Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

Most personal electronic devices entail wireless communication. A cellular phone can reach a communication tower several kilometers distant. This is an expensive operation in terms of electrical consumption, but it is not an operation that requires the secure core. However, we see more and more applications where the cellular phone is used to effect payment. For example, as a means to pay for public transport, when getting to the turnstile the cellular phone can be placed close to a sensor on the vehicle door. An exchange then takes place between that equipment and the personal electronic device, payment is made and the door opens. This is not done with the same communications means as those used by the phone to reach the communication tower, but rather by a much weaker radio frequency channel that can reach only a few centimeters. Since we are effecting payment, this function is obviously one for the secure core. Actually, the standard configuration for this operation is to put the secure core in charge of the financial transaction itself and of the coding of the information to transmit. The antenna and its controller can be located in the personal electronic device, external to the secure core.

When the secure core is not attached to a personal electronic device, but to a passport, it is directly attached to an antenna embedded with the secure chip inside the cover of the passport. In this case, as we have previously noted, the secure core is powered by electro-magnetic induction. Similar to the case of using a cellular phone for payment of transport, the passport’s communication capabilities are very short-range; also a few centimeters. While dictated by the small amount of energy available, the limited distance is a factor of trust; the same that make us speak softer when we confide a secret to someone.

As we’ve seen, secure cores need to be protected in order to limit as much as possible access to their electronics. Therefore, secure core have two pieces: the body and the chip. The substrate of the body is typically a plastic frame with some generic printing. A receptacle is carved in the plastic to receive the chip and its contacts. Inside the plastic, it is also possible to have an antenna for contactless communications directly from the secure core. The size of the antenna can vary depending on the type of transmission used. As we have noted, the chip can be treated in various manners for protection against intrusion. Finally, once the chip completes the basic set up then various markings can be added to the card body to personalize the card. Each assembly of plastic plus chip is made unique by marking the plastic in ways that can be very difficult to alter; for example by a combination of embossing, indenting, laser and thermal marking, holograms and other means to identify the secure core with its owner and institutions vouching for the owner. An obvious example of such is the issuer logo and hologram on a credit card. This effectively says, “Trust that I, the bank, will pay you, the merchant, if the owner, whose name is also on the card, will sign in front of you.” In parallel, the same operation of personalization is done with the chip. Inside the chip are digital certificates for the banking institution vouching for payment, along with coded information giving the references of the owner. So, we see that the source of trust is two-fold: it comes from the physical markings on the secure core body and from the corresponding digital marking on the secure core chip. Henceforth, the trust in the physical and digital domains follows a similar path. There is no better way to illustrate that human and computer networks use the same mechanisms. We are not seeing anthropomorphism at work here. We are seeing an actual identity exchange between human and computer trust foundations, which is in retrospect not surprising, since the computer is acting on the behalf of the human.

As with inter-human comparisons, a most important difference between run-of-the-mill computers and secure cores is their upbringing. Secure cores must be both inexpensive and secure. Additionally, they need to be personalized. This puts important constraints on their manufacturing and distribution. To give an idea of how important this is to the trust imbued to the secure core, consider that it is common for large purchasers of secure cores to request a tour of manufacturing

 

7 In His Own Image

237

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)