Well-Known Member
Image Source: Tron: Legacy
Intent: To create a version of the Minainin chip that can be sold to the galaxy at large
Development Thread: If Required
Manufacturer: Ceredir Industries, UniTech Diagnostics Systems
Model: Meldolen
Affiliation: Open Market
Modularity: Minor - Encryption and stored IDs (both require physical connection to a server), update and/or user verification (software, inclusion selected at time of purchase)
Production: Minor
Material: Circuitry, LED, non-volatile memory, code
Description: Much like the Minainin chip created for the Wardens of the Void, this is a computer chip small enough to be easily concealed in common devices. The program contained within interacts with a vessel's transponder. As long as the chip is installed, said program will insert an encrypted string into the comments contained in transponder broadcasts. As comments are typically ignored and the string would appear to be junk data anyways, it would likely be ignored by automated systems. Also included in the program, however, is an additional function designed to comb through the comments of incoming transponder data and compare each string with the array of users stored within the chip.
It is possible, however unlikely, that an actual piece of junk code in the comments could match an approved user ID, providing a false positive. Additionally, since the chip does not use an internal processor to examine incoming data, the computer used will need to dedicate appropriate cycles to the task. While usually not an issue, excessive commenting in a transponder's code could provide a noticeable slowdown. An attempt to mitigate this was effected: the reader function only examines strings containing a particular amount of characters. Nothing smaller, nothing larger. As well, optimized search algorithms were selected for use on the sorted ID array in an attempt to minimize processor use.
In a notable difference from the Minainin chip however, the purchaser has options with their purchase. They can select whether each user has their own encrypted ID or whether there is a single ID for the entire organization, as well as whether or not other details are included in the user array. Programming can be included that will check whether changes have been made that require an update and that will alert the user if it has (requires comm system access, the organization to own their own encryption server (purchased separately), to have the option enabled on the server, and a subscription to the service). Also available is the option to have a user verify their presence before the programming becomes active. This is typically performed by passcode, though other methods are available. Changing the length of the encrypted string is a feature as well - the longer the better, but it is user preference.
Weaknesses/Drawbacks
- Small, thus easy to lose
- No innate resistance to EMP/ion
- Not foolproof, false positives can happen
- Could significantly slow the host computer in certain conditions
- No automatic updates, lack of new information could lead to issues between organization members
- Requires the use of a host computer and transponder. If one or the other is missing/disabled/off, this has no effect.