These forums have been archived and are now read-only.

The new forums are live and can be found at https://forums.eveonline.com/

EVE Fiction

 
  • Topic is locked indefinitely.
 

The Blueprints

Author
Karthwritte
Trouble Seekers Incorporated
#1 - 2012-02-18 21:03:16 UTC
I don't know if CCP made already a chronicle explaining the blueprints or if there was already a fanmade one, or a official fanmade one; but this idea of "explanation" to the system came to me today and I decided to practice my writing skills (which are hard).

ANYTHING PLEASE SAY SOMETHING, GIVE A OPINION, BUT SOMETHING. Also take in account I am not a profesional writer and my first language isn't English.

The Blueprints


New Eden’s markets could not be so rich and fruitful as we got today without the easiness the capsuleers have to create items, modules and ships using blueprints distributed by the institutions that own them. This is thanks to current universal system that facilitates access, research and re-invention, giving the necessary standards and security to make the market healthier. And without them, the institutions would not feel safe to release their latest advancements to the cluster, taking away the good opportunities the current system has.

Original Blueprints:

The original blueprint system is the brainchild of the firsts standardizations the members of the Yoiul Conference discussed and agreed to use. To being able to protect the designs before, many institutions used software or hardware solutions that lacked any real form of security or easiness in the use of the designs for production. The current and best solution of all resides on the use of both software and hardware to keep control and openness to the data.

The software security part consists in complex algorithms that work always the data its used and divide into:
The analysis algorithms are the ones that make sure the read/write protocols and the hardware are secure to run the data. It’s the most complex and invasive piece of the software measures. Some say that its Jovian design but this haven’t been proved in any form.
The degrading algorithms become active when the data its read and it corrupts it depending on the number of cycles used on the data. It is one of the countermeasures in case the data it’s outside the “license box” its not overexploited in any unlimited copy. Capsuleers can “******” some parts of this algorithms to make bigger copies but the algorithm eventually “evolves” and changes (destroy) the data beyond any useful use.
The encryption/decryption algorithms are custom made algorithms, depending on the race that created them, that always encrypt and decrypt constantly the data as its being read. Its function its to make sure changes to the design are not made (or not easily).

The hardware security part consists of a data box, or more commonly known as “the blueprint box” or “the license box”, which is a special set of data sheets coupled with special components that is supplied by the owner:

A structure scanner that passive or active scans that the box has not being tampered. When it detects a breach it wipes all the data inside. That’s why everyone try to handle the blueprint boxes with care as if it breaks you can say goodbye to the blueprint.
A Micro Fluid Router is installed, so the data box keeps connected to the license datacenters of the owner of the design. It interfaces with the degrading algorithms when the data its in use to make it halt and it identify and correct any change to the design, making it perpetually useful.
A programmable buffer that it’s used to store commands to use when the manufacturing process its ongoing. By reading the design, capsuleers research with special algorithms different methods to make the manufacturing process cheaper or faster and store the results in the buffer. Because of the many n forms the algorithms can read and write the data, the researched methods vary always from blueprint to blueprint, making them unique.


The Blueprints Copy:
The blueprints copies are the copied data of the original blueprints in common boxes of coupled datasheets. The designs of the blueprints copies have to be standard as it only works in the approved hardware and uses the analysis algorithms let work, its limited to some runs because of the degrading algorithms inside the designs and it also can contain the manufacturing commands contained in the programmable buffer of the original blueprint. The copies are also painted with a light blue to make it esthetically similar but different to the blueprints originals famous “blueprint blue”.

T2 Blueprint Copy:
By using approved processes to read and write the data inside the blueprints copies, capsuleers are able to decrypt and re-invent the designs to superior versions of the item. Sadly it doesn’t “clean” the analysis and degrading algorithms making them have the same limitations of the blueprints copies.

T3 Blueprint Copy:
The strange nature of the sleepers makes their technology as limited and superior as it can be. This makes having very complex encryptions and degrading algorithms found in every data system looted from their systems even more impossible to have a design perfect in copy to be used with New Eden technology. Thankfully the results of “mining” the data of them with a racial decryptor make the result (or sense) always the same, making the same sub-systems and ships always. Sadly the resulting blueprint becomes limited just as the copies are.