Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

The most ubiquitous personal electronic device today, the mobile handset comes from different manufacturers with very different means of operation, as defined by their operating system. This environment is not like the world of personal computers, where almost all use a version of the Microsoft Windows operating system.

All handset operating systems provide means for the handset to access information in the Subscriber Identity Module. The handset will need to get user information from the SIM to establish a session with the mobile operator gateway and to encrypt the voice for privacy. This is done by software called middleware, because it sits in the middle between the handset and the SIM. This part of the handset middleware is defined by a European Telecommunications Standards Institute specification that all handsets in the world must follow, numbered 11.11. Another piece of middleware on the handset is numbered 11.14 and provides means for the SIM to access handset resources. For example, the SIM can use the screen of the handset to display menus for asking users their personal identification number for authorization, or other information like new preferences.

Point-of-sale terminals use banking chip cards to perform two basic functions. They talk to the consumer card to establish its validity, and they talk to a commerce gateway to establish the financial transaction. As we’ve discussed, point-of-sale terminals themselves contain their own trusted core, a chip card called Subscriber Access Module (SAM), which is used to authenticate the merchant owning the point-of-sale terminal. As you can see, the point-of-sale terminal plays the role of the personal electronic device of the merchant here. So just like a mobile handset, a point-of-sale terminal contains middleware that knows how to talk with trusted cores, and that, in turn, knows how to relate information about the transaction to various communication peripherals, be they prompters to confirm the transaction, printers to provide a record or communications to link to the gateway.

When a trusted core, say in the form of a smart card, is inserted into a laptop computer, much middleware software is activated. This is because a computer is a much more general tool than a mobile phone or a point-of-sale terminal. The first layer of software encountered by the smart card is a card service component, which allows the computer to talk with all sorts of cards. It even allows the computer to talk with several cards at once. The second layer allows the computer to use the card for basic operations that are very important to provide a standard set of functions that smart cards perform. This layer is a cryptographic component allowing the cards to serve all sorts of encryption and decryption operations.

Those two layers are found on all Microsoft computers. Then above or next to these layers, other layers can be present that provide various card oriented operations, for example encrypting and decrypting e-mail, or logging on a remote computer to access a corporate gateway to the network.

As we noted earlier, the model for much Internet access today is a client-server model. The users of personal electronic devices are ubiquitously using Web browsers that make use of standard protocols to access a wealth of servers that present content to them. Such a protocol is the HyperText Transfer Protocol (HTTP), a name you would be familiar with as you see it in all those Web site addresses, for example http://www.google.com. The server structure can be quite complex, but the general connection facility, which functions as a gateway (or sentinel) to the content is highly standardized. For provision of industry network access (for example, from mobile telephony) to the Internet, the gateway function also provides protocol translation services. For example, it is able to map the over the air protocols between the handset and the base station into TCP/IP to allow connection to arbitrary servers on the Internet.

 

5 Fabric of Society

181

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)