Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

Standardization of a number of such common operations was one of the first consolidating events in the evolutionary progression of secure core software.

This effort began in the late 1980’s within the International Standards Organization to establish a series of international standards related to secure core technology. This effort was driven largely by the financial industry but it garnered the development support from a variety of both manufacturers and large-scale issuers of tokens, like mobile phone operators. The result was the establishment of a family of standards related to tokens based on integrated circuit chips, the foundation of which define basic physical interfaces between integrated circuit chips and interface devices, communication protocols used by tokens and inter-industry services provided by compliant tokens. Through the years, this ISO/IEC 7816 family of standards has continued to evolve.

Using these standards, the software to be resident on the token was designed, developed and installed on the token prior to its issuance to the token bearer. In the early 1990’s began the development of what became the Multos system, as we discussed earlier. This new paradigm involved the installation of a virtual machine interpreter on the token, allowing subsequent trusted installation of new software, even after the token had been issued. In the late 1990’s, this was followed by a similar effort that made use of the Java language as the basis for the on-token virtual machine. By the end of the millennium, these efforts had resulted in a significant transformation of the secure core software environment. As we have previously noted, a major driver in this transformation came through the standardization efforts of the European Telecommunications Standards Institute in the form of standards for the use of such tokens as Subscriber Identity Modules in GSM cellular phones worldwide.

Essentially, in parallel with the development of so-called post-issuance programmable tokens, an evolution was also occurring in the form of enhanced cryptographic capabilities on tokens. The addition of a cryptographic co-processor allowed for the efficient utilization of complex algorithms. An example is the famous RSA algorithm. Named after its inventors, Ron Rivest, Adi Shamir and Leonard Adleman, this algorithm forms the basis of asymmetric key cryptography. This facilitated the deployment of public key infrastructures, thus laying the groundwork for tokens to become the ubiquitous purveyors of identification services. When coupled with efforts from the financial community to specify common protection mechanisms for the applications in the token, in a new organization called GlobalPlatform, tokens came to much greater utility within wide area computer networks.

Indeed, the first decade of the new millennium has seen the evolution of token systems centered upon their integration into more comprehensive computer platforms. Essentially, moves are afoot to integrate seamless secure core support into the operating systems of general computer platforms. This presents something of an evolutionary quandary. Tokens may become easier to incorporate into widespread application systems or they may be supplanted with competing mechanisms within these general computer systems. We will be considering this in more detail in the remaining chapters of this book. For the moment though, let us step back just a bit and see if we can identify some parallels between the manner in which secure core tokens are made operational and the way that people are made operational.




286

8 In Search of Enlightenment

 

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)