Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

the Social Security Number, has absolutely no measurable connection with the actual person, the level of trust that can be placed in identification through the Social Security System is negligible to non-existent. As a consequence, the Social Security Number is essentially useless as an identification mechanism. Nevertheless, it represents one of the more prevalent identity systems in use within the United States.

Relative to current technology, the only viable marker for establishing uniqueness for a person is a biometric characteristic of the person. There are a number of characteristics that can be used: DNA, retinal patterns, iris patterns, fingerprints, palm prints and even footprints. Each of these characteristics has many positive features to recommend their use as a marker, but most also have features that argue against their use. For the moment, we will simply assert that from among these characteristics, there are available one or more appropriate markers to be used in an effective identity system. So, what is so important about a biometric characteristic? These are the only features currently available that have an extremely strong association with the person. As a consequence, they are difficult to impossible to counterfeit if the markers are measured with a trusted system. Using a biometric marker, both steps of the enrollment process that we mentioned above are readily accomplished. If a person is already present in an identity system, then a one-to-many comparison of their biometric marker with those already in the system will determine whether they’ve already been enrolled. Within the vocabulary of identity systems, the term identify actually refers to just this type of comparison. The second step of enrollment is accomplished automatically; the marker is essentially provided by the person to the system, not the other way around. Perhaps the strongest feature of biometry based identity systems is that they constitute an extension of the mechanism that humans use for establishing identity within relative small groups.

The biometric comparisons that we utilize through interpersonal identification are daunting when compared to existing technologies for machine-effected identification. We humans use facial recognition, voice recognition, physical response recognition, auditory recognition and cognitive response recognition; and, we do this simultaneously and seemingly effortlessly. As we noted when considering some of the physiological aspects of both humans and computers, Richard Feynman assigned tremendous value to efficient, reliable identification through miniaturized variants of computers that approximate our natural abilities for interpersonal recognition. Indeed, without attributing a moral value to the proposition, we suggest that such identification has been a central aspect of the evolutionary benefits derived from social groups. The identification mechanism alluded to by Feynman is, at its base, simply a biometry based identity system for which, today, the technologies exist so as to allow such a system to be fully implemented on personal electronic devices. Now, once we can establish an identity, how do we attach specific rules to it?

Complementing the concept of identification that flows from social ecosystems is the concept of authority that applies to that identity. Both identity and authorization entail not only information, but processes affecting and effecting that information as well. Within an interaction, specific parties (entities) to the interaction can be ascribed the authority, or permission, to participate in various ways. I obtain authority to operate a motor vehicle on public roads by acquiring a driver license, a credential that grants certain authority to my identity. I obtain authority to purchase some item by presenting the necessary form of payment to the satisfaction of the seller.

These examples seek to illustrate the distinction between the character of these two processes, that is between identification and authorization, as well as the mechanisms used to effect them. Identification flows as a unique characteristic of the human body. Authorization flows from a

162

5 Fabric of Society

 

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)