Chapter 3322

Some of the guests who knew a little bit about the technology, when they saw the controlled power armor, said, "this isn't quite right?"

Someone who doesn't understand asks, "electronic intrusion is nothing new. Is there anything strange about this? "

"Not electronic intrusion." The guest speaking is probably a person who specializes in the business related to power armor, so he knows a lot and is very deep. Opening his mouth is a bunch of technical terms. "According to the law, the power armor uses McAllen anti copy technology. In theory, it is impossible to be controlled by the enemy because of electronic invasion, right? Besides, even if the McCullen system doesn't work, the mechanical self-regulation system should be activated! Was it destroyed in the previous battle? But that shouldn't be! Even if some of them are broken, it is understandable that one or two of them have been damaged. All of them are broken. Isn't that right? "

"Ah What kind of technology are you talking about? And what kind of self regulatory system is there? " Asked the young man next to him rather embarrassed. He belongs to the type of half bottle vinegar. Usually he likes to take what he knows to ridicule others' ignorance. Today, he finds that the one around him seems to be a real industry person.

The next one didn't notice the embarrassment of the one around him. He just explained seriously: "the anti duplication technology of McAllen is a silicon crystal encryption programming technology invented by a scientist named McCullen. It is a multi-layer security encryption technology across hardware and software. Its principle is actually very simple, that is, the initial guide letter of address code in the software layer Mandatory rules are added to the information. Before reading the data in advance, gates Changshu of the lattice where the code is located will be checked first. If the code of gates Changshu and the address code are... "

"Stop, stop." "We are all amateurs. Some people can't even play with the function software on their mobile phones. Can you explain it in a simpler way?" said the guest

The man next to him is obviously not a complete technical house. He just knows more than that. He is not a rigid scientist who is unsophisticated. Of course, if he really is that kind of person, he will not appear at this kind of party. Hearing the words of people around him, he also responded. These people are not his own technical maniacs, but some tycoons or family agents and other characters. Hoping that they can understand those technical terms is basically equivalent to teaching orangutans to speak pigeon.

"The simple explanation is that the operation software inside the power armor is not installed in the computer disk, but directly recorded in the silicon crystal and exists in the form of physical engraving. Compared with the disk in civil computer, this kind of crystal storage medium has the following advantages: fast reading speed, strong anti-seismic ability, small size, no mechanical parts, low failure rate, low power consumption, and the most important point is that the content can not be modified simply

"Can't modify data, can't write information? What if the user needs to add some settings? "

"Information is just very difficult to modify, not can't be modified. To modify this kind of information requires special coding to modify, otherwise the information written will be disordered and cannot be stored in the storage lattice. Because the key to write the information is not recorded in the device, but is memorized by the operator with his brain before the task starts. Therefore, the password must be input every time the information is modified, otherwise the information will not be written into the recorder. Because of the principle of McAllen's anti duplication technology, this kind of writing restriction information is actually a semi physical protection technology in the form of software. Therefore, no matter how high the hacker's technology is, as long as there is no password, you can't write the information in any case, because this is a semi physical protection measure. "

"What if the enemy got the code by torture or other means?" Asked the guest.

"That's why there's a mechanical self-regulation system." "In fact, this kind of thing is not only power armor, but also robots," explained the expert. The so-called self-regulation system is a self-management system, which is used to restrict automatic equipment such as robots or automatic weapons with high self-control ability and the ability to harm people. The reason why this self-discipline system is called mechanist self-regulation system is not because it is mechanical, but because it does not simulate human feelings like artificial intelligence. This self-discipline system is very rigid, just like the robots in the first generation of science fiction movies. It is very rigid.

The main program of this kind of autonomous system and automation equipment uses completely independent chip and control circuit. All information of the main operating system will be transmitted to the self regulating system in one way, while the self regulating system will not send any information to the main program. You can think of the main program as a government worker. This self regulatory system is like an anti espionage agency. The anti espionage department will always monitor the government personnel, but the government personnel will not know the work of the anti spy department at all. The information between the two is one-way. As long as the basic working state of the government personnel does not change, the anti spy department will never take the initiative to do anything to him. However, once the government official is bribed by foreign forces, his behavior will certainly change. For example, he will sell intelligence or work according to the instructions given by foreign forces instead of following the instructions of the superior or the original job requirements. Once this happens, it proves that the person has been bought off and is no longer working for the country. At this time, the anti espionage organization will seize the government personnel.Of course, this is a metaphor. The self-discipline system in power armor and armed robots is like the anti spy department. Once the program of power armor or armed robot is invaded, its behavior will inevitably be different from the previous settings. There are original operating system settings in the self-regulation system, so the self-discipline system can know the working condition of the main system at any time. Once the behavior of the main system is abnormal and beyond the fault tolerance range of the self-discipline system, it means that it has been invaded or rewritten, and the self-discipline system will start to intervene. It will format the entire operating system, and then copy its internal standby system to the main program location to start work again instead of the original operating system.

Because the self-regulation system is a completely independent system, it is very difficult to tamper with the self-regulation system unless you can grasp the powered armor or armed robot, then take it out and slowly delete it. Although this method can not guarantee that powered armor and armed robots will never be controlled by the enemy, at least in the battlefield, the enemy will never have the time and equipment to control their own power armor and armed robots, and this will achieve the design purpose of the self-discipline system

The guests who thought it was normal for us to control the power armor heard this man's explanation, but they began to wonder. "No! So if this self-regulation system can prevent information from being tampered with, how are those powered armor controlled? "

The professional guest frowned and said, "I don't know how to ask questions! As long as I still suspect that the self-discipline system is broken, but even if one or two power armor self-discipline systems are broken, it is understandable that so many power armor are broken by the self-discipline system, which is obviously impossible. That is to say, the other party has a way to invade the self-discipline system in a short time, so that the self-discipline system and the main system are paralyzed together. "

Although what this person said is very road bound and in-depth, there is a big gap between what he said and what we did. If he knew how we were able to bypass the self-regulation system and McAllen anti copy technology to replace the operating system, he would probably faint directly.

In fact, in his opinion, the anti duplication technology of McAllen, which is easy to solve in price comparison, is a more troublesome thing for us. As for the self-discipline system which is almost insoluble in his opinion, it is not a problem at all.

This self-regulation system is actually like using an independent computer to establish an automatic restoration software. Once the independent computer determines that there is something wrong with the monitored computer, it will automatically format the computer, and then run the restore software to restore the data originally recorded on this computer to that computer. In this way, whether it's a virus or a hacker's invasion, it's useless because the inside of the computer has been thoroughly cleaned. As for the direct invasion of this computer with automatic restore system Sorry, that kind of thing is too difficult. It's easier to think of other methods if you have that skill.

Because of this setting, most people will find it very difficult to bypass the mechanical self-regulation system, and think it is impossible to bypass it to rewrite the information of the main system. However, these people are considering from the software aspect, but we use the hardware mode.

In fact, we didn't change the software content of the automatic restore system at all. What we did was unplug the network cable.

Yes, our method is very simple. We cut the data line between the autonomous system and the main system directly. No matter what kind of self-discipline system is, it will eventually eliminate the possibility of power armor or armed robots being controlled by the enemy by rewriting the information of the main system. But what if there is no physical connection between the self-discipline system and the main system? Information can't be transmitted in the past, how do you want to restore it?

Of course, there is also a counter-measure to our method of cutting the wire. That is to set up a device. As long as the connection between the main system and the autonomous system is disconnected, the main system will self restore or simply self explode. However, although this method can prevent the equipment from being controlled by the enemy, it undoubtedly reduces the survivability of the equipment itself. Because the self-discipline system is all military equipment, that is to say, the environment is very dangerous, especially power armor and armed robots. It's no surprise where you get hurt in a barrage of bullets. If there is such a self explosion or self formatting setting inside the device, then the machine is too dangerous. Because of this kind of setting, the production units of automatic equipment, although aware of the existence of such defects, rarely set up such a protective measure. Because it's so brain drain.

However, what I said is just a metaphor. It is not so simple to do. The arms company is not an idiot. Of course, it is impossible to make two computing cores and connect a data line between them. In time, the autonomous system and the main system are basically packaged together. They share a circuit board and a processor chip. The difference is that the circuits used by the two systems and the computing units in the chip are independent. Although they are packaged on a circuit board and sealed in the same chip, they have their own electrical circuits Several nodes used for data monitoring and restore replication are connected together, which are basically two sets of systems. Therefore, it is not so simple to cut these two separate parts.

However, it may not be so simple for others, but it is different for us.Because of our electromagnetic control capability, we used electromagnetic control capability to burn down the silicon crystal data gateway between the autonomous system and the main system. It's like the customs inside electronic devices, except that it checks data, not goods. This level only allows one-way transmission of data, and the effect is to prevent outsiders from invading the self-discipline system. Because there is no feedback signal for the one-way transmission of information, hackers or other intrusion information can not invade such a system at all. Of course, this method can only be used by the self-discipline system. Because the main system needs to communicate with the outside world, such as joining the battlefield data link and so on, it is unable to set up this kind of physical filtering device.

However, the device is now the network cable on the circuit board. When we burned this little chip, no one's fingernail, the main system and self-discipline system were completely disconnected.

Since the self-regulation system is offline, we can change it as we want. Anyway, there is no way to restore the rostrum. As for the anti copy technology In fact, although this thing is troublesome, it is not without solution.

The key to this anti duplication technology is that the crystal lattice type is defined at the time of production. Make a metaphor in a way that ordinary people can understand. You can think of data as physical matter. The code 0 is square and the code 1 is triangular. The usual memory crystal space is a large space, whether it is a square or a triangle, can be put in, so that you can record any information in the memory crystal. However, the lattice of the memory crystal produced by McAllen anti duplication technology is very small. The lattice is pre-set, either triangle or square. In other words, what kind of lattice is during production can only record what information enters. If your information 0, 1 code and the shape of the lattice are not the same, it will not be inserted, which will lead to writing Failed to enter. That's why this technology makes it difficult to copy a memory crystal, because you can't insert the data of the corresponding shape into the corresponding lattice without knowing the order.

In McAllen anti duplication technology, each memory crystal has a password. This password is actually the arrangement rule of the lattice, so after the password is encrypted, the data can be written and read out according to this rule, otherwise the data will not be completely written into the lattice, and the read out will be chaotic code. As for the fear that the enemy will know the lattice code In fact, it's very easy to solve. The military will order a large number of memory chips, and their passwords are almost all different. Although, like the manufacturer of lock cylinder, occasionally the keys of two locks can be exchanged, but in fact, the probability is very low. The memory crystals sent by military units are all disordered. Therefore, each memory chip has its own code. It takes time for the spy to get the code, and each device has its own code, which increases the difficulty of obtaining information. Moreover, there is a regular exchange system for this crystal in the army, which means that the crystal in the army will change its position after a period of time. Even if you get the password, it will be invalid in a few days at most. Moreover, the crystal that you know the password will not know where it will be changed, and there is no way to effectively use the obtained password.

This method can greatly increase the difficulty of information being stolen, thus reducing the harm of spies.

All of these are the key points that this technology is difficult to break. Because the cost of trying to crack a memory crystal is too high, and only one crystal at a time, the efficiency cost ratio is totally unacceptable, so no one will be stupid enough to crack this code.

But we have another way.

Our method still comes from our electromagnetic control ability, and the method we use is very simple - to reconstruct the lattice.

Generally speaking, the crystal lattice will be shaped when it leaves the factory, but the lattice arrangement in the crystal can not be changed. As long as the appropriate voltage and electric field are used, the crystal lattice structure can be modified. However, this kind of modification can only be changed from small to large, but not from large to small. That is to say, it was originally a triangle hole. You can't put a square in it. I can dig the small triangle hole directly, and then put the square in. However, if the lattice is too large, you can't shrink it. Of course, whether the square is changed to triangle or triangle to square, it can be realized by expanding, so there is basically no need to reduce the lattice.

However, this method will cause the lattice of the memory crystal to become larger, which will change the physical structure of the crystal. The final direct consequence is that the life of the crystal reset by us will decrease, and it can only be modified once, and it will be scrapped next time.

However, none of this is a problem for us, because we are just using this method to control the enemy's equipment to do some work for us. Do we still expect that thing to last for a hundred years? Therefore, for us, this kind of defect is not a defect.

In this way, we can easily change the memory chip with McAllen anti copy technology into a common memory card, and then directly rewrite the operating system. Because the self-regulation system has also been cut off, the new operating system is completely unsupervised, and the internal information is not how we want to change it? So what the guests see now is that all the power armor that hasn't been completely broken has got up, turned into zombie troops, and started to follow us to attack their own people.www.novelhold.com , the fastest update of the webnovel!