Skip to main content

Interactive systems would protect the information

https://crisisofdemocracticstates.blogspot.com/

Kimmo Huosionmaa

The interactive LLS (Low Light Screen) means the mobile device, what has an extremely low light screen, what must watch with night-vision glasses. Those glasses can transmit the code for the system, what tells the system if the user has permission to use some data. This system allows remote controlling the access of some data, and that can be filling with the bio metric identifier. This kind of systems might already in use at some classified areas, where the access must be controlled extremely sharp, like in some nuclear facilities and another kind of missions, where the operator must hide the existence of the team.


The low light screen allows using mobile devices in the dark forests, and in the situation, where the person must hide the position, from the observers. When we are thinking about the interactive technology, where the system identifies the allowance to use some components of those devices, we might think the situation, where the device is allowed to carry outside the operational area. If the operator has this right, the existence of those qualities might be wanted to hide from other persons.


Bio metric identifiers might be a very good tool, but if the owner of the system wants to hide the existence of the LLS (Low Light Screen)- or IRS (Infra-Red Screen) from other users, that might be needed to use the remote control or some other thing, like protective glasses, where is etched the special QR-code, what is visible with the selfie-camera. The double identifier allows denying the access to some functions if the person is outside the area, where the secret or classified things are doing, but this allows a person to use own mobile telephone, and answer the calls, what is coming from the members of the family.


If this component would be connected to the bio metric identifier, the person can use own telephone in secret areas. And if somebody takes that telephone in hand, the fingerprint or camera take the picture of the user. In some cases, the person might have RFID-identifier surgically involved in the hand. If somebody, who has no identifier touches the telephone, the GPS tells that it has been moved, and in this case, double identifier makes possible to uncover, if somebody plays the person.



Comments

Popular posts from this blog

The AI-based PCs will replace current PCs quite soon. A Lenovo director says.

    The AI-based PCs will replace current PCs quite soon. A Lenovo director says.   Lenovo plans to replace current PCs by using new AI-based systems. The AI-based PC is the tool that makes computing more powerful, more effective, and safer than ever before. The Kernel-based AI that guards computers and identifies the users are tools that are required at this time of modern computing. The problem with this type of advantage is that if those AI-based system's servers are in China, makes the PC an ultimate control tool. Another thing is that the host who controls servers can use data collected from the users to create military AI applications. Computer games help to create AI that can respond to all types of actions. And AI also can create things like hypersonic lifting bodies and command systems for military tools. Also, AI can create new types of dual-use systems that control drone swarms in marketing situations for making dragon images in the skies. But the same systems can contro

Quantum computers and ultra-fast photonic microchips can danger even the most secure communication.

"Quantum computers could pose a major security risk to current communication systems in 12-15 years with their exponentially greater speed and code-breaking ability. (ScitechDaily, Today’s Most-Secure Communications Threatened by Future Quantum Computers) Quantum computers can break entire binary cryptography. And that makes all communication unsecured. That is one of the greatest threats in quantum computing. And this brings the arms race to the quantum age. The quantum computer can create codes that any binary computer can break. But the quantum computer can also break old-fashioned codes. And that makes it an ultimate weapon and sabotage tool.   Quantum computers can change the measurements of the ammunition in factories by changing the system calibration. Or it can delete databases from the opponent's computer systems. This thing can delete all SIM cards from mobile telephones. In peacetime, the hackers that operate using quantum systems can steal the names of the counter-

The new 3D printers are coin-size systems.

"The tiny device could enable a user to rapidly create customized, low-cost objects on the go, like a fastener to repair a wobbly bicycle wheel or a component for a critical medical operation. Credit: Sampson Wilcox, RLE" (Scitech, Tiny Titan: MIT’s Revolutionary Coin-Sized 3D Printer Fits in Your Pocket) Researchers created a 3D printer that is coin-size. That kind of printer can create things like microchips. But it's possible. Those tiny 3D printers can also work in extremely large-size projects. In simplest models, the 3D printers are positioned on tracks. The 3D printer itself is the tool, that can be part of the modular production systems.  There are visions of high-temperature metal printers installed on the gantry cranes. That makes those crane printers that can make even ship-size things. The crane that the printer controls can move back and forth and the printer can move horizontally. This kind of thing can turn the crane into a high-temperature 3D printer, that