STAR ARMY

Sci-fi roleplaying and worldbuilding community

User Tools

Site Tools


faction:neshaten:digital_counter_sign_system

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Last revisionBoth sides next revision
faction:neshaten:digital_counter_sign_system [2020/11/29 01:24] – ↷ Links adapted because of a move operation faction:neshaten:digital_counter_sign_system [2023/01/21 12:32] – WIKI QUALITY MGMT - NESTING andrew
Line 1: Line 1:
-===== Digital Counter Sign System =====+====== Digital Counter Sign System ======
  
 The Digital Counter Sign System, or more known as the DCSS, is a specialized command system utilized within the [[faction:neshaten:start]] for use by their civilian and military ships, to help verify not only their authenticity when entering or closing in on a ship, but also to give Ship commanders the ability to lock down systems; the system is thus split between two components - the command authorization codes and the identify friend or foe system and is one of the components that is integrated into the [[faction:neshaten:cordecon_quantum_computer]]. The system is utilized throughout the Kingdom and is mandatory on all ships, stations, and bases. The Digital Counter Sign System, or more known as the DCSS, is a specialized command system utilized within the [[faction:neshaten:start]] for use by their civilian and military ships, to help verify not only their authenticity when entering or closing in on a ship, but also to give Ship commanders the ability to lock down systems; the system is thus split between two components - the command authorization codes and the identify friend or foe system and is one of the components that is integrated into the [[faction:neshaten:cordecon_quantum_computer]]. The system is utilized throughout the Kingdom and is mandatory on all ships, stations, and bases.
  
-==== Command Authorization Codes ====+===== Command Authorization Codes =====
  
 Command Authorization Codes are a series of alphanumeric passwords utilized primarily for locking down important systems from potential enemy tampering. Most codes are unique to an asset, such as a command code on a starship to lock down its navigation systems wouldn't work on another starship - either of the same or different class, because it uses a different code to accomplish that task. Command codes are all unique to an asset and no two command codes can be used for the same system but on two different assets, what this means is that a command code on one ship for a system can't be used on another ship for the same system. The codes can be used for a variety of different reasons, such as locking down a system, authorizing the changing of command, or the authorizing a self destruct system, just to name a few. Command Authorization Codes are a series of alphanumeric passwords utilized primarily for locking down important systems from potential enemy tampering. Most codes are unique to an asset, such as a command code on a starship to lock down its navigation systems wouldn't work on another starship - either of the same or different class, because it uses a different code to accomplish that task. Command codes are all unique to an asset and no two command codes can be used for the same system but on two different assets, what this means is that a command code on one ship for a system can't be used on another ship for the same system. The codes can be used for a variety of different reasons, such as locking down a system, authorizing the changing of command, or the authorizing a self destruct system, just to name a few.
Line 11: Line 11:
 Command codes are stored in an assets control database through a series of fractal encryption algorithms that are continuously passed through the assets quantum computer; this helps ensure that the codes remain deeply firewalled from outside access or even hacking; in the event that a hack is detected the system alerts command personnel.  Command codes are stored in an assets control database through a series of fractal encryption algorithms that are continuously passed through the assets quantum computer; this helps ensure that the codes remain deeply firewalled from outside access or even hacking; in the event that a hack is detected the system alerts command personnel. 
  
-==== Personal Command Codes ====+===== Personal Command Codes =====
  
 Personal Command Codes are codes utilized by individuals for locking down personal assets such as vehicles; although such codes can be found used by military personnel for locking down assigned assets such as fighters and vehicles for use by specific individuals. Civilians commonly used these particular codes due to them being more flexible than those typically used by the military, Trade Families used them so that they can lock down company assets from competitors or from employees. Personal Command Codes are codes utilized by individuals for locking down personal assets such as vehicles; although such codes can be found used by military personnel for locking down assigned assets such as fighters and vehicles for use by specific individuals. Civilians commonly used these particular codes due to them being more flexible than those typically used by the military, Trade Families used them so that they can lock down company assets from competitors or from employees.
  
-==== Identify Friend or Foe System  ====+===== Identify Friend or Foe System  =====
  
 The IFF is a system of encrypted words and numbers that are uniquely assigned to starships and stations so that they can identify themselves more easily to friendly forces, including orbital and ground defense systems. This key is unique to each asset it is assigned, this is because the digital key itself is embedded into its assigned asset, all information related to that ship is held within this key - certain important details, and even minor or useless details - are also stored which is used by the IFF to identify the ships sending the code for verification.  The IFF is a system of encrypted words and numbers that are uniquely assigned to starships and stations so that they can identify themselves more easily to friendly forces, including orbital and ground defense systems. This key is unique to each asset it is assigned, this is because the digital key itself is embedded into its assigned asset, all information related to that ship is held within this key - certain important details, and even minor or useless details - are also stored which is used by the IFF to identify the ships sending the code for verification. 
Line 21: Line 21:
 The code is useful in allowing ships to move more easily through Neshaten territory, due to the uniqueness of the key, no two ships can have the same key and if a key was to be somehow copied and used by another ship, the system would invalidate that key and require the ship it was originally assigned to to report back to the nearest military stronghold so that a new key could be generated.  The code is useful in allowing ships to move more easily through Neshaten territory, due to the uniqueness of the key, no two ships can have the same key and if a key was to be somehow copied and used by another ship, the system would invalidate that key and require the ship it was originally assigned to to report back to the nearest military stronghold so that a new key could be generated. 
  
-=== Asset Authenticity ===+==== Asset Authenticity ====
  
 Asset Authenticity refers primarily to the validity of ships and stations, but can also extend to local assets such as fighters and shuttle crafts. Asset Authenticity is the process of maintaining control over an asset by ensuring that it has proper authorization to access territory within the Kingdom, this kind of system is tied directly into the Friend/Foe system, which means that if an asset comes up with a bad friend or foe marker than authorization is automatically stripped from the asset until the asset can confirm whether it is friendly or not. By utilizing an assets onboard computer system, a ship, or station, or any other kind of asset can have its credentials auto-flagged as suspicious, such as if the asset is stolen out of another individuals hanger bay by a thief, where the thief's bio-signatures do not match those of the individuals who commonly utilize the asset or have permission to; when this happens a series of status symbols are assigned to the asset to determine the level of suspicion.  Asset Authenticity refers primarily to the validity of ships and stations, but can also extend to local assets such as fighters and shuttle crafts. Asset Authenticity is the process of maintaining control over an asset by ensuring that it has proper authorization to access territory within the Kingdom, this kind of system is tied directly into the Friend/Foe system, which means that if an asset comes up with a bad friend or foe marker than authorization is automatically stripped from the asset until the asset can confirm whether it is friendly or not. By utilizing an assets onboard computer system, a ship, or station, or any other kind of asset can have its credentials auto-flagged as suspicious, such as if the asset is stolen out of another individuals hanger bay by a thief, where the thief's bio-signatures do not match those of the individuals who commonly utilize the asset or have permission to; when this happens a series of status symbols are assigned to the asset to determine the level of suspicion. 

faction/neshaten/digital_counter_sign_system.txt · Last modified: 2023/12/21 00:59 by 127.0.0.1