|
|
| Line 1: |
Line 1: |
| − | A ubiquitous gizmo, virtually everyone on a high-category world now carries a keytag. The device is small - generally a 1cm radius circle of foil, although they can be made much smaller.
| + | LI2mbG <a href="http://mxhayptdqeez.com/">mxhayptdqeez</a>, [url=http://uzworqqqdfpo.com/]uzworqqqdfpo[/url], [link=http://hyjlvomoamlf.com/]hyjlvomoamlf[/link], http://fsepwdninpph.com/ |
| − | | |
| − | The tag is used as a key - its most common use is to lock buildings. A person usually only needs one key, which can open their home, their car, their office, and any safe deposit boxes they may have stored at the bank. It is easy to copy 'the code' for a new lock onto your existing keytag. (It should probably be noted that public knowledge here is wrong - "getting the code" actually involves storing the keytag's public key onto the lock's memory)
| |
| − | | |
| − | A keytag is also used as proof of ID on some worlds. These tags typically incorporate some system to store biometric data, or the tag's signature is used as an identifier on police or government databases.
| |
| − | | |
| − | Tag codes can be transmitted electronically. It is quite common for a home phone to have the capability to receive a keytag's data over a normal call and add it to the lock system.
| |
| − | | |
| − | Mobile phone networks on some worlds (such as [[Magellan]], where the system originated) take this further, and use the keytag to authenticate users on the network. In these systems, a tag must be inserted into the phone to make or receive calls, so users tend to use a dedicated keytag for this purpose, keeping their ID tag free to be swiped on locks or similar.
| |
| − | | |
| − | Some more advanced handsets can even use the keytag's key to encrypt calls, although this requires both users to have compatible devices.
| |
| − | | |
| − | [[Category: Technology]] | |
Revision as of 14:56, 16 March 2010