6DCP Hybrid Barcode

With the forthcoming pharmaceutical legislation nearing commencement, Six Degrees Counterfeit Prevention is excited to announce the release of their revolutionary hybrid barcode. The solution leverages widely used logistic symbols, such as a 2-dimensional GS1-DataMatrix or QR Code, combined with the encryption technology provided by Six Degrees.

 

Read the full article here: Hybrid Barcode Press Release

 

 

6DCP in Bentham Science FNA (Food, Nutrition, Agriculture) Journal

 

1. INTRODUCTION  Food traceability has over the last decade become a well-understood topic, both in research and in practice. In Europe food chain traceability was given a special emphasis in Pri-ority 5 of the sixth framework programme (2002-2006) re-sulting in over 14 different research projects, and a total re-search budget of over 140 Million ₃ over four years, and involving up to 400 different participants across 30 coun-tries. These projects include Food Trace [1], which set the ground work for electronic traceability, TRACE IP [2], which worked on origin determination and traceability, CHILL-ON [3] which used traceability for communication in the cold chain and finally Bright Animal [4, 5] which identified new ways of optimisation in the feed-animal-food chain. A good guide to global efforts on larger scale traceability is given in the book “Food traceability around the world” [6]. In many areas, food traceability has become a main stream activity. Large software providers such as IBM and SAP offer food traceability solutions as do specialised pro-viders, such as FoodReg. In the particular case of meat production and related fields, such as animal husbandry and precision livestock farming, a number of efforts have been undertaken (see [7-10] and references therein) to use traceability in

  • Animal tracking
  • Feed optimisation
  • Managing slaughter
  • Managing the butchering process
  • Origin determination

Read Complete Article Here.

 

 

6dcp in Brand© Protection and Promotion World

Six Degrees Counterfeit Prevention offers a non-mathematical encrypted anti-counterfeit solution, and CEO Eddie Cohen says one code can serve multiple purposes: counterfeit and grey market detection, track-and-trace, and marketing acceleration to the end user

‘We are also the only service around that can encrypt – with the world’s only polymorphic, non-mathematical encryption – an entire database record into a 2D barcode.

Read Complete Article here.

A database, is a database, is a database…

On June 19th, BGR reported on a story of a hacker who stole ”50GBs of data or bigger from over 79 large banks.” This may not sound like much data to some, so allow me to put it in perspective.  An A4 page contains on average 1,200 characters.  One (1) GB (gigabyte) of data equates to approximately 894,784 A4 pages or 4,473 (200 page) books. And the BGR report claims “50GBs of data or bigger” was stolen.

Whether your corporate server runs on a Unix/Linux, a Microsoft or other operating system with a database service i.e. Oracle, SAP, MSSQL, MYSQL, etc. hackers install similar systems on their own servers in search of what is referred to as a “Zero Day Attack.”

zero-day (or zero-hour or day zeroattack or threat is an attack that exploits a previously unknown vulnerability in a computer application, meaning that the attack occurs on “day zero” of awareness of the vulnerability. This means that the developers have had zero days to address and patch the vulnerability. Zero-day exploits(actual software that uses a security hole to carry out an attack) are used or shared by attackers before the developer of the target software knows about the vulnerability. The term derives from the age of the exploit. A “zero day” attack occurs on or before the first or “zeroth” day of developer awareness, meaning the developer has not had any opportunity to distribute a security fix to users of the software.[1]

Due to the limitation of human programming skills, zero-day attacks have and always will exist.

Conclusion. Sensitive information stored on a database, should never exist on an internet connected server or outside the corporate network.

Six Degrees Counterfeit Prevention (6DCP) is backed by a team of experts with over 50 years experience in IT Security and Cryptography.   Sensitive to news like this as well as others, this team developed a unique anti-counterfeit, track and trace and marketing acceleration solution that eliminates the need for a database.  Any financial adviser will tell you never to put all your eggs in one basket.  And so will your IT professional.

Consider your serialization or anti-counterfeit system, or the one you’ll soon be mandated to employ (if you’re in the Pharma industry). For each product that is manufactured and marked with a serialized barcode, one (1) data base record is created.   If 100,000 units were manufactured today, 100,000 database records were created as well.  If a hacker were to penetrate the corporate database, they will have access to your company’s proprietary information – your product data.  If they’ve managed to gain access to these records, they most likely cracked the serialization methodology as well.  Having this knowledge, a counterfeiter will be able to produce “genuine” serial numbers and subsequent data base records and introduce “authentic” product into the supply chain.

With our solution, we avoid this risk by a process referred to as Micro Data Base Less Encapsulation (MDLE).  By encrypting and encapsulating an entire data base record into a 2D barcode (or RFID), we provide the capability to mark each individual product with it’s own ultra secure, unique identifier.  This protects our clients against tech savvy counterfeiters who not only know how to make a clean knock off, like rats can burrow their way through the most elite security systems.

Protecting the Consumer, protecting the Brand, eliminate the financial loss caused by counterfeiting.  This is our mission.

If you’d like to learn more about how 6DCP can provide the following solutions, please do not hesitate to ask.

- Counterfeit Protection

- Diversion Detection

- Track and Trace

- Marketing Acceleration (Social Network Advertising)

- Document Security

- ID Card Protection

- Medical ID Cards

- Micro Payment Solution

FYI – This email contains approximately 30KB.  Approximately 0.00004% of the data reported stolen in the article.

6DCP Featured in Product & Image Security Newsletter

Click here to see the complete article.

Norton Anti Virus Hack

Hackers broke into Symantec’s database and stole Norton Anti-Virus source code. Threaten to release.

http://m.gizmodo.com/5876683/hackers-threaten-to-dump-nortons-antivirus-source-code-tomorrow

6DCP featured in Fashion’s Collective

The Issue of Counterfeiting in the Digital Age

It is a modern-day consumer reality that where there is demand for luxury goods, there is ample supply of counterfeit options. Counterfeiting is one of the fastest growing crimes, and shows no signs of slowing down. The World Customs Organization estimates annual global trade in illegitimate goods is about $600 billion, and this figure is expected to rise to $1.7 trillion by 2015. It is estimated that between 5% and 7% of worldwide trade is from the counterfeit market.

Luxury brands take counterfeiting seriously. Almost all brands affected are actively engaged in combating the problem, working with the relevant customs authorities and investigators to enforce a zero-tolerance policy against counterfeits. During the recent Brand Protection and Anti-Counterfeiting Summit in Amsterdam, Guido Baumgartner, Vice-President for Global Brand Protection at Coty, reaffirmed that the digital landscape has created a new dimension in the issue of counterfeiting.

See complete article: http://fashionscollective.com/FashionAndLuxury/12/the-issue-of-counterfeiting-in-the-digital-age/ 

6DCP featured in BeQRious


QR Codes Integrated Into Anti-Counterfeiting Solution

Six Degrees Counterfeit Prevention LLC expanded its anti-counterfeit encryption technology and makes it available to the fashion industry. The encryption is embedded into QR codes and are put on product labels in order to protect brands.

The anti-counterfeit encryption, which utilize non-mathematical encryption technology, is not only meant to get rid of the global counterfeit trade, but also to ensure product authenticity and to revolutionize the fashion industry. This encryption technology, considered to be unparalleled and fool-proof, is impervious to mathematical pattern analysis. Brands using the encryption, instead of just serial numbers, are therefore impossible to forge or fake.

Having a QR code on the fashion item labels encourage consumers with smartphones to join in the brand authentication process. With the help of the QR codes, consumers – as well as law enforcement officers and corporate investigators – can immediately identify whether a product is authentic or fake.

With the QR code labels, it’s like giving each fashion item a digital fingerprint. This fingerprint makes it easy for brands to monitor their products from any given location. Real-time analytics will give brands accurate tools to keep track of products as they get scanned and also to measure illegal activity.

Aside from product verification, 6CDP’s QR codes also give brands a chance to engage their consumers and to help them establish brand loyalty. For one, the codes will also allow consumers convenient access to a company website, where they can learn more about the brand and its products; to social networks, where they can talk or share things about a particular product with their friends and contacts; or to view promotional videos and be entertained.

With this QR code anti-counterfeit campaign, 6DCP is helping bring down the counterfeiting industry, which, according to the World Customs Organization, is estimated to reach $1.5 trillion in value by 2015.

Read the complete article: http://www.beqrious.com/show/qr-codes-integrated-into-anti-counterfeiting-solution

6DCP featured in QRcodepress.com

Anti-counterfeit technology could make QR codes safer for consumers

Six Degrees Counterfeit Prevention will make use of a non-mathematical encryption technique that makes hacking and counterfeiting impossible. Each code using the company’s technology will trigger a verification process when scanned. This will allow mobile users to check the authenticity of the codes before they connect to the content linked to them.

See the complete article: http://www.qrcodepress.com/anti-counterfeit-technology-could-make-qr-codes-safer-for-consumers/854720/

 

6DCP featured in the Apparel Magazine

Anti-counterfeiting Solution Leverages QR Code Technology

Six Degrees Counterfeit Prevention, LLC (6DCP) announces the expansion of its anti-counterfeit encryption technology to the fashion industry. Embedded into quick response (QR) code that is currently being used on product labels everywhere, the impenetrable encryption provides the ultimate in brand protection. It stops counterfeiting, ensures product authenticity, has outstanding marketing potential and is bound to revolutionize the fashion industry.

According to the World Customs Organization, the counterfeiting industry is estimated to reach $1.5 trillion by 2015. 6DCP’s new technology aims to eradicate the global counterfeit trade with its unparalleled non-mathematical encryption technology. Unlike serial numbers and other methods which can be forged or faked, this stronger-than-military-grade technology is impervious to mathematical pattern analysis (hacking) and provides absolute protection from counterfeiting.

Read the complete article: http://apparel.edgl.com/news/Anti-counterfeiting-Solution-Leverages-QR-Code-Technology76383