Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

So, we’ve now illustrated how to establish three levels of personal identity. In addition, we’ve seen how to blend our historical identification systems with a digital system based on biometrics. We can engage in interactions under the guise of any of these levels of identity. By clearly specifying the levels, all parties to an interaction have the same expectations of interpretation. Perhaps more important, with these well-defined levels, our transcendent personal devices can be expected to better act on our behalves. Finally, no matter the level of personal identity used, the interaction process is the same. Let’s briefly review the steps of the interaction.

Drawing the Party Line

The first step we will term the overture. As with a play, this step is prelude to the main action. It entails bringing the supplicant and the sentinel in contact such that they both decide that they wish to enter into the authentication protocol proper. The actions that occur during the overture suggest that either side can first take the initiative in the process. The sentinel may first notice the approach of the supplicant and issue a preliminary challenge: “Halt, who goes there?” Alternatively, the supplicant can take the initiative: “Hello the house!” Following this very preliminary exchange, the sentinel can then begin the formal authentication procedure: “Advance and be recognized!” The supplicant then responds with an initial assertion of identity: “I’m Jane Doe.” Within the cyberspace interaction, we would actually like to give the somewhat stilted assertion: “I am the anchored persona, Jane Doe.”

In essence, we’ve codified an exchange that might occur between two strangers meeting in an isolated location where the intentions of either can range from benign to threatening. For the etiquette of a transcendent personal device, this corresponds to the range of actions from a person plugging an identification token into an apparently dormant system versus an application reaching a point where it needs token services and issuing an order to “Insert Your Token.” We’ve gone a bit overboard in discussing the overture stage because this is an area where operational models of different systems can diverge rather significantly; so, it is useful to model this well such that the two parties can land on their feet no matter how they get started.

The remaining stages are typically understood in a generic sense, but they can vary a great deal in the details. Once a supplicant name is asserted during the overture then the next step is that of marker acquisition. This step is aimed at gathering a marker from the supplicant and providing it to the sentinel. The only real new wrinkle here, from a conceptualization viewpoint, is recognizing that these successive stages may be pursued recursively in order to achieve an adequate trust level among all the elements of the two systems. For example, the two sides might first seek to recognize that each is presenting or using trusted equipment and then subsequently seek to establish trust in the differential identity of the supplicant as well as that of the sentinel. This is particularly important because, for most current token based systems, the token needs to trust the sensors on the sentinel through which the marker is acquired.

The marker to be acquired can run the full gamut of approaches to uniquely authenticate differential identity. It might consist of having the marked party select a series of objects from a list, providing a graphical password. Or, it might entail actually entering a text password or a personal identification number. On a more complex plane, it might entail capturing a facial image of the supplicant or perhaps an image of their iris pattern or one or more fingerprints. In the extreme, it might entail capturing a swab of bodily fluids from which DNA can be obtained. Once the marker is acquired, it can be compared by the sentinel to a marker template that was gathered from the supplicant on enrollment.

364

10 Power of Prayer

 

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)