Home Up




Cryptocommunications and the

Compartmentation of Memory

By Roy D. Follendore III

Copyright (c) 2001 RDFollendoreIII



Human beings tend to associate and use concepts that are used in one area of science and apply them in others.  It is easy to forget that words are representative of ideas that cannot be easily transplanted.  With this in mind, it becomes important to recognize what we are.  In this case, we are the neural networks we are discussing.  A neural network is not just the name of a type of programming.  A neural network is the architectural specification of a mind.  At the core of thought is memory. This discussion is about physical memory and its relationship to Cryptocommunications in defining the physiological to cognitive boundaries of noise to knowledge.[1]


Memory is a process made up of three functional components in such a way they manage a signal.    Within this elemental concept of memory, there are transport, storage, and compartmentation mechanisms.  The transport network represents the potential physical paths though which a signal may be delivered to and from memory.  The storage mechanism is the location and means by which a signal is managed and maintained until retrieved. 


In some ways, the storage and the transport mechanisms can be thought of as part of the same thing.   Signals are always delayed in transit.  A signal delay in transit is therefore essentially a means of storage.  Conversely, a signal held in memory can be considered a part of the transport network.  The purpose of this paper is to discuss the third component, the compartmentation.


Compartmentation involves the control junction as well as the means of isolation of signals in transit and while in storage.  Philosophically, if you consider the transport and storage processes as positive physical attributes of what "is there", then the concept of a compartmentation process would involve the attribute negative assurance associated with what "is not there".  This is important because compartmentation at the physical level is about the regulatory assurance of signal content. 


The combinatorial integration of two separate elemental signals will always generate the loss of identity of at least one of the two signals.  Assume a basic signal is represented as either a positive or a negative charge.  There are actually three separate states, positive, negative and neutral.  If a positive and positive or negative and negative signal were to integrate, the result would be the loss of identity of one of the signals.  If a positive and negative or negative and positive signal were to integrate, then the result would be the loss of identity of both signals.  If a neutral and positive or negative signal were to integrate then the result would always result in the loss of identity of the neutral signal.  

Obviously, the inadvertent integration of signals along a transport path, or within a storage location would result in the loss and/or transformation of signal identity. 


Signal identity transformations are the basis of more complex permutations.  When considered in this way, the ability to isolate and compartment these signals represent not only the means by which storage is achieved and managed, it also represents the means by which transport is achieved. 


Isolation, compartmentation, and differentiation are related though separate concepts.  Compartmentation involves the continued insulated differentiation of discrete units.  Isolation can involve either differentiation of discrete units or continuous streams.   Storage involves compartmentation unless it is being described within the context of transport. A transport by definition involves the isolation of distribution unless the transport path is being considered in context with storage. 


The insulation of transport is different from storage.  Storage is completely insulated, even though it may be accessible.  This is also true while transport is isolated from other transports for the purpose of accessibility.   

Isolation and compartmentation occur in two forms; physical and logical insulation.  The physically insulated manifestation of isolation and compartmentation is accomplished through noninvasive boundary barriers that do not affect signals.  On the other hand, logical isolation and compartmentation is a higher order process accomplished through the control and manipulation of integrated second order signal permutations that generate symbols. 


Because it is possible to manage the loss of signal identity, logical compartmentation functions may occur through the implementation of arrays of physical gates.  The functions of gates are logical permutations because in acting they affect the identity of input to output signals and therefore input to output symbolism.  Second order logic may be used to achieve symbolic isolation through more complex forms of permutation.   Third order logic may be used to achieve rational isolation.    


This is the architectural concept of memory.  Memory is obviously based upon more than storage of a signal or symbol.  Depending on the way that you choose to describe the architecture, memory has more to do with permutation than with symbolic storage.  Memory not assessable, accessible, and transportable is much like the philosophical existence of some unknown tree that falls in a forest.  The degree of insulation is therefore important to memory.  The most insulated and isolated forms of storage are also the most useless. If this description of memory architecture sounds familiar, it should. 

Cryptography is the science of manipulating signals for symbolic permutation.  When strings of symbols are insulated through permutation, they can be logically differentiated and actively insulated both with respect to storage and to transport.  Cryptographic systems can be defined exactly as previously described above in physical systems.  Cryptography is therefore essentially a form of memory management where insulation through differentiation processes takes place through authentication.  


Within early research[2], I argued the concept that information security (INFOSEC) is a natural process. In the next decade, through patented demonstrations, I have previously shown how cryptography can be used to manage and even generate new knowledge through rationally filtered associations of compartmented data and information.  Within this paper, I have made a justifiable cohesive argument that cryptography may be an integral part of the phenomena of natural biological memory.  There are practical advantages to this perspective of thinking.


By proposing this view, it is possible to determine the extent to which concepts associated within Cryptocommunication may be naturally imposed within the biological functioning of memory and rational thinking within the human mind.  If true, then the way in which mankind may consider the natural cognitive operations of the biological brain may be unveiled. We must therefore consider the hypothesis that rational cryptographic filtering may in fact be a high order brain function associated within the process of memory within the mind.   


[1] What then is the value of expressing taxonomy where there is an assemblage of memory as components when their functionality is so highly integrated?  The answer involves the ability to express the functionality of memory architecture. The clear advantage of being able to think about memory in this manner lies within the ability to express the associated elemental dynamic relationships.  These definitions are constructed in such a way so that the distinctions of the assemblage as single process can be described functionally.

[2] A 2020 View of INFOSEC, By Roy D. Follendore III




Copyright (c) 2001-2007 RDFollendoreIII All Rights Reserved