Canon

Illegal Entry Protocols: Difference between revisions

From Halopedia, the Halo wiki

m (Text replacement - "Category:UNSC Protocols" to "Category:UNSC protocols")
m (Text replacement - "{{Ref/Sources}} [[" to "{{Ref/Sources}} [[")
 
(3 intermediate revisions by the same user not shown)
Line 1: Line 1:
{{Era|UNSC|HCW}}
{{Status|Canon}}
'''Illegal Entry Protocols''' ('''IEP'''), colloquially known as '''PIEs''', are software intrusion routines created by [[Catherine Halsey|Dr. Catherine Halsey]] in conjunction with the [[Counter-Illegal Entry Protocols]].<ref name="journal21">'''[[Dr. Halsey's personal journal]]''', ''October 15, 2521''</ref>
'''Illegal Entry Protocols''' ('''IEP'''), colloquially known as '''PIEs''', are software intrusion routines created by [[Catherine Halsey|Dr. Catherine Halsey]] in conjunction with the [[Counter-Illegal Entry Protocols]].<ref name="journal21">'''[[Dr. Halsey's personal journal]]''', ''October 15, 2521''</ref>


==Overview==
==Overview==
By [[2521]], [[United Nations Space Command|UNSC]] military operating systems had been standardized for over the last seventy years, leaving them vulnerable to [[Insurrectionist]] hacking. This stood in contrast to the [[Outer Colony]] networks used by the insurgents: as makeshift software, they were much more heterogeneous in nature and thus more difficult for the UNSC to decipher. There were several incidents in which UNSC systems had been hacked by rebel forces, the most prominent being the [[UNSC destroyer|destroyer]] {{UNSCShip|Persephone}}. This prompted Dr. Halsey to create new security protocols for the UNSC.<ref name="journal21"/>
By [[2521]], [[United Nations Space Command|UNSC]] military operating systems had been standardized for over the last seventy years, leaving them vulnerable to [[Insurrectionist]] hacking. This stood in contrast to the [[Outer Colony]] networks used by the insurgents: as makeshift software, they were much more heterogeneous in nature and thus more difficult for the UNSC to decipher. There were several incidents in which UNSC systems had been hacked by rebel forces, the most prominent being the [[UNSC destroyer|destroyer]] {{UNSCShip|Persephone}}. This prompted Dr. Halsey to create new security protocols for the UNSC.{{Ref/Reuse|journal21}}


Based on already existing translation algorithms, the Illegal Entry Protocols were created by Dr. Halsey primarily for use in third-generation [[smart AI]]s. This new crop of intellect would allow them to penetrate any system software. A side effect of the protocol was that the AIs could learn to mutate and defend established UNSC operations systems from attacks.<ref name="journal21"/> Later, the protocols were used by AIs to reverse-engineer [[Covenant]] technology, namely the [[energy shielding]] of the [[Kig-Yar point defense gauntlet]].<ref>'''[[Dr. Halsey's personal journal]]''', ''May 20, 2544''</ref>
Based on already existing translation algorithms, the Illegal Entry Protocols were created by Dr. Halsey primarily for use in third-generation [[smart AI]]s. This new crop of intellect would allow them to penetrate any system software. A side effect of the protocol was that the AIs could learn to mutate and defend established UNSC operations systems from attacks.{{Ref/Reuse|journal21}} Later, the protocols were used by AIs to reverse-engineer [[Covenant]] technology, namely the [[energy shielding]] of the [[Kig-Yar point defense gauntlet]].<ref>'''[[Dr. Halsey's personal journal]]''', ''May 20, 2544''</ref>


To Dr. Halsey's chagrin, the Illegal Entry Protocols and Counter-Illegal Entry Protocols soon gained the nicknames "PIE" and "C-PIE", respectively, derived from misspellings of their acronyms.<ref name="journal21"/>
To Dr. Halsey's chagrin, the Illegal Entry Protocols and Counter-Illegal Entry Protocols soon gained the nicknames "PIE" and "C-PIE", respectively, derived from misspellings of their acronyms.{{Ref/Reuse|journal21}}


==List of appearances==
==List of appearances==
Line 14: Line 14:


==Sources==
==Sources==
<references/>
{{Ref/Sources}}
 
[[Category:UNSC protocols]]
[[Category:UNSC protocols]]

Latest revision as of 13:55, March 23, 2022

Illegal Entry Protocols (IEP), colloquially known as PIEs, are software intrusion routines created by Dr. Catherine Halsey in conjunction with the Counter-Illegal Entry Protocols.[1]

Overview[edit]

By 2521, UNSC military operating systems had been standardized for over the last seventy years, leaving them vulnerable to Insurrectionist hacking. This stood in contrast to the Outer Colony networks used by the insurgents: as makeshift software, they were much more heterogeneous in nature and thus more difficult for the UNSC to decipher. There were several incidents in which UNSC systems had been hacked by rebel forces, the most prominent being the destroyer UNSC Persephone. This prompted Dr. Halsey to create new security protocols for the UNSC.[1]

Based on already existing translation algorithms, the Illegal Entry Protocols were created by Dr. Halsey primarily for use in third-generation smart AIs. This new crop of intellect would allow them to penetrate any system software. A side effect of the protocol was that the AIs could learn to mutate and defend established UNSC operations systems from attacks.[1] Later, the protocols were used by AIs to reverse-engineer Covenant technology, namely the energy shielding of the Kig-Yar point defense gauntlet.[2]

To Dr. Halsey's chagrin, the Illegal Entry Protocols and Counter-Illegal Entry Protocols soon gained the nicknames "PIE" and "C-PIE", respectively, derived from misspellings of their acronyms.[1]

List of appearances[edit]

Sources[edit]

  1. ^ a b c d Dr. Halsey's personal journal, October 15, 2521
  2. ^ Dr. Halsey's personal journal, May 20, 2544