After reprimanding everyone, Li Weiguo quickly apologized to Wu Hao and said, "Xiao Wu, I'm so sorry. It's all because I didn't do my job well. Don't worry, I guarantee that what we saw and heard today will not be leaked.
"
"It doesn't matter." Wu Hao kept smiling and shook his head. Since people were visiting, these things were naturally taken into consideration by him. He was not surprised, so he comforted Qian Jianyuan, who was still angry: "Mr. Qian
, don’t be angry, I believe they are just too curious."
Qian Jianyuan waved his hand, then continued to look at the screen and sighed slightly: "Neural network algorithms, fuzzy neural network algorithms, and deep learning technology are currently the most cutting-edge research fields in the computer field. I didn't expect that you are actually doing this in this regard.
Such a great achievement has been achieved, and it has also been applied to actual products.
It seems that I really came to the right place this time. It’s wrong to go out behind closed doors, and my old bones are a bit out of step with the times.”
Hearing Qian Jianyuan's sigh, Wu Hao quickly comforted him: "Mr. Qian, these achievements of ours are actually based on previous research. If there are no scientific giants like you to guide the way, how can we
The younger generations like us are growing up quickly."
"That's right, Mr. Qian, never forget the well-diggers. Not just young people like them, but every one of us who enjoys the convenience of current life should be grateful to the researchers who work silently behind these technologies. The motherland will not forget to thank you for your efforts."
I represent the comrades who have dedicated their lives to modernization." Li Weiguo also came to comfort him.
Qian Jianyuan shook his head, and then looked at Wu Hao with a complicated face: "What a pity. If you can calm down and do research, in less than ten years, no, in five years, you can shock the whole world."
, it is not impossible to be on par with those famous scientific giants."
Wu Hao laughed when he heard this and said: "You are too generous, I am too noisy and can't calm down to do research day after day.
This path is quite good now. At least I can do something I like and give back to this society and our country to the best of my ability.
Although the methods are different, they lead to the same goal. To be honest, to be honest, it is to contribute to the progress of mankind and society. To be honest, it is to prosper the country through science and technology.
Of course, I also want to realize my own life value while realizing these ideals. I don’t ask for much wealth, but I want a worry-free life. I will do my best to make the people around me live a better life. This is my little ambition.
A little wish.”
Qian Jianyuan looked at him and said with a kind smile: "A very sincere and simple ideal. In today's noisy society, it is really not easy to have a young man like you from Chicheng."
After saying this, Qian Jianyuan continued to look at the screen and said: "I heard that you also used a new language, but it doesn't look like it to me."
Wu Hao smiled and replied: "There is a new language, but it is not mature yet, so it is only used on a few key nodes. The others still use Python and C
Of course, Java is also partially used.
The reason why everyone has this illusion is that when we package and package, we use a new encryption method, which we call Kongming Lock."
"Is Kong Mingsuo the kind of building block dismantling toy we played when we were children?" asked an expert in his forties.
Wu Hao nodded and said: "Yes, that's it. It's just that it's an image name for our encryption method. It doesn't mean that we adopted this method."
Hearing what Wu Hao said, Luo Kai became interested and said: "Xiao Wu, can you introduce us to this new encryption method? Some of our military's systems and software programs also urgently need a new method.
To protect against increasingly serious cyber hacker attacks."
Luo Kai's question also attracted everyone's attention, and they all turned to stare at him. Upon seeing this, Wu Hao smiled and tapped on the keyboard again, and then a new diagram came out.
"We know that there are currently two main methods of encryption. One is to embed the encryption program in the code, and the other is to add a shell when packaging.
But no matter which method it is, it is nothing more than keeping secrets in the common form of the three generals.
The first is a common online real-time monitoring of encryption status, which sends a signal every period of time. The second is long-term offline encryption. If this kind of encryption is reused, it must be activated online.
The third method is to use a key to encrypt, and when decrypting, use a virtual key, digital signature or hardware key to decrypt.
For important system software, these methods and forms are often used in combination. But even so, as long as you have the corresponding information and data, you can crack it. It just takes a long time.
Our encryption method is a different approach. What we want to do is not to prevent hackers from breaking in and stealing information.
Instead, the original data is encrypted and converted to form some disordered and irregular information content.
So even if someone steals the contents of the kernel, they cannot restore it, let alone read it."
"But if a hacker masters this encryption conversion law, or masters the encryption conversion technology, then the data will be completely restored. And if it is converted and encrypted in this way, will it affect the efficiency of the software operation?" There is one question.
Experts who specialize in research in this area put forward their own objections.
Wu Hao shook his head and said: "No, there are no rules for encryption conversion, everything is done randomly. Moreover, the encryption conversion does not directly correspond to the content, but corresponds to a special encoding. And this encoding is also an encryption password, which is difficult for others to understand.
Decode.
The code itself is recorded by a number ranging from sixteen to twenty-four digits, and each string of numbers corresponds to a code content and position.
Without the source code, it would take millions of years for even the fastest supercomputers to decipher it."
"Such a complex program will definitely be very bloated, but I have checked your system and it is very small. How did you do it?"
"No, it's not complicated at all." Wu Hao shook his head and smiled: "To use an analogy, this is like a drop of poison penetrating into the body of an animal. If you want to detoxify, you must first master the ingredients of the poison and develop a
Corresponding antidote.
Poison is very easy to make, but it is difficult to develop an antidote."
"I finally understand. What you mean is that this is like a mathematical formula. It seems very simple, but it is difficult to find the answer." Qian Jianyuan smiled after hearing what he said.
Wu Hao nodded when he heard this and said: "It can be understood this way."