Technology and life: starting with solar cars
Chapter 154
Chapter 154
"Okay, Wang Chuanjun, I don't worry about your work. You should leave quickly. An Cui and I will just follow you. According to the original saying, you should eat first when you arrive. An Cui and I will go slowly to the Ma's barbecue stall. Where, that’s it, you guys hurry up, I’m going to control the mecha. I haven’t used it since our Yunfan Technology Company made the mecha. This time I must try the mecha What kind of feeling is it like? That feeling should be very exciting. After all, mechs appear for the first time. Who doesn’t want to be the first person to eat crabs? If you don’t want to talk, let’s go quickly. We will gather at the barbecue booth later. Ha, I'm going to tinker with my mecha now." Liu Yun instructed Wang Chuanjun to go to the yard of Yunfan Technology Company after playing Wang Chuanjun.
The newly manufactured mecha is in the courtyard of Yunfan Technology Company, and it is not afraid of being stolen by others, because the system program of the mecha is created by Yunfan Technology Company itself, at least not afraid of being cracked by others in a short period of time Even if someone else stole the mech, it is useless, there is no way to crack the mech's system and enter the mech's operating system.And just in case, Liu Yun also set up a self-destruct program in the mech's system. Once the system is forcibly broken, the mech's system will use self-destruct to destroy itself to ensure that the core information of the mech will not be destroyed. exposed.Of course, the self-destruct program inside the mecha system is only known to Liu Yun and the programmer manager Liu Jinwei in the entire Yunfan Technology Company. A's information security, at least to ensure that the mecha will not be cracked in the short term.
Liu Yun took the lead in walking to the yard of Yunfan Technology Company.
"I want to open the mecha, please verify my permission." Liu Yun spoke to the eyes of the mecha.
Mecha has designed many verification methods in order to improve its authority, one of which is password verification, password verification is the simplest verification method, but there is no doubt that this verification method is the simplest verification method, and it is also the safest Ways of identifying.Methods of recognition such as face authentication or fingerprint authentication actually have bugs that can be exploited. Take face authentication as an example, it is actually possible to make a human face through 3D printing technology, so it is called face recognition. It is not 100% safe, but in life, because it takes a lot of money to make a 3D printed human face, it is not worth spending a lot of money for ordinary people to use 3D printing to make a human face. Therefore, the human face Identification technology is still very safe for most people, but it is still very insecure for those high-end businesses.In addition to face recognition and fingerprint recognition, there is no doubt that fingerprint recognition is relatively safe. The reason why fingerprint recognition is relatively safe is because the security of fingerprint recognition is relatively speaking.As we all know, everyone's fingerprints are different. It is impossible to use your own fingerprint instead of someone else's fingerprint to open someone else's machine by coincidence, because there are no identical fingerprints in this world, but because we are in daily life I often use my hands to participate in various social activities. In fact, I often "record" my fingerprints in some places by accident. Copy our fingerprints, and then make a fingerprint in reverse according to the copied fingerprint model, then this produced fingerprint can easily replace the original owner's fingerprint, and you can use this imitated fingerprint to complete all kinds of fingerprints. Various verification methods.Stealing the fingerprint of the victim in the same way is very troublesome, and it takes a lot of time and money. Therefore, the cost of this method is relatively high, and it is not necessary for most people to do so. Therefore, Fingerprint recognition is relatively safe, and it is quite convenient and fast compared to other verification methods.But generally speaking, the password authentication method is the safest, because the password can only exist in people's minds and cannot be stolen by others. Therefore, the password authentication method is the safest and most worthy of promotion.
Therefore, in terms of mech verification, Liu Yun adopted the method of double verification of face and password, which means very simple, that is, face recognition verification is performed first, and then password verification is performed. As long as one of these two verifications is used, the verification cannot be completed. If the mecha can't complete the authentication of the owner's identity, naturally it can't open the mecha, so these two verifications must be passed.
The first is the face verification of the mecha. When the face of the mecha is verified, the opening of the mecha is opened. At this time, people outside the mecha can enter the inside of the mecha, that is, the cockpit of the mecha, but this It does not mean that the mecha can be used, because after the face verification is passed, you can only enter the mecha. At this time, you must pass the password verification to use the various functions of the mecha. That is to say, the mecha is now only After opening the door, it has not started to start. To actually start the mecha, you need to enter the password again. Only when the user of the mecha enters the correct password, the mecha will be opened by the user, that is to say The display of the mecha will display the boot interface. Only when the mecha boot interface starts, it means that the mecha is ready to run. It is really started to run, and you can control the mecha to perform various tasks. Operation, such as the most basic walking operation, needless to say, the walking function is the most basic function, and there is nothing worth explaining.
"The user of the mecha, please look into my eyes, and then start face recognition." After the mecha made a sound, it reminded Liu Yun to look at the head of the mecha. Scanned Liu Yun's face, checked the distance between Liu Yun's eyes and the distance between the pupil and the nose, and finally identified Liu Yun's pupils and Liu Yun's eyebrows, eyes, nose, mouth, and facial contours. After confirming that the person in front of him was Liu Yun, the mech's face verification was considered passed.
"Okay, the identification has been completed now, and the identification result is the identity of the system administrator, please enter." After the mecha finished speaking, it opened the retractable door in front.
The only reason to say that it is the identity of the system administrator is because all mech users are graded, and the most senior is undoubtedly the system administrator.
(End of this chapter)
"Okay, Wang Chuanjun, I don't worry about your work. You should leave quickly. An Cui and I will just follow you. According to the original saying, you should eat first when you arrive. An Cui and I will go slowly to the Ma's barbecue stall. Where, that’s it, you guys hurry up, I’m going to control the mecha. I haven’t used it since our Yunfan Technology Company made the mecha. This time I must try the mecha What kind of feeling is it like? That feeling should be very exciting. After all, mechs appear for the first time. Who doesn’t want to be the first person to eat crabs? If you don’t want to talk, let’s go quickly. We will gather at the barbecue booth later. Ha, I'm going to tinker with my mecha now." Liu Yun instructed Wang Chuanjun to go to the yard of Yunfan Technology Company after playing Wang Chuanjun.
The newly manufactured mecha is in the courtyard of Yunfan Technology Company, and it is not afraid of being stolen by others, because the system program of the mecha is created by Yunfan Technology Company itself, at least not afraid of being cracked by others in a short period of time Even if someone else stole the mech, it is useless, there is no way to crack the mech's system and enter the mech's operating system.And just in case, Liu Yun also set up a self-destruct program in the mech's system. Once the system is forcibly broken, the mech's system will use self-destruct to destroy itself to ensure that the core information of the mech will not be destroyed. exposed.Of course, the self-destruct program inside the mecha system is only known to Liu Yun and the programmer manager Liu Jinwei in the entire Yunfan Technology Company. A's information security, at least to ensure that the mecha will not be cracked in the short term.
Liu Yun took the lead in walking to the yard of Yunfan Technology Company.
"I want to open the mecha, please verify my permission." Liu Yun spoke to the eyes of the mecha.
Mecha has designed many verification methods in order to improve its authority, one of which is password verification, password verification is the simplest verification method, but there is no doubt that this verification method is the simplest verification method, and it is also the safest Ways of identifying.Methods of recognition such as face authentication or fingerprint authentication actually have bugs that can be exploited. Take face authentication as an example, it is actually possible to make a human face through 3D printing technology, so it is called face recognition. It is not 100% safe, but in life, because it takes a lot of money to make a 3D printed human face, it is not worth spending a lot of money for ordinary people to use 3D printing to make a human face. Therefore, the human face Identification technology is still very safe for most people, but it is still very insecure for those high-end businesses.In addition to face recognition and fingerprint recognition, there is no doubt that fingerprint recognition is relatively safe. The reason why fingerprint recognition is relatively safe is because the security of fingerprint recognition is relatively speaking.As we all know, everyone's fingerprints are different. It is impossible to use your own fingerprint instead of someone else's fingerprint to open someone else's machine by coincidence, because there are no identical fingerprints in this world, but because we are in daily life I often use my hands to participate in various social activities. In fact, I often "record" my fingerprints in some places by accident. Copy our fingerprints, and then make a fingerprint in reverse according to the copied fingerprint model, then this produced fingerprint can easily replace the original owner's fingerprint, and you can use this imitated fingerprint to complete all kinds of fingerprints. Various verification methods.Stealing the fingerprint of the victim in the same way is very troublesome, and it takes a lot of time and money. Therefore, the cost of this method is relatively high, and it is not necessary for most people to do so. Therefore, Fingerprint recognition is relatively safe, and it is quite convenient and fast compared to other verification methods.But generally speaking, the password authentication method is the safest, because the password can only exist in people's minds and cannot be stolen by others. Therefore, the password authentication method is the safest and most worthy of promotion.
Therefore, in terms of mech verification, Liu Yun adopted the method of double verification of face and password, which means very simple, that is, face recognition verification is performed first, and then password verification is performed. As long as one of these two verifications is used, the verification cannot be completed. If the mecha can't complete the authentication of the owner's identity, naturally it can't open the mecha, so these two verifications must be passed.
The first is the face verification of the mecha. When the face of the mecha is verified, the opening of the mecha is opened. At this time, people outside the mecha can enter the inside of the mecha, that is, the cockpit of the mecha, but this It does not mean that the mecha can be used, because after the face verification is passed, you can only enter the mecha. At this time, you must pass the password verification to use the various functions of the mecha. That is to say, the mecha is now only After opening the door, it has not started to start. To actually start the mecha, you need to enter the password again. Only when the user of the mecha enters the correct password, the mecha will be opened by the user, that is to say The display of the mecha will display the boot interface. Only when the mecha boot interface starts, it means that the mecha is ready to run. It is really started to run, and you can control the mecha to perform various tasks. Operation, such as the most basic walking operation, needless to say, the walking function is the most basic function, and there is nothing worth explaining.
"The user of the mecha, please look into my eyes, and then start face recognition." After the mecha made a sound, it reminded Liu Yun to look at the head of the mecha. Scanned Liu Yun's face, checked the distance between Liu Yun's eyes and the distance between the pupil and the nose, and finally identified Liu Yun's pupils and Liu Yun's eyebrows, eyes, nose, mouth, and facial contours. After confirming that the person in front of him was Liu Yun, the mech's face verification was considered passed.
"Okay, the identification has been completed now, and the identification result is the identity of the system administrator, please enter." After the mecha finished speaking, it opened the retractable door in front.
The only reason to say that it is the identity of the system administrator is because all mech users are graded, and the most senior is undoubtedly the system administrator.
(End of this chapter)
You'll Also Like
-
Pirate Family
Chapter 1318 9 hours ago -
Full-time Summoner
Chapter 1763 9 hours ago -
Technology: breaking the hegemony that monopolizes the world
Chapter 1904 9 hours ago -
Out of the cage
Chapter 1605 9 hours ago -
Build Madness
Chapter 1094 9 hours ago -
Recruit black physique to start practice in the wasteland
Chapter 1581 9 hours ago -
Night of apocalypse
Chapter 1107 9 hours ago -
Mortal Cultivation: Starting from a Casual Cultivator
Chapter 1110 9 hours ago -
Technology overlord starts with baby
Chapter 1229 9 hours ago -
Naruto: I traveled through time with the Samsara Eye
Chapter 151 10 hours ago