Skip to main content

Data security and optical and sonar-based data transmitting methods.

Data security and optical and sonar-based data transmitting methods.



The artificial intelligence is an excellent tool for handling data security. If we are thinking the cameras of the mobile telephones they can use to detect the face or even the form of blood veins and another biometric identifier of the user, and if some unauthorized person would use the telephone, the information about that will be told to the controllers.

One of the biggest problems with optical data transmission is the system must have visual contact with the transmitter, and that means that the optical transmitters must put on the roof. And if the mobile system uses that thing, it must turn the camera to the transmitting LED system.

The LED system is always safer for eyes than laser-based systems, and the mobile device can be every side of the blinking LED, which would transmit data to the mobile device. There are two or three ways to make that thing real, and one is that the data would send from the mobile device by standard radio waves.

Problems with optical data transmission are that the systems must have visual contact with each other. The laser-based system, which uses optical fibers, has very bad security problems because if somebody would contact powerful carbon monoxide laser to that optical fiber, that can cause a fire in the very large areas. 


Or the mobile telephones sonar, what would focus the camera can also transmit data. That system would be work like old-time modems, which send the data by using sound. And that kind of sound-based intranets is used also for controlling underwater robots. And the pocket light of the mobile telephone can also be used to transmit bits. The thing that makes that system safe is that they are using extraordinary methods to make data networks. But some of those methods are suitable only in the closed environment, and in the streets, they are not very practical.

Sonar-based data transmission would have problems with noise.


So those data transfer methods are meant for use in some specially equipped offices and the devices must be kept in a certain position and area between support station and mobile devices must keep clear if we want to use optical data. The sonar-based system needs a silent environment and it might be suitable only in underwater situations. And maybe the divers would use that thing to control underwater drones, what are diving quadcopters, what can go in caves and shipwrecks. That would make research of those targets safer than going in self.

When we are thinking about the use of LED-lights in the data transfer missions, we can think that the LEDs that cannot see from outside would use as the WLAN system. But that thing might give more effective protection against hackers if we would use a hybrid solution.

That means that the telephone uses norma radio-based WLAN for search the data, and the system would use that optical data transmit for answering to the mobile system. Also, LED lights can be used as securing the data. If the mobile telephone doesn't get some code by that system, it would delete the classified data and deny access to confidential files.


Comments

Popular posts from this blog

Could this be the thing, that some people don't want you to know about zombies?

Could this be the thing, that some people don't want you to know about zombies? The simplest way to control zombies, which are made by using tetrodotoxin, which is called "zombie poison" is to use the automatic dispenser, which is normally used in diabetes treatment. In this case, the dispenser would be loaded by using tetrodotoxin. If the level of this poison is right, the person would be totally under the control of other people. And if the system cannot detect this poison there is a possibility to make the laboratory experiment when the staff will follow the decrease of the tetrodotoxin, and then the system can use a simple clock, which will inject poison to the body of a victim after a certain time. This would be an effective tool in the hands of military and counter-terror operators. Those zombies can be captured enemy operators, who will send back, and then they just kill their ex-partners. By using genetically engineered bacteria could be possible to create t...

Terrifying visions of genetic engineering.

 Terrifying visions of genetic engineering.  The modern Hounds of Baskerville ABW:s (Advanced biological weapons are the modern Hounds of Baskerville. The term ABV means the animal which is genetically engineered. And which is controlled by using some interactive electronic systems. There is a possibility to connect the action camera to dogs collars. And transmit commands to that animal by using electronic systems. Spoken words can use to the commands.  Or they can be a series of sounds that are stored in the sound files. When the operator activates a certain file that sound means a certain command to the animals. There is the possibility to automatize some commands by connecting the system to the image recognition tool. When the action camera sees something that is stored in the memory of the computer. That system sends the coded order to the animal.  Nanotechnology and genetic engineering are the most lethal combination in the world. The ABW:s (Advanced Biological ...

Facebook and dominance of the media.

The position of Facebook is dominating and that causes concern. Facebook is a well-known and commonly used service. And that thing causes that the information is starting to pile up in that service. That information contains data that we might want to hide. Facebook is a network-based service that can use for many purposes from marketing to intelligence.  Facebook was down and the thing cost about half a million dollars per hour to that service. That shutdown has shown how dominating that service has been growing. Facebook is a powerful tool. It can use to track the networks of people.  Artificial intelligence can show the network map of the people who are using that service. The data that travels between certain members of the network can show how often those people are contacting each other. There is a lot of criticism against Facebook but the fact is that everybody is using that thing.  The attitudes toward Facebook are conflicting. People are criticizing that service ...