For MTU (don't use 3I at all) I came up with a ship transponder system. The terminology is necessarily taken from our TL but it is only as analogy.
The transponder is installed towards to end of ship construction. It is basically a smallish (1 meter3) armoured box self powered by beta voltaics. It has one fiber connector to hook into the ships comm computer.
components: purpose built computer. densiometer. beta voltaic power source (100 years).
When the "box" is 1st installed it makes a detailed grav map of the ship and has the perm structure "fixed" into memory. This is detailed down to minor structural anomalies.
Shortly before the ship is turned over to its owner from the yard, Scout Service (or equivalent) programs it with its unique Public & Private encryption keys along with registration details of ship. This data is securely sent out via the x-boat system to starports, Scout service & Navy. Only the appropriate Scout Service dept. gets the Private key.
When a ship enters a system and its transponder is queried by system control it sends its reply encrypted with its private key, the star port secure comm system decrypts using the ships registered Public key. The response from the transponder also includes last 10 system control ID's its communicated with including dates. Starports also have their own keys and the ship transponders have the public keys in database to be able to verify that it is indeed communicating with actual correct authorities.
Transponders record if they have been moved or, put in a new ship. They will respond with this data when ID queried by authorities. They can also detect (via densiometer) if the ship is carrying nukes. This data being detailed to authorities when transponder queried.
The unit is totally sealed and unlocks from within when proper coded instructions are given (encrypted with private key) if servicing is required by appropriate Scout personnel with correct equipment. If someone attempts to gain illegal access, all encryption keys are wiped and key h/w is fused (useless blob).
Data as to ship past itinerary is up-streamed to sub-sector & sector starport authorities and computers automatically find conflicting data if someone has managed to use another ships private key code in a transponder.
The transponder is installed towards to end of ship construction. It is basically a smallish (1 meter3) armoured box self powered by beta voltaics. It has one fiber connector to hook into the ships comm computer.
components: purpose built computer. densiometer. beta voltaic power source (100 years).
When the "box" is 1st installed it makes a detailed grav map of the ship and has the perm structure "fixed" into memory. This is detailed down to minor structural anomalies.
Shortly before the ship is turned over to its owner from the yard, Scout Service (or equivalent) programs it with its unique Public & Private encryption keys along with registration details of ship. This data is securely sent out via the x-boat system to starports, Scout service & Navy. Only the appropriate Scout Service dept. gets the Private key.
When a ship enters a system and its transponder is queried by system control it sends its reply encrypted with its private key, the star port secure comm system decrypts using the ships registered Public key. The response from the transponder also includes last 10 system control ID's its communicated with including dates. Starports also have their own keys and the ship transponders have the public keys in database to be able to verify that it is indeed communicating with actual correct authorities.
Transponders record if they have been moved or, put in a new ship. They will respond with this data when ID queried by authorities. They can also detect (via densiometer) if the ship is carrying nukes. This data being detailed to authorities when transponder queried.
The unit is totally sealed and unlocks from within when proper coded instructions are given (encrypted with private key) if servicing is required by appropriate Scout personnel with correct equipment. If someone attempts to gain illegal access, all encryption keys are wiped and key h/w is fused (useless blob).
Data as to ship past itinerary is up-streamed to sub-sector & sector starport authorities and computers automatically find conflicting data if someone has managed to use another ships private key code in a transponder.