Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

specifications. Whereas the theory of access is quite solid by now, there are indeed competing technologies, and therefore there will be variations in any presentation of the subject. Authentication means recognizing that requesters of content are indeed who they claim they are. Authentication relies on two concepts, identity and credentials. To illustrate the difference, let’s consider Marie Doe, who has a daughter, Suzie Doe. There is no doubt on Suzie’s identity. However, Suzie may have a passport which is passed limit date. In this case, Suzie has a solid identity, but weak credentials. Reversely, let’s consider John Reborn, who has a valid passport, but, who, in fact, is a spy with a false name. The identity of John is false, but his credentials are strong. So we see that identity and credentials are two different concepts. Identity is who the person is; credentials are here to affirm that the person is who he or she claims to be. When presented with credentials, the recipient must first establish trust in the credentials, and then establish how much trust it assigns to the linkage between the credentials and the person they represent.

For a computer to authenticate a person, credentials of the person can be of different forms that we will present in order of increasing confidence. The first credential is the name of the person, then perhaps a password that they can provide, then perhaps an object they carry that they can present to the computer, and further on even a representation of themselves that is associated with their physical presence. If the name of the person is all there is, the trust is minimal, unless the context is such that there is no possibility of mistake. Otherwise, it’s easy for anybody to give a false name. Concerning the password, the level of trust can be much higher if the password is complex enough. If the password is, say, four letters long, it’s not difficult to try all combinations. Some computers limit the numbers of trials for that reason, but then the odds are high that a password may be compromised when multiple accounts are searched. Long, unwieldy passwords are more secure, although more difficult to remember. In the end, passwords have a major weakness. They are easy to steal.

There are many ways to surreptitiously obtain passwords, and therefore, only limited trust is placed in them. That’s why tokens have been introduced, in the form of Radio-Frequency Identification (RFID) tags or smart cards. With these, the user presents physical evidence to the computer. Such tokens can be sophisticated in that they can talk with the recipient computer to make sure that they recognize that computer, and that the computer recognizes them. Moreover, they can be set up such that they are only activated if their owner provides evidence of ownership. Of course, by now you recognize that we can say that the owner authenticates to the token, which in turn authenticates on behalf of the owner to the recipient computer. That’s two levels of security. The way the owner provides evidence of proof to the token can be through a password or through physical presence, what is called biometry. Biometry is the science of associating particular features of humans with their identity. For example, fingerprints, iris scan, hand geometry, DNA, these are all unique identifiers of humans. Biometry can be used in two different ways in the authentication scheme. If this is direct authentication without a token, the user provides, say, the fingerprint, and the recipient computer double checks the fingerprint against a database. With a token, things can be made much more secure, because the user provides the evidence to the token itself, which may double check with its own database, all in the protected environment of the token. The biometric sensor is attached to the token and is therefore much less liable of having been tampered with, and the processing of information happens inside the token. As the token itself is physically protected, the likelihood of interference is very low, and therefore we can say that an authentication system that relies on a token plus biometry is quite strong. In fact, this is how secure governmental facilities are protected, with the additional precaution that not one, but several biometric verifications may be requested at once.

204

6 The Shrine of Content

 

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)