K E Y N E S
OUT OF CHARACTER INFORMATION
Intent: To create a decryption/decoder program for Primo Victoria and the Sith Empire.
Image Source: Norbert Batai, Artstation (x)
Canon Link: Scandoc Decoder, Snooper, Decryption Computer, Data Breaker, Communication Wave Descrambler, Decoder, Software of Probabilities, Data-Sifter Software
Primary Source: Dumb Terminals (x)
Manufacturer: Primo Victorian
Affiliation: Primo Victorian, The Sith Empire | Closed-Market.
Model: AVS-K3YN5 “Keynes”
Modularity: None
Production: Semi-Unique
Material:
Scandoc Decoder
Snooper, Decoder
Decryption Computer
Data Breaker
Data-Sifter Software
Software of Probabilities
Communication Wave Descrambler
Master Coder, D/Square Decoder
Hard Disk Drive, DRAM, CPU
Integrated Circuits, System Boards
SPECIAL FEATURES
Utilizes several decoding/decryption and/or descrambling programs to aid communications/intelligence analysts.
Can sift through already collected data as determined by communications/intelligence analysts.
May be able to identify data patterns which can be of use to communications/intelligence personnel.
Can store data on its hard drives that can be accessed later on agents.
Control codes limit overall functionality - as the Keynes cannot be programmed to do anything other than sift through data and decrypt/decode intercepted encryptions.
Sifter: Sifts through already collected data for information as determined by communications and intelligence analysts.
Decryption: Will attempt to decode/decrypt the information that has been provided to it.
Computer: It is at the end of the day a console that is prone to various weaknesses. It can be infected with a computer virus, it can be shot up, it can be blown up - it can have an overload of power.
Keynes itself does not search for the information, nor goes out to collect it. It does, however, look to sift through, decode and or decrypt/descramble information that has been presented to it. Information can be inserted via disk, where it is then read/accessed and displayed on the monitor. From there communications/intelligence analysts can work through the data utilizing Keynes’ abilities.
Pulling from various decryption and decoder programs, the Keynes works to sift through collected data as determined by communications and intelligence analysts. Encrypted messages that are intercepted by communications can also be sent to Keynes. The device will attempt to decode/decrypt the message it is given, it does this by running the message through various programs.
Keynes is a console that can be installed within the communications lab or the main bridge of a starship, station or base. Keynes requires peripherals, including various input/output devices but can run independently on its own power supply. Provided it is connected to a power source, Keynes is a terminal with the primary function of sifting through collected data, and the secondary function of decoding/decryption.
A question came down to if the Keynes could be programmed for encryption - and an answer was provided. The Keynes for its capabilities is not a very ‘intelligent’ terminal, in essence, it can interpret a limited number of control codes. These control codes are special keyboard sequences that perform functions such as clearing a line, clearing the screen or controlling the cursor position. Beyond this, there are no other control codes or functions.
Keynes possesses a limited memory bank, and thus if new software is to be installed, older software must be uninstalled. Software installed must be in compliance with Keynes’ control codes otherwise the software will not work.