1 / 18

Counterfeit ID Card Detection

Counterfeit ID Card Detection. About Us. Six Degrees Counterfeit Prevention, LLC (6DCP) is a leading marketing and distribution firm for CryptoCodex LTD., providers of the most powerful counterfeit protection, document security, and track & trace solution on the market. Encryp ted.

sachi
Download Presentation

Counterfeit ID Card Detection

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Counterfeit ID Card Detection

  2. About Us Six Degrees Counterfeit Prevention, LLC (6DCP) is a leading marketing and distribution firm for CryptoCodex LTD., providers of the most powerful counterfeit protection, document security, and track & trace solution on the market. Encrypted Powered by CryptoCodex Ltd. Protected

  3. The Problem • A fake identification document (Passport, Military I.D., Driver’s License, Medical I.D. Card) is created by replacing a person’s picture in an authentic document • When the picture replacement is carried out by experts, it is practicallynon-detectable • The fake I.D. allows user to receive all services as if he was the originaldocument carrier

  4. Current Affairs • 5 Hackers Charged in Largest Data-Breach Scheme in U.S. (credit cards) “Four Russians and a Ukrainian were charged in what prosecutors called the largest hacking scheme in U.S. history [ … ] stealingmore than 160 million credit card numbers resulting in hundreds of millions of dollars in losses.” -Bloomberg • 3.6 million Social Security numbers hacked in South Carolina • “3.6 million Social Security numbers had been compromised. The attack also exposed 387,000 credit and debit card numbers. The stolen data included other information people file with their tax returns such as names and addresses. Businesses’ taxpayer identification numbers also potentially have been comprised in the attack that is being described as one of the nation’s largest against a state agency.” -The State • Special Report: Alleged cyberattack hits Istanbul airports • The U.S. and Chinese governments said they were reviewing cybersecurity threats at the working group level during mid-July talks in Washington. The U.S. Defense Department accused the Chinese military of targeting U.S. computer networks early this year, China denied the allegations.

  5. The Proposed Technology • The proposed solution is based on aself-contained document • The I.D. itself carries all components needed for its authentication • The original picture and document’s textual data are encrypted and printed into a barcode label • No database is required to authenticate the I.D. • A 2D barcode can contain all of the relevantdata– fully encrypted Powered by CryptoCodex Ltd.

  6. The Encryption Technique • It is “CHAOTIC” [symmetrical, polymorphic, non-mathematical algorithm] • The KEY is a PHR (Pure Human Random) • The strength of the encryption is unlike anyother today • All expert attempts to hack it have failed Powered by CryptoCodex Ltd.

  7. The Encryption – Explained • Originally, the data in the left sand bottle is meaningful • “Shaking” the bottle will cause the data to encrypt • The only way to decrypt the data is to reverse each and every sand particular path • No Algorithm was involved – thus, no way to break the system • Encrypted data volume does not change • Any attempt to further move the sand particulars, will “deepen” the encryption – away from a solution… Powered by CryptoCodex Ltd.

  8. The Security Levels • The I.D.’s fields (number, name, address, height, eye color, date of birth, date of issuance, etc.) are encrypted and encapsulated in the data carrier. A process referred to as MDLE or Micro Database Less Encapsulation. • The encryption does not increase the data volume leaving room for pictures and small details. • Security measures allow for multiple levels of readability, from little to all of the content. • Non-mathematical encryption is impervious to any of today’s threats. • Removing the central database eliminates a point of vulnerability Powered by CryptoCodex Ltd.

  9. The Storage Element A greater storage capacitor allows for a greater amount of data to be stored. Possible Storage Elements: • Smart Card • RFID • 2-D Barcode In the future governments may agree to utilize other electronic data capacitors like flash drives. Presently, only paper and plastic materials are accepted.

  10. Smart-Card • A Smart-Card can hold a large amount of data • Should a Smart-Card be included as part of the documents, it will enable storing the cardholder’s complete picture – fully encrypted • The picture, together with the textual data, will be encrypted and stored in the card • A computerized process will read and decrypt the data and will display the result to the inspector with the granted authority

  11. RFID (Radio Frequency Identification) • The device is based on radio wave transmissions • The device can hold a substantial amount of data • The complete encrypted picture and textual data may reside in the device • Possibility for identity theft by a remote reading of the data is this technology’s biggest disadvantage • The device is a real threat to human privacy and consequently was rejected by manygovernments

  12. The Implementation Summary • The encrypted 2D barcode will contain the I.D. holder’s personal data • A barcode label will be included as an integral part of the I.D • An encrypted label cannot be created without the encryption technology and the key

  13. The Authentication Center • The authentication center should be strictly guarded • It is possible to set as many authentication centers as desired since the data resides on the document itself • The inspection posts would communicate with the authentication center(s) and will instantly receive I.D. validation or detect fraud • Since the communication is also encrypted,to use internet or cellular links

  14. Potential Applications • Drivers’ Licenses • Identification • Passports • Visas / Green Cards • Social Security Cards • Medical I.D.’s • Secure Access Cards

  15. Examples

  16. Encryption Encryption technology is the only symmetrical, polymorphic, non-mathematical encryption method in the world. Its key strength (minimum 1 million bit key size) is truly chaotic and based on a innovative, patent pending technology called PHR Pure Human Randomization. PHR replaces the structuring and use of a pseudo-random calculative hash function. PHR cannot be cracked or brute forced by any known method(s). Key Strength – 1 million bit or more Performance 400% faster compared to AES. MPU use – Mathematical Process Unit in CPU use 3% – 7% only. Overhead of the file from original 5% +/- (original+5%) +/- Powered by CryptoCodex Ltd.

  17. Micro Database Less Encapsulation - MDLE Other encryption algorithms have a bit overhead of between 300-700% when encrypting small amounts of information. PHR on the other hand uses an unparalleled, non dictionary compression ratio operational technique which has a bit overhead of 5-7%. Because of this, we are capable of encrypting relevant information into one 2D barcode. A process referred to as MDLE – Micro Database Less Encapsulation. Powered by CryptoCodex Ltd.

  18. Six Degrees Counterfeit Prevention, LLC ForAdditionalInformation info@6dcp.com

More Related