characteristics
that are quite random in their development and their subsequent randomness is
adequately influenced by the statistics of extremely large numbers such that we
can establish a very low probability that the characteristic will develop
identically in two different individuals in a population sample the size of the
population of the earth (and then some).
To engage in a trusted authentication
protocol, the transcendent personal device must be able to request a biometric
entry on the part of the bearer. To do this, it must incorporate the necessary
sensors to capture the proffered biometric image or images. Given the
capabilities of currently available technology, probably the most plausible
architecture is for such biometric sensors to be incorporated into the
transcendent personal device body. While this may be slightly less attractive
from a security standpoint, the form factor impact of requiring biometric
sensors on or within the trusted core agent is a severe limitation on the
construction of this element. However, this is also a possibility given that
fingerprint sensors (a fingerprint is the iconic biometric characteristic) are
already available that can be included directly onto a secure core.
We’ve observed that a human biometric
characteristic is a good mechanism through which to bind the human bearer to
her or his transcendent personal device. It would be extremely useful if
similar characteristics were available for equipment assemblies such as the
transcendent personal device itself. Well, in fact, such characteristics are
available in limited areas and the technology offers the prospect of enhanced
utility within a wide range of equipment. Scott Guthery, a long time colleague
of the authors and a founder of Mobile-Mind, Inc., has done a review of this
area and has suggested the name mechanimetrics for a characteristic of
machines based on electromagnetic processes that parallels that of biometrics
for living organisms. This characteristic potentially allows for tamper-evident
behavior of a token and its auxiliary attachments through the measurement of
the aggregate differential identity of the mechanism. Central to the ability to
effect a policy infrastructure is the ability to identify the players within
that infrastructure to whom policy can be ascribed. Trust in a secure core
derives from the immutable nature of the computer hardware and subsequently its
software. The integrated circuit chip provides a relative self-contained
computer system that is difficult, if not impossible to change. Its software is
stored in read-only memory which is also difficult if not impossible to change.
Mechanimetrics extends these trust mechanisms to more general device
architectures.
We can recapitulate the primary
requirements of the transcendent personal device as we’ve derived them from the
needs hierarchy of people as reflected in the anticipated needs of computer
networks. The need of transcendence itself mandates the connection of the
primary trust infrastructure of the human social order with the primary trust infrastructure
of the network. To meet this need within the device will require mutational
changes within the human social order as well as within the technical
facilities of the device.
Given a comprehensive environment, the
capabilities of the device to function on behalf of the bearer derive from the
need of self-actualization. The device must function through peer-level
interactions with the external world that it encounters through its basic
physiological capabilities. This functionality is guided by an ontology of the
relevant social orders and network architectures. Specific interactions are
engaged through processing capabilities derived through aesthetic needs on the
part of the device and the device bearer. Through such aesthetic means, the
actual trust equations of pending interactions are determined. Cognitive needs
provide a basis through
|