Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

operator was not presented the secrete data contained on the SIM, communication would not be allowed, and the fraud would be thwarted.

Later on, the presence of the Subscriber Identity Module allowed one further fundamental function, as the deployment of mobile networks brought with it a new need, that of allowing various mobile operators to serve each other’s clients. For example, a caller in Chile uses a Chilean operator to speak to someone in China served by a Chinese operator. When an operator serves a client of another operator, that’s called roaming. Of course, the roaming operator wants the original operator of the client to pay for that service. That’s where the Subscriber Identity Module took its second role. As the roaming operator could present to the original operator the secret data of the user, the original operator could not deny paying the roaming operator. What we see here is a fundamental function of the trusted core of personal electronic devices, called non-repudiation, which facilitates electronic commerce, of which mobile telephony was an early form.

The story of the success of the GSM and its smart card architecture must include mentioning that the very portability of the Subscriber Identity Module played a fundamental role, since it allowed the decoupling of the relationship of the mobile phone operator with personal electronic devices produced by the phone handset manufacturers. By moving the SIM from one handset to another, the consumer would get instant service with the same mobile phone operator, keeping the operator more in control of the customer relationship, and less so the handset manufacturer.

The role of computational devices in finance is as old as finance itself. In fact early writing was most often linked with the need to record business information, a fact used by John Chadwick in The Decipherment of Linear B, where he made the winning hypothesis that the clay tablets of Knossos in Greece where transactional records. There is then little wonder that some of the early computer networks were associated with inter-bank transfers, which fostered the establishment of networking technology in the banking world. So just like it happened with cellular telephony, with the need of security, cards with embedded trusted electronics, smart cards that the banks called chip cards, came into play, enabling consumer usage of the financial network. Ironically, when the actual deployment of chip cards started picking up a bit of steam in 1978, a core idea of the inventors was that this was the ideal carrier of electronic money, a form of money akin to banknotes and coins, but in a digital form; however, this vision really didn’t end up being central to the early development of chip cards, that took the form of securing banking transactions more similar to a digital form of personal checks.

The extension of the banking system into the realm of networks for consumers required means to recognize the person making the financial transaction. Hence was borne the credit card of today, whose function was initially to carry an identification number that would trigger the various mechanisms needed for the economic exchange to happen.

As we’ve seen in Chapter 1, in the 1990’s, it became apparent that the state of the art to protect banking information, the magnetic stripe of credit cards, was made largely obsolete by the increasing sophistication of the hacker community, and this particularly in countries with an expensive or lacking network infrastructure. Therefore, the most powerful financial card operations, Europay, MasterCard and Visa, defined a standard way, called EMV from their names, to use chip cards to protect individual financial transactions over their private networks. The closed architecture of the network then established the need for a device called a Point-Of-Sale terminal (POS), accompanied with a card-acceptance device, that allows secure reading of the information of the user’s chip card. When you go to the grocery, the point-of-sale terminal is the computer used by the cashier, the successor to cashing machines of yore. Actually, the point-of-

 

5 Fabric of Society

177

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)