After reprimanding everyone, Li Weiguo quickly apologized to Wu Hao and said, "Xiao Wu, I'm so sorry. It's all because I didn't do my job well. Don't worry, I guarantee that what we saw and heard today will not be leaked. "
"It doesn't matter." Wu Hao kept smiling and shook his head. Since people are visiting, these are naturally under his consideration. He was not surprised, so he comforted Qian Jianyuan, who was still angry: "Mr. Qian, don't be angry either. I believe they are just too curious."
Qian Jianyuan waved his hand, then continued to look at the screen and sighed slightly: "Neural network algorithm, fuzzy neural network algorithm, and deep learning technology are currently the most cutting-edge research fields in the computer field. I didn't expect that you are actually doing this in this regard. Such a great achievement has been achieved, and it has also been applied to actual products.
It seems that I really came to the right place this time. It is wrong to go out behind closed doors, and my old bones are a bit out of step with the times. "
Hearing Qian Jianyuan's sigh, Wu Hao quickly consoled him: "Mr. Qian, these achievements of ours are actually based on previous research. If there are no scientific giants like you to guide the way, how can we We, the younger generation, are growing up quickly.”
"That's right, Mr. Qian, never forget the well-diggers. Not only young people like them, but every one of us who enjoy the convenience of current life should be grateful to the researchers behind these technologies. The motherland will not forget to thank you." I represent the comrades who have dedicated their lives to modernization." Li Weiguo also came to comfort him.
Qian Jianyuan shook his head, then looked at Wu Hao with a complicated face and said: "What a pity. If you can calm down and do research, you can shock the whole world in less than ten years, no, in five years." , it is not impossible to rival those famous scientific giants."
Wu Hao heard this and said with a smile: "You're flattering me, I'm too noisy and can't calm down to do research day after day.
This path is quite good now. At least I can do something I like and give back to this society and our country to the best of my ability.
Although the methods are different, they lead to the same goal. At a higher level, we are contributing to the progress of mankind and society. To be honest, this is rejuvenating the country through science and technology.
Of course, I also want to realize my own life value while realizing these ideals. Don't ask for much wealth, but ask for a worry-free life. Do my best to make the people around me live a better life. This is my little wish. "
Qian Jianyuan looked at him and said with a kind smile: "A very sincere and simple ideal. In today's noisy society, it is really not easy to have a young man like you from Chicheng."
After saying this, Qian Jianyuan continued to look at the screen and said: "I heard that you also used a new language, but it doesn't look like it to me."
Wu Hao smiled and replied: "There is a new language, but it is not mature yet, so it is only used on a few key nodes. Others still use Python and C++, and of course some also use Java.
The reason why everyone has this illusion is that when we package and package, we use a new encryption method, which we call Kongming Lock. "
"Is Kong Mingsuo the kind of building block dismantling toy we played when we were children?" asked an expert in his forties.
Wu Hao nodded and said: "Yes, that's it. It's just that it's an image name for our encryption method. It doesn't mean that we adopted this method."
Hearing what Wu Hao said, Luo Kai became interested and said: "Xiao Wu, can you introduce us to this new encryption method? Some of our military's systems and software programs also urgently need a new method. To protect against increasingly serious cyber hacker attacks."
Luo Kai's question also attracted everyone's attention, and they all turned to stare at him. Seeing this, Wu Hao smiled and tapped on the keyboard again, and then a new diagram came out.
"We know that there are currently two main encryption methods. One is to embed the encryption program in the code, and the other is to add a shell when packaging.
But no matter which method it is, it is nothing more than keeping secrets in the common form of the three generals.
The first is the common online real-time monitoring of encryption status, sending a signal every period of time. The second type is long-term offline encryption. If this kind of encryption is reused, it must be activated online.
The third method is to use a key method for encryption, and when decrypting, use a virtual key, digital signature or hardware key to decrypt.
For important system software, these methods and forms are often used in combination. But even so, as long as you have the corresponding information and data, you can crack it. It just takes a long time.
Our encryption method is a different approach. What we want to do is not to prevent hackers from breaking in and stealing information.
Instead, the original data is encrypted and converted to form some disordered and irregular information content.
So even if someone steals the contents of the kernel, they cannot restore it, let alone read it. "
"But if a hacker masters this encryption conversion law, or masters the encryption conversion technology, then the data will be completely restored. And if such conversion and encryption are performed, will it affect the efficiency of the software operation?" There is a question. Experts who specialize in research in this area put forward their own objections.
Wu Hao shook his head and said: "No, there are no rules for encryption conversion. Everything is done randomly. Moreover, the encryption conversion does not directly correspond to the content, but to a special encoding. And this encoding is also an encryption password, which is difficult for others to understand. To decipher.
The code itself is recorded by a number ranging from sixteen to twenty-four digits. Each string of numbers corresponds to a code content and position.
Without the source code, it would take millions of years for even the fastest supercomputers to decipher it. "
"Such a complex program will be very bloated, but I have checked your system and it is very small. How did you do it?"
"No, it's not complicated at all." Wu Hao shook his head and smiled: "To use an analogy, this is like a drop of poison penetrating into the body of an animal. If you want to detoxify, you must first master the ingredients of the poison and develop a Corresponding antidote.
Poison is very easy to make, but it is difficult to develop an antidote. "
"I finally understand. What you mean is that this is like a mathematical formula. It seems very simple, but it is difficult to find the answer." Qian Jianyuan smiled after hearing what he said.
Wu Hao nodded when he heard this and said: "It can be understood this way."