6dcp presentation_12.19.2015

32
COUNTERFEIT PREVENTION, LLC. www.6DCP.com

Upload: eddie-cohen

Post on 10-Feb-2017

544 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: 6DCP Presentation_12.19.2015

COUNTERFEIT PREVENTION, LLC.

www.6DCP.com

Page 2: 6DCP Presentation_12.19.2015

About Us

Six Degrees Counterfeit Prevention, LLC

(6DCP) is globally licensed by

CryptoCodex LTD. to market and distribute

MDLE (Micro Database Less

Encapsulation), the most effective security

solution for detecting superfluous, falsified,

or adulterated products and documents, for

detecting lost/stolen/diverted goods, and is

track & trace ready to meet worldwide

regulation.

COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.comTechnology

Page 3: 6DCP Presentation_12.19.2015

COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITYSix Degrees Counterfeit Prevention, LLC. | www.6DCP.com

COUNTERFEIT PROTECTION

GREY MARKET DETECTION

TRACK & TRACE READY

BRAND LOYALTY

DOCUMENT SECURITY

ID/BIOMETRIC CARD SECURITY

CREDIT CARD SECURITY

COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.comTechnology

SCAN

AUTHENTICATE

SOLUTIONS

Page 4: 6DCP Presentation_12.19.2015

Estimated $1.7

trillion industry in

2009

Estimated to

destroy 10% of top

line revenue

Rising 15.6%

annuallyhttp://www.netnames.com/blog/

wp-

content/uploads/2015/10/NetNa

mes-Counterfeiting-Report-

2015_REVISEDFINAL.pdf

A Global Pandemic

COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.comTechnology

$1.7 $2.0

$2.3

$2.6

$3.0

$3.5

2009 2010 2011 2012 2013 2014

Counterfeit Industry: In Trillions $USDhttp://www.iacc.org/resources/about/statistics

Page 5: 6DCP Presentation_12.19.2015

Industries Affected

Pharmaceuticals

Banking and Financial

Fashion and Accessories

Electronics and

Components

Food and Beverage

Alcohol and Tobacco

Driver’s Licenses and ID

Cards

Passports

Secure Access Cards

Tax Stamps

Luxury Goods

Art and Artifacts

Precious Gems

Automobile and

Aviation

Insurance Certificates

Medical Health Cards

Credit Card

And More…

COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.comTechnology

Page 6: 6DCP Presentation_12.19.2015

Security Solutions

Security

Solutions

Can Store

Meaningful

Data

Immune to

Mathematical

Attack

Database

Less

Generates

Business

Intelligence

Consumer

Engagement

Smartphone

Authentication

MDLE*

RFID/NFC X X X

Barcodes X X X

Analog** N/A N/A N/A X X X

* MDLE – a CryptoCodex technology.

**Holograms, Security Papers, Taggants, DNA, UV Inks, etc.

COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.comTechnology

Page 7: 6DCP Presentation_12.19.2015

HTTPS://YOURCOMP.COM/1939527GB08A

Typical Digital Solution

Comprised of 2 Variables:

Random Number Generator – A

mathematical process that generates a

[pseudo] randomized serial number.

The Database – Hardware and software

that centrally stores and manages

sensitive (intellectual property)

information.

SERIAL NUMBER

DATABASE

COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.comTechnology

Page 8: 6DCP Presentation_12.19.2015

Typical Authentication Cycle

SENSITIVE DATA

STORED ONLINE

HTTPS://YOURCOMP.COM/1939527GB08A

SERIAL

NUMBERCOMPANY

URL

Request

Response

COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.comTechnology

Page 9: 6DCP Presentation_12.19.2015

The Problem with Digital Solutions

“As we move into a serialized world the secure

databases of product and event information that trading

partners will use to comply with regulations will be the

target for the counterfeiters.

The database will be the "Holy Grail" quest for the

sophisticated counterfeiters. By sophisticated I mean

those interested in injecting large quantities of falsified

medicines into a legitimate supply chain.”

Tim Marsh – Supply Chain Security Consultant

https://www.linkedin.com/pulse/20140709193725-18691743-counterfeiter-targets-in-a-serialized-world

COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.comTechnology

Page 10: 6DCP Presentation_12.19.2015

WHAT DO THE

FOLLOWING

COMPANIES

HAVE IN

COMMON?

COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.comTechnology

Page 11: 6DCP Presentation_12.19.2015

COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.comTechnology

Page 12: 6DCP Presentation_12.19.2015

10001100111101010010110001100110

01111010100100111001111010100100

11000110011110101001011011010100

11010100100110001100111101010010

11001100111011001100111010100100

11000110011110101001011011010100

00011001111010100100011001111010

10010110001100110011110101001001

11001111010100100111011011010100

10001100111101010010110001100110

01111010100100111001111010100100

11000110011110101001011011010100

11010100100110001100111101010010

11001100111011001100111010100100

11000110011110101001011011010100

00011001111010100100011001111010

10010110001100110011110101001001

11001111010100100111011011010100

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com

THE SOLUTION: MDLE PROTECTING THE MOST IMPORTANT INFORMATION ASSETS

Page 13: 6DCP Presentation_12.19.2015

Features:

- Encrypts an entire database

record into a 2D barcode or

other data carrier

- Decentralizes sensitive

information and eliminates need

for a central database

- Seamless integration into

existing ERP

- Military grade, patented

- Low barrier to entry

MDLE

COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.comTechnology

Page 14: 6DCP Presentation_12.19.2015

HTTP://6D.2CQ.CO/?373666902ABD49104ED855C2131F3F9A80841C763BCF874A8D60EBAEEC2641F518850012A000

ENCRYPTED DATABASE RECORD – SENSITIVE INFORMATIONCLIENT

URL

MDLE

PRODUCT NAMEDATE OF PRODUCTIONLOT NUMBERBATCH NUMBEREXPIRY DATESERIAL NUMBER

MGQTYDESTINATION CODEOTHER PROPRIETARY DATA

DATABASE RECORD

COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.comTechnology

Page 15: 6DCP Presentation_12.19.2015

Secure OFFLINE Environment

MDLE Encryption Server

DatabaseERP

SENSITIVE DATA

STORED OFFLINE

MDLE Decryption (Key) Server

Incoming Web Server

MEANINGLESS DATA

STORED ONLINE

EncryptionServer

COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.comTechnology

Page 16: 6DCP Presentation_12.19.2015

Secure OFFLINE Generation of MDLE

Encrypted 2D barcode (database record) is sent to the production line printer, packaging company, other.

MDLE Encryption Server

DatabaseERP

MDLE Encrypted2D Barcode

OFFLINE. Disconnected from Internet

Production Line Printer

Packaging/Labelling Converter

Document PrinterEncryption

Server

COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.comTechnology

Page 17: 6DCP Presentation_12.19.2015

MDLE Supports Aggregation

PRODUCTPRODUCT

PRODUCTPRODUCT

PRODUCTPRODUCT

PRODUCTPRODUCT

PRODUCTPRODUCT

PRODUCTPRODUCT

COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.comTechnology

Page 18: 6DCP Presentation_12.19.2015

MDLE Supports Secure Track & Trace*

PROD

UCT

PROD

UCT

PROD

UCT

PROD

UCT

PROD

UCT

PROD

UCTPROD

UCT

PROD

UCT

PROD

UCT

PROD

UCT

PROD

UCT

PROD

UCT

Track & Trace Database

Supply Chain Security | Secure Serialization | Compliant with all Global Standards

* MDLE is a security module that integrates into existing ERP and Track & Trace Software

COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.comTechnology

Page 19: 6DCP Presentation_12.19.2015

MILLION EYES INSPECTORS

Genuine Results

Possible Counterfeit

GLOBAL DETECTION | SURVEILLANCE | MARKETING

COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.comTechnology

Page 20: 6DCP Presentation_12.19.2015

MDLE Supports Brand Loyalty Programs

COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.comTechnology

Page 21: 6DCP Presentation_12.19.2015

Sensitive information such as

user’s image and biographical data

is encrypted within the barcode, not

in an online database.

Authentication on a need to know

basis.

Can be scanned with any device

with a camera and 2D barcode

reader.

MDLE for Document Security

COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.comTechnology

Page 22: 6DCP Presentation_12.19.2015

Create Virtual net over assets, supply chain partners, 3PLs, and consumers

Monitor Assets and marketing activity in real time

Gather Real time business intelligence

Detect Parallel market, 3rd party shifts, lost, stolen, or counterfeit activity in real time

Alert Corporate security of illegal activity in real time

Respond To accurate intelligence in real time

Business Intelligence

COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.comTechnology

Page 23: 6DCP Presentation_12.19.2015

Insurance Benefits

Security

Detection Capability

Response Time

Compliance

Consumer Confidence

Liability in a Breach

Breach Related Costs

Liability from

Counterfeiting

Liability from Diversion

Liability from Product

Recalls

COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.comTechnology

Page 24: 6DCP Presentation_12.19.2015

01100110011110101001001100011001

11101010010110011001111010100100

11000110011110101001011011010100

10001100111101010010110001100110

01111010100100111001111010100100

11000110011110101001011011010100

11010100100110001100111101010010

11001100111011001100111010100100

11000110011110101001011011010100

01100110011110101001001100011001

11101010010110011001111010100100

11000110011110101001011011010100

10001100111101010010110001100110

01111010100100111001111010100100

11000110011110101001011011010100

11010100100110001100111101010010

11001100111011001100111010100100

11000110011110101001011011010100

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com

THE IRON RING

DATABASE LESS

AUTHENTICATION

Page 25: 6DCP Presentation_12.19.2015

MDLE Decryption (Key) Server

UserScanning Label

Incoming Web Server

Outbound Web Server

1-Way Data Flow Membrane*

1-Way Data Flow Membrane*

Secure Data

Flow Diagram

The Iron Ring* Hardware has been approved

for use by the US Government to

protect nuclear facilities and

other ultra sensitive networks.

COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.comTechnology

Page 26: 6DCP Presentation_12.19.2015

The Iron Ring Cycle

Step 1 Step 2 Step 3 Step 4 Step 5

User scans barcode

Encrypted payload sent through web server and 1 way

data transfer membrane

To MDLE decryption server for authentication

and out a 1 way data transfer membrane

Out through web server

Authentication response sent to

User

COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.comTechnology

Page 27: 6DCP Presentation_12.19.2015

01100110011110101001001100011001

11101010010110011001111010100100

11000110011110101001011011010100

10001100111101010010110001100110

01111010100100111001111010100100

11000110011110101001011011010100

11010100100110001100111101010010

11001100111011001100111010100100

11000110011110101001011011010100

01100110011110101001001100011001

11101010010110011001111010100100

11000110011110101001011011010100

10001100111101010010110001100110

01111010100100111001111010100100

11000110011110101001011011010100

11010100100110001100111101010010

11001100111011001100111010100100

11000110011110101001011011010100

TECHNICAL SPECIFICATIONS

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com

Page 28: 6DCP Presentation_12.19.2015

011001100111101010010011000110011110101001011001

100111101010010011000110011110101001011011010100

100011001111010100101100011001100111101010010011

100111101010010011000110011110101001011011010100

110101001001100011001111010100101100110011101100

110011101010010011000110011110101001011011010100

000110011110101001000110011110101001011000110011

001111010100100111001111010100100111011011010100

Patented encryption method that eliminates need to store sensitive information in an

online database.

Encryption Key is truly chaotic.

Based on a innovative and patented technology called Pure Human Randomization, or

PHR.

PHR is protected against Rainbow Crack, Dictionary Attack, Cryptanalysis and Brute

Force.

Military Grade Encryption

COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.comTechnology

Page 29: 6DCP Presentation_12.19.2015

011001100111101010010011000110011110101001011001

100111101010010011000110011110101001011011010100

100011001111010100101100011001100111101010010011

100111101010010011000110011110101001011011010100

110101001001100011001111010100101100110011101100

110011101010010011000110011110101001011011010100

000110011110101001000110011110101001011000110011

001111010100100111001111010100100111011011010100

Encryption – Performance Features

Key Strength – 1 million bit or more

400% faster when compared to AES.

MPU use – Mathematical Process Unit in CPU use only 3% –7%.

+/- 5% overhead of the file from original data set.

Capable of encrypting entire columns of a database (up to 300 characters) into one 2D

barcode.

US Patent No. 8914369

White Paper

COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.comTechnology

Page 30: 6DCP Presentation_12.19.2015

“Defining drop shipments is an important issue. There are novel low cost methods that guarantee

product authentication as pennies per unit that cannot be reverse engineered. Check out

www.6dcp.com/track-and-trace”......“While I did not work with Privacy Inside (now Cryptocodex) on

this application, I did a preliminary analysis of their merging barcodes with PHR and found

this approach a strong audit tool for counterfeit commercial goods” – Andre Szykier, Chief

Scientist at Aegis Health Security

“Simple is always better ... by elimination of the perceived complexity in the authentication

world 6DCP products could be a pivot point that will help achieve a more reasonable following.” –

Michael Agee (RIP), Brand Protection Specialist

“Six Degrees is a new company and I believe it offers a truly transformational technology with

huge potential. It can solve so many of the brand authentication, serialization, and

associated data security issues facing the Pharma, biotech, and medical device industry

today.” - Anonymous

What the Experts Say About Us

COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.comTechnology

Page 31: 6DCP Presentation_12.19.2015

Take Away

NEVER PLACE ALL

YOUR EGGS IN

ONE BASKET!

COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.comTechnology

Page 32: 6DCP Presentation_12.19.2015

Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com

CONTACT US

9074 De Garmo Avenue

Sun Valley, California 91352 USA

Tel: 818-570-1277

Email: [email protected]

Web: www.6dcp.com