Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

counter-example, the blood vessel pattern on the surface of a kidney, while perhaps unique to each person, would probably require invasive techniques to measure. In addition to being non-invasive, any measurement equipment should be relatively inexpensive and highly reliable. It should be possible to certify a level of trustworthiness of the equipment.

When a person enters an identification system, a copy of their differential identity marker is captured and stored in the identity registry for the system. This process is termed enrollment. At the time a person enrolls, the marker can be compared to all existing markers in the registry to confirm that the person is only entered into the system once. This process is termed identification. The process of capturing the marker from the person and comparing that to a copy of the marker that was stored away when the person enrolled in the identification system in question is termed either verification or authentication. The marker should be of such a form that a highly reliable comparison of captured versus stored markers can be made. The probability should be low that markers that should match don’t, and the probability should be high that markers that should not match indeed do not match. The comparison process should be relatively quick, which means not really more than a second or so. If it takes two hours to perform the comparison process then the authentication operation will be useless for most interactions.

We can also suggest a couple of characteristics that would allow us to keep differential identity teased apart from privacy. First, the marker should convey no information about the individual other than the differential identity of that person. Moreover, the marker should offer minimal or non-existent forensic evidence. In other words, it is desirable that the marker not be amenable to unintended indication of physical presence, which is an example of forensic evidence, except through an intentionally activated authentication protocol.

Following this rather lengthy prologue, we will now cut to the chase and assert that at the present time, the most reliable differential identity marker mechanism that possesses these characteristics is one or more of the biometric traits of the human body. Principal among these are fingerprints, handprints, facial characteristics, retinal patterns, iris patterns and DNA. Further, it should be noted that we’re suggesting that an actual biometric characteristic forms the differential identity marker, not some card or other token that encompasses the biometric characteristic.

The last two marker requirements that we noted illustrate our concern for the demarcation between establishing pure differential identity and using differential identity as an index for other information that we often want to relate to identity. As an example, if we want to adhere to our set of stated marker requirements, we will be more inclined to use a fingerprint or an iris scan versus using a DNA pattern because DNA conveys much more health related information that an individual may well want to hold private. Moreover, because we can derive DNA from blood or other bodily fluids, the presence of DNA is an ambiguous indicator of physical presence. That is, since blood can be taken from an individual and then placed at some location where that individual has not actually been, it is a potentially erroneous forensic indicator. We will be more inclined to use an iris scan versus a fingerprint because the iris scan offers significantly less forensic value than does a fingerprint. When we handle things, we often leave behind our fingerprints. When we look at things, we rarely leave behind our iris patterns. However, iris patterns contain more health related information than fingerprints.





 

9 Mutation

313

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)