CN102831530A - Two-dimensional graph coding anti-fake based method and tag and making method of two-dimensional graph coding anti-fake based tag - Google Patents

Two-dimensional graph coding anti-fake based method and tag and making method of two-dimensional graph coding anti-fake based tag Download PDF

Info

Publication number
CN102831530A
CN102831530A CN2012102965679A CN201210296567A CN102831530A CN 102831530 A CN102831530 A CN 102831530A CN 2012102965679 A CN2012102965679 A CN 2012102965679A CN 201210296567 A CN201210296567 A CN 201210296567A CN 102831530 A CN102831530 A CN 102831530A
Authority
CN
China
Prior art keywords
coding
printing
text
picture
printing carrier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012102965679A
Other languages
Chinese (zh)
Other versions
CN102831530B (en
Inventor
冯林
王筱雨
陈航
岳铁刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Xinhuayi Printing Co., Ltd.
Original Assignee
冯林
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to CN201110343638.1 priority Critical
Priority to CN201110343638 priority
Application filed by 冯林 filed Critical 冯林
Priority to CN201210296567.9A priority patent/CN102831530B/en
Publication of CN102831530A publication Critical patent/CN102831530A/en
Application granted granted Critical
Publication of CN102831530B publication Critical patent/CN102831530B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00577Recognising objects characterised by unique random properties, i.e. objects having a physically unclonable function [PUF], e.g. authenticating objects based on their unclonable texture
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • G06K19/06056Constructional details the marking comprising a further embedded marking, e.g. a 1D bar code with the black bars containing a smaller sized coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/08Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
    • G06K19/10Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards
    • G06K19/18Constructional details
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6201Matching; Proximity measures
    • G06K9/6202Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
    • G06K9/6203Shifting or otherwise transforming the patterns to accommodate for positional errors
    • G06K9/6211Matching configurations of points or features, e.g. constellation matching
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/003Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00577Recognising objects characterised by unique random properties, i.e. objects having a physically unclonable function [PUF], e.g. authenticating objects based on their unclonable texture
    • G06K2009/0059Recognising objects characterised by unique random properties, i.e. objects having a physically unclonable function [PUF], e.g. authenticating objects based on their unclonable texture markers for authenticating, copy prevention

Abstract

The invention relates to two-dimensional graph coding anti-fake based method and tag and a making method of the two-dimensional graph coding anti-fake based tag. In the invention, a two-dimensional graph coding image generated by a computer and a two-dimensional graph coding image read by an image reading device can be distinguished through the existence of the a boundary of a first printing carrier and a second printing carrier, and therefore, the problem that a lawless person cracks a two-dimensional graph coding database through an exhaustion method; the second printing carrier is randomly bonded on the first printing carrier, the boundary of the first printing carrier and the second printing carrier and the relative position information of the two-dimensional graph coding image are stored in data, and whether the position of the boundary is consistent or not is analyzed and judged, and therefore, a counterfeit tag is prevented from being made by simulating the making process of the tag by the lawless person; an image-text area is punched, the position of a hole is randomly changed, and the lawless person needs to know the position of the hole and accurately position and punch through a machine if intending to simulate the tag, and therefore, the counterfeit cost is increased.

Description

A kind of method, label and label producing method based on the X-Y scheme encode false-proof
[technical field]
The present invention relates to a kind of method for anti-counterfeit, label and label producing method, particularly a kind of method, label and this label producing method based on the X-Y scheme encode false-proof.
[background technology]
False proof is to solve a problem, both has been difficult for forging, and is easy to identification again.False proof purpose mainly is for the product of different businessmans is distinguished.Before computing machine, network and 3C technical development maturation, false proof method mainly is the consumer directly need not can realize by means of instrument the true and false through naked eyes identification, and the principle of this anti-counterfeiting technology is to make anti-false sign with special printing technology; Like holographic false proof, because this printing technology is difficult, particularly template is difficult to plagiarize; So false proof cost is very high, be difficult to know template through the finished product after the printing, so antifalsification is still very high through reverse-engineering; Exactly because but its template is difficult to prevent; And printing cost is high, so be difficult to the different hologram of each product printing, a same hologram can be printed on a large amount of products; If so as long as can crack its template, it will be very huge by the counterfeit loss that constitutes.
Along with the continuous development of science and technology, only be difficult to directly to go out the true and false respectively, so need be by special instrument and equipment through naked eyes; This false proof be the distinctive mark that utilizes special devices and technology to make; For example laser anti-counterfeit code, recessive printing ink false proof, super false proof, reticulate pattern is false proof etc., because this anti-counterfeiting characteristic with the naked eye is difficult to identification, need could go out the true and false respectively with special testing instruments; So its applicability is wideless, can only be used for the false proof of valuables.
Along with the development of computing machine, internet and 3C technology, people begin to tell truth from falsehood by remote server, such as the cipher counterfeit-proof technology; It is to compile the set of number random cipher to product, this password is imprinted on sign goes up and hide, and this password is deposited in can supply in the Computer Database that the consumer inquires about simultaneously; The consumer passes through phone, fax or the Internet after buying product; Password on the marker is torn input compare identification, identical is exactly genuine, different false; And this password obtains through complex calculation; Be difficult to extrapolate its algorithm through password, also just be difficult to know other all correct passwords, have certain antifalsification through a password.But owing to a series of numeral can crack through the computer program exhaust algorithm, so its antifalsification is not high yet.
In order to prevent that the lawless person from cracking numerical ciphers through the computer program method of exhaustion, people have introduced X-Y scheme encode false-proof technology.Be to use certain specific geometric figure chequered with black and white graphic recording data symbol information that (on the two-dimensional directional) distributes on the plane according to certain rules; On coding, utilize " 0 ", the notion of " 1 " bit stream that constitutes the computer-internal logical foundations dexterously; Use several and the corresponding geometrical body of scale-of-two to represent the literal numerical information; Automatically handle with realization information through image input device or photoelectric scanning device automatically identifying and reading: therefore two-dimensional bar code/X-Y scheme coding can express great deal of information in horizontal and vertical two orientation while expressing information in very little area.So the X-Y scheme coding not only can carry out identification to each commodity, can also carry out anti-counterfeiting mark.Though the X-Y scheme coding is compared numerical code and more is difficult to crack through computer program; But the numerical coding that X-Y scheme coding essence still is made up of " 0 " and " 1 "; Still can crack through the method for exhaustion of computer program; On the other hand, the lawless person still can and then print the X-Y scheme coded scanning carry out counterfeit, so its security also is not high especially.
In order to prevent that figure is replicated printing; People have expected a kind of method through texture anti-fake, mainly are the intrinsic structural textures of sign material that the anti-counterfeiting characteristic-numerical ciphers of code anti-fake printing is become non-artificial manufacturing, are about to deposit in the database that can inquire about after figure on the paper that people have a mind to make the band fiber scans; Then anti-false sign is divided into 12 lattices; Consumption through have or not in these 12 lattices of Help by Phone fiber or check its figure discern true and false, though this method has prevented lawless person's copy pattern and since its polling routine also be very the complicacy; Very complicated by contrast; Consumer's inquiry rate is also very low, and a large amount of markers is not inquired about, and being equal to nothing, it is false proof to use.
Sum up existing anti-counterfeiting technology, the inventor thinks that a good anti-counterfeiting technology must possess following key element:
1. the consumer recognizes (then too complicated like above-mentioned texture identification) easily, need not by instrument, perhaps by simple tools; 2. the consumer obtains (as get final product through mobile phone) easily and arrives real information, and the product in itself and the hand is contrasted; 3. sign printing easily, and easy making the, low production cost like this; 4. the manufacturing technology of sign can not itself use the reverse-engineering principle to obtain through identifying; 5. the sign of each product is different, and the cost that duplicates of lawless person can be very high like this.
And existing anti-counterfeiting technology all can not all reach some above-mentioned requirement, so its false proof security is not high.
[summary of the invention]
The object of the invention is exactly in order to solve the problem that prior art exists, to have proposed a kind of method based on the X-Y scheme encode false-proof, label and label producing method.
Concrete technical scheme of the present invention is following:
The present invention provides a kind of method based on the X-Y scheme encode false-proof, and this method comprises: printing X-Y scheme coding on product; Image read-out reads the X-Y scheme coding that is identified on the product; Obtain the X-Y scheme coded message that image read-out reads; Judge said X-Y scheme coded message whether with database in the X-Y scheme coded message of storing consistent; Like unanimity, show that then this product is a certified products, if inconsistent, show that then this product is pseudo-article; It is characterized in that:
Described X-Y scheme is encoded to one, and this X-Y scheme coding is printed on two printing carriers, said second printing carrier stick on first printing carrier on.
This method further comprises:
Judge in the X-Y scheme coding that said image read-out reads whether include the separatrix of first printing carrier and second printing carrier, and if had would further judge said X-Y scheme coded message whether with database in the X-Y scheme coded message of storing consistent.
This method further comprises:
At random second printing carrier is bonded on first printing carrier; Said X-Y scheme coding is read through the X-Y scheme code reading device in printing X-Y scheme coding back on two printing carriers; Obtain the marginal position in this X-Y scheme coding, and this positional information and X-Y scheme are encoded corresponding stored in database;
After the X-Y scheme coded message of in X-Y scheme coded message that said image read-out reads and database, storing was consistent, the marginal positional information of storing in the separatrix positional information in the X-Y scheme coding that image read-out is read and the database was compared;
Like unanimity, show that then this product is a certified products, if inconsistent, show that then this product is pseudo-article.
This method further comprises:
On first printing carrier of product, punch at random; And be benchmark with the hole in the zone at place, hole printing figure message at random; Then second printing carrier is bonded on first printing carrier at random; And second printing carrier covers hole and picture and text, reads the distribution plan and the picture and text in hole through image read-out, and with pore size distribution figure and picture and text and X-Y scheme coding corresponding stored in database;
After the marginal positional information of storing in the separatrix positional information in X-Y scheme that image read-out reads coding and the database is consistent; Find out and this X-Y scheme encode corresponding pore size distribution figure and picture and text, and this pore size distribution figure and picture and text are sent to display device show;
Pore size distribution figure that identifies on the product and picture and text are compared with the pore size distribution figure and the picture and text that show,, show that then this product is a certified products,, show that then this product is pseudo-article if two pore size distribution figure and picture and text are inconsistent if two pore size distribution figure are consistent with picture and text.
The present invention also provides a kind of label based on the X-Y scheme encode false-proof; This label comprises the X-Y scheme coding that is printed on the product; Said X-Y scheme code storage is characterized in that in database described X-Y scheme is encoded to one; And this X-Y scheme coding is printed on two printing carriers, said second printing carrier stick on first printing carrier on.
The separatrix of first printing carrier and second printing carrier can be read by image read-out, and positional information and the X-Y scheme of said separatrix in the X-Y scheme coding encoded corresponding stored in database.
Said on first printing carrier and be positioned at the porose and picture and text that distribute under second printing carrier, the distribution plan in said hole and picture and text and X-Y scheme are encoded corresponding stored in database.
The present invention provides a kind of method for making based on X-Y scheme encode false-proof label in addition, it is characterized in that, this method comprises the steps:
At random second printing carrier is bonded on first printing carrier of product; After printing is stored in the X-Y scheme coding in the data on two printing carriers; Read said X-Y scheme coding through the X-Y scheme code reading device; Obtain the marginal position in this X-Y scheme coding, and this positional information and X-Y scheme are encoded corresponding stored in database.
After printing is stored in the X-Y scheme coding in the data on two printing carriers; Read said X-Y scheme coding through the X-Y scheme code reading device; Obtain the marginal position in this X-Y scheme coding, and this positional information and X-Y scheme are encoded corresponding stored in database.
Further, this method comprises the steps:
On first printing carrier of product, punch at random; And be benchmark with the hole in the zone at place, hole printing figure message at random; Then second printing carrier is bonded on first printing carrier at random; And second printing carrier covers hole and picture and text, reads the distribution plan and the picture and text in hole through image read-out, and with pore size distribution figure and picture and text and X-Y scheme coding corresponding stored in database.
Beneficial technical effects of the present invention is:
Because first printing carrier and second printing carrier are not at grade; So can read its separatrix through image read-out; Thereby can distinguish the X-Y scheme coded image that X-Y scheme coded image that computing machine generates and image read-out read through marginal having or not; Thereby avoided the lawless person to generate the problem of X-Y scheme coded image through computing machine; Can prevent that the lawless person from cracking the problem in X-Y scheme coded data storehouse through the method for exhaustion, improved security of the present invention.
Owing at random second printing carrier is bonded on first printing carrier; And the separatrix of first printing carrier and second printing carrier and the relative position information of X-Y scheme coded image are stored in the data; And whether the marginal position of analysis and judgement is consistent, so just can prevent that the lawless person from removing to make the label of personation through the manufacturing process of imitation label.
Through in image-text area punching, and the position in hole is a random variation, and the lawless person carries out accurate positional punch through machine in the position in hole again if imitation should be known, has increased counterfeit cost, makes security improve more.
On the other hand,, improved the inquiry rate of this anti-counterfeiting mark, made anti-forgery security higher owing to after second printing carrier covers picture and text, can so then help the consumer and actively go to carry out the Antiforge inquiry operation through with the prize sign of picture and text as prize drawing.
The various advantages of cumulated volume invention anti-counterfeiting technology: 1. the consumer recognizes easily, only needs can realize Antiforge inquiry by common instrument (like mobile phone); 2. the consumer gets access to real information (through mobile phone) easily, and the product in itself and the hand is contrasted; 3. sign printing easily, and easy making the, low production cost like this; 4. the manufacturing technology of sign can not itself use the reverse-engineering principle to obtain through identifying; 5. the sign of each product is different, and the cost that duplicates of lawless person can be very high like this.All block up through the above-mentioned various means leak that the lawless person is counterfeit, make that counterfeit possibility is almost nil, and counterfeit cost is very huge, and legal manufacturer's production cost is very low.So method for anti-counterfeit of the present invention is with low cost, security is very high.
[description of drawings]
Fig. 1 is that the label spatial structure of the embodiment of the invention 1 is launched synoptic diagram;
Fig. 2 is the method flow diagram of the forming label of the embodiment of the invention 1;
Fig. 3 is that the label spatial structure of the embodiment of the invention 2 is launched synoptic diagram;
Fig. 4 is the method flow diagram of the forming label of the embodiment of the invention 2.
[embodiment]
For the purpose, technical scheme and the advantage that make invention is clearer,, the present invention is further elaborated below in conjunction with accompanying drawing and embodiment.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not used for limiting the present invention.
Embodiment 1
As shown in Figure 1, a kind of antifalsification label based on the X-Y scheme coding, this label comprise that being printed on the X-Y scheme that (also can be printed on the shell of product) on the product external packaging box 10 encodes 11, and said X-Y scheme coding 11 is stored in the data in server storehouse.The core of said X-Y scheme coding 11 is printed on the paper slip of pasting on the external packing box 12, and the periphery of said X-Y scheme coding 11 is printed on the said external packing box 10, and said paper slip 12 is frangible subsides, is bonded on the said external packing box 10.
Has separatrix 121 between said paper slip 12 and the external packing box 10; Said paper slip 12 is bonded on the external packing box 10 at random; So the relative position of separatrix in the X-Y scheme coded image is random variation, relative position information and the X-Y scheme of this separatrix in the X-Y scheme coded image encoded corresponding stored in the middle database of server.
Because X-Y scheme coding 11 is to be printed on two printing carriers that are on the Different Plane; And two different printing carriers have the separatrix; Can judge that said X-Y scheme coding is to be printed on two different printing carriers through marginal having or not; Still on the same printing carrier, can prevent that like this lawless person from carrying out the method for exhaustion then through the synthetic X-Y scheme coding of software and attempting checking.If the lawless person wants through checking, must the X-Y scheme coding be printed on two printing carriers, and then read the X-Y scheme coding through image read-out, attempt checking then, this has increased huge cost to the fake producer undoubtedly.
As shown in Figure 2, the method for making this antifalsification label is:
S1: paper slip 12 is sticked on the said external packing box 10 at random;
S2: at the X-Y scheme coding 11 of the regional printing stored that is pasted with paper slip 12 in database;
S3: employing X-Y scheme code reading device reads the X-Y scheme coding 11 that is printed on paper slip 12 and the external packing box 10;
S4: obtain the positional information of paper slip 12 and external packing box 10 separatrix 121 in the X-Y scheme coding 11, and this positional information and said X-Y scheme are encoded 11 corresponding stored in database.
The consumer is when carrying out false proof evaluation; The X-Y scheme that the consumer at first adopts image read-out (such as camera or scanner) to read and is printed on paper slip and the external packing box is encoded; And this X-Y scheme coding is sent to the server of network side through wired or wireless mode; Server obtains said X-Y scheme coded image; Whether include the separatrix of paper slip and external packing box in the X-Y scheme coding that the said image read-out of analysis and judgement reads,, then inform that through display device (like the display of computer or the display screen of mobile phone) consumer's X-Y scheme coding is invalid if do not have; If have, then further judge X-Y scheme coded message that said image read-out reads whether with database in the X-Y scheme coded message of storing consistent, as inconsistent, then inform that through display device consumer's X-Y scheme encodes illegal; If any unanimity, the marginal positional information of storing in the separatrix positional information in this X-Y scheme coding that then image read-out is read and the database is compared; Like unanimity, show that then this product is a certified products, if two positions are inconsistent, show that then this product is pseudo-article.
Owing at random paper slip is bonded on the external packing box; And first printing is carried-body and the separatrix of second printing carrier and the relative position information of X-Y scheme coded image be stored in the data; And whether the marginal position of analysis and judgement is consistent, so just can prevent that the lawless person from removing to make the label of personation through the manufacturing process of imitation label.
Embodiment 2
On the basis of the foregoing description 1, present embodiment has proposed the method for making of other a kind of method for anti-counterfeit, label and this label.As shown in Figure 3, be positioned at said paper slip 12 under, on the external packing box 10 of said product, also be provided with a square hole 101.This square hole 101 is to beat the said locational of this external packing box at random through perforating device (comprising that laser burns shell punch device and pin type perforating device); In the zone at square hole place at random printing figure message 13 (picture and text in the present embodiment are a bird; In fact; Also can be other picture and text, and the picture and text of each product are not quite similar also), these picture and text 13 are to be the benchmark zone that is printed on square hole place at random with the square hole.Said paper slip 12 covers in said square hole 101 with said picture and text 13 together, tears said paper slip 12 and said square hole 101 and picture and text 13 can occur.
Be stored in the data in server storehouse after the picture and text 13 that will have a square hole read through image read-out, and with these picture and text 13 and X-Y scheme coding corresponding stored in the data in server storehouse.Owing to include square hole in the picture and text; Thereby so even the fake producer can try out X-Y scheme coding download picture and text through the computer program method of exhaustion also to print; But also need punch behind the fake producer to picture and text, because the position in hole is at random with respect to said picture and text, so; The fake producer is difficult to go to beat square hole through the picture and text that show, and has increased cost to the fake producer.For the ease of printing figure message, can adopt first printing figure message, beat the method (also can take earlier punching at random, and then the mode of printing figure message) of square hole again.
As shown in Figure 4, the method for making this antifalsification label is:
S1: printing figure message 13 on the external packing box of product;
S2: beat square hole 101 at random in picture and text 13 zones;
S3: read the picture and text figure that has square hole 101 through image read-out;
S4: the picture and text figure and the X-Y scheme that will have square hole 101 are encoded 11 corresponding stored in database;
S5: paper slip 12 is sticked on the said external packing box 10 at random and covers in said square hole 101 and picture and text 13;
S6: at the X-Y scheme coding 11 of the regional printing stored that is pasted with paper slip 12 in database;
S7: employing X-Y scheme code reading device reads the X-Y scheme coding 11 that is printed on paper slip 12 and the external packing box 10;
S8: obtain the positional information of paper slip 12 and external packing box 10 separatrix 121 in the X-Y scheme coding 11, and this positional information and said X-Y scheme are encoded 11 corresponding stored in database.
The consumer is when carrying out false proof evaluation; The X-Y scheme that the consumer at first adopts image read-out (such as camera or scanner) to read and is printed on paper slip and the external packing box is encoded; And this X-Y scheme coding is sent to the server of network side through wired or wireless mode; Server obtains said X-Y scheme coded image; Whether include the separatrix of paper slip and external packing box in the X-Y scheme coding that the said image read-out of analysis and judgement reads,, then inform that through display device (like the display of computer or the display screen of mobile phone) consumer's X-Y scheme coding is invalid if do not have; If have, then further judge X-Y scheme coded message that said image read-out reads whether with database in the X-Y scheme coded message of storing consistent, as inconsistent, then inform that through display device consumer's X-Y scheme encodes illegal; If any unanimity, the marginal positional information of storing in the separatrix positional information in this X-Y scheme coding that then image read-out is read and the database is compared; Like unanimity, then find out the picture and text with square hole relative, and these picture and text with square hole are shown through display device (the for example screen of display or mobile phone) with this X-Y scheme coded message; At this moment, the consumer compares the picture and text with square hole that identify on the product external packaging box with the picture and text that have square hole that show, if two picture and text are in full accord, shows that then this product is a certified products, if two picture and text are inconsistent, shows that then this product is pseudo-article.
Through at image-text area the hole being set, and the position in hole is a random variation, and the lawless person carries out accurate positional punch through machine again if imitation should be known the position in hole, has increased counterfeit cost, makes security improve more.On the other hand,, improved the inquiry rate of this anti-counterfeiting mark, made anti-forgery security higher owing to after second printing carrier covers picture and text, can so then help the consumer and actively go to carry out the Antiforge inquiry operation through with the prize sign of picture and text as prize drawing.
Said square hole is merely the cited embodiment of the present invention, and its shape can be various, all can like prismatic, triangle and ellipse.
In a word; Above embodiment is only unrestricted in order to technical scheme of the present invention to be described; Although with reference to preferred embodiment the present invention is specified, those of ordinary skill in the art should be appreciated that and can make amendment or be equal to replacement technical scheme of the present invention; And not breaking away from the spirit and the scope of technical scheme of the present invention, it all should be encompassed in the middle of the claim scope of the present invention.

Claims (10)

1. method based on the X-Y scheme encode false-proof, this method comprises: printing X-Y scheme coding on product; Image read-out reads the X-Y scheme coding that is identified on the product; Obtain the X-Y scheme coded message that image read-out reads; Judge said X-Y scheme coded message whether with database in the X-Y scheme coded message of storing consistent; Like unanimity, show that then this product is a certified products, if inconsistent, show that then this product is pseudo-article; It is characterized in that:
Described X-Y scheme is encoded to one, and this X-Y scheme coding is printed on two printing carriers, said second printing carrier stick on first printing carrier on.
2. the method based on the X-Y scheme encode false-proof according to claim 1 is characterized in that, this method further comprises:
Judge in the X-Y scheme coding that said image read-out reads whether include the separatrix of first printing carrier and second printing carrier, and if had would further judge said X-Y scheme coded message whether with database in the X-Y scheme coded message of storing consistent.
3. the method based on the X-Y scheme encode false-proof according to claim 2 is characterized in that, this method further comprises:
At random second printing carrier is bonded on first printing carrier; Said X-Y scheme coding is read through the X-Y scheme code reading device in printing X-Y scheme coding back on two printing carriers; Obtain the marginal position in this X-Y scheme coding, and this positional information and X-Y scheme are encoded corresponding stored in database;
After the X-Y scheme coded message of in X-Y scheme coded message that said image read-out reads and database, storing was consistent, the marginal positional information of storing in the separatrix positional information in the X-Y scheme coding that image read-out is read and the database was compared;
Like unanimity, show that then this product is a certified products, if inconsistent, show that then this product is pseudo-article.
4. the method based on the X-Y scheme encode false-proof according to claim 3 is characterized in that, this method further comprises:
On first printing carrier of product, punch at random; And be benchmark with the hole in the zone at place, hole printing figure message at random; Then second printing carrier is bonded on first printing carrier at random; And second printing carrier covers hole and picture and text, reads the distribution plan and the picture and text in hole through image read-out, and with pore size distribution figure and picture and text and X-Y scheme coding corresponding stored in database;
After the marginal positional information of storing in the separatrix positional information in X-Y scheme that image read-out reads coding and the database is consistent; Find out and this X-Y scheme encode corresponding pore size distribution figure and picture and text, and this pore size distribution figure and picture and text are sent to display device show;
Pore size distribution figure that identifies on the product and picture and text are compared with the pore size distribution figure and the picture and text that show,, show that then this product is a certified products,, show that then this product is pseudo-article if two pore size distribution figure and picture and text are inconsistent if two pore size distribution figure are consistent with picture and text.
5. label based on the X-Y scheme encode false-proof; This label comprises the X-Y scheme coding that is printed on the product; Said X-Y scheme code storage is characterized in that in database described X-Y scheme is encoded to one; And this X-Y scheme coding is printed on two printing carriers, said second printing carrier stick on first printing carrier on.
6. antifalsification label according to claim 5; It is characterized in that; The separatrix of first printing carrier and second printing carrier can be read by image read-out, and positional information and the X-Y scheme of said separatrix in the X-Y scheme coding encoded corresponding stored in database.
7. antifalsification label according to claim 6 is characterized in that, said on first printing carrier and be positioned at the porose and picture and text that distribute under second printing carrier, the distribution plan in said hole and picture and text and X-Y scheme are encoded corresponding stored in database.
8. the method for making based on X-Y scheme encode false-proof label is characterized in that, this method comprises the steps:
At random second printing carrier is bonded on first printing carrier of product; After printing is stored in the X-Y scheme coding in the data on two printing carriers; Read said X-Y scheme coding through the X-Y scheme code reading device; Obtain the marginal position in this X-Y scheme coding, and this positional information and X-Y scheme are encoded corresponding stored in database.
9. the method for making based on X-Y scheme encode false-proof label according to claim 8; It is characterized in that; After printing is stored in the X-Y scheme coding in the data on two printing carriers; Read said X-Y scheme coding through the X-Y scheme code reading device, obtain the marginal position in this X-Y scheme coding, and this positional information and X-Y scheme are encoded corresponding stored in database.
10. the method for making based on X-Y scheme encode false-proof label according to claim 9 is characterized in that, further, this method comprises the steps:
On first printing carrier of product, punch at random; And be benchmark with the hole in the zone at place, hole printing figure message at random; Then second printing carrier is bonded on first printing carrier at random; And second printing carrier covers hole and picture and text, reads the distribution plan and the picture and text in hole through image read-out, and with pore size distribution figure and picture and text and X-Y scheme coding corresponding stored in database.
CN201210296567.9A 2011-11-02 2012-08-15 A kind of method based on X-Y scheme encode false-proof Expired - Fee Related CN102831530B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201110343638.1 2011-11-02
CN201110343638 2011-11-02
CN201210296567.9A CN102831530B (en) 2011-11-02 2012-08-15 A kind of method based on X-Y scheme encode false-proof

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN201510501018.4A CN105205524A (en) 2011-11-02 2012-08-15 Anti-counterfeit label based on two-dimensional graph code
CN201210296567.9A CN102831530B (en) 2011-11-02 2012-08-15 A kind of method based on X-Y scheme encode false-proof
CN201510500049.8A CN105205523A (en) 2011-11-02 2012-08-15 Anti-counterfeit label manufacturing method based on two-dimensional graph code

Related Child Applications (2)

Application Number Title Priority Date Filing Date
CN201510500049.8A Division CN105205523A (en) 2011-11-02 2012-08-15 Anti-counterfeit label manufacturing method based on two-dimensional graph code
CN201510501018.4A Division CN105205524A (en) 2011-11-02 2012-08-15 Anti-counterfeit label based on two-dimensional graph code

Publications (2)

Publication Number Publication Date
CN102831530A true CN102831530A (en) 2012-12-19
CN102831530B CN102831530B (en) 2016-01-06

Family

ID=47334650

Family Applications (3)

Application Number Title Priority Date Filing Date
CN201510501018.4A Pending CN105205524A (en) 2011-11-02 2012-08-15 Anti-counterfeit label based on two-dimensional graph code
CN201510500049.8A Pending CN105205523A (en) 2011-11-02 2012-08-15 Anti-counterfeit label manufacturing method based on two-dimensional graph code
CN201210296567.9A Expired - Fee Related CN102831530B (en) 2011-11-02 2012-08-15 A kind of method based on X-Y scheme encode false-proof

Family Applications Before (2)

Application Number Title Priority Date Filing Date
CN201510501018.4A Pending CN105205524A (en) 2011-11-02 2012-08-15 Anti-counterfeit label based on two-dimensional graph code
CN201510500049.8A Pending CN105205523A (en) 2011-11-02 2012-08-15 Anti-counterfeit label manufacturing method based on two-dimensional graph code

Country Status (2)

Country Link
CN (3) CN105205524A (en)
WO (1) WO2013063871A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109472337A (en) * 2018-11-05 2019-03-15 上海中商网络股份有限公司 A kind of label anti-counterfeit method and apparatus based on random character

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWM469566U (en) * 2013-08-29 2014-01-01 Int Currency Tech Valuable document identification machine for identification using fast response codes
EP3113083A3 (en) 2015-07-01 2017-02-01 Dimitri Marinkin Method for protecting the authenticity of an object, item, document, packaging and/or a label from imitation, forgery and theft
EA031834B1 (en) 2015-07-01 2019-02-28 Дмитрий Маринкин Method for identifying authenticity of an item having security marking on its surface

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1202134A (en) * 1995-11-13 1998-12-16 奥雷尔·菲斯利钞票工程有限公司 Security document with security marking
US20030175608A1 (en) * 2001-12-20 2003-09-18 Fuji Xerox Co., Ltd. Electrophotographic toner, electrophotographic developer and image formation method using the same
CN101013516A (en) * 2007-02-07 2007-08-08 张健 Two-dimensional currency automatic recognition method and system
CN100522648C (en) * 2004-05-05 2009-08-05 德国捷德有限公司 Security document
CN201892956U (en) * 2010-10-25 2011-07-06 中拍讯业(北京)电子商务有限公司 Anti-counterfeiting mark linkage self-destroying device

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2580540Y (en) * 2002-11-28 2003-10-15 淄博泰宝防伪技术产品有限公司 Disposable taking-off coating film stripped anti-fake mark
CN1569492A (en) * 2004-04-29 2005-01-26 张翼鲲 Anti-counterfeit method by merging patterns to check
CN101013539B (en) * 2007-02-08 2010-08-11 李峰 Rationing-cutting type anti-counterfeit structure, producing method and anti-counterfeit method
CN101561863A (en) * 2008-04-14 2009-10-21 北京中科诚通科技发展有限公司 Anti-counterfeit identifying system for identifying anti-counterfeit printed material by mobile phone, scanner and camera
CN101763767A (en) * 2008-12-23 2010-06-30 郑阿奇 Anti-fake identification method with dual encryption code
CN101673387A (en) * 2009-10-23 2010-03-17 深圳劲嘉彩印集团股份有限公司 Commodity digital anti-counterfeit method
CN101976366A (en) * 2010-10-25 2011-02-16 中拍讯业(北京)电子商务有限公司 Linked self-destruction device of anti-counterfeiting mark and anti-counterfeiting verifying method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1202134A (en) * 1995-11-13 1998-12-16 奥雷尔·菲斯利钞票工程有限公司 Security document with security marking
US20030175608A1 (en) * 2001-12-20 2003-09-18 Fuji Xerox Co., Ltd. Electrophotographic toner, electrophotographic developer and image formation method using the same
CN100522648C (en) * 2004-05-05 2009-08-05 德国捷德有限公司 Security document
CN101013516A (en) * 2007-02-07 2007-08-08 张健 Two-dimensional currency automatic recognition method and system
CN201892956U (en) * 2010-10-25 2011-07-06 中拍讯业(北京)电子商务有限公司 Anti-counterfeiting mark linkage self-destroying device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109472337A (en) * 2018-11-05 2019-03-15 上海中商网络股份有限公司 A kind of label anti-counterfeit method and apparatus based on random character

Also Published As

Publication number Publication date
WO2013063871A1 (en) 2013-05-10
CN102831530B (en) 2016-01-06
CN105205523A (en) 2015-12-30
CN105205524A (en) 2015-12-30

Similar Documents

Publication Publication Date Title
CN103093355B (en) A kind of based on two-dimensional code anti-counterfeiting label and label producing method
CN103794135B (en) Carry out generating to the mark formed by dot matrix and Quick Response Code and know method for distinguishing
EP2724332B1 (en) Systems for tracking and authenticating goods
CN202306599U (en) Anti-counterfeit label based on two-dimension code
CN101537751B (en) Novel method for processing anti-counterfeit printing
CN105469132A (en) Duplicate coding internet of things traceability security label and 2-dimensional bar code security traceability method
CN103358741A (en) Shaking jet printing anti-counterfeiting method and marker thereof
CN103903040B (en) Product identification verifies anti-fake label and verification method
CN102831530B (en) A kind of method based on X-Y scheme encode false-proof
CN102354410A (en) Random-texture anti-counterfeit method, system thereof and discriminator
CN102708391A (en) Anti-counterfeiting label on basis of fractal image and anti-counterfeiting verification method
CN104239928B (en) Anti-counterfeiting printed matter and corresponding anti-counterfeiting method
CN102306312A (en) Novel anti-counterfeiting system and method for carrying out identification on anti-counterfeit label
CN204406897U (en) Novel combination type anti-counterfeiting mark
CN202075925U (en) Label with relevant tags in and out of product
CN104240592B (en) The corresponding method for anti-counterfeit of hole grain mirror image
CN103093173A (en) Anti-fake method, anti-fake label and label manufacture method
CN103794134B (en) Generate and the method identifying the mark formed by dot matrix and electronic supervision code
CN103500532A (en) Random embossing touch anti-fake method
CN207133844U (en) A kind of anti-counterfeit printing product
TW201405503A (en) Random embossment tactile feeling counterfeiting method
CN204044849U (en) Product identification checking anti-fake label
CN203422895U (en) Anti-counterfeit label of screen coding
CN102081879B (en) Method for preventing counterfeit by describing superposition state of printed lines and spots and fiber yarns and fiber particles contained in carrier
CN102999771A (en) Commodity anti-counterfeiting code construction and verification method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data
TA01 Transfer of patent application right

Effective date of registration: 20150925

Address after: 518000 Guangdong province Shenzhen Guangming New District Office of Gongming Tian Liao community with the concept of road nineteen, road 10, Kyushu Industrial Park Building 2, seven, 702 and 701A

Applicant after: Shenzhen Xinhuayi Printing Co., Ltd.

Address before: 518000 Baoan North Road, Guangdong, Shenzhen, No. 3039, No.

Applicant before: Feng Lin

CB03 Change of inventor or designer information

Inventor after: Wang Zhusheng

Inventor after: Li Chune

Inventor after: Wang Zhusheng, Wang Xiuzhi, Liu Simin, Lu Honghao, yellow pigeon, Zhang Baotu, Xinhua, Huang Bin, Huang Liansheng, Li Chune, Wang Fengjuan

Inventor after: Wang Xiuzhi

Inventor after: Liu Simin

Inventor after: Lu Honghao

Inventor after: Huang Ge

Inventor after: Zhang Bao

Inventor after: Tu Xinhua

Inventor after: Huang Bin

Inventor after: Huang Liansheng

Inventor before: Feng Lin

Inventor before: Wang Xiaoyu

Inventor before: Chen Hang

Inventor before: Feng Lin, Wang Yi, Chen Hangyue, Gang Gang

C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160106

Termination date: 20160815