CN105205523A - Anti-counterfeit label manufacturing method based on two-dimensional graph code - Google Patents

Anti-counterfeit label manufacturing method based on two-dimensional graph code Download PDF

Info

Publication number
CN105205523A
CN105205523A CN201510500049.8A CN201510500049A CN105205523A CN 105205523 A CN105205523 A CN 105205523A CN 201510500049 A CN201510500049 A CN 201510500049A CN 105205523 A CN105205523 A CN 105205523A
Authority
CN
China
Prior art keywords
scheme
printing carrier
printing
picture
text
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510500049.8A
Other languages
Chinese (zh)
Inventor
冯林
王筱雨
陈航
岳铁刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Quanzhou Intelligent Technology Co., Ltd.
Original Assignee
冯林
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 冯林 filed Critical 冯林
Priority to CN201510500049.8A priority Critical patent/CN105205523A/en
Publication of CN105205523A publication Critical patent/CN105205523A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • G06K19/06056Constructional details the marking comprising a further embedded marking, e.g. a 1D bar code with the black bars containing a smaller sized coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/08Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
    • G06K19/10Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards
    • G06K19/18Constructional details
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/74Image or video pattern matching; Proximity measures in feature spaces
    • G06V10/75Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video features; Coarse-fine approaches, e.g. multi-scale approaches; using context analysis; Selection of dictionaries
    • G06V10/757Matching configurations of points or features
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/80Recognising image objects characterised by unique random patterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/003Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/95Pattern authentication; Markers therefor; Forgery detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Evolutionary Computation (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Software Systems (AREA)
  • Artificial Intelligence (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

The invention relates to an anti-counterfeit label manufacturing method based on a two-dimensional graph code. Through the method, through whether a first printing carrier and a second printing carrier have a boundary or not, a two-dimensional graph code image generated by a computer can be distinguished from a two-dimensional graph code image read by an image reading device, so a problem that a two-dimensional graph code database can be cracked by lawless persons through a method of exhaustion can be solved; the second printing carrier is randomly pasted on the first printing carrier, the boundaries of the first printing carrier and the second printing carrier and relative position information of the two-dimensional graph code images are stored in the data, whether positions of the boundaries are consistent are analyzed and determined, so counterfeit labels are prevented from being manufactured by the lawless persons through simulating a label manufacturing method. Punching is carried out in picture and text areas, positions of holes are changed randomly, the lawless persons who simulate the labels are required to know about the positions of the holes and to punch and position accurately through a machine, through the method, counterfeit cost for the lawless persons increases.

Description

A kind of method for making based on X-Y scheme encode false-proof label
[technical field]
The present invention relates to a kind of method for anti-counterfeit, label and label producing method, particularly one is based on X-Y scheme encode false-proof label producing method.
[background technology]
False proof is to solve a problem, both not easily forges, and is easy to again identify.False proof object is mainly in order to distinguish the product of different businessman.At computing machine, before network and 3C technical development maturation, false proof method mainly consumer directly by naked eyes without the need to can realize the identification of the true and false by means of instrument, the principle of this anti-counterfeiting technology makes anti-false sign by special printing technology, as holographic false proof, because this printing technology is more difficult, particularly template is difficult to plagiarize, so false proof cost is very high, be difficult to know template by reverse-engineering by the finished product after printing, so antifalsification is still very high, but exactly because its template is difficult to prevent, and printing cost is high, so be difficult to print different holograms to each product, a same hologram can be printed on a large amount of products, as long as if so its template can be cracked, it will be very huge by counterfeit the loss formed.
Along with the development of science and technology, be difficult to by means of only naked eyes directly to go out the true and false respectively, so need by special instrument and equipment, this false proof be the distinctive mark utilizing special equipment and process to make, such as laser anti-counterfeit code, recessive ink false proof, super false proof, reticulate pattern is false proof, because this anti-counterfeiting characteristic is with the naked eye difficult to identify, need to go out the true and false respectively with special testing instruments, so its applicability is wideless, the false proof of valuables can only be used for.
Along with computing machine, the development of internet and 3C technology, people start to tell truth from falsehood by remote server, such as cipher counterfeit-proof technology, it compiles set of number random cipher to product, this password is imprinted on mark go up and hide, simultaneously by this password stored in can for consumer query Computer Database in, consumer passes through phone after purchase product, fax or the Internet, password on marker is torn input and compares identification, identical is exactly genuine, different false, and this password is through, and complex calculation obtains, be difficult to extrapolate its algorithm by password, also be just difficult to know other all correct passwords by a password, there is certain antifalsification.But because a series of numeral can be cracked by computer program exhaust algorithm, so its antifalsification is not high yet.
In order to prevent lawless person from cracking numerical ciphers by the computer program method of exhaustion, people introduce X-Y scheme encode false-proof technology.The chequered with black and white graphic recording data symbol information that distributes in plane (on two-dimensional directional) according to certain rules with certain specific geometric figure; Coding utilizes the concept of " 0 ", " 1 " bit stream forming computer-internal logical foundations dexterously, the geometrical body using several corresponding with scale-of-two is to represent word numerical information, automatically processed to realize information by image input device or photoelectric scanning device automatically identifying and reading: two-dimensional bar code/X-Y scheme coding in horizontal and vertical two orientation expressing information simultaneously, therefore can express a large amount of information in very little area.So X-Y scheme coding not only can carry out identification to each commodity, can also carry out anti-counterfeiting mark.Although X-Y scheme coding is compared numerical code and is more difficult to be cracked by computer program, but the numerical coding that X-Y scheme coding essence is still made up of " 0 " and " 1 ", or can be cracked by the method for exhaustion of computer program, on the other hand, X-Y scheme coded scanning and then print still can be carried out counterfeit by lawless person, so its security is not also high especially.
Printing is replicated in order to prevent figure, people contemplate a kind of method by texture anti-fake, mainly anti-counterfeiting characteristic-numerical ciphers that code anti-fake prints is become the structural texture that the mark material of non-artificial manufacture is intrinsic, stored in the database that can inquire about after scanning by people's figure of having a mind on the paper of fabricated ribbon fiber, then anti-false sign is divided into 12 lattices, consume by these 12 lattices of Help by Phone with or without fiber or check its figure and identify true and false, although this method prevents lawless person's copy pattern, but because its polling routine is also very complicated, very complicated by contrast, consumer query rate is also very low, a large amount of markers is not queried, being equal to nothing, it is false proof to use.
Sum up existing anti-counterfeiting technology, inventor thinks, a good anti-counterfeiting technology must possess following key element:
1. consumer easily recognizes (texture described above identification is then too complicated), without the need to by instrument, or by simple instrument; 2. consumer easily obtains (as by mobile phone) to real information, and is compared by the product in itself and hand; 3. mark easily printing, and easily make, such low production cost; 4. the manufacturing technology of mark itself does not use reverse-engineering principle to obtain by identifying; 5. the mark of each product is different, and the cost that such lawless person copies can be very high.
And existing anti-counterfeiting technology all can not reach some above-mentioned requirement, so its false proof security is not high.
[summary of the invention]
Object of the present invention is exactly to solve prior art Problems existing, proposes a kind of method based on X-Y scheme encode false-proof, label and label producing method.
Concrete technical scheme of the present invention is as follows:
The invention provides a kind of method based on X-Y scheme encode false-proof, the method comprises: on product, print X-Y scheme coding; Image read-out reads the X-Y scheme coding be identified on product; Obtain the X-Y scheme coded message that image read-out reads; Judge that whether described X-Y scheme coded message is consistent with the X-Y scheme coded message stored in database; As unanimously, then show that this product is certified products, if inconsistent, then show that this product is adulterant; It is characterized in that:
Described X-Y scheme is encoded to one, and this X-Y scheme coding is printed on two printing carriers, and described second printing carrier is pasted onto the upper of the first printing carrier.
The method comprises further:
Judge the separatrix whether including the first printing carrier and the second printing carrier in the X-Y scheme coding that described image read-out reads, if had, judge that whether described X-Y scheme coded message is consistent with the X-Y scheme coded message stored in database further.
The method comprises further:
At random the second printing carrier is bonded on the first printing carrier, described X-Y scheme coding is read by X-Y scheme code reading device after two printing carriers print X-Y scheme coding, obtain the marginal position in this X-Y scheme coding, and this positional information and X-Y scheme are encoded corresponding stored in a database;
After the X-Y scheme coded message read at described image read-out is consistent with the X-Y scheme coded message stored in database, the separatrix positional information in the X-Y scheme coding read by image read-out is compared with the marginal positional information stored in database;
As unanimously, then show that this product is certified products, if inconsistent, then show that this product is adulterant.
The method comprises further:
Punch on the first printing carrier of product at random, and take hole as the region stochastic print picture and text of benchmark at place, hole, then the second printing carrier is bonded on the first printing carrier at random, and hole and picture and text cover by the second printing carrier, read the distribution plan in hole and picture and text by image read-out, and pore size distribution figure and picture and text and X-Y scheme are encoded corresponding stored in a database;
After separatrix positional information in the X-Y scheme coding that image read-out reads is consistent with the marginal positional information stored in database, find out the pore size distribution figure and picture and text encoding corresponding with this X-Y scheme, and send to display device to show in this pore size distribution figure and picture and text;
The pore size distribution figure that product identifies is compared with picture and text with the pore size distribution figure shown with picture and text, if two pore size distribution figure are consistent with picture and text, then shows that this product is certified products, if two pore size distribution figure and picture and text inconsistent, then show that this product is adulterant.
The present invention also provides a kind of label based on X-Y scheme encode false-proof, this label comprises the X-Y scheme coding be printed on product, described X-Y scheme code storage in a database, it is characterized in that, described X-Y scheme is encoded to one, and this X-Y scheme coding is printed on two printing carriers, and described second printing carrier is pasted onto the upper of the first printing carrier.
The separatrix of the first printing carrier and the second printing carrier can read by image read-out, and the positional information of described separatrix in X-Y scheme coding and X-Y scheme encode corresponding stored in a database.
Describedly on the first printing carrier, be positioned at the porose and picture and text that to distribute immediately below the second printing carrier, the distribution plan in described hole and picture and text and X-Y scheme encode corresponding stored in a database.
The present invention separately provides a kind of method for making based on X-Y scheme encode false-proof label, and it is characterized in that, the method comprises the steps:
At random the second printing carrier is bonded on the first printing carrier of product, after on two printing carriers, printing stores X-Y scheme coding in the data, described X-Y scheme coding is read by X-Y scheme code reading device, obtain the marginal position in this X-Y scheme coding, and this positional information and X-Y scheme are encoded corresponding stored in a database.
After on two printing carriers, printing stores X-Y scheme coding in the data, described X-Y scheme coding is read by X-Y scheme code reading device, obtain the marginal position in this X-Y scheme coding, and this positional information and X-Y scheme are encoded corresponding stored in a database.
Further, the method comprises the steps:
Punch on the first printing carrier of product at random, and take hole as the region stochastic print picture and text of benchmark at place, hole, then the second printing carrier is bonded on the first printing carrier at random, and hole and picture and text cover by the second printing carrier, read the distribution plan in hole and picture and text by image read-out, and pore size distribution figure and picture and text and X-Y scheme are encoded corresponding stored in a database.
The technique effect that the present invention is useful is:
Due to the first printing carrier and the second printing carrier not at grade, so its separatrix can be read by image read-out, by marginal with or without thus the X-Y scheme coded image that the X-Y scheme coded image of Practical computer teaching and image read-out read can be distinguished, thus avoid the problem of lawless person by Practical computer teaching X-Y scheme coded image, can prevent lawless person from cracking the problem in X-Y scheme coded data storehouse by the method for exhaustion, improve security of the present invention.
Owing at random the second printing carrier being bonded on the first printing carrier, and the first printing carrier and the separatrix of the second printing carrier and the relative position information of X-Y scheme coded image are stored in the data, and analyze and judge that whether marginal position is consistent, so just can prevent lawless person from removing to make the label of personation by the manufacturing process of imitating label.
By punching at image-text area, and the position in hole is random variation, if lawless person will imitate the position should knowing hole, carries out accurate positional punch again by machine, adds counterfeit cost, and security is improved more.
On the other hand, after picture and text cover by the second printing carrier, by using the prize mark of picture and text as prize drawing, so then can be conducive to consumer and actively go to carry out Antiforge inquiry operation, improve the query rate of this anti-counterfeiting mark, make anti-forgery security higher.
The various advantages of cumulated volume invention anti-counterfeiting technology: 1. consumer easily recognizes, only need can realize Antiforge inquiry by common instrument (as mobile phone); 2. consumer easily gets real information (passing through mobile phone), and is compared by the product in itself and hand; 3. mark easily printing, and easily make, such low production cost; 4. the manufacturing technology of mark itself does not use reverse-engineering principle to obtain by identifying; 5. the mark of each product is different, and the cost that such lawless person copies can be very high.By above-mentioned various means, leak counterfeit for lawless person is all blocked, make counterfeit possibility almost nil, and counterfeit cost is very huge, and the production cost of legal manufacturer is very low.So method for anti-counterfeit of the present invention is with low cost, security is very high.
[accompanying drawing explanation]
Fig. 1 is that the label spatial structure of the embodiment of the present invention 1 launches schematic diagram;
Fig. 2 is the method flow diagram of the forming label of the embodiment of the present invention 1;
Fig. 3 is that the label spatial structure of the embodiment of the present invention 2 launches schematic diagram;
Fig. 4 is the method flow diagram of the forming label of the embodiment of the present invention 2.
[embodiment]
In order to make the object of invention, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not used for limiting the present invention.
Embodiment 1
As shown in Figure 1, a kind of antifalsification label based on X-Y scheme coding, this label comprises the X-Y scheme coding 11 being printed on and product external packaging box 10 (also can be printed on the shell of product), and described X-Y scheme coding 11 is stored in the database of server.The core of described X-Y scheme coding 11 is printed on paper slip 12 that external packing box is pasted, and the periphery of described X-Y scheme coding 11 is printed on described external packing box 10, and described paper slip 12 is frangible subsides, is bonded on described external packing box 10.
Between described paper slip 12 and external packing box 10, there is separatrix 121, described paper slip 12 is bonded on external packing box 10 at random, so the relative position of separatrix in X-Y scheme coded image is random variation, the relative position information of this separatrix in X-Y scheme coded image and X-Y scheme encode corresponding stored in server in database.
Because X-Y scheme coding 11 is printed on two printing carriers be in Different Plane, and two different printing carriers have separatrix, by marginal with or without judging that described X-Y scheme coding is printed on two different printing carriers, or on same printing carrier, can prevent lawless person from then carrying out the method for exhaustion by software process quality X-Y scheme coding like this and carry out trial checking.If lawless person wants by checking, by X-Y scheme code printing on two printing carriers, and then must read X-Y scheme coding by image read-out, then carry out trial checking, this adds huge cost to fake producer undoubtedly.
As shown in Figure 2, the method making this antifalsification label is:
S1: paper slip 12 is pasted onto at random on described external packing box 10;
S2: print the X-Y scheme coding 11 stored in a database in the region being pasted with paper slip 12;
S3: the X-Y scheme be printed on paper slip 12 and external packing box 10 encodes 11 to adopt X-Y scheme code reading device to read;
S4: the positional information obtaining paper slip 12 and external packing box 10 separatrix 121 in X-Y scheme coding 11, and this positional information and described X-Y scheme are encoded 11 corresponding stored in a database.
Consumer is when carrying out authentication, first consumer adopts image read-out (such as camera or scanner) to read, and the X-Y scheme be printed on paper slip and external packing box is encoded, and this X-Y scheme coding is sent to the server of network side by wired or wireless mode, server obtains described X-Y scheme coded image, analyze the separatrix whether including paper slip and external packing box in the X-Y scheme coding judging that described image read-out reads, if do not had, then inform that consumer's X-Y scheme coding is invalid by display device (as the display of computer or the display screen of mobile phone), if had, then judge that whether the X-Y scheme coded message that described image read-out reads is consistent with the X-Y scheme coded message stored in database further, as inconsistent, then inform that consumer's X-Y scheme coding is illegal by display device, if any unanimously, then the separatrix positional information in this X-Y scheme coding read by image read-out is compared with the marginal positional information stored in database, as unanimously, then show that this product is certified products, if two positions are inconsistent, then show that this product is adulterant.
Owing at random paper slip being bonded on external packing box, and the first printing is carried-body and the separatrix of the second printing carrier and the relative position information of X-Y scheme coded image store in the data, and analyze and judge that whether marginal position is consistent, so just can prevent lawless person from removing to make the label of personation by the manufacturing process of imitating label.
Embodiment 2
On the basis of above-described embodiment 1, the present embodiment proposes the method for making of another method for anti-counterfeit, label and this label.As shown in Figure 3, be positioned at immediately below described paper slip 12, the external packing box 10 of described product is also provided with a square hole 101.This square hole 101 beats on the described position of this external packing box at random by perforating device (comprise laser and burn shell punch device and pin type perforating device), (picture and text in the present embodiment are a bird to region stochastic print picture and text 13 at square hole place, in fact, also can be other picture and text, and the picture and text of each product are also not quite similar), these picture and text 13 are take square hole as benchmark stochastic print in the region at square hole place.Described square hole 101 covers in by described paper slip 12 together with described picture and text 13, tears described paper slip 12 and can occur described square hole 101 and picture and text 13.
Be stored in the database of server after the picture and text 13 with square hole are read by image read-out, and these picture and text 13 are encoded corresponding stored in the database of server with X-Y scheme.Owing to including square hole in picture and text, so namely fake producer allows to try out X-Y scheme coding by the computer program method of exhaustion thus download picture and text and print, but also need after fake producer to punch to picture and text, because the position in hole is random relative to described picture and text, so, fake producer's picture and text be difficult to by showing go to beat square hole, add cost to fake producer.For the ease of printing figure message, first printing figure message can be adopted, then beat the method (also can take first random punching, and then the mode of printing figure message) of square hole.
As shown in Figure 4, the method making this antifalsification label is:
S1: printing figure message 13 on the external packing box of product;
S2: beat square hole 101 at random in picture and text 13 region;
S3: read the picture and text figure with square hole 101 by image read-out;
S4: encode 11 corresponding stored in a database by with the picture and text figure of square hole 101 and X-Y scheme;
S5: paper slip 12 to be pasted onto at random on described external packing box 10 and to cover in described square hole 101 and picture and text 13;
S6: print the X-Y scheme coding 11 stored in a database in the region being pasted with paper slip 12;
S7: the X-Y scheme be printed on paper slip 12 and external packing box 10 encodes 11 to adopt X-Y scheme code reading device to read;
S8: the positional information obtaining paper slip 12 and external packing box 10 separatrix 121 in X-Y scheme coding 11, and this positional information and described X-Y scheme are encoded 11 corresponding stored in a database.
Consumer is when carrying out authentication, first consumer adopts image read-out (such as camera or scanner) to read, and the X-Y scheme be printed on paper slip and external packing box is encoded, and this X-Y scheme coding is sent to the server of network side by wired or wireless mode, server obtains described X-Y scheme coded image, analyze the separatrix whether including paper slip and external packing box in the X-Y scheme coding judging that described image read-out reads, if do not had, then inform that consumer's X-Y scheme coding is invalid by display device (as the display of computer or the display screen of mobile phone), if had, then judge that whether the X-Y scheme coded message that described image read-out reads is consistent with the X-Y scheme coded message stored in database further, as inconsistent, then inform that consumer's X-Y scheme coding is illegal by display device, if any unanimously, then the separatrix positional information in this X-Y scheme coding read by image read-out is compared with the marginal positional information stored in database, as unanimously, then find out the picture and text with square hole relative with this X-Y scheme coded message, and the picture and text this with square hole are shown by display device (screen of such as display or mobile phone), now, consumer by the picture and text with square hole that product external packaging box identifies with show with square hole picture and text compared with, if two picture and text are completely the same, then show that this product is certified products, if two picture and text are inconsistent, then show that this product is adulterant.
By in image-text area providing holes, and the position in hole is random variation, if lawless person will imitate the position should knowing hole, carries out accurate positional punch again by machine, adds counterfeit cost, and security is improved more.On the other hand, after picture and text cover by the second printing carrier, by using the prize mark of picture and text as prize drawing, so then can be conducive to consumer and actively go to carry out Antiforge inquiry operation, improve the query rate of this anti-counterfeiting mark, make anti-forgery security higher.
Described square hole is only the embodiment cited by the present invention, and its shape can be various, as prismatic, triangle and ellipse.
In a word, above embodiment is only in order to illustrate technical scheme of the present invention and unrestricted, although with reference to preferred embodiment to invention has been detailed description, those of ordinary skill in the art is to be understood that, can modify to technical scheme of the present invention or equivalent replacement, and not departing from the spirit and scope of technical solution of the present invention, it all should be encompassed in the middle of right of the present invention.

Claims (2)

1. based on a method for making for X-Y scheme encode false-proof label, it is characterized in that, the method comprises the steps:
At random the second printing carrier is bonded on the first printing carrier of product, X-Y scheme coding comprises core and periphery, and core and the periphery of this X-Y scheme coding are printed on two printing carriers respectively, described core is printed on the second printing carrier, and described periphery is printed on the first printing carrier; After on two printing carriers, printing stores X-Y scheme coding in a database, described X-Y scheme coding is read by X-Y scheme code reading device, obtain the marginal relative position information in this X-Y scheme coding, and this relative position information and X-Y scheme are encoded corresponding stored in a database.
2. the method for making based on X-Y scheme encode false-proof label according to claim 1, is characterized in that, further, the method also comprises the steps:
Punch on the first printing carrier of product at random, and take hole as the region stochastic print picture and text of benchmark at place, hole, then the second printing carrier is bonded on the first printing carrier at random, and hole and picture and text cover by the second printing carrier, read the distribution plan in hole and picture and text by image read-out, and pore size distribution figure and picture and text and X-Y scheme are encoded corresponding stored in a database.
CN201510500049.8A 2011-11-02 2012-08-15 Anti-counterfeit label manufacturing method based on two-dimensional graph code Pending CN105205523A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510500049.8A CN105205523A (en) 2011-11-02 2012-08-15 Anti-counterfeit label manufacturing method based on two-dimensional graph code

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN2011103436381 2011-11-02
CN201110343638 2011-11-02
CN201510500049.8A CN105205523A (en) 2011-11-02 2012-08-15 Anti-counterfeit label manufacturing method based on two-dimensional graph code
CN201210296567.9A CN102831530B (en) 2011-11-02 2012-08-15 A kind of method based on X-Y scheme encode false-proof

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201210296567.9A Division CN102831530B (en) 2011-11-02 2012-08-15 A kind of method based on X-Y scheme encode false-proof

Publications (1)

Publication Number Publication Date
CN105205523A true CN105205523A (en) 2015-12-30

Family

ID=47334650

Family Applications (3)

Application Number Title Priority Date Filing Date
CN201510500049.8A Pending CN105205523A (en) 2011-11-02 2012-08-15 Anti-counterfeit label manufacturing method based on two-dimensional graph code
CN201210296567.9A Expired - Fee Related CN102831530B (en) 2011-11-02 2012-08-15 A kind of method based on X-Y scheme encode false-proof
CN201510501018.4A Pending CN105205524A (en) 2011-11-02 2012-08-15 Anti-counterfeit label based on two-dimensional graph code

Family Applications After (2)

Application Number Title Priority Date Filing Date
CN201210296567.9A Expired - Fee Related CN102831530B (en) 2011-11-02 2012-08-15 A kind of method based on X-Y scheme encode false-proof
CN201510501018.4A Pending CN105205524A (en) 2011-11-02 2012-08-15 Anti-counterfeit label based on two-dimensional graph code

Country Status (2)

Country Link
CN (3) CN105205523A (en)
WO (1) WO2013063871A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWM469566U (en) * 2013-08-29 2014-01-01 Int Currency Tech Valuable document identification machine for identification using fast response codes
EP3113083A3 (en) 2015-07-01 2017-02-01 Dimitri Marinkin Method for protecting the authenticity of an object, item, document, packaging and/or a label from imitation, forgery and theft
EA031834B1 (en) 2015-07-01 2019-02-28 Дмитрий Маринкин Method for identifying authenticity of an item having security marking on its surface
CN109472337B (en) * 2018-11-05 2023-07-04 上海中商网络股份有限公司 Label anti-counterfeiting method and device based on random characteristics
CN113568155A (en) * 2021-06-21 2021-10-29 深圳视见医疗科技有限公司 Glass slide
CN116227524B (en) * 2023-05-05 2023-08-08 杭州蚂蚁酷爱科技有限公司 Anti-fake code generation and verification method and label-based anti-fake system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2580540Y (en) * 2002-11-28 2003-10-15 淄博泰宝防伪技术产品有限公司 Disposable taking-off coating film stripped anti-fake mark
CN1569492A (en) * 2004-04-29 2005-01-26 张翼鲲 Anti-counterfeit method by merging patterns to check
CN101013516A (en) * 2007-02-07 2007-08-08 张健 Two-dimensional currency automatic recognition method and system
CN101013539A (en) * 2007-02-08 2007-08-08 陈艳存 Rationing-cutting type anti-counterfeit structure, producing method and anti-counterfeit method
CN101561863A (en) * 2008-04-14 2009-10-21 北京中科诚通科技发展有限公司 Anti-counterfeit identifying system for identifying anti-counterfeit printed material by mobile phone, scanner and camera
CN101673387A (en) * 2009-10-23 2010-03-17 深圳劲嘉彩印集团股份有限公司 Commodity digital anti-counterfeit method
CN201892956U (en) * 2010-10-25 2011-07-06 中拍讯业(北京)电子商务有限公司 Anti-counterfeiting mark linkage self-destroying device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1065821C (en) * 1995-11-13 2001-05-16 奥雷尔·菲斯利钞票工程有限公司 Security document with security marking
JP3882609B2 (en) * 2001-12-20 2007-02-21 富士ゼロックス株式会社 Electrophotographic toner, electrophotographic developer, and image forming method using the same
CN100522648C (en) * 2004-05-05 2009-08-05 德国捷德有限公司 Security document
CN101763767A (en) * 2008-12-23 2010-06-30 郑阿奇 Anti-fake identification method with dual encryption code
CN101976366A (en) * 2010-10-25 2011-02-16 中拍讯业(北京)电子商务有限公司 Linked self-destruction device of anti-counterfeiting mark and anti-counterfeiting verifying method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2580540Y (en) * 2002-11-28 2003-10-15 淄博泰宝防伪技术产品有限公司 Disposable taking-off coating film stripped anti-fake mark
CN1569492A (en) * 2004-04-29 2005-01-26 张翼鲲 Anti-counterfeit method by merging patterns to check
CN101013516A (en) * 2007-02-07 2007-08-08 张健 Two-dimensional currency automatic recognition method and system
CN101013539A (en) * 2007-02-08 2007-08-08 陈艳存 Rationing-cutting type anti-counterfeit structure, producing method and anti-counterfeit method
CN101561863A (en) * 2008-04-14 2009-10-21 北京中科诚通科技发展有限公司 Anti-counterfeit identifying system for identifying anti-counterfeit printed material by mobile phone, scanner and camera
CN101673387A (en) * 2009-10-23 2010-03-17 深圳劲嘉彩印集团股份有限公司 Commodity digital anti-counterfeit method
CN201892956U (en) * 2010-10-25 2011-07-06 中拍讯业(北京)电子商务有限公司 Anti-counterfeiting mark linkage self-destroying device

Also Published As

Publication number Publication date
CN102831530B (en) 2016-01-06
CN105205524A (en) 2015-12-30
CN102831530A (en) 2012-12-19
WO2013063871A1 (en) 2013-05-10

Similar Documents

Publication Publication Date Title
CN103093355B (en) A kind of based on two-dimensional code anti-counterfeiting label and label producing method
CN102831530B (en) A kind of method based on X-Y scheme encode false-proof
CN106782035B (en) Sawtooth code anti-counterfeiting method
US10235618B2 (en) Authentication feature in a barcode
CN103093173A (en) Anti-fake method, anti-fake label and label manufacture method
CN106682912A (en) Method and apparatus for authentication of 3D structure
CN202306599U (en) Anti-counterfeit label based on two-dimension code
CN105469132A (en) Duplicate coding internet of things traceability security label and 2-dimensional bar code security traceability method
CN103208067B (en) Antiforge system and the formation of label thereof, embed, understand, differentiate and ownership change method
CN103390183A (en) Generation method for anti-fake code applied to mobile phone recognition
WO2006106677A1 (en) Printed matter, method and device for detecting such printed matter, and authentication method and device
CN103390187A (en) Packaging box on basis of two-dimensional codes and having verification function and achieving method thereof
CN101561863A (en) Anti-counterfeit identifying system for identifying anti-counterfeit printed material by mobile phone, scanner and camera
CN101587663A (en) Strip encrypting fake-proof
CN104233907B (en) There is cheque paper of intelligent micro Quick Response Code and its preparation method and application
CN109472335A (en) A kind of lottery ticket anti-counterfeiting system and method for anti-counterfeit
US20150076219A1 (en) Tactile anti-forgery method using random emboss
CN102306312A (en) Novel anti-counterfeiting system and method for carrying out identification on anti-counterfeit label
CN104239928B (en) Anti-counterfeiting printed matter and corresponding anti-counterfeiting method
CN103761657A (en) Random characteristic information anti-counterfeiting method
CN102799917A (en) Anti-counterfeiting method for random color graphics of computers implemented by using screen code control method
CN103390184A (en) Image information embedding method suitable for anti-fake codes identified through mobile phone
CN205028583U (en) Antifalsification label based on two -dimensional code combines together with fingerprint
CN103500532A (en) Random embossing touch anti-fake method
CN103794134B (en) Generate and the method identifying the mark formed by dot matrix and electronic supervision code

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20171214

Address after: 362216 Fujian city of Quanzhou province Jinjiang city Luoshan Street Building No. 1208 Aetna world city

Applicant after: Quanzhou Intelligent Technology Co., Ltd.

Address before: 518000 Guangdong city of Shenzhen province Futian District Binjiang Binhe Village East 8 Building 502

Applicant before: Feng Lin

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20151230