Vol 3 Chapter 2295: self-destruct device


"At the same time, every soldier wearing the personal terminal system of battlefield data information can share the relevant intelligence data information transmitted by other units in real time in his smart AR glasses.
For example, the latest satellite maps, UAV reconnaissance remote sensing maps, or real-time images, radar detection images and other data information. In this way, we can know ourselves and our enemies, and we will be safe in a hundred battles. "
After listening to Wu Hao's introduction, Li Weiguo and others nodded, but they raised a new question.
In this way, will this personal terminal system of battlefield data information have the risk of leakage? For example, when this equipment is picked up or captured by the enemy, isn't this intelligence data exposed to the enemy?
Also, since this personal terminal system of battlefield data information is connected with many other weapon equipment systems, once the enemy uses this system as an interface springboard to attack our weapon equipment and related combat systems, this is not worth the loss. Chicken ribs.
Hearing these two questions, Wu Hao replied with a smile: "Actually, we have thought of these two questions for a long time, and we have carried out relevant research and technical breakthroughs in a targeted manner, which can greatly guarantee this set of battlefield data. Information personal terminal system security.
First of all, I can tell you very clearly that even if the enemy gets this personal terminal system of battlefield data and information, it cannot be used. Because there is a human iris recognition lens on the inner frame of our smart AR glasses.
Every soldier wearing this personal terminal system of battlefield data information must undergo iris identity authentication, so that no one except the soldier himself can use this equipment.
And this pair of glasses is not to be used by others after verification. This is not the case. During the use process, this iris identification lens will always identify and verify the iris data information of our human eyes. When it is found that the iris cannot be compared When paired, the system will be automatically locked, waiting for re-authentication to unlock.
If the verification fails several times, the system will be automatically locked unless there is a higher-level password to unlock.
The smart AR glasses and the host of each of our battlefield data information personal terminal systems are bound together, which means that even if the enemy wants to bypass the bio-iris recognition mechanism of the smart AR glasses, they cannot connect to the system. , get the data information inside.
It is also impossible for the enemy to use this device as an interface and a springboard to invade our data information system and combat command system. First of all, our personal terminal system for battlefield data and information itself has a very powerful firewall. It is basically impossible for the enemy to crack and conquer this system in a short time.
Secondly, the rear system command and control center will detect all battlefield data information personal terminal systems in real time, scan the operation of all battlefield data information personal terminal systems and the exchange of relevant data information. When a single device is found to be abnormal, the rear command and control system will automatically isolate and cut off these abnormal systems. These devices can only reconnect to the entire network after the relevant abnormal conditions are eliminated.
Finally, it is the personal authority design of the battlefield data information personal terminal system. Those data information can be contacted by those people and those positions, and these can be set. Therefore, even if the other party picks up this battlefield data information personal terminal system device and is lucky enough to crack it, the data information they have is very limited.
Because the data information in this personal terminal system of battlefield data information is only about the owner of this equipment and the troops where it is located, they cannot obtain the data information of other units unless they obtain the corresponding permissions.
Such a setting can greatly avoid the leakage of data information of a single device, resulting in leakage of data information, thereby causing huge losses. "
Speaking of this, Wu Hao paused for a while, then said in a soft tone: "Actually, there is another insurance, which is the self-destruction device.
When someone wants to disassemble these devices without authorization, the self-destruction device in the device will be activated to burn the electronic components inside, so as to avoid being researched and used by the enemy.
Secondly, when the soldiers are in danger and at an emergency, they can also manually clear all the data in the equipment, or even think that the self-destruction device is activated. "
After speaking, Wu Hao looked at the crowd and said with a smile: "However, there is still some controversy about whether to install a self-destruction device in the equipment. So we decided to come up with two sets of plans, and specifically decided to let The user chooses for himself.

Hearing Wu Hao's words, everyone present nodded in understanding.
Li Weiguo nodded at him and said, "Generally speaking, we don't have any requirements or regulations in this regard. However, we will deal with specific issues in detail. In some cases, the self-destruction device will definitely play a very important role."
"The key is to look at the safety of this self-destruction device. If it is safe and reliable enough, then it must be good to have it." Luo Kai analyzed from his point of view.
Wu Hao smiled and nodded in response: "You can rest assured in this regard, this self-destruction device is safe and reliable enough~EbookFREE.me~ First of all, it is not a bomb, and it will not explode strongly. It is actually equipped with equipment inside. A small explosion point and some other solutions are generated. When the self-destruction device is activated, the explosion point explodes, and the solution inside flows to the precise electronic components, thereby corroding and burning the circuit boards on these electronic components, thereby A short circuit, etc. occurs.
In this process, the personnel are safe enough and will not cause any harm to them. "
After listening to his explanation, everyone understood it and couldn't help but praise their design.
Compared with others talking about the technology and performance of this system, Meng Changbo was obviously more concerned about the price of such a system, and immediately asked. In his opinion, the performance of this system is definitely not to be said, but if the price is too expensive, it is definitely impossible to achieve large-scale equipment. In this case, the practical value of this personal terminal system of battlefield data information will be greatly reduced.
Hearing Meng Changbo's question, Wu Hao shook his head with a smile: "The overall cost is not expensive. In fact, it is much lower than the cost of some current equipment under development. This is mainly due to the fact that we have very mature technology. The production process and the stable supply of cheap raw materials, so if we can produce it on a large scale, then we can control the price of a single set of battlefield data and information personal terminal systems to a very low range.

Latest chapter of Ebook Military Technology Click here