Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

sale terminal is also protected by a chip card, called a Security Access Module (SAM), which is used by the merchant. The user chip card protects against fraudulent customers, while the merchant chip card protects against fraudulent merchants.

The local architecture of the network is the link between the merchant system (i.e. the point-of-sale terminal) and the office of another participant to the system, called the acquirer. The role of the acquirer is to get the information of the chip card and route the proper financial information to the institution that has provided the chip card to the consumer. That institution is called the issuer of the chip card.

Original television networks were broadcast over the air in such a way that anybody with a television set was able to capture the signal. The revenues of the television broadcaster came from advertising or other resources directly received as the source, so there was no need to secure anything to protect the financial flows. In the 1980’s, the idea of providing private television channels caught on, whether through fixed lines (“cable”) or over the air. In both cases, the business case for providing the service required that the signal would only be decoded by the person having paid the associated dues. Again, the trusted smart card would become a key component of such systems. However, the case of encrypted signals over the air became a new capability to be provided by the cards, since the communication channel was one-way only, from the emitting station to the television set, with no return signal. No mutual authentication was possible. By this, we mean that it was possible for the user smart card to authenticate that the signal was indeed coming from the right broadcast station, and to use the proper decryption keys, but it was not possible for the broadcast station to know which user was actually viewing the channel. From a technological standpoint, this makes the feat of encrypted programming a very difficult task, because anyone can capture the encrypted signal and then try to decrypt it. This is a process with a good chance of success because the signal was, by necessity, encrypted by general means. This created a race between system implementers and hackers that continues to this day.

Within these television systems, the closed network is comprised of a decoding box and a smart card containing user parameters as well as other information that must be kept secret. If you have cable television or satellite television at home, the smart card is inside the box that your provider delivered at the initiation of the service. The local network is the link between the decoding box and the cable operator, in case of wired communications, or the broadcaster, in case of communication over the air. At the time of this writing, television networks have not evolved to global, roaming agreements like those found in telecommunication and banking. We’ll see shortly that this will probably happen in a very different setup.

Convergence

For as long as a phone was a phone, a merchant terminal a merchant terminal, and a television a television, dedicated industrial networks were perfectly suited to the tasks of their domain. However, things started to change when personal electronic devices started using protocols of general computer networks, like the universal serial bus and, as we saw before, Internet. Mobile handsets added capabilities by connecting to components of general use, for example memory cards, and Internet browsers. Similarly, merchant terminals started to be based on personal computer technology instead of specialized circuitry. And, as cable companies started to provide Internet services on top of their traditional television services so that their customers could browse the Web at home, we began to see companies in turn wanting to provide television services on top

178

5 Fabric of Society

 

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)