Certificate of Authenticity Security for the Diamond Industry About Us Six Degrees Counterfeit Prevention is a an authorized distributor for CryptoCodex Ltd., providers of the most powerful and.
Download ReportTranscript Certificate of Authenticity Security for the Diamond Industry About Us Six Degrees Counterfeit Prevention is a an authorized distributor for CryptoCodex Ltd., providers of the most powerful and.
Slide 1
Certificate of
Authenticity
Security for the
Diamond Industry
About Us
Six Degrees Counterfeit Prevention is
a an authorized distributor for
CryptoCodex Ltd., providers of the
most powerful and secure
counterfeit protection, track and
trace and document security solution
in the world today.
Encrypted Barcode
Strength I Security
The Encryption Technique
It is “CHAOTIC” [symmetrical, polymorphic, non-mathematical algorithm].
The KEY is a PHR (Pure Human Random).
The strength of the encryption is unlike any other today.
All expert attempts to hack it have failed.
Encryption technology is property of CryptoCodex Ltd.
The Encryption – Explained
The original data in the left sand bottle is meaningful.
“Shaking” the bottle will cause the data to encrypt.
The only way to decrypt the data is to reverse each and every sand
particular to it’s original state.
No Algorithm was involved – thus, there is no way to break the
system.
Encrypted data volume does not change.
Any attempt to further move the sand particulars, will “deepen” the
encryption – away from a solution.
Encryption technology is property of CryptoCodex Ltd.
Benefits
Eliminate the target, reduce the threat – Eliminates the need for
an online authentication (database) center.
The entire content of the certificate (color, cut, quality, etc.) is
encrypted within the data carrier and editable only by the issuer.
The encryption does not increase the data volume leaving room
for pictures and small details.
Security measures allow for multiple levels of readability for
Government, Law Enforcement and Commercial use.
Non-mathematical encryption is impervious to any of today’s
threats.
Encryption technology is property of CryptoCodex Ltd.
Solution
Self-contained document contains all the
components required for authentication.
No database is required to authenticate the
certificate (or the diamond).
A 2D barcode can contain all of the relevant
data – fully encrypted.
Can be scribed on the surface of the diamond
(as small as 20 microns) without damaging the
stone.
Can be printed onto Certificate of Authenticity.
Encryption technology is property of CryptoCodex Ltd.
Examples
Enlarged view of encrypted barcode
scribed onto the girdle of a
diamond.
Encryption technology is property of CryptoCodex Ltd.
Demo
How to create a
Certificate of Authenticity . . .
Six Degrees Counterfeit Prevention, LLC
For Additional Information
[email protected]
Slide 2
Certificate of
Authenticity
Security for the
Diamond Industry
About Us
Six Degrees Counterfeit Prevention is
a an authorized distributor for
CryptoCodex Ltd., providers of the
most powerful and secure
counterfeit protection, track and
trace and document security solution
in the world today.
Encrypted Barcode
Strength I Security
The Encryption Technique
It is “CHAOTIC” [symmetrical, polymorphic, non-mathematical algorithm].
The KEY is a PHR (Pure Human Random).
The strength of the encryption is unlike any other today.
All expert attempts to hack it have failed.
Encryption technology is property of CryptoCodex Ltd.
The Encryption – Explained
The original data in the left sand bottle is meaningful.
“Shaking” the bottle will cause the data to encrypt.
The only way to decrypt the data is to reverse each and every sand
particular to it’s original state.
No Algorithm was involved – thus, there is no way to break the
system.
Encrypted data volume does not change.
Any attempt to further move the sand particulars, will “deepen” the
encryption – away from a solution.
Encryption technology is property of CryptoCodex Ltd.
Benefits
Eliminate the target, reduce the threat – Eliminates the need for
an online authentication (database) center.
The entire content of the certificate (color, cut, quality, etc.) is
encrypted within the data carrier and editable only by the issuer.
The encryption does not increase the data volume leaving room
for pictures and small details.
Security measures allow for multiple levels of readability for
Government, Law Enforcement and Commercial use.
Non-mathematical encryption is impervious to any of today’s
threats.
Encryption technology is property of CryptoCodex Ltd.
Solution
Self-contained document contains all the
components required for authentication.
No database is required to authenticate the
certificate (or the diamond).
A 2D barcode can contain all of the relevant
data – fully encrypted.
Can be scribed on the surface of the diamond
(as small as 20 microns) without damaging the
stone.
Can be printed onto Certificate of Authenticity.
Encryption technology is property of CryptoCodex Ltd.
Examples
Enlarged view of encrypted barcode
scribed onto the girdle of a
diamond.
Encryption technology is property of CryptoCodex Ltd.
Demo
How to create a
Certificate of Authenticity . . .
Six Degrees Counterfeit Prevention, LLC
For Additional Information
[email protected]
Slide 3
Certificate of
Authenticity
Security for the
Diamond Industry
About Us
Six Degrees Counterfeit Prevention is
a an authorized distributor for
CryptoCodex Ltd., providers of the
most powerful and secure
counterfeit protection, track and
trace and document security solution
in the world today.
Encrypted Barcode
Strength I Security
The Encryption Technique
It is “CHAOTIC” [symmetrical, polymorphic, non-mathematical algorithm].
The KEY is a PHR (Pure Human Random).
The strength of the encryption is unlike any other today.
All expert attempts to hack it have failed.
Encryption technology is property of CryptoCodex Ltd.
The Encryption – Explained
The original data in the left sand bottle is meaningful.
“Shaking” the bottle will cause the data to encrypt.
The only way to decrypt the data is to reverse each and every sand
particular to it’s original state.
No Algorithm was involved – thus, there is no way to break the
system.
Encrypted data volume does not change.
Any attempt to further move the sand particulars, will “deepen” the
encryption – away from a solution.
Encryption technology is property of CryptoCodex Ltd.
Benefits
Eliminate the target, reduce the threat – Eliminates the need for
an online authentication (database) center.
The entire content of the certificate (color, cut, quality, etc.) is
encrypted within the data carrier and editable only by the issuer.
The encryption does not increase the data volume leaving room
for pictures and small details.
Security measures allow for multiple levels of readability for
Government, Law Enforcement and Commercial use.
Non-mathematical encryption is impervious to any of today’s
threats.
Encryption technology is property of CryptoCodex Ltd.
Solution
Self-contained document contains all the
components required for authentication.
No database is required to authenticate the
certificate (or the diamond).
A 2D barcode can contain all of the relevant
data – fully encrypted.
Can be scribed on the surface of the diamond
(as small as 20 microns) without damaging the
stone.
Can be printed onto Certificate of Authenticity.
Encryption technology is property of CryptoCodex Ltd.
Examples
Enlarged view of encrypted barcode
scribed onto the girdle of a
diamond.
Encryption technology is property of CryptoCodex Ltd.
Demo
How to create a
Certificate of Authenticity . . .
Six Degrees Counterfeit Prevention, LLC
For Additional Information
[email protected]
Slide 4
Certificate of
Authenticity
Security for the
Diamond Industry
About Us
Six Degrees Counterfeit Prevention is
a an authorized distributor for
CryptoCodex Ltd., providers of the
most powerful and secure
counterfeit protection, track and
trace and document security solution
in the world today.
Encrypted Barcode
Strength I Security
The Encryption Technique
It is “CHAOTIC” [symmetrical, polymorphic, non-mathematical algorithm].
The KEY is a PHR (Pure Human Random).
The strength of the encryption is unlike any other today.
All expert attempts to hack it have failed.
Encryption technology is property of CryptoCodex Ltd.
The Encryption – Explained
The original data in the left sand bottle is meaningful.
“Shaking” the bottle will cause the data to encrypt.
The only way to decrypt the data is to reverse each and every sand
particular to it’s original state.
No Algorithm was involved – thus, there is no way to break the
system.
Encrypted data volume does not change.
Any attempt to further move the sand particulars, will “deepen” the
encryption – away from a solution.
Encryption technology is property of CryptoCodex Ltd.
Benefits
Eliminate the target, reduce the threat – Eliminates the need for
an online authentication (database) center.
The entire content of the certificate (color, cut, quality, etc.) is
encrypted within the data carrier and editable only by the issuer.
The encryption does not increase the data volume leaving room
for pictures and small details.
Security measures allow for multiple levels of readability for
Government, Law Enforcement and Commercial use.
Non-mathematical encryption is impervious to any of today’s
threats.
Encryption technology is property of CryptoCodex Ltd.
Solution
Self-contained document contains all the
components required for authentication.
No database is required to authenticate the
certificate (or the diamond).
A 2D barcode can contain all of the relevant
data – fully encrypted.
Can be scribed on the surface of the diamond
(as small as 20 microns) without damaging the
stone.
Can be printed onto Certificate of Authenticity.
Encryption technology is property of CryptoCodex Ltd.
Examples
Enlarged view of encrypted barcode
scribed onto the girdle of a
diamond.
Encryption technology is property of CryptoCodex Ltd.
Demo
How to create a
Certificate of Authenticity . . .
Six Degrees Counterfeit Prevention, LLC
For Additional Information
[email protected]
Slide 5
Certificate of
Authenticity
Security for the
Diamond Industry
About Us
Six Degrees Counterfeit Prevention is
a an authorized distributor for
CryptoCodex Ltd., providers of the
most powerful and secure
counterfeit protection, track and
trace and document security solution
in the world today.
Encrypted Barcode
Strength I Security
The Encryption Technique
It is “CHAOTIC” [symmetrical, polymorphic, non-mathematical algorithm].
The KEY is a PHR (Pure Human Random).
The strength of the encryption is unlike any other today.
All expert attempts to hack it have failed.
Encryption technology is property of CryptoCodex Ltd.
The Encryption – Explained
The original data in the left sand bottle is meaningful.
“Shaking” the bottle will cause the data to encrypt.
The only way to decrypt the data is to reverse each and every sand
particular to it’s original state.
No Algorithm was involved – thus, there is no way to break the
system.
Encrypted data volume does not change.
Any attempt to further move the sand particulars, will “deepen” the
encryption – away from a solution.
Encryption technology is property of CryptoCodex Ltd.
Benefits
Eliminate the target, reduce the threat – Eliminates the need for
an online authentication (database) center.
The entire content of the certificate (color, cut, quality, etc.) is
encrypted within the data carrier and editable only by the issuer.
The encryption does not increase the data volume leaving room
for pictures and small details.
Security measures allow for multiple levels of readability for
Government, Law Enforcement and Commercial use.
Non-mathematical encryption is impervious to any of today’s
threats.
Encryption technology is property of CryptoCodex Ltd.
Solution
Self-contained document contains all the
components required for authentication.
No database is required to authenticate the
certificate (or the diamond).
A 2D barcode can contain all of the relevant
data – fully encrypted.
Can be scribed on the surface of the diamond
(as small as 20 microns) without damaging the
stone.
Can be printed onto Certificate of Authenticity.
Encryption technology is property of CryptoCodex Ltd.
Examples
Enlarged view of encrypted barcode
scribed onto the girdle of a
diamond.
Encryption technology is property of CryptoCodex Ltd.
Demo
How to create a
Certificate of Authenticity . . .
Six Degrees Counterfeit Prevention, LLC
For Additional Information
[email protected]
Slide 6
Certificate of
Authenticity
Security for the
Diamond Industry
About Us
Six Degrees Counterfeit Prevention is
a an authorized distributor for
CryptoCodex Ltd., providers of the
most powerful and secure
counterfeit protection, track and
trace and document security solution
in the world today.
Encrypted Barcode
Strength I Security
The Encryption Technique
It is “CHAOTIC” [symmetrical, polymorphic, non-mathematical algorithm].
The KEY is a PHR (Pure Human Random).
The strength of the encryption is unlike any other today.
All expert attempts to hack it have failed.
Encryption technology is property of CryptoCodex Ltd.
The Encryption – Explained
The original data in the left sand bottle is meaningful.
“Shaking” the bottle will cause the data to encrypt.
The only way to decrypt the data is to reverse each and every sand
particular to it’s original state.
No Algorithm was involved – thus, there is no way to break the
system.
Encrypted data volume does not change.
Any attempt to further move the sand particulars, will “deepen” the
encryption – away from a solution.
Encryption technology is property of CryptoCodex Ltd.
Benefits
Eliminate the target, reduce the threat – Eliminates the need for
an online authentication (database) center.
The entire content of the certificate (color, cut, quality, etc.) is
encrypted within the data carrier and editable only by the issuer.
The encryption does not increase the data volume leaving room
for pictures and small details.
Security measures allow for multiple levels of readability for
Government, Law Enforcement and Commercial use.
Non-mathematical encryption is impervious to any of today’s
threats.
Encryption technology is property of CryptoCodex Ltd.
Solution
Self-contained document contains all the
components required for authentication.
No database is required to authenticate the
certificate (or the diamond).
A 2D barcode can contain all of the relevant
data – fully encrypted.
Can be scribed on the surface of the diamond
(as small as 20 microns) without damaging the
stone.
Can be printed onto Certificate of Authenticity.
Encryption technology is property of CryptoCodex Ltd.
Examples
Enlarged view of encrypted barcode
scribed onto the girdle of a
diamond.
Encryption technology is property of CryptoCodex Ltd.
Demo
How to create a
Certificate of Authenticity . . .
Six Degrees Counterfeit Prevention, LLC
For Additional Information
[email protected]
Slide 7
Certificate of
Authenticity
Security for the
Diamond Industry
About Us
Six Degrees Counterfeit Prevention is
a an authorized distributor for
CryptoCodex Ltd., providers of the
most powerful and secure
counterfeit protection, track and
trace and document security solution
in the world today.
Encrypted Barcode
Strength I Security
The Encryption Technique
It is “CHAOTIC” [symmetrical, polymorphic, non-mathematical algorithm].
The KEY is a PHR (Pure Human Random).
The strength of the encryption is unlike any other today.
All expert attempts to hack it have failed.
Encryption technology is property of CryptoCodex Ltd.
The Encryption – Explained
The original data in the left sand bottle is meaningful.
“Shaking” the bottle will cause the data to encrypt.
The only way to decrypt the data is to reverse each and every sand
particular to it’s original state.
No Algorithm was involved – thus, there is no way to break the
system.
Encrypted data volume does not change.
Any attempt to further move the sand particulars, will “deepen” the
encryption – away from a solution.
Encryption technology is property of CryptoCodex Ltd.
Benefits
Eliminate the target, reduce the threat – Eliminates the need for
an online authentication (database) center.
The entire content of the certificate (color, cut, quality, etc.) is
encrypted within the data carrier and editable only by the issuer.
The encryption does not increase the data volume leaving room
for pictures and small details.
Security measures allow for multiple levels of readability for
Government, Law Enforcement and Commercial use.
Non-mathematical encryption is impervious to any of today’s
threats.
Encryption technology is property of CryptoCodex Ltd.
Solution
Self-contained document contains all the
components required for authentication.
No database is required to authenticate the
certificate (or the diamond).
A 2D barcode can contain all of the relevant
data – fully encrypted.
Can be scribed on the surface of the diamond
(as small as 20 microns) without damaging the
stone.
Can be printed onto Certificate of Authenticity.
Encryption technology is property of CryptoCodex Ltd.
Examples
Enlarged view of encrypted barcode
scribed onto the girdle of a
diamond.
Encryption technology is property of CryptoCodex Ltd.
Demo
How to create a
Certificate of Authenticity . . .
Six Degrees Counterfeit Prevention, LLC
For Additional Information
[email protected]
Slide 8
Certificate of
Authenticity
Security for the
Diamond Industry
About Us
Six Degrees Counterfeit Prevention is
a an authorized distributor for
CryptoCodex Ltd., providers of the
most powerful and secure
counterfeit protection, track and
trace and document security solution
in the world today.
Encrypted Barcode
Strength I Security
The Encryption Technique
It is “CHAOTIC” [symmetrical, polymorphic, non-mathematical algorithm].
The KEY is a PHR (Pure Human Random).
The strength of the encryption is unlike any other today.
All expert attempts to hack it have failed.
Encryption technology is property of CryptoCodex Ltd.
The Encryption – Explained
The original data in the left sand bottle is meaningful.
“Shaking” the bottle will cause the data to encrypt.
The only way to decrypt the data is to reverse each and every sand
particular to it’s original state.
No Algorithm was involved – thus, there is no way to break the
system.
Encrypted data volume does not change.
Any attempt to further move the sand particulars, will “deepen” the
encryption – away from a solution.
Encryption technology is property of CryptoCodex Ltd.
Benefits
Eliminate the target, reduce the threat – Eliminates the need for
an online authentication (database) center.
The entire content of the certificate (color, cut, quality, etc.) is
encrypted within the data carrier and editable only by the issuer.
The encryption does not increase the data volume leaving room
for pictures and small details.
Security measures allow for multiple levels of readability for
Government, Law Enforcement and Commercial use.
Non-mathematical encryption is impervious to any of today’s
threats.
Encryption technology is property of CryptoCodex Ltd.
Solution
Self-contained document contains all the
components required for authentication.
No database is required to authenticate the
certificate (or the diamond).
A 2D barcode can contain all of the relevant
data – fully encrypted.
Can be scribed on the surface of the diamond
(as small as 20 microns) without damaging the
stone.
Can be printed onto Certificate of Authenticity.
Encryption technology is property of CryptoCodex Ltd.
Examples
Enlarged view of encrypted barcode
scribed onto the girdle of a
diamond.
Encryption technology is property of CryptoCodex Ltd.
Demo
How to create a
Certificate of Authenticity . . .
Six Degrees Counterfeit Prevention, LLC
For Additional Information
[email protected]
Slide 9
Certificate of
Authenticity
Security for the
Diamond Industry
About Us
Six Degrees Counterfeit Prevention is
a an authorized distributor for
CryptoCodex Ltd., providers of the
most powerful and secure
counterfeit protection, track and
trace and document security solution
in the world today.
Encrypted Barcode
Strength I Security
The Encryption Technique
It is “CHAOTIC” [symmetrical, polymorphic, non-mathematical algorithm].
The KEY is a PHR (Pure Human Random).
The strength of the encryption is unlike any other today.
All expert attempts to hack it have failed.
Encryption technology is property of CryptoCodex Ltd.
The Encryption – Explained
The original data in the left sand bottle is meaningful.
“Shaking” the bottle will cause the data to encrypt.
The only way to decrypt the data is to reverse each and every sand
particular to it’s original state.
No Algorithm was involved – thus, there is no way to break the
system.
Encrypted data volume does not change.
Any attempt to further move the sand particulars, will “deepen” the
encryption – away from a solution.
Encryption technology is property of CryptoCodex Ltd.
Benefits
Eliminate the target, reduce the threat – Eliminates the need for
an online authentication (database) center.
The entire content of the certificate (color, cut, quality, etc.) is
encrypted within the data carrier and editable only by the issuer.
The encryption does not increase the data volume leaving room
for pictures and small details.
Security measures allow for multiple levels of readability for
Government, Law Enforcement and Commercial use.
Non-mathematical encryption is impervious to any of today’s
threats.
Encryption technology is property of CryptoCodex Ltd.
Solution
Self-contained document contains all the
components required for authentication.
No database is required to authenticate the
certificate (or the diamond).
A 2D barcode can contain all of the relevant
data – fully encrypted.
Can be scribed on the surface of the diamond
(as small as 20 microns) without damaging the
stone.
Can be printed onto Certificate of Authenticity.
Encryption technology is property of CryptoCodex Ltd.
Examples
Enlarged view of encrypted barcode
scribed onto the girdle of a
diamond.
Encryption technology is property of CryptoCodex Ltd.
Demo
How to create a
Certificate of Authenticity . . .
Six Degrees Counterfeit Prevention, LLC
For Additional Information
[email protected]
Certificate of
Authenticity
Security for the
Diamond Industry
About Us
Six Degrees Counterfeit Prevention is
a an authorized distributor for
CryptoCodex Ltd., providers of the
most powerful and secure
counterfeit protection, track and
trace and document security solution
in the world today.
Encrypted Barcode
Strength I Security
The Encryption Technique
It is “CHAOTIC” [symmetrical, polymorphic, non-mathematical algorithm].
The KEY is a PHR (Pure Human Random).
The strength of the encryption is unlike any other today.
All expert attempts to hack it have failed.
Encryption technology is property of CryptoCodex Ltd.
The Encryption – Explained
The original data in the left sand bottle is meaningful.
“Shaking” the bottle will cause the data to encrypt.
The only way to decrypt the data is to reverse each and every sand
particular to it’s original state.
No Algorithm was involved – thus, there is no way to break the
system.
Encrypted data volume does not change.
Any attempt to further move the sand particulars, will “deepen” the
encryption – away from a solution.
Encryption technology is property of CryptoCodex Ltd.
Benefits
Eliminate the target, reduce the threat – Eliminates the need for
an online authentication (database) center.
The entire content of the certificate (color, cut, quality, etc.) is
encrypted within the data carrier and editable only by the issuer.
The encryption does not increase the data volume leaving room
for pictures and small details.
Security measures allow for multiple levels of readability for
Government, Law Enforcement and Commercial use.
Non-mathematical encryption is impervious to any of today’s
threats.
Encryption technology is property of CryptoCodex Ltd.
Solution
Self-contained document contains all the
components required for authentication.
No database is required to authenticate the
certificate (or the diamond).
A 2D barcode can contain all of the relevant
data – fully encrypted.
Can be scribed on the surface of the diamond
(as small as 20 microns) without damaging the
stone.
Can be printed onto Certificate of Authenticity.
Encryption technology is property of CryptoCodex Ltd.
Examples
Enlarged view of encrypted barcode
scribed onto the girdle of a
diamond.
Encryption technology is property of CryptoCodex Ltd.
Demo
How to create a
Certificate of Authenticity . . .
Six Degrees Counterfeit Prevention, LLC
For Additional Information
[email protected]
Slide 2
Certificate of
Authenticity
Security for the
Diamond Industry
About Us
Six Degrees Counterfeit Prevention is
a an authorized distributor for
CryptoCodex Ltd., providers of the
most powerful and secure
counterfeit protection, track and
trace and document security solution
in the world today.
Encrypted Barcode
Strength I Security
The Encryption Technique
It is “CHAOTIC” [symmetrical, polymorphic, non-mathematical algorithm].
The KEY is a PHR (Pure Human Random).
The strength of the encryption is unlike any other today.
All expert attempts to hack it have failed.
Encryption technology is property of CryptoCodex Ltd.
The Encryption – Explained
The original data in the left sand bottle is meaningful.
“Shaking” the bottle will cause the data to encrypt.
The only way to decrypt the data is to reverse each and every sand
particular to it’s original state.
No Algorithm was involved – thus, there is no way to break the
system.
Encrypted data volume does not change.
Any attempt to further move the sand particulars, will “deepen” the
encryption – away from a solution.
Encryption technology is property of CryptoCodex Ltd.
Benefits
Eliminate the target, reduce the threat – Eliminates the need for
an online authentication (database) center.
The entire content of the certificate (color, cut, quality, etc.) is
encrypted within the data carrier and editable only by the issuer.
The encryption does not increase the data volume leaving room
for pictures and small details.
Security measures allow for multiple levels of readability for
Government, Law Enforcement and Commercial use.
Non-mathematical encryption is impervious to any of today’s
threats.
Encryption technology is property of CryptoCodex Ltd.
Solution
Self-contained document contains all the
components required for authentication.
No database is required to authenticate the
certificate (or the diamond).
A 2D barcode can contain all of the relevant
data – fully encrypted.
Can be scribed on the surface of the diamond
(as small as 20 microns) without damaging the
stone.
Can be printed onto Certificate of Authenticity.
Encryption technology is property of CryptoCodex Ltd.
Examples
Enlarged view of encrypted barcode
scribed onto the girdle of a
diamond.
Encryption technology is property of CryptoCodex Ltd.
Demo
How to create a
Certificate of Authenticity . . .
Six Degrees Counterfeit Prevention, LLC
For Additional Information
[email protected]
Slide 3
Certificate of
Authenticity
Security for the
Diamond Industry
About Us
Six Degrees Counterfeit Prevention is
a an authorized distributor for
CryptoCodex Ltd., providers of the
most powerful and secure
counterfeit protection, track and
trace and document security solution
in the world today.
Encrypted Barcode
Strength I Security
The Encryption Technique
It is “CHAOTIC” [symmetrical, polymorphic, non-mathematical algorithm].
The KEY is a PHR (Pure Human Random).
The strength of the encryption is unlike any other today.
All expert attempts to hack it have failed.
Encryption technology is property of CryptoCodex Ltd.
The Encryption – Explained
The original data in the left sand bottle is meaningful.
“Shaking” the bottle will cause the data to encrypt.
The only way to decrypt the data is to reverse each and every sand
particular to it’s original state.
No Algorithm was involved – thus, there is no way to break the
system.
Encrypted data volume does not change.
Any attempt to further move the sand particulars, will “deepen” the
encryption – away from a solution.
Encryption technology is property of CryptoCodex Ltd.
Benefits
Eliminate the target, reduce the threat – Eliminates the need for
an online authentication (database) center.
The entire content of the certificate (color, cut, quality, etc.) is
encrypted within the data carrier and editable only by the issuer.
The encryption does not increase the data volume leaving room
for pictures and small details.
Security measures allow for multiple levels of readability for
Government, Law Enforcement and Commercial use.
Non-mathematical encryption is impervious to any of today’s
threats.
Encryption technology is property of CryptoCodex Ltd.
Solution
Self-contained document contains all the
components required for authentication.
No database is required to authenticate the
certificate (or the diamond).
A 2D barcode can contain all of the relevant
data – fully encrypted.
Can be scribed on the surface of the diamond
(as small as 20 microns) without damaging the
stone.
Can be printed onto Certificate of Authenticity.
Encryption technology is property of CryptoCodex Ltd.
Examples
Enlarged view of encrypted barcode
scribed onto the girdle of a
diamond.
Encryption technology is property of CryptoCodex Ltd.
Demo
How to create a
Certificate of Authenticity . . .
Six Degrees Counterfeit Prevention, LLC
For Additional Information
[email protected]
Slide 4
Certificate of
Authenticity
Security for the
Diamond Industry
About Us
Six Degrees Counterfeit Prevention is
a an authorized distributor for
CryptoCodex Ltd., providers of the
most powerful and secure
counterfeit protection, track and
trace and document security solution
in the world today.
Encrypted Barcode
Strength I Security
The Encryption Technique
It is “CHAOTIC” [symmetrical, polymorphic, non-mathematical algorithm].
The KEY is a PHR (Pure Human Random).
The strength of the encryption is unlike any other today.
All expert attempts to hack it have failed.
Encryption technology is property of CryptoCodex Ltd.
The Encryption – Explained
The original data in the left sand bottle is meaningful.
“Shaking” the bottle will cause the data to encrypt.
The only way to decrypt the data is to reverse each and every sand
particular to it’s original state.
No Algorithm was involved – thus, there is no way to break the
system.
Encrypted data volume does not change.
Any attempt to further move the sand particulars, will “deepen” the
encryption – away from a solution.
Encryption technology is property of CryptoCodex Ltd.
Benefits
Eliminate the target, reduce the threat – Eliminates the need for
an online authentication (database) center.
The entire content of the certificate (color, cut, quality, etc.) is
encrypted within the data carrier and editable only by the issuer.
The encryption does not increase the data volume leaving room
for pictures and small details.
Security measures allow for multiple levels of readability for
Government, Law Enforcement and Commercial use.
Non-mathematical encryption is impervious to any of today’s
threats.
Encryption technology is property of CryptoCodex Ltd.
Solution
Self-contained document contains all the
components required for authentication.
No database is required to authenticate the
certificate (or the diamond).
A 2D barcode can contain all of the relevant
data – fully encrypted.
Can be scribed on the surface of the diamond
(as small as 20 microns) without damaging the
stone.
Can be printed onto Certificate of Authenticity.
Encryption technology is property of CryptoCodex Ltd.
Examples
Enlarged view of encrypted barcode
scribed onto the girdle of a
diamond.
Encryption technology is property of CryptoCodex Ltd.
Demo
How to create a
Certificate of Authenticity . . .
Six Degrees Counterfeit Prevention, LLC
For Additional Information
[email protected]
Slide 5
Certificate of
Authenticity
Security for the
Diamond Industry
About Us
Six Degrees Counterfeit Prevention is
a an authorized distributor for
CryptoCodex Ltd., providers of the
most powerful and secure
counterfeit protection, track and
trace and document security solution
in the world today.
Encrypted Barcode
Strength I Security
The Encryption Technique
It is “CHAOTIC” [symmetrical, polymorphic, non-mathematical algorithm].
The KEY is a PHR (Pure Human Random).
The strength of the encryption is unlike any other today.
All expert attempts to hack it have failed.
Encryption technology is property of CryptoCodex Ltd.
The Encryption – Explained
The original data in the left sand bottle is meaningful.
“Shaking” the bottle will cause the data to encrypt.
The only way to decrypt the data is to reverse each and every sand
particular to it’s original state.
No Algorithm was involved – thus, there is no way to break the
system.
Encrypted data volume does not change.
Any attempt to further move the sand particulars, will “deepen” the
encryption – away from a solution.
Encryption technology is property of CryptoCodex Ltd.
Benefits
Eliminate the target, reduce the threat – Eliminates the need for
an online authentication (database) center.
The entire content of the certificate (color, cut, quality, etc.) is
encrypted within the data carrier and editable only by the issuer.
The encryption does not increase the data volume leaving room
for pictures and small details.
Security measures allow for multiple levels of readability for
Government, Law Enforcement and Commercial use.
Non-mathematical encryption is impervious to any of today’s
threats.
Encryption technology is property of CryptoCodex Ltd.
Solution
Self-contained document contains all the
components required for authentication.
No database is required to authenticate the
certificate (or the diamond).
A 2D barcode can contain all of the relevant
data – fully encrypted.
Can be scribed on the surface of the diamond
(as small as 20 microns) without damaging the
stone.
Can be printed onto Certificate of Authenticity.
Encryption technology is property of CryptoCodex Ltd.
Examples
Enlarged view of encrypted barcode
scribed onto the girdle of a
diamond.
Encryption technology is property of CryptoCodex Ltd.
Demo
How to create a
Certificate of Authenticity . . .
Six Degrees Counterfeit Prevention, LLC
For Additional Information
[email protected]
Slide 6
Certificate of
Authenticity
Security for the
Diamond Industry
About Us
Six Degrees Counterfeit Prevention is
a an authorized distributor for
CryptoCodex Ltd., providers of the
most powerful and secure
counterfeit protection, track and
trace and document security solution
in the world today.
Encrypted Barcode
Strength I Security
The Encryption Technique
It is “CHAOTIC” [symmetrical, polymorphic, non-mathematical algorithm].
The KEY is a PHR (Pure Human Random).
The strength of the encryption is unlike any other today.
All expert attempts to hack it have failed.
Encryption technology is property of CryptoCodex Ltd.
The Encryption – Explained
The original data in the left sand bottle is meaningful.
“Shaking” the bottle will cause the data to encrypt.
The only way to decrypt the data is to reverse each and every sand
particular to it’s original state.
No Algorithm was involved – thus, there is no way to break the
system.
Encrypted data volume does not change.
Any attempt to further move the sand particulars, will “deepen” the
encryption – away from a solution.
Encryption technology is property of CryptoCodex Ltd.
Benefits
Eliminate the target, reduce the threat – Eliminates the need for
an online authentication (database) center.
The entire content of the certificate (color, cut, quality, etc.) is
encrypted within the data carrier and editable only by the issuer.
The encryption does not increase the data volume leaving room
for pictures and small details.
Security measures allow for multiple levels of readability for
Government, Law Enforcement and Commercial use.
Non-mathematical encryption is impervious to any of today’s
threats.
Encryption technology is property of CryptoCodex Ltd.
Solution
Self-contained document contains all the
components required for authentication.
No database is required to authenticate the
certificate (or the diamond).
A 2D barcode can contain all of the relevant
data – fully encrypted.
Can be scribed on the surface of the diamond
(as small as 20 microns) without damaging the
stone.
Can be printed onto Certificate of Authenticity.
Encryption technology is property of CryptoCodex Ltd.
Examples
Enlarged view of encrypted barcode
scribed onto the girdle of a
diamond.
Encryption technology is property of CryptoCodex Ltd.
Demo
How to create a
Certificate of Authenticity . . .
Six Degrees Counterfeit Prevention, LLC
For Additional Information
[email protected]
Slide 7
Certificate of
Authenticity
Security for the
Diamond Industry
About Us
Six Degrees Counterfeit Prevention is
a an authorized distributor for
CryptoCodex Ltd., providers of the
most powerful and secure
counterfeit protection, track and
trace and document security solution
in the world today.
Encrypted Barcode
Strength I Security
The Encryption Technique
It is “CHAOTIC” [symmetrical, polymorphic, non-mathematical algorithm].
The KEY is a PHR (Pure Human Random).
The strength of the encryption is unlike any other today.
All expert attempts to hack it have failed.
Encryption technology is property of CryptoCodex Ltd.
The Encryption – Explained
The original data in the left sand bottle is meaningful.
“Shaking” the bottle will cause the data to encrypt.
The only way to decrypt the data is to reverse each and every sand
particular to it’s original state.
No Algorithm was involved – thus, there is no way to break the
system.
Encrypted data volume does not change.
Any attempt to further move the sand particulars, will “deepen” the
encryption – away from a solution.
Encryption technology is property of CryptoCodex Ltd.
Benefits
Eliminate the target, reduce the threat – Eliminates the need for
an online authentication (database) center.
The entire content of the certificate (color, cut, quality, etc.) is
encrypted within the data carrier and editable only by the issuer.
The encryption does not increase the data volume leaving room
for pictures and small details.
Security measures allow for multiple levels of readability for
Government, Law Enforcement and Commercial use.
Non-mathematical encryption is impervious to any of today’s
threats.
Encryption technology is property of CryptoCodex Ltd.
Solution
Self-contained document contains all the
components required for authentication.
No database is required to authenticate the
certificate (or the diamond).
A 2D barcode can contain all of the relevant
data – fully encrypted.
Can be scribed on the surface of the diamond
(as small as 20 microns) without damaging the
stone.
Can be printed onto Certificate of Authenticity.
Encryption technology is property of CryptoCodex Ltd.
Examples
Enlarged view of encrypted barcode
scribed onto the girdle of a
diamond.
Encryption technology is property of CryptoCodex Ltd.
Demo
How to create a
Certificate of Authenticity . . .
Six Degrees Counterfeit Prevention, LLC
For Additional Information
[email protected]
Slide 8
Certificate of
Authenticity
Security for the
Diamond Industry
About Us
Six Degrees Counterfeit Prevention is
a an authorized distributor for
CryptoCodex Ltd., providers of the
most powerful and secure
counterfeit protection, track and
trace and document security solution
in the world today.
Encrypted Barcode
Strength I Security
The Encryption Technique
It is “CHAOTIC” [symmetrical, polymorphic, non-mathematical algorithm].
The KEY is a PHR (Pure Human Random).
The strength of the encryption is unlike any other today.
All expert attempts to hack it have failed.
Encryption technology is property of CryptoCodex Ltd.
The Encryption – Explained
The original data in the left sand bottle is meaningful.
“Shaking” the bottle will cause the data to encrypt.
The only way to decrypt the data is to reverse each and every sand
particular to it’s original state.
No Algorithm was involved – thus, there is no way to break the
system.
Encrypted data volume does not change.
Any attempt to further move the sand particulars, will “deepen” the
encryption – away from a solution.
Encryption technology is property of CryptoCodex Ltd.
Benefits
Eliminate the target, reduce the threat – Eliminates the need for
an online authentication (database) center.
The entire content of the certificate (color, cut, quality, etc.) is
encrypted within the data carrier and editable only by the issuer.
The encryption does not increase the data volume leaving room
for pictures and small details.
Security measures allow for multiple levels of readability for
Government, Law Enforcement and Commercial use.
Non-mathematical encryption is impervious to any of today’s
threats.
Encryption technology is property of CryptoCodex Ltd.
Solution
Self-contained document contains all the
components required for authentication.
No database is required to authenticate the
certificate (or the diamond).
A 2D barcode can contain all of the relevant
data – fully encrypted.
Can be scribed on the surface of the diamond
(as small as 20 microns) without damaging the
stone.
Can be printed onto Certificate of Authenticity.
Encryption technology is property of CryptoCodex Ltd.
Examples
Enlarged view of encrypted barcode
scribed onto the girdle of a
diamond.
Encryption technology is property of CryptoCodex Ltd.
Demo
How to create a
Certificate of Authenticity . . .
Six Degrees Counterfeit Prevention, LLC
For Additional Information
[email protected]
Slide 9
Certificate of
Authenticity
Security for the
Diamond Industry
About Us
Six Degrees Counterfeit Prevention is
a an authorized distributor for
CryptoCodex Ltd., providers of the
most powerful and secure
counterfeit protection, track and
trace and document security solution
in the world today.
Encrypted Barcode
Strength I Security
The Encryption Technique
It is “CHAOTIC” [symmetrical, polymorphic, non-mathematical algorithm].
The KEY is a PHR (Pure Human Random).
The strength of the encryption is unlike any other today.
All expert attempts to hack it have failed.
Encryption technology is property of CryptoCodex Ltd.
The Encryption – Explained
The original data in the left sand bottle is meaningful.
“Shaking” the bottle will cause the data to encrypt.
The only way to decrypt the data is to reverse each and every sand
particular to it’s original state.
No Algorithm was involved – thus, there is no way to break the
system.
Encrypted data volume does not change.
Any attempt to further move the sand particulars, will “deepen” the
encryption – away from a solution.
Encryption technology is property of CryptoCodex Ltd.
Benefits
Eliminate the target, reduce the threat – Eliminates the need for
an online authentication (database) center.
The entire content of the certificate (color, cut, quality, etc.) is
encrypted within the data carrier and editable only by the issuer.
The encryption does not increase the data volume leaving room
for pictures and small details.
Security measures allow for multiple levels of readability for
Government, Law Enforcement and Commercial use.
Non-mathematical encryption is impervious to any of today’s
threats.
Encryption technology is property of CryptoCodex Ltd.
Solution
Self-contained document contains all the
components required for authentication.
No database is required to authenticate the
certificate (or the diamond).
A 2D barcode can contain all of the relevant
data – fully encrypted.
Can be scribed on the surface of the diamond
(as small as 20 microns) without damaging the
stone.
Can be printed onto Certificate of Authenticity.
Encryption technology is property of CryptoCodex Ltd.
Examples
Enlarged view of encrypted barcode
scribed onto the girdle of a
diamond.
Encryption technology is property of CryptoCodex Ltd.
Demo
How to create a
Certificate of Authenticity . . .
Six Degrees Counterfeit Prevention, LLC
For Additional Information
[email protected]