Counterfeit ID Card Detection. About Us Six Degrees Counterfeit Prevention, LLC (6DCP) is a leading marketing and distribution firm for CryptoCodex LTD.,

Slides:



Advertisements
Similar presentations
CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Advertisements

Securing the Worlds Information Secure Dynamic Credit and Debit Cards Stop Credit Card and Identity Theft Andre Brisson Stephen Boren Co founders/ Co.
Key Management And Key Distribution The essential problems addressed by all cryptosystems is how to safely exchange keys and how to easily manage the.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Lecture 6 User Authentication (cont)
David Grochocki et al.  Lures Potential attackers  Smartmeters do two way communication  Millions of Meters has to be replaced  Serious damages just.
Zenith Visa Web Acquiring A quick over view. Web Acquiring Allows merchants to receive payments for goods and services through the Internet Allows customers.
1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 8 Network Security Copyright © 2010, Elsevier Inc. All rights.
Protecting Electronic Components Against Counterfeiting
It’s Time to Upgrade Your Thinking Q1 & Q2 Cyber Breaches Source: Identity Theft Resource Center, 7/2/ breaches with over 8.5 million records.
IDENTITY THEFT By Beaudan S and Tazwaar A. Identity Theft Identity theft is hard to protect against because hackers are getting better and better and.
Access Control Methodologies
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
1 Mon. December 3, 2001A Secure National ID Card Group 8 Chris Marinak Mike Cuvelier Adam Sowers Saud Bangash.
Certificate of Authenticity Security for the Diamond Industry.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
SMARTCARDS. What we’ll cover: How does the Smart Card work (layout and operating system)? Security issues for the card holder The present and future of.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 10: Authentication Guide to Computer Network Security.
© Pearson Education Limited, Chapter 5 Database Administration and Security Transparencies.
Smart Cards By Simon Siu and Russell Doyle Overview Size of a credit card Small embedded computer chip – Memory cards – Processor cards – Electronic.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
BUSINESS B1 Information Security.
Dan Johnson. What is a hashing function? Fingerprint for a given piece of data Typically generated by a mathematical algorithm Produces a fixed length.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
The Strickland Group Founded in employees Information Technology consulting – Software Development – HelpDesk Support – Network Infrastructure.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Cryptography and Network Security (CS435) Part One (Introduction)
Shanti Bramhacharya and Nick McCarty. This paper deals with the vulnerability of RFIDs A Radio Frequency Identifier or RFID is a small device used to.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
CIS 325: Data Communications1 Chapter Seventeen Network Security.
BY: CHRIS GROVES Privacy in the Voting Booth. Reason for Privacy Voters worry that their vote may be held against them in the future  People shouldn’t.
Authentication What you know? What you have? What you are?
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
CSCI-235 Micro-Computers in Science Privacy & Security.
Fall 2006CS 395: Computer Security1 Key Management.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Information Systems Design and Development Security Precautions Computing Science.
Preventative Measures
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Millions of T-Mobile customers exposed in Experian breach
SOLUTION ID CARDS AND DRIVER’S LICENSES
Presentation transcript:

Counterfeit ID Card Detection

About Us Six Degrees Counterfeit Prevention, LLC (6DCP) is a leading marketing and distribution firm for CryptoCodex LTD., providers of the most powerful counterfeit protection, document security, and track & trace solution on the market. Encrypted Protected Powered by CryptoCodex Ltd.

The Problem A fake identification document (Passport, Military I.D., Drivers License, Medical I.D. Card) is created by replacing a persons picture in an authentic document When the picture replacement is carried out by experts, it is practically non-detectable The fake I.D. allows user to receive all services as if he was the original document carrier

Current Affairs 5 Hackers Charged in Largest Data-Breach Scheme in U.S. (credit cards) 5 Hackers Charged in Largest Data-Breach Scheme in U.S. (credit cards) Four Russians and a Ukrainian were charged in what prosecutors called the largest hacking scheme in U.S. history [ … ] stealing more than 160 million credit card numbers resulting in hundreds of millions of dollars in losses. -Bloomberg 3.6 million Social Security numbers hacked in South Carolina 3.6 million Social Security numbers hacked in South Carolina 3.6 million Social Security numbers had been compromised. The attack also exposed 387,000 credit and debit card numbers. The stolen data included other information people file with their tax returns such as names and addresses. Businesses taxpayer identification numbers also potentially have been comprised in the attack that is being described as one of the nations largest against a state agency. -The State Special Report: Alleged cyberattack hits Istanbul airports Special Report: Alleged cyberattack hits Istanbul airports The U.S. and Chinese governments said they were reviewing cybersecurity threats at the working group level during mid-July talks in Washington. The U.S. Defense Department accused the Chinese military of targeting U.S. computer networks early this year, China denied the allegations.

The Proposed Technology The proposed solution is based on a self-contained document The I.D. itself carries all components needed for its authentication The original picture and documents textual data are encrypted and printed into a barcode label No database is required to authenticate the I.D. A 2D barcode can contain all of the relevant data – fully encrypted Powered by CryptoCodex Ltd.

The Encryption Technique It is CHAOTIC [symmetrical, polymorphic, non-mathematical algorithm] The KEY is a PHR (Pure Human Random) The strength of the encryption is unlike any other today All expert attempts to hack it have failed Powered by CryptoCodex Ltd.

The Encryption – Explained Originally, the data in the left sand bottle is meaningful Shaking the bottle will cause the data to encrypt The only way to decrypt the data is to reverse each and every sand particular path No Algorithm was involved – thus, no way to break the system Encrypted data volume does not change Any attempt to further move the sand particulars, will deepen the encryption – away from a solution… Powered by CryptoCodex Ltd.

The Security Levels The I.D.s fields (number, name, address, height, eye color, date of birth, date of issuance, etc.) are encrypted and encapsulated in the data carrier. A process referred to as MDLE or Micro Database Less Encapsulation. The encryption does not increase the data volume leaving room for pictures and small details. Security measures allow for multiple levels of readability, from little to all of the content. Non-mathematical encryption is impervious to any of todays threats. Removing the central database eliminates a point of vulnerability Powered by CryptoCodex Ltd.

The Storage Element A greater storage capacitor allows for a greater amount of data to be stored. Possible Storage Elements: Smart Card RFID 2-D Barcode In the future governments may agree to utilize other electronic data capacitors like flash drives. Presently, only paper and plastic materials are accepted.

Smart-Card A Smart-Card can hold a large amount of data Should a Smart-Card be included as part of the documents, it will enable storing the cardholders complete picture – fully encrypted The picture, together with the textual data, will be encrypted and stored in the card A computerized process will read and decrypt the data and will display the result to the inspector with the granted authority

RFID (Radio Frequency Identification) The device is based on radio wave transmissions The device can hold a substantial amount of data The complete encrypted picture and textual data may reside in the device Possibility for identity theft by a remote reading of the data is this technologys biggest disadvantage The device is a real threat to human privacy and consequently was rejected by many governments

The Implementation Summary The encrypted 2D barcode will contain the I.D. holders personal data A barcode label will be included as an integral part of the I.D An encrypted label cannot be created without the encryption technology and the key

The authentication center should be strictly guarded It is possible to set as many authentication centers as desired since the data resides on the document itself The inspection posts would communicate with the authentication center(s) and will instantly receive I.D. validation or detect fraud Since the communication is also encrypted, to use internet or cellular links The Authentication Center

Drivers Licenses Identification Passports Visas / Green Cards Social Security Cards Medical I.D.s Secure Access Cards Potential Applications

Examples

Encryption Encryption technology is the only symmetrical, polymorphic, non-mathematical encryption method in the world. Its key strength (minimum 1 million bit key size) is truly chaotic and based on a innovative, patent pending technology called PHR Pure Human Randomization. PHR replaces the structuring and use of a pseudo-random calculative hash function. PHR cannot be cracked or brute forced by any known method(s). Powered by CryptoCodex Ltd. Key Strength – 1 million bit or more Performance 400% faster compared to AES. MPU use – Mathematical Process Unit in CPU use 3% – 7% only. Overhead of the file from original 5% +/- (original+5%) +/-

Micro Database Less Encapsulation - MDLE Powered by CryptoCodex Ltd. Other encryption algorithms have a bit overhead of between % when encrypting small amounts of information. PHR on the other hand uses an unparalleled, non dictionary compression ratio operational technique which has a bit overhead of 5-7%. Because of this, we are capable of encrypting relevant information into one 2D barcode. A process referred to as MDLE – Micro Database Less Encapsulation.

Six Degrees Counterfeit Prevention, LLC For Additional Information