As she spoke of this, Vera suddenly raised her head somewhat unwillingly and asked the old man, “Is there a possibility that his identity has been encrypted within the system?”
“Encrypted?” The old man frowned and thought about it, then spoke up and said, “There are indeed cases of encryption. The relevant information for people with special identities will be encrypted, but the system itself is unable to access the encrypted content directly in order to ensure that this encrypted information will not be found out.”
Vera asked him, “What is the general encryption logic?”
The old man said, “As far as I know, there are two kinds of encryption logic. The first is that his identity information is completely erased from the system and his information is stored in another system that is mutually isolated. The latter will not have any connection with the network, which means that his real information only exists in the latter system and no one outside will be able to find out any clues about him.”
With that said, the old man continued, “The other kind is more complicated. This person would have a set of real identity information, but this set of information is encrypted within the system and has somehow become a one-way identity.”
Vera asked, “What does one-way mean?”
The old man explained, “One-way means that his identification card, passport, driver’s license, and even his household registration, marriage certificate, and identification documents are real. His identification number is also real, but if anyone in the system wants to look up information on him, they will not be able to find anything. For example, if I want to check on the people named Charlie Wade in the whole country, his information will not appear in the results returned by the system. Even if we pull out information of hundreds of millions of men in the country, his information will not be in.”
“If we want to check his information, there are two conditions. Firstly, you must know his name and his accurate identification number. You will only be able to find out his information when these two pieces of information are completely accurate.”
“This way, it would basically put an end to other people’s wide search because like you, if you really need to use the system to find someone in a sea of people, you will not know his identification number. If you know his identification number, that will mean that you’ve already mastered his real information so you don’t need to use this system to search widely.”
“If he wants to go abroad, he can use his name and passport number to book a flight ticket, and he will be able to exit customs smoothly with his passport.”
“However, if anyone wants to look him up through the information registered on the plane, it will be impossible for them to find anything. If you want to search for a person named Charlie Wade who had flown into Oskia but you only know his name, his information will not be displayed.”
Vera’s brows were knitted tightly together, and she had a solemn and fretful expression.
After a moment of hesitation, she asked the old man, “It doesn’t matter whether the person I’m looking for is the first or second type. Are you able to find out this hidden information with your status and connections?”
Comments
The readers' comments on the novel: The Man in Power After Being Married into Her Family