Halopedia Era UNSC.png
HaloArray.png

Illegal Entry Protocols: Difference between revisions

From Halopedia, the Halo wiki

No edit summary
mNo edit summary
Line 5: Line 5:
By [[2521]], [[UNSC]] military operating systems had been standardized for over the last seventy years, leaving them vulnerable to [[Insurrectionist]] hacking. This stood in contrast to the [[Outer Colony]] networks used by the insurgents: as makeshift software, they were much more heterogeneous in nature and thus more difficult for the UNSC to decipher. There were several incidents in which UNSC systems had been hacked by rebel forces, the most prominent being the [[UNSC destroyer|destroyer]] {{UNSCShip|Persephone}}. This prompted Dr. Halsey to create new security protocols for the UNSC.<ref name="journal21"/>
By [[2521]], [[UNSC]] military operating systems had been standardized for over the last seventy years, leaving them vulnerable to [[Insurrectionist]] hacking. This stood in contrast to the [[Outer Colony]] networks used by the insurgents: as makeshift software, they were much more heterogeneous in nature and thus more difficult for the UNSC to decipher. There were several incidents in which UNSC systems had been hacked by rebel forces, the most prominent being the [[UNSC destroyer|destroyer]] {{UNSCShip|Persephone}}. This prompted Dr. Halsey to create new security protocols for the UNSC.<ref name="journal21"/>


Based on already existing translation algorithms, the so called "PIEs" were created by Dr. Halsey primarily for use in third-generation [[smart AI]]s. This new crop of intellect would allow them to penetrate any system software. A side effect of the protocol was that the AIs could learn to mutate and defend established UNSC operations systems from attacks.<ref name="journal21"/> Later, the protocols were used by AIs to reverse-engineer [[Covenant]] technology, namely the [[energy shielding]] of the [[Kig-Yar point defense gauntlet]].<ref>'''[[Dr. Halsey's personal journal]]''', ''May 20, 2544''</ref>
Based on already existing translation algorithms, the Illegal Entry Protocols were created by Dr. Halsey primarily for use in third-generation [[smart AI]]s. This new crop of intellect would allow them to penetrate any system software. A side effect of the protocol was that the AIs could learn to mutate and defend established UNSC operations systems from attacks.<ref name="journal21"/> Later, the protocols were used by AIs to reverse-engineer [[Covenant]] technology, namely the [[energy shielding]] of the [[Kig-Yar point defense gauntlet]].<ref>'''[[Dr. Halsey's personal journal]]''', ''May 20, 2544''</ref>


To Dr. Halsey's chagrin, the Illegal Entry Protocols and Counter-Illegal Entry Protocols soon gained the nicknames "PIE" and "C-PIE", respectively, based on misspellings of their acronyms.<ref name="journal21"/>
To Dr. Halsey's chagrin, the Illegal Entry Protocols and Counter-Illegal Entry Protocols soon gained the nicknames "PIE" and "C-PIE", respectively, derived from misspellings of their acronyms.<ref name="journal21"/>


==List of appearances==
==List of appearances==

Revision as of 05:15, May 23, 2014

Illegal Entry Protocols (IEP), colloquially known as PIEs, are software intrusion routines created by Dr. Catherine Halsey in conjunction with the Counter-Illegal Entry Protocols.[1]

Overview

By 2521, UNSC military operating systems had been standardized for over the last seventy years, leaving them vulnerable to Insurrectionist hacking. This stood in contrast to the Outer Colony networks used by the insurgents: as makeshift software, they were much more heterogeneous in nature and thus more difficult for the UNSC to decipher. There were several incidents in which UNSC systems had been hacked by rebel forces, the most prominent being the destroyer UNSC Persephone. This prompted Dr. Halsey to create new security protocols for the UNSC.[1]

Based on already existing translation algorithms, the Illegal Entry Protocols were created by Dr. Halsey primarily for use in third-generation smart AIs. This new crop of intellect would allow them to penetrate any system software. A side effect of the protocol was that the AIs could learn to mutate and defend established UNSC operations systems from attacks.[1] Later, the protocols were used by AIs to reverse-engineer Covenant technology, namely the energy shielding of the Kig-Yar point defense gauntlet.[2]

To Dr. Halsey's chagrin, the Illegal Entry Protocols and Counter-Illegal Entry Protocols soon gained the nicknames "PIE" and "C-PIE", respectively, derived from misspellings of their acronyms.[1]

List of appearances

Sources

  1. ^ a b c d Dr. Halsey's personal journal, October 15, 2521
  2. ^ Dr. Halsey's personal journal, May 20, 2544