6DCP Hybrid Barcode

With the forthcoming pharmaceutical legislation nearing commencement, Six Degrees Counterfeit Prevention is excited to announce the release of their revolutionary hybrid barcode. The solution leverages widely used logistic symbols, such as a 2-dimensional GS1-DataMatrix or QR Code, combined with the encryption technology provided by Six Degrees.


Read the full article here: Hybrid Barcode Press Release



6DCP in Bentham Science FNA (Food, Nutrition, Agriculture) Journal


1. INTRODUCTION  Food traceability has over the last decade become a well-understood topic, both in research and in practice. In Europe food chain traceability was given a special emphasis in Pri-ority 5 of the sixth framework programme (2002-2006) re-sulting in over 14 different research projects, and a total re-search budget of over 140 Million ₃ over four years, and involving up to 400 different participants across 30 coun-tries. These projects include Food Trace [1], which set the ground work for electronic traceability, TRACE IP [2], which worked on origin determination and traceability, CHILL-ON [3] which used traceability for communication in the cold chain and finally Bright Animal [4, 5] which identified new ways of optimisation in the feed-animal-food chain. A good guide to global efforts on larger scale traceability is given in the book “Food traceability around the world” [6]. In many areas, food traceability has become a main stream activity. Large software providers such as IBM and SAP offer food traceability solutions as do specialised pro-viders, such as FoodReg. In the particular case of meat production and related fields, such as animal husbandry and precision livestock farming, a number of efforts have been undertaken (see [7-10] and references therein) to use traceability in

  • Animal tracking
  • Feed optimisation
  • Managing slaughter
  • Managing the butchering process
  • Origin determination

Read Complete Article Here.



A database, is a database, is a database…

On June 19th, BGR reported on a story of a hacker who stole ”50GBs of data or bigger from over 79 large banks.” This may not sound like much data to some, so allow me to put it in perspective.  An A4 page contains on average 1,200 characters.  One (1) GB (gigabyte) of data equates to approximately 894,784 A4 pages or 4,473 (200 page) books. And the BGR report claims “50GBs of data or bigger” was stolen.

Whether your corporate server runs on a Unix/Linux, a Microsoft or other operating system with a database service i.e. Oracle, SAP, MSSQL, MYSQL, etc. hackers install similar systems on their own servers in search of what is referred to as a “Zero Day Attack.”

zero-day (or zero-hour or day zeroattack or threat is an attack that exploits a previously unknown vulnerability in a computer application, meaning that the attack occurs on “day zero” of awareness of the vulnerability. This means that the developers have had zero days to address and patch the vulnerability. Zero-day exploits(actual software that uses a security hole to carry out an attack) are used or shared by attackers before the developer of the target software knows about the vulnerability. The term derives from the age of the exploit. A “zero day” attack occurs on or before the first or “zeroth” day of developer awareness, meaning the developer has not had any opportunity to distribute a security fix to users of the software.[1]

Due to the limitation of human programming skills, zero-day attacks have and always will exist.

Conclusion. Sensitive information stored on a database, should never exist on an internet connected server or outside the corporate network.

Six Degrees Counterfeit Prevention (6DCP) is backed by a team of experts with over 50 years experience in IT Security and Cryptography.   Sensitive to news like this as well as others, this team developed a unique anti-counterfeit, track and trace and marketing acceleration solution that eliminates the need for a database.  Any financial adviser will tell you never to put all your eggs in one basket.  And so will your IT professional.

Consider your serialization or anti-counterfeit system, or the one you’ll soon be mandated to employ (if you’re in the Pharma industry). For each product that is manufactured and marked with a serialized barcode, one (1) data base record is created.   If 100,000 units were manufactured today, 100,000 database records were created as well.  If a hacker were to penetrate the corporate database, they will have access to your company’s proprietary information – your product data.  If they’ve managed to gain access to these records, they most likely cracked the serialization methodology as well.  Having this knowledge, a counterfeiter will be able to produce “genuine” serial numbers and subsequent data base records and introduce “authentic” product into the supply chain.

With our solution, we avoid this risk by a process referred to as Micro Data Base Less Encapsulation (MDLE).  By encrypting and encapsulating an entire data base record into a 2D barcode (or RFID), we provide the capability to mark each individual product with it’s own ultra secure, unique identifier.  This protects our clients against tech savvy counterfeiters who not only know how to make a clean knock off, like rats can burrow their way through the most elite security systems.

Protecting the Consumer, protecting the Brand, eliminate the financial loss caused by counterfeiting.  This is our mission.

If you’d like to learn more about how 6DCP can provide the following solutions, please do not hesitate to ask.

- Counterfeit Protection

- Diversion Detection

- Track and Trace

- Marketing Acceleration (Social Network Advertising)

- Document Security

- ID Card Protection

- Medical ID Cards

- Micro Payment Solution

FYI – This email contains approximately 30KB.  Approximately 0.00004% of the data reported stolen in the article.

Norton Anti Virus Hack

Hackers broke into Symantec’s database and stole Norton Anti-Virus source code. Threaten to release.