"At the same time, every soldier wearing a battlefield data information personal terminal system can share relevant intelligence data transmitted back by other units in real time on his or her own smart AR glasses.
For example, the latest satellite maps, drone reconnaissance remote sensing maps, or real-time images, radar detection screens and other data information. In this way, we can know ourselves and the enemy, and fight without danger."
After listening to Wu Hao's introduction, Li Weiguo and others nodded, but a new question was raised.
In this way, will there be a risk of leakage of this personal terminal system of battlefield data information? For example, if this set of equipment is picked up or seized by the enemy, wouldn't all the intelligence data and information be exposed to the enemy?
Also, since this battlefield data information personal terminal system is connected to many other weapon and equipment systems, once the enemy uses this system as an interface springboard to attack our weapons and equipment and related combat systems, wouldn't it be worth the loss?
Tasteless.
Hearing these two questions, Wu Hao smiled and replied: "Actually, we have thought of these two questions a long time ago, and have carried out relevant research and technical breakthroughs to ensure that this set of battlefield data can be guaranteed to a great extent.
Security of information personal terminal systems.
First of all, I can tell you very clearly that even if the enemy obtains this personal terminal system for battlefield data information, it cannot use it. Because there is a human eye iris recognition lens on the inner frame of our smart AR glasses.
Every soldier wearing this battlefield data information personal terminal system must undergo iris identity authentication. In this way, no one except the soldier himself can use this device.
And this pair of glasses can not be handed over to others for use after verification. This is not the case. During use, this iris identification lens will also constantly identify and verify the iris data information of our human eyes. When it is found that the iris is incomparable.
When paired, the system will automatically lock and wait for re-verification to unlock.
If the verification fails several times, the system will be automatically locked unless a higher authority password is used to unlock it.
The smart AR glasses and the host of each of our battlefield data information personal terminal systems are bound together. This also means that even if the enemy wants to bypass the biometric iris recognition mechanism of the smart AR glasses, they cannot connect to the system.
, obtain the data information inside.
As for the enemy trying to use this device as an interface and springboard to invade our data information system and combat command system, this is also impossible. First of all, our battlefield data information personal terminal system itself has a very powerful firewall. The enemy wants to
It is basically impossible to crack and conquer this system in a short time.
Secondly, the rear system command and control center will detect all battlefield data information personal terminal systems in real time, scan the operation status of all battlefield data information personal terminal systems and the exchange of related data information. When a single device is found to be abnormal, the rear
The command and control system will automatically isolate and cut off these abnormal systems. Only after the relevant abnormal conditions are eliminated can these devices be reconnected to the entire network.
Finally, there is the personal permission design of the battlefield data information personal terminal system. Those data information are accessible to those people and those positions, and these can be set. So even if the other party picks up this battlefield data information personal terminal system device,
Even if they were lucky enough to crack it, the data information they had was very limited.
Because the data information in the personal terminal system of this set of battlefield data information is only about the owner of this set of equipment and the unit to which he belongs. They cannot obtain the data information of other units unless they obtain the corresponding permissions.
Such a setting can greatly avoid the leakage of data information from a single device, which may lead to data leakage and huge losses."
At this point, Wu Hao paused for a moment, then softened his tone and said: "Actually, there is another insurance, which is the self-destruct device.
When someone without authorization wants to dismantle these devices for huge profits, the self-destruction device in the device will be activated and burn the electronic components inside, thereby avoiding being studied and exploited by the enemy.
Secondly, when soldiers encounter danger and reach an emergency, they can also manually clear all data in the equipment, or even activate the self-destruction device."
After saying that, Wu Hao looked at everyone at the scene and spread their hands and said with a smile: "However, there is still some controversy about whether to install a self-destruction device in the equipment. So we decided to come up with two sets of plans, and specifically decided to let users
Make your own choice.”
After hearing Wu Hao's words, everyone present nodded to express their understanding.
Li Weiguo nodded at him and said: "Generally speaking, we do not have requirements or regulations in this regard. However, specific issues will be dealt with on a case-by-case basis. In some cases, the self-destruction device will definitely play a very important role."
"The key is to see the safety of this self-destruction device. If it is safe and reliable enough, then it will definitely be good to have it." Luo Kai analyzed from his perspective.
Wu Hao smiled and nodded in response: "Don't worry about this, this self-destruction device is safe and reliable enough. First of all, it is not a bomb and will not explode violently. It is actually equipped with a small explosive device.
Dots, and some other solutions. When the self-destruct device is activated, the explosive dots explode, and the solution inside flows onto the precision electronic components, thereby corroding and burning the circuit boards on these electronic components, resulting in short circuits and other situations.
During this process, personnel are safe enough and no harm will be caused to them."
After hearing his explanation, everyone understood and couldn't help but praise their design.
Compared with others who were talking about the technology and performance of this system, Meng Changbo was obviously more concerned about the price of such a system, and then asked about it. In his opinion, the performance of this system was definitely hard to say, but if
If the price is too expensive, it will definitely not be equipped on a large scale. In this case, the practical value of this battlefield data information personal terminal system will be greatly reduced.
Hearing Meng Changbo's inquiry, Wu Hao smiled and shook his head: "The overall cost is not expensive. In fact, it is much lower than the cost of some equipment currently under development. This is mainly due to our very mature
Production technology, as well as stable and cheap supply of raw materials, so if we can produce it on a large scale, then we can control the price of a single battlefield data information personal terminal system to a very low range."