CN105205523A - Anti-counterfeit label manufacturing method based on two-dimensional graph code - Google Patents
Anti-counterfeit label manufacturing method based on two-dimensional graph code Download PDFInfo
- Publication number
- CN105205523A CN105205523A CN201510500049.8A CN201510500049A CN105205523A CN 105205523 A CN105205523 A CN 105205523A CN 201510500049 A CN201510500049 A CN 201510500049A CN 105205523 A CN105205523 A CN 105205523A
- Authority
- CN
- China
- Prior art keywords
- scheme
- printing carrier
- printing
- picture
- text
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06046—Constructional details
- G06K19/06056—Constructional details the marking comprising a further embedded marking, e.g. a 1D bar code with the black bars containing a smaller sized coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/08—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
- G06K19/10—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards
- G06K19/18—Constructional details
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/70—Arrangements for image or video recognition or understanding using pattern recognition or machine learning
- G06V10/74—Image or video pattern matching; Proximity measures in feature spaces
- G06V10/75—Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video features; Coarse-fine approaches, e.g. multi-scale approaches; using context analysis; Selection of dictionaries
- G06V10/757—Matching configurations of points or features
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/80—Recognising image objects characterised by unique random patterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/003—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/95—Pattern authentication; Markers therefor; Forgery detection
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Computing Systems (AREA)
- Evolutionary Computation (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Software Systems (AREA)
- Artificial Intelligence (AREA)
- Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Editing Of Facsimile Originals (AREA)
- Credit Cards Or The Like (AREA)
Abstract
The invention relates to an anti-counterfeit label manufacturing method based on a two-dimensional graph code. Through the method, through whether a first printing carrier and a second printing carrier have a boundary or not, a two-dimensional graph code image generated by a computer can be distinguished from a two-dimensional graph code image read by an image reading device, so a problem that a two-dimensional graph code database can be cracked by lawless persons through a method of exhaustion can be solved; the second printing carrier is randomly pasted on the first printing carrier, the boundaries of the first printing carrier and the second printing carrier and relative position information of the two-dimensional graph code images are stored in the data, whether positions of the boundaries are consistent are analyzed and determined, so counterfeit labels are prevented from being manufactured by the lawless persons through simulating a label manufacturing method. Punching is carried out in picture and text areas, positions of holes are changed randomly, the lawless persons who simulate the labels are required to know about the positions of the holes and to punch and position accurately through a machine, through the method, counterfeit cost for the lawless persons increases.
Description
[technical field]
The present invention relates to a kind of method for anti-counterfeit, label and label producing method, particularly one is based on X-Y scheme encode false-proof label producing method.
[background technology]
False proof is to solve a problem, both not easily forges, and is easy to again identify.False proof object is mainly in order to distinguish the product of different businessman.At computing machine, before network and 3C technical development maturation, false proof method mainly consumer directly by naked eyes without the need to can realize the identification of the true and false by means of instrument, the principle of this anti-counterfeiting technology makes anti-false sign by special printing technology, as holographic false proof, because this printing technology is more difficult, particularly template is difficult to plagiarize, so false proof cost is very high, be difficult to know template by reverse-engineering by the finished product after printing, so antifalsification is still very high, but exactly because its template is difficult to prevent, and printing cost is high, so be difficult to print different holograms to each product, a same hologram can be printed on a large amount of products, as long as if so its template can be cracked, it will be very huge by counterfeit the loss formed.
Along with the development of science and technology, be difficult to by means of only naked eyes directly to go out the true and false respectively, so need by special instrument and equipment, this false proof be the distinctive mark utilizing special equipment and process to make, such as laser anti-counterfeit code, recessive ink false proof, super false proof, reticulate pattern is false proof, because this anti-counterfeiting characteristic is with the naked eye difficult to identify, need to go out the true and false respectively with special testing instruments, so its applicability is wideless, the false proof of valuables can only be used for.
Along with computing machine, the development of internet and 3C technology, people start to tell truth from falsehood by remote server, such as cipher counterfeit-proof technology, it compiles set of number random cipher to product, this password is imprinted on mark go up and hide, simultaneously by this password stored in can for consumer query Computer Database in, consumer passes through phone after purchase product, fax or the Internet, password on marker is torn input and compares identification, identical is exactly genuine, different false, and this password is through, and complex calculation obtains, be difficult to extrapolate its algorithm by password, also be just difficult to know other all correct passwords by a password, there is certain antifalsification.But because a series of numeral can be cracked by computer program exhaust algorithm, so its antifalsification is not high yet.
In order to prevent lawless person from cracking numerical ciphers by the computer program method of exhaustion, people introduce X-Y scheme encode false-proof technology.The chequered with black and white graphic recording data symbol information that distributes in plane (on two-dimensional directional) according to certain rules with certain specific geometric figure; Coding utilizes the concept of " 0 ", " 1 " bit stream forming computer-internal logical foundations dexterously, the geometrical body using several corresponding with scale-of-two is to represent word numerical information, automatically processed to realize information by image input device or photoelectric scanning device automatically identifying and reading: two-dimensional bar code/X-Y scheme coding in horizontal and vertical two orientation expressing information simultaneously, therefore can express a large amount of information in very little area.So X-Y scheme coding not only can carry out identification to each commodity, can also carry out anti-counterfeiting mark.Although X-Y scheme coding is compared numerical code and is more difficult to be cracked by computer program, but the numerical coding that X-Y scheme coding essence is still made up of " 0 " and " 1 ", or can be cracked by the method for exhaustion of computer program, on the other hand, X-Y scheme coded scanning and then print still can be carried out counterfeit by lawless person, so its security is not also high especially.
Printing is replicated in order to prevent figure, people contemplate a kind of method by texture anti-fake, mainly anti-counterfeiting characteristic-numerical ciphers that code anti-fake prints is become the structural texture that the mark material of non-artificial manufacture is intrinsic, stored in the database that can inquire about after scanning by people's figure of having a mind on the paper of fabricated ribbon fiber, then anti-false sign is divided into 12 lattices, consume by these 12 lattices of Help by Phone with or without fiber or check its figure and identify true and false, although this method prevents lawless person's copy pattern, but because its polling routine is also very complicated, very complicated by contrast, consumer query rate is also very low, a large amount of markers is not queried, being equal to nothing, it is false proof to use.
Sum up existing anti-counterfeiting technology, inventor thinks, a good anti-counterfeiting technology must possess following key element:
1. consumer easily recognizes (texture described above identification is then too complicated), without the need to by instrument, or by simple instrument; 2. consumer easily obtains (as by mobile phone) to real information, and is compared by the product in itself and hand; 3. mark easily printing, and easily make, such low production cost; 4. the manufacturing technology of mark itself does not use reverse-engineering principle to obtain by identifying; 5. the mark of each product is different, and the cost that such lawless person copies can be very high.
And existing anti-counterfeiting technology all can not reach some above-mentioned requirement, so its false proof security is not high.
[summary of the invention]
Object of the present invention is exactly to solve prior art Problems existing, proposes a kind of method based on X-Y scheme encode false-proof, label and label producing method.
Concrete technical scheme of the present invention is as follows:
The invention provides a kind of method based on X-Y scheme encode false-proof, the method comprises: on product, print X-Y scheme coding; Image read-out reads the X-Y scheme coding be identified on product; Obtain the X-Y scheme coded message that image read-out reads; Judge that whether described X-Y scheme coded message is consistent with the X-Y scheme coded message stored in database; As unanimously, then show that this product is certified products, if inconsistent, then show that this product is adulterant; It is characterized in that:
Described X-Y scheme is encoded to one, and this X-Y scheme coding is printed on two printing carriers, and described second printing carrier is pasted onto the upper of the first printing carrier.
The method comprises further:
Judge the separatrix whether including the first printing carrier and the second printing carrier in the X-Y scheme coding that described image read-out reads, if had, judge that whether described X-Y scheme coded message is consistent with the X-Y scheme coded message stored in database further.
The method comprises further:
At random the second printing carrier is bonded on the first printing carrier, described X-Y scheme coding is read by X-Y scheme code reading device after two printing carriers print X-Y scheme coding, obtain the marginal position in this X-Y scheme coding, and this positional information and X-Y scheme are encoded corresponding stored in a database;
After the X-Y scheme coded message read at described image read-out is consistent with the X-Y scheme coded message stored in database, the separatrix positional information in the X-Y scheme coding read by image read-out is compared with the marginal positional information stored in database;
As unanimously, then show that this product is certified products, if inconsistent, then show that this product is adulterant.
The method comprises further:
Punch on the first printing carrier of product at random, and take hole as the region stochastic print picture and text of benchmark at place, hole, then the second printing carrier is bonded on the first printing carrier at random, and hole and picture and text cover by the second printing carrier, read the distribution plan in hole and picture and text by image read-out, and pore size distribution figure and picture and text and X-Y scheme are encoded corresponding stored in a database;
After separatrix positional information in the X-Y scheme coding that image read-out reads is consistent with the marginal positional information stored in database, find out the pore size distribution figure and picture and text encoding corresponding with this X-Y scheme, and send to display device to show in this pore size distribution figure and picture and text;
The pore size distribution figure that product identifies is compared with picture and text with the pore size distribution figure shown with picture and text, if two pore size distribution figure are consistent with picture and text, then shows that this product is certified products, if two pore size distribution figure and picture and text inconsistent, then show that this product is adulterant.
The present invention also provides a kind of label based on X-Y scheme encode false-proof, this label comprises the X-Y scheme coding be printed on product, described X-Y scheme code storage in a database, it is characterized in that, described X-Y scheme is encoded to one, and this X-Y scheme coding is printed on two printing carriers, and described second printing carrier is pasted onto the upper of the first printing carrier.
The separatrix of the first printing carrier and the second printing carrier can read by image read-out, and the positional information of described separatrix in X-Y scheme coding and X-Y scheme encode corresponding stored in a database.
Describedly on the first printing carrier, be positioned at the porose and picture and text that to distribute immediately below the second printing carrier, the distribution plan in described hole and picture and text and X-Y scheme encode corresponding stored in a database.
The present invention separately provides a kind of method for making based on X-Y scheme encode false-proof label, and it is characterized in that, the method comprises the steps:
At random the second printing carrier is bonded on the first printing carrier of product, after on two printing carriers, printing stores X-Y scheme coding in the data, described X-Y scheme coding is read by X-Y scheme code reading device, obtain the marginal position in this X-Y scheme coding, and this positional information and X-Y scheme are encoded corresponding stored in a database.
After on two printing carriers, printing stores X-Y scheme coding in the data, described X-Y scheme coding is read by X-Y scheme code reading device, obtain the marginal position in this X-Y scheme coding, and this positional information and X-Y scheme are encoded corresponding stored in a database.
Further, the method comprises the steps:
Punch on the first printing carrier of product at random, and take hole as the region stochastic print picture and text of benchmark at place, hole, then the second printing carrier is bonded on the first printing carrier at random, and hole and picture and text cover by the second printing carrier, read the distribution plan in hole and picture and text by image read-out, and pore size distribution figure and picture and text and X-Y scheme are encoded corresponding stored in a database.
The technique effect that the present invention is useful is:
Due to the first printing carrier and the second printing carrier not at grade, so its separatrix can be read by image read-out, by marginal with or without thus the X-Y scheme coded image that the X-Y scheme coded image of Practical computer teaching and image read-out read can be distinguished, thus avoid the problem of lawless person by Practical computer teaching X-Y scheme coded image, can prevent lawless person from cracking the problem in X-Y scheme coded data storehouse by the method for exhaustion, improve security of the present invention.
Owing at random the second printing carrier being bonded on the first printing carrier, and the first printing carrier and the separatrix of the second printing carrier and the relative position information of X-Y scheme coded image are stored in the data, and analyze and judge that whether marginal position is consistent, so just can prevent lawless person from removing to make the label of personation by the manufacturing process of imitating label.
By punching at image-text area, and the position in hole is random variation, if lawless person will imitate the position should knowing hole, carries out accurate positional punch again by machine, adds counterfeit cost, and security is improved more.
On the other hand, after picture and text cover by the second printing carrier, by using the prize mark of picture and text as prize drawing, so then can be conducive to consumer and actively go to carry out Antiforge inquiry operation, improve the query rate of this anti-counterfeiting mark, make anti-forgery security higher.
The various advantages of cumulated volume invention anti-counterfeiting technology: 1. consumer easily recognizes, only need can realize Antiforge inquiry by common instrument (as mobile phone); 2. consumer easily gets real information (passing through mobile phone), and is compared by the product in itself and hand; 3. mark easily printing, and easily make, such low production cost; 4. the manufacturing technology of mark itself does not use reverse-engineering principle to obtain by identifying; 5. the mark of each product is different, and the cost that such lawless person copies can be very high.By above-mentioned various means, leak counterfeit for lawless person is all blocked, make counterfeit possibility almost nil, and counterfeit cost is very huge, and the production cost of legal manufacturer is very low.So method for anti-counterfeit of the present invention is with low cost, security is very high.
[accompanying drawing explanation]
Fig. 1 is that the label spatial structure of the embodiment of the present invention 1 launches schematic diagram;
Fig. 2 is the method flow diagram of the forming label of the embodiment of the present invention 1;
Fig. 3 is that the label spatial structure of the embodiment of the present invention 2 launches schematic diagram;
Fig. 4 is the method flow diagram of the forming label of the embodiment of the present invention 2.
[embodiment]
In order to make the object of invention, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not used for limiting the present invention.
Embodiment 1
As shown in Figure 1, a kind of antifalsification label based on X-Y scheme coding, this label comprises the X-Y scheme coding 11 being printed on and product external packaging box 10 (also can be printed on the shell of product), and described X-Y scheme coding 11 is stored in the database of server.The core of described X-Y scheme coding 11 is printed on paper slip 12 that external packing box is pasted, and the periphery of described X-Y scheme coding 11 is printed on described external packing box 10, and described paper slip 12 is frangible subsides, is bonded on described external packing box 10.
Between described paper slip 12 and external packing box 10, there is separatrix 121, described paper slip 12 is bonded on external packing box 10 at random, so the relative position of separatrix in X-Y scheme coded image is random variation, the relative position information of this separatrix in X-Y scheme coded image and X-Y scheme encode corresponding stored in server in database.
Because X-Y scheme coding 11 is printed on two printing carriers be in Different Plane, and two different printing carriers have separatrix, by marginal with or without judging that described X-Y scheme coding is printed on two different printing carriers, or on same printing carrier, can prevent lawless person from then carrying out the method for exhaustion by software process quality X-Y scheme coding like this and carry out trial checking.If lawless person wants by checking, by X-Y scheme code printing on two printing carriers, and then must read X-Y scheme coding by image read-out, then carry out trial checking, this adds huge cost to fake producer undoubtedly.
As shown in Figure 2, the method making this antifalsification label is:
S1: paper slip 12 is pasted onto at random on described external packing box 10;
S2: print the X-Y scheme coding 11 stored in a database in the region being pasted with paper slip 12;
S3: the X-Y scheme be printed on paper slip 12 and external packing box 10 encodes 11 to adopt X-Y scheme code reading device to read;
S4: the positional information obtaining paper slip 12 and external packing box 10 separatrix 121 in X-Y scheme coding 11, and this positional information and described X-Y scheme are encoded 11 corresponding stored in a database.
Consumer is when carrying out authentication, first consumer adopts image read-out (such as camera or scanner) to read, and the X-Y scheme be printed on paper slip and external packing box is encoded, and this X-Y scheme coding is sent to the server of network side by wired or wireless mode, server obtains described X-Y scheme coded image, analyze the separatrix whether including paper slip and external packing box in the X-Y scheme coding judging that described image read-out reads, if do not had, then inform that consumer's X-Y scheme coding is invalid by display device (as the display of computer or the display screen of mobile phone), if had, then judge that whether the X-Y scheme coded message that described image read-out reads is consistent with the X-Y scheme coded message stored in database further, as inconsistent, then inform that consumer's X-Y scheme coding is illegal by display device, if any unanimously, then the separatrix positional information in this X-Y scheme coding read by image read-out is compared with the marginal positional information stored in database, as unanimously, then show that this product is certified products, if two positions are inconsistent, then show that this product is adulterant.
Owing at random paper slip being bonded on external packing box, and the first printing is carried-body and the separatrix of the second printing carrier and the relative position information of X-Y scheme coded image store in the data, and analyze and judge that whether marginal position is consistent, so just can prevent lawless person from removing to make the label of personation by the manufacturing process of imitating label.
Embodiment 2
On the basis of above-described embodiment 1, the present embodiment proposes the method for making of another method for anti-counterfeit, label and this label.As shown in Figure 3, be positioned at immediately below described paper slip 12, the external packing box 10 of described product is also provided with a square hole 101.This square hole 101 beats on the described position of this external packing box at random by perforating device (comprise laser and burn shell punch device and pin type perforating device), (picture and text in the present embodiment are a bird to region stochastic print picture and text 13 at square hole place, in fact, also can be other picture and text, and the picture and text of each product are also not quite similar), these picture and text 13 are take square hole as benchmark stochastic print in the region at square hole place.Described square hole 101 covers in by described paper slip 12 together with described picture and text 13, tears described paper slip 12 and can occur described square hole 101 and picture and text 13.
Be stored in the database of server after the picture and text 13 with square hole are read by image read-out, and these picture and text 13 are encoded corresponding stored in the database of server with X-Y scheme.Owing to including square hole in picture and text, so namely fake producer allows to try out X-Y scheme coding by the computer program method of exhaustion thus download picture and text and print, but also need after fake producer to punch to picture and text, because the position in hole is random relative to described picture and text, so, fake producer's picture and text be difficult to by showing go to beat square hole, add cost to fake producer.For the ease of printing figure message, first printing figure message can be adopted, then beat the method (also can take first random punching, and then the mode of printing figure message) of square hole.
As shown in Figure 4, the method making this antifalsification label is:
S1: printing figure message 13 on the external packing box of product;
S2: beat square hole 101 at random in picture and text 13 region;
S3: read the picture and text figure with square hole 101 by image read-out;
S4: encode 11 corresponding stored in a database by with the picture and text figure of square hole 101 and X-Y scheme;
S5: paper slip 12 to be pasted onto at random on described external packing box 10 and to cover in described square hole 101 and picture and text 13;
S6: print the X-Y scheme coding 11 stored in a database in the region being pasted with paper slip 12;
S7: the X-Y scheme be printed on paper slip 12 and external packing box 10 encodes 11 to adopt X-Y scheme code reading device to read;
S8: the positional information obtaining paper slip 12 and external packing box 10 separatrix 121 in X-Y scheme coding 11, and this positional information and described X-Y scheme are encoded 11 corresponding stored in a database.
Consumer is when carrying out authentication, first consumer adopts image read-out (such as camera or scanner) to read, and the X-Y scheme be printed on paper slip and external packing box is encoded, and this X-Y scheme coding is sent to the server of network side by wired or wireless mode, server obtains described X-Y scheme coded image, analyze the separatrix whether including paper slip and external packing box in the X-Y scheme coding judging that described image read-out reads, if do not had, then inform that consumer's X-Y scheme coding is invalid by display device (as the display of computer or the display screen of mobile phone), if had, then judge that whether the X-Y scheme coded message that described image read-out reads is consistent with the X-Y scheme coded message stored in database further, as inconsistent, then inform that consumer's X-Y scheme coding is illegal by display device, if any unanimously, then the separatrix positional information in this X-Y scheme coding read by image read-out is compared with the marginal positional information stored in database, as unanimously, then find out the picture and text with square hole relative with this X-Y scheme coded message, and the picture and text this with square hole are shown by display device (screen of such as display or mobile phone), now, consumer by the picture and text with square hole that product external packaging box identifies with show with square hole picture and text compared with, if two picture and text are completely the same, then show that this product is certified products, if two picture and text are inconsistent, then show that this product is adulterant.
By in image-text area providing holes, and the position in hole is random variation, if lawless person will imitate the position should knowing hole, carries out accurate positional punch again by machine, adds counterfeit cost, and security is improved more.On the other hand, after picture and text cover by the second printing carrier, by using the prize mark of picture and text as prize drawing, so then can be conducive to consumer and actively go to carry out Antiforge inquiry operation, improve the query rate of this anti-counterfeiting mark, make anti-forgery security higher.
Described square hole is only the embodiment cited by the present invention, and its shape can be various, as prismatic, triangle and ellipse.
In a word, above embodiment is only in order to illustrate technical scheme of the present invention and unrestricted, although with reference to preferred embodiment to invention has been detailed description, those of ordinary skill in the art is to be understood that, can modify to technical scheme of the present invention or equivalent replacement, and not departing from the spirit and scope of technical solution of the present invention, it all should be encompassed in the middle of right of the present invention.
Claims (2)
1. based on a method for making for X-Y scheme encode false-proof label, it is characterized in that, the method comprises the steps:
At random the second printing carrier is bonded on the first printing carrier of product, X-Y scheme coding comprises core and periphery, and core and the periphery of this X-Y scheme coding are printed on two printing carriers respectively, described core is printed on the second printing carrier, and described periphery is printed on the first printing carrier; After on two printing carriers, printing stores X-Y scheme coding in a database, described X-Y scheme coding is read by X-Y scheme code reading device, obtain the marginal relative position information in this X-Y scheme coding, and this relative position information and X-Y scheme are encoded corresponding stored in a database.
2. the method for making based on X-Y scheme encode false-proof label according to claim 1, is characterized in that, further, the method also comprises the steps:
Punch on the first printing carrier of product at random, and take hole as the region stochastic print picture and text of benchmark at place, hole, then the second printing carrier is bonded on the first printing carrier at random, and hole and picture and text cover by the second printing carrier, read the distribution plan in hole and picture and text by image read-out, and pore size distribution figure and picture and text and X-Y scheme are encoded corresponding stored in a database.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510500049.8A CN105205523A (en) | 2011-11-02 | 2012-08-15 | Anti-counterfeit label manufacturing method based on two-dimensional graph code |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011103436381 | 2011-11-02 | ||
CN201110343638 | 2011-11-02 | ||
CN201510500049.8A CN105205523A (en) | 2011-11-02 | 2012-08-15 | Anti-counterfeit label manufacturing method based on two-dimensional graph code |
CN201210296567.9A CN102831530B (en) | 2011-11-02 | 2012-08-15 | A kind of method based on X-Y scheme encode false-proof |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210296567.9A Division CN102831530B (en) | 2011-11-02 | 2012-08-15 | A kind of method based on X-Y scheme encode false-proof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105205523A true CN105205523A (en) | 2015-12-30 |
Family
ID=47334650
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510500049.8A Pending CN105205523A (en) | 2011-11-02 | 2012-08-15 | Anti-counterfeit label manufacturing method based on two-dimensional graph code |
CN201210296567.9A Expired - Fee Related CN102831530B (en) | 2011-11-02 | 2012-08-15 | A kind of method based on X-Y scheme encode false-proof |
CN201510501018.4A Pending CN105205524A (en) | 2011-11-02 | 2012-08-15 | Anti-counterfeit label based on two-dimensional graph code |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210296567.9A Expired - Fee Related CN102831530B (en) | 2011-11-02 | 2012-08-15 | A kind of method based on X-Y scheme encode false-proof |
CN201510501018.4A Pending CN105205524A (en) | 2011-11-02 | 2012-08-15 | Anti-counterfeit label based on two-dimensional graph code |
Country Status (2)
Country | Link |
---|---|
CN (3) | CN105205523A (en) |
WO (1) | WO2013063871A1 (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWM469566U (en) * | 2013-08-29 | 2014-01-01 | Int Currency Tech | Valuable document identification machine for identification using fast response codes |
EP3113083A3 (en) | 2015-07-01 | 2017-02-01 | Dimitri Marinkin | Method for protecting the authenticity of an object, item, document, packaging and/or a label from imitation, forgery and theft |
EA031834B1 (en) | 2015-07-01 | 2019-02-28 | Дмитрий Маринкин | Method for identifying authenticity of an item having security marking on its surface |
CN109472337B (en) * | 2018-11-05 | 2023-07-04 | 上海中商网络股份有限公司 | Label anti-counterfeiting method and device based on random characteristics |
CN113568155A (en) * | 2021-06-21 | 2021-10-29 | 深圳视见医疗科技有限公司 | Glass slide |
CN116227524B (en) * | 2023-05-05 | 2023-08-08 | 杭州蚂蚁酷爱科技有限公司 | Anti-fake code generation and verification method and label-based anti-fake system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN2580540Y (en) * | 2002-11-28 | 2003-10-15 | 淄博泰宝防伪技术产品有限公司 | Disposable taking-off coating film stripped anti-fake mark |
CN1569492A (en) * | 2004-04-29 | 2005-01-26 | 张翼鲲 | Anti-counterfeit method by merging patterns to check |
CN101013516A (en) * | 2007-02-07 | 2007-08-08 | 张健 | Two-dimensional currency automatic recognition method and system |
CN101013539A (en) * | 2007-02-08 | 2007-08-08 | 陈艳存 | Rationing-cutting type anti-counterfeit structure, producing method and anti-counterfeit method |
CN101561863A (en) * | 2008-04-14 | 2009-10-21 | 北京中科诚通科技发展有限公司 | Anti-counterfeit identifying system for identifying anti-counterfeit printed material by mobile phone, scanner and camera |
CN101673387A (en) * | 2009-10-23 | 2010-03-17 | 深圳劲嘉彩印集团股份有限公司 | Commodity digital anti-counterfeit method |
CN201892956U (en) * | 2010-10-25 | 2011-07-06 | 中拍讯业(北京)电子商务有限公司 | Anti-counterfeiting mark linkage self-destroying device |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1065821C (en) * | 1995-11-13 | 2001-05-16 | 奥雷尔·菲斯利钞票工程有限公司 | Security document with security marking |
JP3882609B2 (en) * | 2001-12-20 | 2007-02-21 | 富士ゼロックス株式会社 | Electrophotographic toner, electrophotographic developer, and image forming method using the same |
CN100522648C (en) * | 2004-05-05 | 2009-08-05 | 德国捷德有限公司 | Security document |
CN101763767A (en) * | 2008-12-23 | 2010-06-30 | 郑阿奇 | Anti-fake identification method with dual encryption code |
CN101976366A (en) * | 2010-10-25 | 2011-02-16 | 中拍讯业(北京)电子商务有限公司 | Linked self-destruction device of anti-counterfeiting mark and anti-counterfeiting verifying method |
-
2012
- 2012-01-10 WO PCT/CN2012/070164 patent/WO2013063871A1/en active Application Filing
- 2012-08-15 CN CN201510500049.8A patent/CN105205523A/en active Pending
- 2012-08-15 CN CN201210296567.9A patent/CN102831530B/en not_active Expired - Fee Related
- 2012-08-15 CN CN201510501018.4A patent/CN105205524A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN2580540Y (en) * | 2002-11-28 | 2003-10-15 | 淄博泰宝防伪技术产品有限公司 | Disposable taking-off coating film stripped anti-fake mark |
CN1569492A (en) * | 2004-04-29 | 2005-01-26 | 张翼鲲 | Anti-counterfeit method by merging patterns to check |
CN101013516A (en) * | 2007-02-07 | 2007-08-08 | 张健 | Two-dimensional currency automatic recognition method and system |
CN101013539A (en) * | 2007-02-08 | 2007-08-08 | 陈艳存 | Rationing-cutting type anti-counterfeit structure, producing method and anti-counterfeit method |
CN101561863A (en) * | 2008-04-14 | 2009-10-21 | 北京中科诚通科技发展有限公司 | Anti-counterfeit identifying system for identifying anti-counterfeit printed material by mobile phone, scanner and camera |
CN101673387A (en) * | 2009-10-23 | 2010-03-17 | 深圳劲嘉彩印集团股份有限公司 | Commodity digital anti-counterfeit method |
CN201892956U (en) * | 2010-10-25 | 2011-07-06 | 中拍讯业(北京)电子商务有限公司 | Anti-counterfeiting mark linkage self-destroying device |
Also Published As
Publication number | Publication date |
---|---|
CN102831530B (en) | 2016-01-06 |
CN105205524A (en) | 2015-12-30 |
CN102831530A (en) | 2012-12-19 |
WO2013063871A1 (en) | 2013-05-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103093355B (en) | A kind of based on two-dimensional code anti-counterfeiting label and label producing method | |
CN102831530B (en) | A kind of method based on X-Y scheme encode false-proof | |
CN106782035B (en) | Sawtooth code anti-counterfeiting method | |
US10235618B2 (en) | Authentication feature in a barcode | |
CN103093173A (en) | Anti-fake method, anti-fake label and label manufacture method | |
CN106682912A (en) | Method and apparatus for authentication of 3D structure | |
CN202306599U (en) | Anti-counterfeit label based on two-dimension code | |
CN105469132A (en) | Duplicate coding internet of things traceability security label and 2-dimensional bar code security traceability method | |
CN103208067B (en) | Antiforge system and the formation of label thereof, embed, understand, differentiate and ownership change method | |
CN103390183A (en) | Generation method for anti-fake code applied to mobile phone recognition | |
WO2006106677A1 (en) | Printed matter, method and device for detecting such printed matter, and authentication method and device | |
CN103390187A (en) | Packaging box on basis of two-dimensional codes and having verification function and achieving method thereof | |
CN101561863A (en) | Anti-counterfeit identifying system for identifying anti-counterfeit printed material by mobile phone, scanner and camera | |
CN101587663A (en) | Strip encrypting fake-proof | |
CN104233907B (en) | There is cheque paper of intelligent micro Quick Response Code and its preparation method and application | |
CN109472335A (en) | A kind of lottery ticket anti-counterfeiting system and method for anti-counterfeit | |
US20150076219A1 (en) | Tactile anti-forgery method using random emboss | |
CN102306312A (en) | Novel anti-counterfeiting system and method for carrying out identification on anti-counterfeit label | |
CN104239928B (en) | Anti-counterfeiting printed matter and corresponding anti-counterfeiting method | |
CN103761657A (en) | Random characteristic information anti-counterfeiting method | |
CN102799917A (en) | Anti-counterfeiting method for random color graphics of computers implemented by using screen code control method | |
CN103390184A (en) | Image information embedding method suitable for anti-fake codes identified through mobile phone | |
CN205028583U (en) | Antifalsification label based on two -dimensional code combines together with fingerprint | |
CN103500532A (en) | Random embossing touch anti-fake method | |
CN103794134B (en) | Generate and the method identifying the mark formed by dot matrix and electronic supervision code |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20171214 Address after: 362216 Fujian city of Quanzhou province Jinjiang city Luoshan Street Building No. 1208 Aetna world city Applicant after: Quanzhou Intelligent Technology Co., Ltd. Address before: 518000 Guangdong city of Shenzhen province Futian District Binjiang Binhe Village East 8 Building 502 Applicant before: Feng Lin |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20151230 |