is very simple, and we directly cut the data cables connecting the self-regulatory system and the main system. No matter how awesome the self-regulatory system is, it ultimately needs to rewrite the main system information to eliminate the possibility of the power armor or armed robot being controlled by the enemy. But what if there is no physical connection between the self-regulatory system and the main system? The information cannot be transmitted. How do you restore it?

Of course, there is also a method of confronting our method of cutting network cables, that is, to set up a device, as long as the connection between the main system and the self-discipline system is disconnected, the main system will self-restore or simply self-destruct. However, although this method can prevent the equipment from being controlled and utilized by the enemy, it undoubtedly reduces the equipment's own survivability. Because the self-discipline system is military equipment, that is, the environment is very dangerous, especially the power armor and armed robots. It is not surprising that they will be hurt anywhere in the guns and bullets. If there is such a self-destruct or self-formatted setting inside the equipment, then the machine is too dangerous. Because this setting is a bit extra, although the production unit of the automatic equipment knows that there are such defects, it rarely really sets up such protective measures. Because it is too brainless.

However, the network cutting cable I am talking about is actually just a metaphor, and it is not that simple to do it. The arms company is not an idiot. Of course, it is impossible to really get two computing cores and then connect a data cable in the middle. In time, this self-regulatory system and the main system are simply packaged together. The two share a circuit board and a processor chip. The difference is that the circuit used by both and the computing units in the chip are independent. Although they are packaged on a circuit board and sealed in the same chip, they each have their own electrical circuits. Except for a few nodes used for data monitoring and restoration and writing, they are basically two systems. Therefore, it is not that simple to cut these two independent parts.

However, it may not be that simple for others, but it is different for us.

Because of our electromagnetic control capabilities, when intrusion, we use electromagnetic control capabilities to burn the silicon crystal data gate between the self-regulatory system and the main system. This thing is like the customs inside an electronic device. The difference is that it checks data rather than goods. This level only allows data to be transmitted in one-way, and the effect is to prevent outsiders from invading the self-regulatory system. Because the level of unidirectional information transmission has no feedback signal, hackers or other intrusion information cannot invade such a system. Of course, this method can only be used by the self-regulatory system. Because the main system needs to communicate with the outside world, such as joining the battlefield data link, it is impossible to set up such a physical filtering device.

However, this device now becomes the network cable on this circuit board. When we burned this small chip that was not as big as a small fingernail, the main system and the self-discipline system were completely disconnected.

Because the self-discipline system is offline, we can change whatever we want. Anyway, the rostrum has no way to restore it. As for the anti-replication technology... In fact, although this thing is troublesome, it is not unsolvable.

The key to this McAllen anti-replication technology is that the lattice type is defined during production of the memory chip. It is a metaphor that ordinary people can understand. You can imagine data as physical substances. Among them, 0 is square and 1 is triangle. The normal memory crystal space is a larger space, whether square or triangle, it can be put in. In this way, you can record any information in this memory crystal. However, use McAllen anti-replication to prevent it.

The lattice of the memory crystal produced by the writing technology is very small. The lattice is pre-set, either a triangle or a square. That is to say, the lattice looks like during production, and only what kind of information can be recorded. If your information 0 and 1 codes and lattice are different, it will not be inserted. It will also lead to writing failure. This is why this technology makes it difficult for memory crystals to be rewrite, because if you don’t know the order, you can’t insert the data of the corresponding shape into the corresponding lattice.

In McAllen anti-replication technology, each memory crystal has a password. This password is actually the arrangement rule of the lattice, so after the password is again, the data can be written and read according to this rule. Otherwise, the data will not be fully written into the lattice, and it is also garbled to read it. As for the problem of worrying about the enemy knowing the lattice password, it is actually easy to solve. The army will order a large number of memory chips, and their passwords are almost all different. Although just like the manufacturer that produces lock cores, there are occasionally two lock keys that can be interchanged, but in fact, this probability is very low.

All the memory crystals sent by military units are disrupted, so each memory chip has its own code, and it takes time for a spy to get this code. Moreover, each device has its own code, which increases the difficulty of obtaining information. Moreover, there is a system for regular exchange of this crystal in the army, which means that the crystals that do not understand will change positions after a period of time. Even if you get the password, it will be invalid for a few days at most. Moreover, the crystal that you know the password will not be replaced, and there is no way to effectively use the obtained password.

This method can greatly increase the difficulty of information being stolen, thereby reducing the harm of spies.

The above are the key points that this technology is difficult to break, because it is too expensive to crack a memory crystal, and it is only targeted at one crystal at a time, and the cost ratio is completely unacceptable, so no one will be stupid enough to crack this kind of password.

However, we have another way.

Our method still comes from our electromagnetic control capabilities, and the method we use is actually very simple to reconstruct the lattice.

Generally speaking, the lattice will be fixed when it leaves the factory, but the layout of the lattice in the crystal is not impossible to change. As long as the appropriate voltage and electric field are used to modify the lattice structure in the crystal. However, this modification can only be small to large, but not large to small. In other words, it is originally a triangle hole. If you have a square hole that cannot be placed in, I can dig the small triangle hole directly and then stuff the square hole in. However, if the lattice is too large, it will not work. Of course, whether it is a square triangle or a triangle to square, it can be achieved by expansion, so there is basically no need to shrink the lattice.

However, this method will cause the memory crystal lattice to grow larger, thus causing changes in the physical structure of the crystal. The final direct consequence is that the life of the crystal we reset will decrease, and it can only be modified once, and it will be scrapped next time.

However, these are not problems for us, because we just use this method to control the enemy's equipment and work for us for a while. Do we still expect that thing can be kept for a hundred years? Therefore, this defect is actually not a defect for us.
Chapter completed!
Prev Index    Favorite Next