Download presentation
Presentation is loading. Please wait.
Published byRebeca With Modified over 10 years ago
1
Counterfeit ID Card Detection
2
About Us Six Degrees Counterfeit Prevention, LLC (6DCP) is a leading marketing and distribution firm for CryptoCodex LTD., providers of the most powerful counterfeit protection, document security, and track & trace solution on the market. Encrypted Protected Powered by CryptoCodex Ltd.
3
The Problem A fake identification document (Passport, Military I.D., Drivers License, Medical I.D. Card) is created by replacing a persons picture in an authentic document When the picture replacement is carried out by experts, it is practically non-detectable The fake I.D. allows user to receive all services as if he was the original document carrier
4
Current Affairs 5 Hackers Charged in Largest Data-Breach Scheme in U.S. (credit cards) 5 Hackers Charged in Largest Data-Breach Scheme in U.S. (credit cards) Four Russians and a Ukrainian were charged in what prosecutors called the largest hacking scheme in U.S. history [ … ] stealing more than 160 million credit card numbers resulting in hundreds of millions of dollars in losses. -Bloomberg 3.6 million Social Security numbers hacked in South Carolina 3.6 million Social Security numbers hacked in South Carolina 3.6 million Social Security numbers had been compromised. The attack also exposed 387,000 credit and debit card numbers. The stolen data included other information people file with their tax returns such as names and addresses. Businesses taxpayer identification numbers also potentially have been comprised in the attack that is being described as one of the nations largest against a state agency. -The State Special Report: Alleged cyberattack hits Istanbul airports Special Report: Alleged cyberattack hits Istanbul airports The U.S. and Chinese governments said they were reviewing cybersecurity threats at the working group level during mid-July talks in Washington. The U.S. Defense Department accused the Chinese military of targeting U.S. computer networks early this year, China denied the allegations.
5
The Proposed Technology The proposed solution is based on a self-contained document The I.D. itself carries all components needed for its authentication The original picture and documents textual data are encrypted and printed into a barcode label No database is required to authenticate the I.D. A 2D barcode can contain all of the relevant data – fully encrypted Powered by CryptoCodex Ltd.
6
The Encryption Technique It is CHAOTIC [symmetrical, polymorphic, non-mathematical algorithm] The KEY is a PHR (Pure Human Random) The strength of the encryption is unlike any other today All expert attempts to hack it have failed Powered by CryptoCodex Ltd.
7
The Encryption – Explained Originally, the data in the left sand bottle is meaningful Shaking the bottle will cause the data to encrypt The only way to decrypt the data is to reverse each and every sand particular path No Algorithm was involved – thus, no way to break the system Encrypted data volume does not change Any attempt to further move the sand particulars, will deepen the encryption – away from a solution… Powered by CryptoCodex Ltd.
8
The Security Levels The I.D.s fields (number, name, address, height, eye color, date of birth, date of issuance, etc.) are encrypted and encapsulated in the data carrier. A process referred to as MDLE or Micro Database Less Encapsulation. The encryption does not increase the data volume leaving room for pictures and small details. Security measures allow for multiple levels of readability, from little to all of the content. Non-mathematical encryption is impervious to any of todays threats. Removing the central database eliminates a point of vulnerability Powered by CryptoCodex Ltd.
9
The Storage Element A greater storage capacitor allows for a greater amount of data to be stored. Possible Storage Elements: Smart Card RFID 2-D Barcode In the future governments may agree to utilize other electronic data capacitors like flash drives. Presently, only paper and plastic materials are accepted.
10
Smart-Card A Smart-Card can hold a large amount of data Should a Smart-Card be included as part of the documents, it will enable storing the cardholders complete picture – fully encrypted The picture, together with the textual data, will be encrypted and stored in the card A computerized process will read and decrypt the data and will display the result to the inspector with the granted authority
11
RFID (Radio Frequency Identification) The device is based on radio wave transmissions The device can hold a substantial amount of data The complete encrypted picture and textual data may reside in the device Possibility for identity theft by a remote reading of the data is this technologys biggest disadvantage The device is a real threat to human privacy and consequently was rejected by many governments
12
The Implementation Summary The encrypted 2D barcode will contain the I.D. holders personal data A barcode label will be included as an integral part of the I.D An encrypted label cannot be created without the encryption technology and the key
13
The authentication center should be strictly guarded It is possible to set as many authentication centers as desired since the data resides on the document itself The inspection posts would communicate with the authentication center(s) and will instantly receive I.D. validation or detect fraud Since the communication is also encrypted, to use internet or cellular links The Authentication Center
14
Drivers Licenses Identification Passports Visas / Green Cards Social Security Cards Medical I.D.s Secure Access Cards Potential Applications
15
Examples
16
Encryption Encryption technology is the only symmetrical, polymorphic, non-mathematical encryption method in the world. Its key strength (minimum 1 million bit key size) is truly chaotic and based on a innovative, patent pending technology called PHR Pure Human Randomization. PHR replaces the structuring and use of a pseudo-random calculative hash function. PHR cannot be cracked or brute forced by any known method(s). Powered by CryptoCodex Ltd. Key Strength – 1 million bit or more Performance 400% faster compared to AES. MPU use – Mathematical Process Unit in CPU use 3% – 7% only. Overhead of the file from original 5% +/- (original+5%) +/-
17
Micro Database Less Encapsulation - MDLE Powered by CryptoCodex Ltd. Other encryption algorithms have a bit overhead of between 300-700% when encrypting small amounts of information. PHR on the other hand uses an unparalleled, non dictionary compression ratio operational technique which has a bit overhead of 5-7%. Because of this, we are capable of encrypting relevant information into one 2D barcode. A process referred to as MDLE – Micro Database Less Encapsulation.
18
Six Degrees Counterfeit Prevention, LLC For Additional Information info@6dcp.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.