Upload
rebeca-with
View
212
Download
0
Tags:
Embed Size (px)
Citation preview
Counterfeit ID Card Detection
About Us
Six Degrees Counterfeit Prevention, LLC (6DCP) is a leading marketing and distribution firm for CryptoCodex LTD., providers of the most powerful counterfeit protection, document security, and track & trace solution on the market.
Encrypted
Protected
Powered by CryptoCodex Ltd.
The Problem
A fake identification document (Passport, Military I.D., Driver’s License, Medical I.D. Card) is created by replacing a person’s picture in an authentic document
When the picture replacement is carried out by experts, it is practicallynon-detectable
The fake I.D. allows user to receive all services as if he was the originaldocument carrier
Current Affairs
5 Hackers Charged in Largest Data-Breach Scheme in U.S. (credit cards)
“Four Russians and a Ukrainian were charged in what prosecutors called the largest hacking scheme in U.S. history [ … ] stealing more than 160 million credit card numbers resulting in hundreds of millions of dollars in losses.” -Bloomberg
3.6 million Social Security numbers hacked in South Carolina
“3.6 million Social Security numbers had been compromised. The attack also exposed 387,000 credit and debit card numbers. The stolen data included other information people file with their tax returns such as names and addresses. Businesses’ taxpayer identification numbers also potentially have been comprised in the attack that is being described as one of the nation’s largest against a state agency.” -The State Special Report: Alleged cyberattack
hits Istanbul airportsThe U.S. and Chinese governments said they were reviewing cybersecurity threats at the working group level during mid-July talks in Washington. The U.S. Defense Department accused the Chinese military of targeting U.S. computer networks early this year, China denied the allegations.
The Proposed Technology
The proposed solution is based on aself-contained document
The I.D. itself carries all components needed for its authentication
The original picture and document’s textual data are encrypted and printed into a barcode label
No database is required to authenticate the I.D.
A 2D barcode can contain all of the relevantdata – fully encrypted
Powered by CryptoCodex Ltd.
The Encryption Technique
It is “CHAOTIC” [symmetrical, polymorphic, non-mathematical algorithm]
The KEY is a PHR (Pure Human Random)
The strength of the encryption is unlike any other today
All expert attempts to hack it have failed
Powered by CryptoCodex Ltd.
The Encryption – Explained
Originally, the data in the left sand bottle is meaningful “Shaking” the bottle will cause the data to encrypt The only way to decrypt the data is to reverse each and every sand
particular path No Algorithm was involved – thus, no way to break the system Encrypted data volume does not change Any attempt to further move the sand particulars, will “deepen” the
encryption – away from a solution…
Powered by CryptoCodex Ltd.
The Security Levels
The I.D.’s fields (number, name, address, height, eye color, date of birth, date of issuance, etc.) are encrypted and encapsulated in the data carrier. A process referred to as MDLE or Micro Database Less Encapsulation.
The encryption does not increase the data volume leaving room for pictures and small details.
Security measures allow for multiple levels of readability, from little to all of the content.
Non-mathematical encryption is impervious to any of today’s threats.
Removing the central database eliminates a point of vulnerability
Powered by CryptoCodex Ltd.
The Storage Element
A greater storage capacitor allows for a greater amount of data to be stored.
Possible Storage Elements: Smart Card RFID 2-D Barcode
In the future governments may agree to utilize other electronic data capacitors like flash drives.
Presently, only paper and plastic materials are accepted.
Smart-Card
A Smart-Card can hold a large amount of data
Should a Smart-Card be included as part of the documents, it will enable storing the cardholder’s complete picture – fully encrypted
The picture, together with the textual data, will be encrypted and stored in the card
A computerized process will read and decrypt the data and will display the result to the inspector with the granted authority
RFID (Radio Frequency Identification)
The device is based on radio wave transmissions
The device can hold a substantial amount of data
The complete encrypted picture and textual data may reside in the device
Possibility for identity theft by a remote reading of the data is this technology’s biggest disadvantage
The device is a real threat to human privacy and consequently was rejected by manygovernments
The Implementation Summary
The encrypted 2D barcode will contain the I.D. holder’s personal data
A barcode label will be included as an integral part of the I.D
An encrypted label cannot be created without the encryption technology and the key
The authentication center should be strictly guarded
It is possible to set as many authentication centers as desired since the data resides on the document itself
The inspection posts would communicate with the authentication center(s) and will instantly receive I.D. validation or detect fraud
Since the communication is also encrypted,to use internet or cellular links
The Authentication Center
Drivers’ Licenses
Identification
Passports
Visas / Green Cards
Social Security Cards
Medical I.D.’s
Secure Access Cards
Potential Applications
Examples
Encryption
Encryption technology is the only symmetrical, polymorphic, non-mathematical encryption method in the world. Its key strength (minimum 1 million bit key size) is truly chaotic and based on a innovative, patent pending technology called PHR Pure Human Randomization. PHR replaces the structuring and use of a pseudo-random calculative hash function. PHR cannot be cracked or brute forced by any known method(s).
Powered by CryptoCodex Ltd.
Key Strength – 1 million bit or more
Performance 400% faster compared to AES.
MPU use – Mathematical Process Unit in CPU use 3% – 7% only.
Overhead of the file from original 5% +/- (original+5%) +/-
Micro Database Less Encapsulation - MDLE
Powered by CryptoCodex Ltd.
Other encryption algorithms have a bit overhead of between 300-700% when encrypting small amounts of information. PHR on the other hand uses an unparalleled, non dictionary compression ratio operational technique which has a bit overhead of 5-7%. Because of this, we are capable of encrypting relevant information into one 2D barcode. A process referred to as MDLE – Micro Database Less Encapsulation.
Six Degrees Counterfeit Prevention, LLC
For Additional [email protected]