SlideShare a Scribd company logo
1 of 46
Download to read offline
COUNTERFEIT PREVENTION, LLC.
www.6DCP.com
About Us
Six Degrees Counterfeit Prevention, LLC
(6DCP) is globally licensed by
CryptoCodex LTD. to market and distribute
MDLE (Micro Database Less
Encapsulation), the most effective security
solution for detecting superfluous, falsified,
or adulterated products and documents, for
detecting lost/stolen/diverted goods, and is
track & trace ready to meet worldwide
regulation.
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITYSix Degrees Counterfeit Prevention, LLC. | www.6DCP.com
COUNTERFEIT PROTECTION
GREY MARKET DETECTION
TRACK & TRACE READY
BRAND LOYALTY
DOCUMENT SECURITY
ID/BIOMETRIC CARD SECURITY
CREDIT CARD SECURITY
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
SCAN
AUTHENTICATE
Estimated $1.7
trillion industry in
2009
Estimated to
destroy 10% of top
line revenue
Rising 15.6%
annually
http://www.netnames.com/blog/
wp-
content/uploads/2015/10/NetNa
mes-Counterfeiting-Report-
2015_REVISEDFINAL.pdf
A Global Pandemic
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
$1.7
$2.0
$2.3
$2.6
$3.0
$3.5
2009 2010 2011 2012 2013 2014
Counterfeit Industry: In Trillions $USD
http://www.iacc.org/resources/about/statistics
Industries Affected
Pharmaceuticals
Banking and Financial
Fashion and Accessories
Electronics and
Components
Food and Beverage
Alcohol and Tobacco
Driver’s Licenses and ID
Cards
Passports
Secure Access Cards
Tax Stamps
Luxury Goods
Art and Artifacts
Precious Gems
Automobile and
Aviation
Insurance Certificates
Medical Health Cards
Credit Card
And More…
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
Security Solutions
Security
Solutions
Can Store
Meaningful
Data
Immune to
Mathematical
Attack
Database
Less
Generates
Business
Intelligence
Consumer
Engagement
Smartphone
Authentication
MDLE*
RFID/NFC X X X
Barcodes X X X
Analog** N/A N/A N/A X X X
* MDLE – a CryptoCodex technology.
**Holograms, Security Papers, Taggants, DNA, UV Inks, etc.
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
HTTPS://YOURCOMP.COM/1939527GB08A
Typical Digital Solution
Comprised of 2 Variables:
Random Number Generator – A
mathematical process that generates a
[pseudo] randomized serial number.
The Database – Hardware and software
that centrally stores and manages
sensitive (intellectual property)
information.
SERIAL NUMBER
DATABASE
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
Typical Authentication Cycle
SENSITIVE DATA
STORED ONLINE
HTTPS://YOURCOMP.COM/1939527GB08A
SERIAL
NUMBER
COMPANY
URL
Request
Response
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
The Problem with Digital Solutions
“As we move into a serialized world the secure
databases of product and event information that trading
partners will use to comply with regulations will be the
target for the counterfeiters.
The database will be the "Holy Grail" quest for the
sophisticated counterfeiters. By sophisticated I mean
those interested in injecting large quantities of falsified
medicines into a legitimate supply chain.”
Tim Marsh – Supply Chain Security Consultant
https://www.linkedin.com/pulse/20140709193725-18691743-counterfeiter-targets-in-a-serialized-world
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
WHAT DO THE
FOLLOWING
COMPANIES
HAVE IN
COMMON?
AND WE’VE ONLY
SEEN THE TIP OF
THE ICEBERG!
10001100111101010010110001100110
01111010100100111001111010100100
11000110011110101001011011010100
11010100100110001100111101010010
11001100111011001100111010100100
11000110011110101001011011010100
00011001111010100100011001111010
10010110001100110011110101001001
11001111010100100111011011010100
10001100111101010010110001100110
01111010100100111001111010100100
11000110011110101001011011010100
11010100100110001100111101010010
11001100111011001100111010100100
11000110011110101001011011010100
00011001111010100100011001111010
10010110001100110011110101001001
11001111010100100111011011010100
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
THE SOLUTION: MDLE
PROTECTING THE MOST IMPORTANT INFORMATION ASSETS
What is MDLE?
MDLE is a military grade and patented
process for encrypting and encapsulating
sensitive information otherwise stored in a
database, in cost effective data carriers
such as 2D barcodes. Technology
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
MDLE Features
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
Encrypts an entire
database record into a
2D barcode or other
data carrier
Decentralizes sensitive
information and
eliminates need for a
central database
Seamless integration into existing ERP
Low barrier to entry
MDLE Content
HTTP://6D.2CQ.CO/?373666902ABD49104ED855C2131F3F9A80841C763BCF874A8D60EBAEEC2641F518850012A000
ENCRYPTED DATABASE RECORD – SENSITIVE INFORMATION
CLIENT
URL
PRODUCT NAME
DATE OF PRODUCTION
LOT NUMBER
BATCH NUMBER
EXPIRY DATE
SERIAL NUMBER
MG
QTY
DESTINATION CODE
OTHER PROPRIETARY DATA
DATABASE RECORD
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
Secure OFFLINE Generation of MDLE
Encrypted 2D barcode (database record) is sent to the production line printer, packaging company, other.
MDLE Encryption
Server
Database
ERP
MDLE Encrypted
2D Barcode
OFFLINE. Disconnected from Internet
Production Line Printer
Packaging/Labelling Converter
Document Printer
Encryption
Server
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
01100110011110101001001100011001
11101010010110011001111010100100
11000110011110101001011011010100
10001100111101010010110001100110
01111010100100111001111010100100
11000110011110101001011011010100
11010100100110001100111101010010
11001100111011001100111010100100
11000110011110101001011011010100
01100110011110101001001100011001
11101010010110011001111010100100
11000110011110101001011011010100
10001100111101010010110001100110
01111010100100111001111010100100
11000110011110101001011011010100
11010100100110001100111101010010
11001100111011001100111010100100
11000110011110101001011011010100
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
THE IRON RING
DATABASE LESS
AUTHENTICATION
Secure ONLINE Environment
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
MDLE Decryption
(Key) Server
Incoming
Web Server
MEANINGLESS DATA
STORED ONLINE
The Decryption Server stores ONLY
the keys to authenticate the MDLE
label
The Decryption Server is protected
by The Iron Ring, a revolutionary
database less authentication method
Even if the Decryption Server is
hacked, no sensitive information will
be exposed
MDLE Decryption
(Key) Server
User
Scanning Label
Incoming
Web Server
Outbound
Web Server
1-Way Data Flow
Membrane*
1-Way Data Flow
Membrane*
Secure Data
Flow Diagram
The Iron Ring
* Hardware has been approved
for use by the US Government to
protect nuclear facilities and
other ultra sensitive networks.
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
The Iron Ring
Step 1 Step 2 Step 3 Step 4 Step 5
User scans
barcode
Encrypted payload
sent through web
server and 1 way
data transfer
membrane
To MDLE
decryption server
for authentication
and out a 1 way
data transfer
membrane
Out through web
server
Authentication
response sent to
User
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
MDLE Supports Aggregation
PRODUCT
PRODUCT
PRODUCT
PRODUCT
PRODUCT
PRODUCT
PRODUCT
PRODUCT
PRODUCT
PRODUCT
PRODUCT
PRODUCT
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
MDLE Supports Aggregation
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
MDLE encrypted payload and serial number secured in 2D code on individual market packages
MDLE encrypted payload secured in 2D code with sequential serial numbers at case level
MDLE Supports Secure Track & Trace*
PROD
UCT
PROD
UCT
PROD
UCT
PROD
UCT
PROD
UCT
PROD
UCT
PROD
UCT
PROD
UCT
PROD
UCT
PROD
UCT
PROD
UCT
PROD
UCT
Track & Trace Database
Supply Chain Security | Secure Serialization | Compliant with all Global Standards
* MDLE is a security module that integrates into existing ERP and Track & Trace Software
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
MDLE Log File
Decryption (Key) Server authenticates and logs
every scanning event in real time which can be
exported to existing track and trace or ERP software
MILLION EYES INSPECTORS
Genuine Results
Possible Counterfeit
GLOBAL SURVEILLANCE | DETECTION | MARKETING
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
MDLE Supports Brand Loyalty Programs
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
USER
AUTHENTICATES
LABEL AND RECEIVES
AN INCENTIVE, i.e.
COUPON
USER SHARES
SECURE COUPON
ON SOCIAL
NETWORK
DATA IS LOGGED
AND CAN BE USED
TO DEVELOP
INNOVATIVE
MARKETING
OPPORTUNITIES
Brand Ambassadors can share incentives/coupons on social networks with all
activity being traceable back to the original user.
Create Virtual net over assets, supply chain partners, 3PLs, and consumers
Monitor Assets and marketing activity in real time
Gather Real time business intelligence
Detect Parallel market, 3rd party shifts, lost, stolen, or counterfeit activity in real time
Alert Corporate security of illegal activity in real time
Respond To accurate intelligence in real time
MDLE – A Model for Business Intelligence
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
MDLE Insurance Benefits
Security
Detection Capability
Response Time
Compliance
Consumer Confidence
Liability in a Breach
Breach Related Costs
Liability from
Counterfeiting
Liability from Diversion
Liability from Product
Recalls
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
10001100111101010010110001100110
01111010100100111001111010100100
11000110011110101001011011010100
11010100100110001100111101010010
11001100111011001100111010100100
11000110011110101001011011010100
00011001111010100100011001111010
10010110001100110011110101001001
11001111010100100111011011010100
10001100111101010010110001100110
01111010100100111001111010100100
11000110011110101001011011010100
11010100100110001100111101010010
11001100111011001100111010100100
11000110011110101001011011010100
00011001111010100100011001111010
10010110001100110011110101001001
11001111010100100111011011010100
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
MDLE: OTHER USES
PROTECTING THE MOST IMPORTANT INFORMATION ASSETS
Sensitive information such as
user’s image and biographical data
is encrypted within the barcode, not
in an online database.
Authentication on a need to know
basis.
Can be scanned with any device
with a camera and 2D barcode
reader.
Document Security
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
Medical Cards/Tags
Can be printed on a card
Can be scribed onto Military dog
tag, emergency medical bracelet,
or pendant
Can be printed onto medical
adhesive patch
Can be saved as digital card on
mobile device
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
MDLE Content
Patient’s name, medical information, and
emergency contact details
Medical condition(s)
Medication currently taking
One touch to
dial relative,
Doctor, or other
Patient’s image
Link to full
medical record
Link to ERP
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
Paintings and Sculptures
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
The authentication mechanism in Cryptocodex’s technology defines random points for the LSA, 3DSS,
and/or 3DIS devices to scan and gather the unique macro, micro, and chemical signatures of an item.
These unique signatures are then digitized, compressed, and secured within a QR code.
3D Imaging and Spectroscopy3D Surface Scanning
Laser Surface Authentication
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
Diploma Security
Source: Retired FBI Special Agent Allen Ezell
No nation is immune from the problem.
An estimated 5% of US (alone!) diplomas are
fraudulent.
More than half of all people claiming a new
PhD have a fake degree.
The Government Accountability Office looked
for fake degrees among employees of less
than 5 percent of federal agencies and found
enough to suggest that more than one hundred
thousand federal employees have at least one.
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
Biometric Authentication
Fingerprint Palm Vein Iris Scan
Database Less Secure Access System
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
Tax Stamp Security
Web based login from any device
Generate and purchase import tax
stamps in real time
Print on demand or send to
manufacturer for production line
printing
Purchase preprinted dispensing
labels
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
Precious Stones & Metals
Barcode size – 20 microns
on table or girdle of
diamond. Image magnified.
MDLE barcode contains the
encrypted diamond
certification that is secured
on the stone (laser marked)
and the paper COA.
MDLE enables full track and
trace capabilities from the
mine, to polishing, to the
consumer.
MDLE’s powerful
authentication system can
detect for conflict and/or lab
grown stones.
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
Other Uses for MDLE
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
Secure Payment Solutions
QRedit – 360 degree payment
security solution for protecting
the consumer’s credit card
details when shopping online
or through mobile.
Cryptocurrency and
blockchain security.
01100110011110101001001100011001
11101010010110011001111010100100
11000110011110101001011011010100
10001100111101010010110001100110
01111010100100111001111010100100
11000110011110101001011011010100
11010100100110001100111101010010
11001100111011001100111010100100
11000110011110101001011011010100
01100110011110101001001100011001
11101010010110011001111010100100
11000110011110101001011011010100
10001100111101010010110001100110
01111010100100111001111010100100
11000110011110101001011011010100
11010100100110001100111101010010
11001100111011001100111010100100
11000110011110101001011011010100
TECHNICAL SPECIFICATIONS
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
011001100111101010010011000110011110101001011001
100111101010010011000110011110101001011011010100
100011001111010100101100011001100111101010010011
100111101010010011000110011110101001011011010100
110101001001100011001111010100101100110011101100
110011101010010011000110011110101001011011010100
000110011110101001000110011110101001011000110011
001111010100100111001111010100100111011011010100
Patented encryption method that eliminates need to store sensitive information in an
online database.
Encryption Key is truly chaotic.
Based on a innovative and patented technology called Pure Human Randomization, or
PHR.
PHR is protected against Rainbow Crack, Dictionary Attack, Cryptanalysis and Brute
Force.
Military Grade Encryption
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
011001100111101010010011000110011110101001011001
100111101010010011000110011110101001011011010100
100011001111010100101100011001100111101010010011
100111101010010011000110011110101001011011010100
110101001001100011001111010100101100110011101100
110011101010010011000110011110101001011011010100
000110011110101001000110011110101001011000110011
001111010100100111001111010100100111011011010100
Encryption – Performance Features
Key Strength – 1 million bit or more
400% faster when compared to AES.
MPU use – Mathematical Process Unit in CPU use only 3% –7%.
+/- 5% overhead of the file from original data set.
Capable of encrypting entire columns of a database (up to 300 characters) into one 2D
barcode.
US Patent No. 8914369
White Paper
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
“Defining drop shipments is an important issue. There are novel low cost methods that guarantee
product authentication as pennies per unit that cannot be reverse engineered. Check out
www.6dcp.com/track-and-trace”......“While I did not work with Privacy Inside (now Cryptocodex) on this
application, I did a preliminary analysis of their merging barcodes with PHR and found this
approach a strong audit tool for counterfeit commercial goods” – Andre Szykier, Chief Scientist at
Aegis Health Security
“Simple is always better ... by elimination of the perceived complexity in the authentication world
6DCP products could be a pivot point that will help achieve a more reasonable following.” – Michael
Agee (RIP), Brand Protection Specialist
“Having come from a solution provider that used encryption based technologies for serialization, I was
well aware of your company and knew the respect you have garnered for your technology.
However, as I have come to know more about it through our discussions and demonstrations, I am
simply overwhelmed by the strength of your product. You are able to cover the three central
tenets of brand protection in the most forceful way possible – security, scalability, and
performance. – Dr. Avi Chaudhuri
What the Experts Say About Us
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
Take Away
NEVER PLACE ALL
YOUR EGGS IN
ONE BASKET!
COUNTERFEIT PROTECTION | MARKETING ACCELLERATION | DOCUMENT SECURITY
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
Technology
Six Degrees Counterfeit Prevention, LLC. | www.6DCP.com
CONTACT US
9074 De Garmo Avenue
Sun Valley, California 91352 USA
Tel: 818-570-1277
Email: info@6dcp.com
Web: www.6dcp.com

More Related Content

What's hot

Slideshare fintech-may26th-def
Slideshare fintech-may26th-defSlideshare fintech-may26th-def
Slideshare fintech-may26th-defQafis
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?Ulf Mattsson
 
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2bNov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2bUlf Mattsson
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?Ulf Mattsson
 
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...Ulf Mattsson
 
Scalable and secure RFID data discovery
Scalable and secure RFID data discoveryScalable and secure RFID data discovery
Scalable and secure RFID data discoveryMiguel Pardal
 
Protecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACAProtecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACAUlf Mattsson
 
Securing data today and in the future - Oracle NYC
Securing data today and in the future - Oracle NYCSecuring data today and in the future - Oracle NYC
Securing data today and in the future - Oracle NYCUlf Mattsson
 
Contractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive DataContractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive DataDigital Shadows
 
Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...
Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...
Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...Steven Meister
 
SPUnite17 Microsoft Cloud Deutschland
SPUnite17 Microsoft Cloud DeutschlandSPUnite17 Microsoft Cloud Deutschland
SPUnite17 Microsoft Cloud DeutschlandNCCOMMS
 
PCI Descoping: How to Reduce Controls and Streamline Compliance
PCI Descoping: How to Reduce Controls and Streamline CompliancePCI Descoping: How to Reduce Controls and Streamline Compliance
PCI Descoping: How to Reduce Controls and Streamline ComplianceTokenEx
 
Guide: Security and Compliance
Guide: Security and ComplianceGuide: Security and Compliance
Guide: Security and ComplianceQuestionPro
 
Fool Proof: Protecting Digital Identity in the Age of the Data Breach
Fool Proof: Protecting Digital Identity in the Age of the Data BreachFool Proof: Protecting Digital Identity in the Age of the Data Breach
Fool Proof: Protecting Digital Identity in the Age of the Data BreachPriyanka Aash
 
What is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS LondonWhat is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS LondonUlf Mattsson
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020Ulf Mattsson
 
Unicaseeds Demo Days - Cryptolab
Unicaseeds Demo Days - CryptolabUnicaseeds Demo Days - Cryptolab
Unicaseeds Demo Days - CryptolabUnicaseed
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyUlf Mattsson
 

What's hot (20)

Slideshare fintech-may26th-def
Slideshare fintech-may26th-defSlideshare fintech-may26th-def
Slideshare fintech-may26th-def
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?
 
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2bNov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?
 
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
 
Scalable and secure RFID data discovery
Scalable and secure RFID data discoveryScalable and secure RFID data discovery
Scalable and secure RFID data discovery
 
Protecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACAProtecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACA
 
Securing data today and in the future - Oracle NYC
Securing data today and in the future - Oracle NYCSecuring data today and in the future - Oracle NYC
Securing data today and in the future - Oracle NYC
 
Contractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive DataContractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive Data
 
Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...
Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...
Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...
 
SPUnite17 Microsoft Cloud Deutschland
SPUnite17 Microsoft Cloud DeutschlandSPUnite17 Microsoft Cloud Deutschland
SPUnite17 Microsoft Cloud Deutschland
 
PCI Descoping: How to Reduce Controls and Streamline Compliance
PCI Descoping: How to Reduce Controls and Streamline CompliancePCI Descoping: How to Reduce Controls and Streamline Compliance
PCI Descoping: How to Reduce Controls and Streamline Compliance
 
Guide: Security and Compliance
Guide: Security and ComplianceGuide: Security and Compliance
Guide: Security and Compliance
 
White_Papers
White_PapersWhite_Papers
White_Papers
 
Fool Proof: Protecting Digital Identity in the Age of the Data Breach
Fool Proof: Protecting Digital Identity in the Age of the Data BreachFool Proof: Protecting Digital Identity in the Age of the Data Breach
Fool Proof: Protecting Digital Identity in the Age of the Data Breach
 
What is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS LondonWhat is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS London
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
 
Unicaseeds Demo Days - Cryptolab
Unicaseeds Demo Days - CryptolabUnicaseeds Demo Days - Cryptolab
Unicaseeds Demo Days - Cryptolab
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
 
Implementing your APIs with zero trust
Implementing your APIs with zero trustImplementing your APIs with zero trust
Implementing your APIs with zero trust
 

Similar to Protect sensitive data and combat counterfeiting with database-less authentication

6DCP Presentation_12.19.2015
6DCP Presentation_12.19.20156DCP Presentation_12.19.2015
6DCP Presentation_12.19.2015Eddie Cohen
 
VeriDoc Global Solution: Document Security
VeriDoc Global Solution: Document SecurityVeriDoc Global Solution: Document Security
VeriDoc Global Solution: Document SecurityElissa Renton
 
Joaquín Moreno - Blockchain Practice Lead de Globant - semanainformatica.com
Joaquín Moreno -  Blockchain Practice Lead de Globant - semanainformatica.comJoaquín Moreno -  Blockchain Practice Lead de Globant - semanainformatica.com
Joaquín Moreno - Blockchain Practice Lead de Globant - semanainformatica.comCOIICV
 
Data protection on premises, and in public and private clouds
Data protection on premises, and in public and private cloudsData protection on premises, and in public and private clouds
Data protection on premises, and in public and private cloudsUlf Mattsson
 
PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance ReportHolly Vega
 
Securing The Cloud
Securing The CloudSecuring The Cloud
Securing The Cloudgeorge.james
 
Who is the next target proactive approaches to data security
Who is the next target   proactive approaches to data securityWho is the next target   proactive approaches to data security
Who is the next target proactive approaches to data securityUlf Mattsson
 
Product Anticounterfeiting in Supply Chain Using Blockchain Technology
Product Anticounterfeiting in Supply Chain Using Blockchain TechnologyProduct Anticounterfeiting in Supply Chain Using Blockchain Technology
Product Anticounterfeiting in Supply Chain Using Blockchain TechnologyIRJET Journal
 
Cybercrime future perspectives
Cybercrime future perspectivesCybercrime future perspectives
Cybercrime future perspectivesSensePost
 
Threat Modelling Serverless APIs
Threat Modelling Serverless APIsThreat Modelling Serverless APIs
Threat Modelling Serverless APIsMatthew Gillard
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deckRichard Blech
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSTrend Micro
 
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...AIRCC Publishing Corporation
 

Similar to Protect sensitive data and combat counterfeiting with database-less authentication (20)

6DCP Presentation_12.19.2015
6DCP Presentation_12.19.20156DCP Presentation_12.19.2015
6DCP Presentation_12.19.2015
 
Blockchain Secured Ecosystem - BSecured
Blockchain Secured Ecosystem - BSecuredBlockchain Secured Ecosystem - BSecured
Blockchain Secured Ecosystem - BSecured
 
Blockchain Secured Ecosystem - BSecured
Blockchain Secured Ecosystem - BSecuredBlockchain Secured Ecosystem - BSecured
Blockchain Secured Ecosystem - BSecured
 
BeSecured_Brochure_02 (1).pdf
BeSecured_Brochure_02 (1).pdfBeSecured_Brochure_02 (1).pdf
BeSecured_Brochure_02 (1).pdf
 
BSecured - Securing Originals on BlockChain Technology.pdf
BSecured - Securing Originals on BlockChain Technology.pdfBSecured - Securing Originals on BlockChain Technology.pdf
BSecured - Securing Originals on BlockChain Technology.pdf
 
VeriDoc Global Solution: Document Security
VeriDoc Global Solution: Document SecurityVeriDoc Global Solution: Document Security
VeriDoc Global Solution: Document Security
 
Joaquín Moreno - Blockchain Practice Lead de Globant - semanainformatica.com
Joaquín Moreno -  Blockchain Practice Lead de Globant - semanainformatica.comJoaquín Moreno -  Blockchain Practice Lead de Globant - semanainformatica.com
Joaquín Moreno - Blockchain Practice Lead de Globant - semanainformatica.com
 
Data protection on premises, and in public and private clouds
Data protection on premises, and in public and private cloudsData protection on premises, and in public and private clouds
Data protection on premises, and in public and private clouds
 
PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance Report
 
Securing The Cloud
Securing The CloudSecuring The Cloud
Securing The Cloud
 
Who is the next target proactive approaches to data security
Who is the next target   proactive approaches to data securityWho is the next target   proactive approaches to data security
Who is the next target proactive approaches to data security
 
Product Anticounterfeiting in Supply Chain Using Blockchain Technology
Product Anticounterfeiting in Supply Chain Using Blockchain TechnologyProduct Anticounterfeiting in Supply Chain Using Blockchain Technology
Product Anticounterfeiting in Supply Chain Using Blockchain Technology
 
Cybercrime future perspectives
Cybercrime future perspectivesCybercrime future perspectives
Cybercrime future perspectives
 
Threat Modelling Serverless APIs
Threat Modelling Serverless APIsThreat Modelling Serverless APIs
Threat Modelling Serverless APIs
 
DigiChain Blockhain on HyperLedger
DigiChain Blockhain on HyperLedgerDigiChain Blockhain on HyperLedger
DigiChain Blockhain on HyperLedger
 
Barcelona presentationv6
Barcelona presentationv6Barcelona presentationv6
Barcelona presentationv6
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deck
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWS
 
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
 

Protect sensitive data and combat counterfeiting with database-less authentication