CN112406354A - Application of novel anti-counterfeiting material in commodity anti-counterfeiting, currency anti-counterfeiting, bank card and the like - Google Patents

Application of novel anti-counterfeiting material in commodity anti-counterfeiting, currency anti-counterfeiting, bank card and the like Download PDF

Info

Publication number
CN112406354A
CN112406354A CN202011175721.8A CN202011175721A CN112406354A CN 112406354 A CN112406354 A CN 112406354A CN 202011175721 A CN202011175721 A CN 202011175721A CN 112406354 A CN112406354 A CN 112406354A
Authority
CN
China
Prior art keywords
currency
irregular
checking
counterfeiting
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011175721.8A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202011175721.8A priority Critical patent/CN112406354A/en
Publication of CN112406354A publication Critical patent/CN112406354A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/36Identification or security features, e.g. for preventing forgery comprising special materials
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
    • B42D25/21Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose for multiple purposes
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
    • B42D25/22Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose for use in combination with accessories specially adapted for information-bearing cards
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
    • B42D25/23Identity cards
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
    • B42D25/24Passports
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
    • B42D25/29Securities; Bank notes
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/318Signatures
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/40Manufacture
    • B42D25/405Marking

Abstract

The prior anti-counterfeiting material has a fatal defect: it is difficult to prevent copying. Regardless of the material of the mark we use, no matter how complex we encrypt the information, replication can always be achieved. The problem of copy prevention cannot be fundamentally solved from the material science itself, as well as from the cryptography itself. For this purpose, class 1 new security materials (irregular materials) can be used, which contain a very large amount of information and are therefore difficult to reproduce completely. And when in verification, only the specific position needs to be checked, and the related information amount is small, so the operation is easy. Because the data volume is large, if the inspection position is unknown, even if an adversary steals irregular materials, a correct inspection result cannot be obtained and the inspection result passes the verification. It can be used for anti-fake of commodity and for making currency, bank card and identity card. The currency has the advantages that data is not easy to lose, and the currency is far safer than the current electronic currency. The identity document is the most advanced of the technologies for off-line identity verification.

Description

Application of novel anti-counterfeiting material in commodity anti-counterfeiting, currency anti-counterfeiting, bank card and the like
The application is a divisional application with original application number of 201711254446.7, and is named as the application of the novel anti-counterfeiting material in anti-counterfeiting payment, currency anti-counterfeiting, bank cards and the like, and the application date is as follows: 11/27/2017.
The notice of first review of the original application (26/04/2020) indicates that the claims of the original application do not conform to the unity principle, so that a part of the claims (claims 4 and 5) is applied separately and some contents irrelevant to the new subject matter are deleted.
Technical Field
The present invention relates to commodity anti-fake technology, electronic payment technology, currency anti-fake technology, bank card anti-fake technology and identity distinguishing technology. More specifically, it is a technology of currency anti-counterfeiting, bank card anti-counterfeiting and identity authentication using a novel anti-counterfeiting material.
Background
At present, a lot of counterfeit goods exist in the market, the benefits of consumers and manufacturers are damaged, and anti-counterfeiting work is very important for improving the benefits of real merchants. The most reliable method for authenticating a product is to examine the physical and chemical properties of the product itself, but this method is not always used because it is troublesome, complicated, takes a long time, and is expensive. Besides, the authenticity of the commodity can be indirectly identified through an entity such as the package of the commodity, an anti-counterfeiting code (commonly called as an 'electronic code') and the like. The anti-counterfeiting cost of the package is high, but the package is also easy to counterfeit. The prior anti-counterfeiting code technology has lower cost but is easier to counterfeit.
In many cases, the anti-counterfeiting code is calculated by a specific encryption algorithm according to data such as the serial number of the commodity, so that a large database is not needed, the cost is low, and the anti-counterfeiting code can be cracked by an adversary after a plurality of times of calculation in a long time. However, many internal personnel of the anti-counterfeiting code company in the past also reveal the encryption algorithm and the secret key.
Even if the commodity has a real anti-counterfeiting label, the anti-counterfeiting label is not necessarily a genuine product, the anti-counterfeiting label can be falsely used, and the commodity can be packaged.
In addition, the existing currency, bank card and ID card have many defects, and the defects can be solved by 1 new anti-counterfeiting material.
Disclosure of Invention
The present invention is divided into a plurality of sections such as introduction of irregular materials, money, bank cards, and the like, which will be described below.
1. Irregular material
The existing anti-counterfeiting code has a plurality of defects, and the article with the anti-counterfeiting label is not necessarily a genuine article. Now the 1 time use (failure after verification) of the anti-counterfeiting code has been widely used, which can well prevent the duplication, but the 1 time counterfeiting opportunity is left for the enemy, and the 1 time counterfeiting opportunity is favorable for the commodity with higher jewelry equivalence. The adversary can also reconcile the merchandise and sell the genuine goods through the physical store to gain a profit.
In the field of anti-counterfeiting technology, it is most troublesome that the authenticity of the 1-time authentication is not guaranteed, but the prevention of copying is difficult. Regardless of the material of the mark we use, no matter how complex we encrypt the information, replication can always be achieved. The problem of copy prevention cannot be fundamentally solved from the material science itself, as well as from the cryptography itself.
Aiming at the problem, I put forward a brand-new thought, the concept of which is completely different from the previous idea, and the problem is solved by the quantity of the data instead of the quality of the data. It is possible to use security materials (hereinafter referred to as "irregular materials") which are difficult to reproduce completely, and the characteristics of these security materials are theoretically unlimited, so that it is difficult for an adversary to reproduce completely. Colloquially, my idea is not "complete" replication. Irregular materials are the only reliable way to prevent 1 time counterfeiting.
The irregular material is classified into an optical irregular material which uses an optical characteristic as a main inspection basis, an electrical irregular material which uses an electrical characteristic as an inspection basis, and the like, and it uses a tool such as a microscope to record and inspect the material, so that the data amount is extremely large.
The nature of the irregular material is theoretically unlimited, so that it is difficult for the adversary to reproduce it completely, which causes technical problems: such a large amount of data is difficult to store, transmit and verify. And recording and inspection are difficult.
For 1 business card sized anti-counterfeiting material, a conventional scanner with 600dpi is used, and the scanned file is about 60 MB. On the other hand, if a microscope with a magnification of 800 times is used to record data, the data size of 1 tag is about 36.8GB, which is about 30 movie spaces. The scanner with higher precision has slower scanning speed, and it is a normal matter to scan a picture for tens of minutes or even hours, and the speed obviously cannot meet the requirement of true-false identification of common goods. Even if the speed is increased to a sufficient level, the information storage cost, the information transmission cost and the like of the system are far beyond the level that ordinary people can bear.
Aiming at the technical problem of large data volume, I propose a technical means of sampling inspection, namely, a server randomly determines 1 or 1 group of inspection positions and records inspection data according to the inspection positions. When the user wants to distinguish the authenticity of the commodity, the identity of the user is verified, after the identity of the user is confirmed, the server returns the checking position to the checking equipment, the checking equipment obtains the checking result (usually 1 check value is obtained according to a certain algorithm instead of all image data, so that the data volume can be reduced, the safety can be improved) and returns the checking result to the server, and the server judges the authenticity of the anti-counterfeiting material. Therefore, the speed of collecting, storing, transmitting and verifying the anti-counterfeiting information and the cost of collecting, storing, transmitting and verifying the anti-counterfeiting information can meet the requirements.
The spot check does not change the situation of large overall data volume, so that the complete copy can still be prevented.
And the examination according to the designated position leads the transmitted data volume to be smaller, thus being easy to inquire. If the inspection position is unknown, even if the enemy steals the irregular material, the correct inspection result cannot be obtained.
In order to improve the safety, the inspection position cannot be revealed at will, and the following technical means can be adopted: when the user purchases on the network, the system records the order number (the order information comprises a user name and the like), and binds the order number with the anti-counterfeiting code of the corresponding commodity. When the user receives the commodity, the server of the service station sends the anti-fake code, etc. and the system confirms the user's identity based on the anti-fake code and the order number and returns to the checking position. The anti-counterfeiting code in the past is usually not bound with an order number, and the anti-counterfeiting code is not provided with such a complicated verification step when in use.
This material is easy to manufacture but difficult to replicate, the cost of replication far exceeding that of manufacture. Of course, under certain technical conditions, the precision of checking irregular materials is limited, and it is also possible to reproduce irregular materials with such precision, but the cost thereof is generally very high and therefore difficult to realize. However, different irregular materials have different copying difficulties, and some of the current technologies cannot be copied according to a certain precision.
The server should generally determine the area to be checked, and the user (checking device) should not issue the checking location, area. If the user (checking device) sends the checking position, the server can not obtain the checking result any more, because the anti-counterfeiting material is not in the detectable area of the server, and the original server does not record all data of the anti-counterfeiting material (because the recording cost is too high and the time consumption is too long), the server can only determine and send the checking position.
Some irregular materials are described below, and optical irregular materials are classified into 1-dimensional, 2-dimensional, and 3-dimensional 3 types. For example, filing 1 plastic rod with a flat surface with 1 irregular file with an irregular line would result in 1 irregular surface. If the 1-dimensional irregular material has a large surface irregularity, each portion can be inspected by 1 straight line, and the 1-dimensional irregular material will be hereinafter referred to as a 1-dimensional material. If the unevenness is large, it is impossible to inspect each portion in 1 straight line, and if the inspected portion is distributed on 1 plane, such irregular material will be hereinafter referred to as 2-dimensional material. If the examined regions are not distributed on 1 plane but are three-dimensional, the irregular material is hereinafter referred to as 3-dimensional material, which is extremely expensive to copy, but also expensive to manufacture.
The inspection of the optical irregular material is performed at a designated position (hereinafter referred to as an inspection position) by using a magnifying glass, a microscope, or the like. According to the figure checked at the appointed position, the processing is carried out according to a certain rule (for example, the conversion is 1, the conversion is not 0, the coordinate of the dust and the like can be directly converted into the data, or the quantity of the dust and the like in each square is converted into the data, the methods are many, and the invention does not strictly limit the method), the specific data can be obtained, and the authenticity of the commodity can be verified according to the data. Such data and inspected patterns are hereinafter collectively referred to as "inspection results". And the inspection positions are random and irregular, 1 or more groups of inspection positions can be randomly determined before the irregular material is sent out, and the inspection positions and the inspection results are recorded. When the buyer receives the commodity, after the primary verification (the verification of the anti-counterfeiting code and the identity of the buyer) is passed, the buyer sends out the checking positions to a specific person or equipment (such as a server of a service network), and then checks according to the positions, so that the transmitted data volume is small.
If the service network sends out the checking result and the seller server directly completes the verification of the irregular materials, it is more beneficial to determine the buyer's identity, but it is less beneficial to determine the seller's identity. If the seller server sends out 1 check value (generated by irreversible algorithm of randomly extracting several digits and the like) to a central server (hereinafter referred to as an 'associated control center') before the seller server sends out the check position, the seller server sends out the check position to the associated control center, the service network point sends out the check result to the associated control center, and the associated control center also generates 1 check value according to the check result and checks whether the check values are consistent, so that whether the seller identity is correct or not can be judged. And the verification value is generated according to the irregular material, and since the inspection position is uncertain, it is difficult for an adversary to obtain an accurate inspection result and generate the verification value. The check value is generated by an irreversible algorithm, so that an adversary can be prevented from deducing the checking result. And the inspection result is used as the source data, so that the method is more reliable than the conventional method for generating the dynamic password, because the source data is truly random. If the service network sends out the checking positions (1 in 1 specific group of positions can be randomly adopted), the server of the seller sends out the checking results (checking a plurality of specific positions in advance), which is favorable for determining the identity of the seller, but the overall safety is poor.
The methods for preparing irregular materials are numerous and can be said to be unlimited. Not only the above-mentioned method of filing with a file, but also the shape of a torn, broken, or broken portion of a material such as paper may be irregular. We can also do this by using 1 file with irregular surface to file 1 piece of plastic with flat surface in irregular route and speed; printing on materials such as paper or plastics by using the plastic as a printing plate (hereinafter referred to as a filing plate); the printed paper or plastic can be printed with 1 straight line or curve to check the graph on the straight line or curve. It is of course also possible to not print a line but to inform the examiner of the position of the line used for the examination, so that it is difficult for the adversary to perform the examination. The material can be cut out according to irregular directions and positions, and 1 side edge of the cut material is straight and is positioned at a position with more printed points and lines. These irregular materials are hereinafter referred to as rasped materials. If the examined part of the material is on 1 straight line, the material is actually 1-dimensional material. The proportion of the file materials printed by the same 1 file printing plate to the total file materials is controlled under a certain standard, so that the file materials commonly encountered by people are different.
In addition, opaque dust (fine solid particles) can be scattered, irregular vibration is applied to a screen carrying the dust to increase the randomness of the falling position of the dust, and the dust is fixed after falling on the base material. When the irregular material (hereinafter referred to as a solid particle material) is observed, the position is not easy to determine, lines and the like can be printed on the irregular material to assist positioning, but the thinnest of the lines which can be printed by a common printing technology can only reach 0.06 mm, and the small area is difficult to mark. The color blocks with specific size and certain distance can be printed (hereinafter referred to as positioning color blocks, which can be similar to the pattern of zebra stripes), and the boundaries of the color blocks are used as the basis for determining the position. The irregular material can be provided with fibers (hereinafter referred to as positioning fibers) to assist positioning, which can help positioning better, and the fibers are not provided under the condition of low requirement, so that the cost is reduced. It is also possible to use fibres of different thickness or colour for marking the positions, the thick fibres representing 1 and the thin fibres representing 0, 4 fibres in 1 group, which means 15 positions. Even if the position of the fiber is not very accurate, it can be 1 kind of position irregular mark. The surface of the material may be marked in a positive direction to facilitate the determination of the coordinates of the dust, the location of the inspected area. Thus, when fixing and checking irregular materials, the first thing to do is to determine the positive direction. The printed lines can be marked with scales and the like so as to calculate the deformation proportion and the like. Dots or other shaped markings for location may also be printed on the irregular material.
In particular such materials may be such that: transparent plastic with high strength or glass is used as a base material, so that the material is not easy to deform, and materials such as steel wires and plastic can be added into the base material or adhered below (outside) the base material to improve the strength, so that the material can be bent properly; the method comprises the steps of firstly coating a transparent adhesive (generally diluted by an organic solvent) on 1 surface of a base material, volatilizing the solvent, placing positioning fibers on the base material at intervals, facing the positioning fibers upwards, applying irregular vibration to a screen bearing dust to scatter the dust from the upper part, and disturbing by irregular air flow, wherein the movement of the air flow in a small space is irregular, so that the movement of the dust also becomes irregular. After the dust fell down, 1 transparent protective film was further coated thereon. The dust is preferably irregular in shape to increase the difficulty of copying. The base material has high strength, can prevent the material from deforming, but is easy to take off. The strength of the base material is low, so that the material can be prevented from being torn off. If the material for reinforcing such as plastic is adhered to the protective film of the irregular material and has a large width, a bad person can cut the irregular material at the places to steal the irregular material, and the irregular material is not damaged, so that the situation should be avoided.
The base material of the irregular material is transparent, which is convenient for direct observation by a microscope, but if the irregular material is attached to a commodity which is transparent or semitransparent, the background can influence the inspection result by direct observation by a magnifying glass and a microscope. For this purpose, opaque substrates can be used, and the color of the substrate needs to be different from that of the dust, for example, white and black, respectively, otherwise it is difficult to distinguish the substrate from the dust. For the convenience of observation, a metal film can be attached under the adhesive to reflect light.
But randomly determining the inspection locations, which may be exactly on the positioning fibers; it is also possible that in certain locations there is too much dust and there is no significant gap between the dust; or the converted data is lack of randomness due to the fact that the dust is too little and a blank area is formed. These locations may be abandoned and additional locations may be searched for inspection until a suitable location is found.
In addition, the material can also be prepared by a method of spraying paint, coating, ink and the like, namely, the liquid such as the paint, the coating, the ink and the like is sprayed out under pressure, irregular airflow is used for disturbing liquid drops, a part of the liquid drops are attached to a base material such as plastic and the like, and a protective film is covered after the liquid drops such as the paint, the coating and the like are dried, wherein the irregular material is hereinafter referred to as a liquid drop material. The droplet material is the same as the solid particle material, and the inspection method is hereinafter collectively referred to as a particle material. Dry droplets, dust, etc., are opaque, fine particles.
In addition, we can also make such 1 irregular material: the surface of the substrate is covered with 1 layer of opaque material (e.g. paint, paint) from which the solvent is evaporated, and then moved over the surface of the material in an irregular path using 1 or more (steel) needles (the distance between which is unequal and irregular) (e.g. the movement of the substrate is controlled by 1 motor, the movement of the steel needles is controlled by another 2 motors, 1 movement in the left-right direction is achieved, 1 rotation of the part on which the steel needles are mounted is achieved, the speed of movement of which is irregular). Thus, the steel needle will not have paint, coating, etc. in the place where the steel needle is stroked (the paint, coating, etc. will be scraped off), and thus an irregular pattern will be formed on the surface of the irregular material. The point of the steel needle is very small, so the mark drawn by the steel needle is very thin, and the adversary can hardly reproduce the same irregular material. Such irregular material is hereinafter referred to as "scratch material". To protect the coating, 1 protective film can be adhered on the surface of the coating. In order to prevent copying, a substrate can be coated with a coating, paint or the like which has high viscosity and cannot be used for printing, and people can only copy patterns by using ink or the like in the past.
Generally, the inspection of all scratches is not needed, and only 1 scratch needs to be inspected. Moreover, we do not need to record data for all the 1 scratch, and only need to check some parts. We need to do finer checks on smaller parts, so the amount of data is smaller. And which 1 (scratch) is used, hereinafter also referred to as the inspection position. Generally, a thicker needle can be used, the number of the needles is not too large, so that the scratch is thicker and less, the examination is easy, the manufacturing cost of the label is lower, and the label is suitable for commodities with lower value. For higher value goods, thinner and more pins can be used to increase the difficulty and cost of label duplication. It is easier to examine than particulate materials, but is easier to replicate.
We can use such an inspection device: 1 convex lens, 1 glass plate for determining the position of irregular material, 1 light source for illuminating the inspection part, and 1 CCD for light sensing. The CCD is positioned at the imaging position, the positions of the convex lens, the glass plate and the CCD are fixed, and the magnification of the image is also fixed. When the glass plate is used, the irregular material is placed on the glass plate, and an enlarged image can be generated. The glass plate may be printed with lines to facilitate location determination. And the irregular material may move according to the location of the inspection.
The packages for commodities having high value in the past are mostly disposable, because people should prevent forgery by these packages. But after the irregular material is adopted, the anti-counterfeiting technology does not depend on the package any more, so that the package can be simpler and can be recycled, the packaging cost can be greatly reduced, and the other 1 indirect benefit of the anti-counterfeiting technology is realized.
For example, the physical amount of the optical irregularity material can be considered by spraying droplets of a dye dissolved in a volatile organic solvent on 1 piece of white paper, spraying droplets of a colorless volatile organic solvent on the paper, rapidly volatilizing the solvent by heating, blowing, or the like, and covering the paper with 1 protective film. At this time, the dye is not completely diffused, and the concentration difference of the dye is large at each place. The paper is made of fibers, the dye is easy to migrate (commonly called feathering) through capillary action, so that the color of each part on the paper has good randomness, and the material is called feathering material in the following. To prevent migration of the dye, additional materials to prevent dye diffusion may be added after the solvent has evaporated, such as by spraying with melted wax, which, upon cooling, becomes a solid and prevents dye diffusion. However, it is difficult to develop a technique for determining the color depth at each location, and the cost is high.
We can also use refractive index as the property under investigation. For example, transparent plastics may be doped with substances that alter the direction of refraction of light (e.g., other types of plastic or glass debris, where the debris resulting from grinding the glass is highly irregular). A screen (which may be divided into multiple sections) containing debris of various types of matter may be rotated and vibrated at irregular speeds and then disturbed by irregular airflow; after reaching a certain thickness, the raw materials are heated and pressed to form a body 1. These materials should not be mixed thoroughly or the randomness of the results obtained from examining the material everywhere is poor. Although the relative cost is high, the imitation is difficult, and the method is promising when being used in the fields of national defense, national security and the like.
The cost of the equipment for detecting and inspecting the optical irregular material is higher, while the cost of the equipment for detecting and inspecting the electrical irregular material can be lower, for example, the materials of powder with different resistivities (materials with larger resistivity difference should be adopted as much as possible to increase the randomness) such as lead, tin, copper, iron and graphite can be mixed (the method is the same as the above), and then the mixture is heated and pressed into 1 body, wherein the material can contain fine bubbles to increase the randomness, and the material is hereinafter referred to as the resistance material for short. However, the air bubbles containing oxygen oxidize the metal, and for this purpose, the metal can be produced in an atmosphere filled with an inert gas such as nitrogen. There are many ways to examine the resistance material, and the present invention is not limited thereto. If 1 electrode is placed at a fixed position and the probe is placed at a different position, different resistances will be formed. The 2 probes can also be used to measure the resistance between 2 probes and convert the resistance into a checking result through a certain rule, and the distance between the 2 probes should be larger to improve the difficulty of attack. The resistance distribution associated with the inspection results for the 2 groups of positions is more complicated than that associated with the inspection results for the 1 group of positions, 4 groups being more complicated, and 16 groups being more complicated, even if the positions are regular (e.g., the distances between adjacent points are the same). The resistance between 2 points is related to the material at multiple locations, and this relationship is very complicated and difficult to deduce by calculation, and if the resistance material is to be reproduced, errors at 1 may result in different inspection results. This material is very difficult to reproduce, easy to store (not easily damaged), and low in cost for inspection, and is promising. There may also be 2 electrodes and the voltage, resistance, etc. measured at multiple locations (the position of these probes, electrodes, hereinafter collectively referred to as the interrogation location, which may be 1 set of locations, not necessarily 1 location alone) which is more difficult to copy. When the current between 2 electrodes is different, the change of the voltage at each position is nonlinear, so that the examination can be carried out under the condition of different currents, and the examination can also be carried out under the condition of different voltages between 2 electrodes, and the examination conditions are hereinafter referred to as examination conditions. In the prior art, the current is controlled accurately, the cost is high, and the resistance measurement is easy, so the inspection method for changing the inspection condition is not discussed in the following. The cost of the detection equipment for the irregular materials is far lower than that of the detection equipment using the microscope.
The magnetic medium can be used to make irregular material, making the track irregular as much as possible, and using a sensitive magnetic head for examination.
For the commodities with low value, only a small label made of irregular materials (hereinafter referred to as an irregular label) is needed to be pasted at the sealing part of the package, so that the bad can be prevented from packing the commodities, for the commodities with high value (such as diamonds), the bad can still pack the commodities from places except the irregular label, and the genuine commodities are sold through an irregular channel, so that only anti-counterfeiting payment and the irregular label are insufficient. The package can be covered by large irregular material, and the package can effectively prevent the commodity with high value from being changed. The irregular package can be divided into a package and a seal 2, and after the commodity is put into the package, the irregular material for sealing is attached to the seal. The packaging part can use the firmer base material to facilitate the recycling; the sealing part can be removed by using the base material with lower strength. After the irregular material with a firmer base material is produced in large quantities, the irregular material is difficult to distinguish from other irregular materials after being recycled due to the large quantity of the irregular material, so that the irregular material can be recycled for a plurality of times, and the cost of each use is low. After each use, the writing such as the serial number of the commodity and the buyer is washed away or torn off, and a new serial number is printed or a label such as a new serial number is attached when the product is used again. The inspection positions of the irregular package must cover the sealing position, and other enough positions (the interval between the inspection positions cannot be larger than the minimum linear degree of the goods), otherwise, the adversary can cut the irregular package from the inspection positions to carry out bag adjustment. For the irregular label, the position passing through the sealing position is checked, so that the checking position only needs to pass through the sealing position.
The inspection of irregular materials needs special equipment, so the inspection is often completed at a service network. If the buyer requests to deliver goods to the service network, the buyer can leave the goods in the service network, and inform the buyer that the goods are delivered to the service network, and inform the information of the kind of goods, after the buyer checks the goods information, if the buyer orders the goods, the buyer can confirm the goods, after the system checks the identity of the buyer, the service network sends anti-fake code to the joint control center, after the anti-fake code is verified, the agent module (at present, many units do not have their own servers, and can not verify the anti-fake code by themselves, we can provide agent service for them, i.e. add 1 more module outside the joint control center for the seller to complete the verification of anti-fake code and irregular material, and the service network sends the verification position of irregular material to the service network through the joint control center, and after the service network obtains the verification result from the irregular material, the service network returns to the joint control center, The agent module completes payment after passing the verification, and the service network delivers the goods to the buyer, so that the buyer has the decision right on starting the verification activity, the buyer can easily obtain the trust of the buyer, and the delivery person does not need to run for 2 times; the goods can be left in the service network, the anti-counterfeiting code label and the like are delivered to the buyer, the buyer submits the anti-counterfeiting code information through the mobile phone, the service network checks the irregular materials after the anti-counterfeiting information is verified, and the goods are delivered to the buyer if the verification is passed, so that the delivery person needs to run for 2 times, and the buyer has a long time waiting for the processing result.
In the transportation of goods, each link of handing over is the most prone to cause problems, and to ensure that goods received by a last buyer are not regulated, problems do not occur in each 1 link, otherwise, once the goods are regulated, all former dealers are probably suspects, and the criminals are difficult to accurately determine. The simpler method is that when the goods are enough to be held by the safe, the goods are held by the safe, and every 1 new department, the goods in the safe are transferred or the password is changed. The links except for the goods transfer are safer, but the link of the goods transfer has problems. The safe may not be problematic, but the goods may be exchanged.
More reliable method is that when the safe is locked, 1 irregular label (hereinafter referred to as cross-over label) is stuck on the door seam of the safe door, and the specific part is checked, and the checking position and the checking result are recorded; when the goods arrive at the next 1 department or unit, the last 1 department or unit informs the inspection position of the goods, after the inspection result is obtained, the last 1 department or unit is returned, the last 1 department or unit carries out the authentication according to the record, and the authentication result is informed to the next 1 department or unit. If the verification is passed, then 1 new handover label is attached besides the handover label attached to the upper 1 department or unit, and the above operations are repeated (the specific part of the handover label is inspected, the inspection position and the inspection result are recorded, when the goods arrive at the next 1 department or unit, the upper 1 department or unit informs the inspection position, after the inspection result is obtained, the upper 1 department or unit returns, the upper 1 department or unit performs verification according to the record, and informs the verification result to the next 1 department or unit). If the verification fails, the relevant aspects are immediately informed to stop the transfer of the goods, so that the possible crime occurrence range is small, the suspect is easy to determine, and the criminal is greatly deterred. The hand-over label is not easy to copy like a conventional anti-counterfeit label, so that the safety can be greatly improved.
If the goods are large and many, it is impossible to hold 1 safe, and 1 large box for storing goods, hereinafter referred to as "safe box", can be manufactured. When the safe box is locked, 1 cross-over label is stuck on the door seam of the box door, and 1 new cross-over label is stuck when the safe box reaches the next 1 department or unit, and the verification method is adopted. If the conditions allow, the corner of the storage box can be provided with a cross-over label to prevent the goods from being taken out and packaged. If the quantity of certain commodities (such as mobile phones and the like) is large, the delivery unit can also use the safe deposit box to hold a plurality of commodities for 1 time, so that the anti-counterfeiting cost is reduced.
If the inspection position of the irregular material is informed, the inspection position is made by an unsafe method (namely, the irregular material is used more simply), so that many opportunities are given to the enemy, and the effect of the irregular material is greatly reduced. If the adversary steals 1 piece of irregular material and also knows the related key, etc., the verification request can be forged and the checking position can be obtained, so that the checking result can be obtained, and other measures are necessary for application. The accurate person and equipment can obtain the checking position in a reliable mode, the effect of irregular materials can be really played, and the identity of a buyer and a service network point is confirmed through an anti-counterfeiting code, so that the method is more reliable.
The irregular material is closely combined with reliable authentication and commodity anti-counterfeiting technology to have application value, and the anti-counterfeiting of the entity and the digital anti-counterfeiting are combined. If the identity of the person or entity who sends the authentication request cannot be verified, the inspection position is freely disclosed, and the safety is not high. It is very important to combine the use of irregular materials with the verification of the anti-counterfeiting code.
The characteristics of 1 person are unlimited and include not only name, telephone number, password, fingerprint, portrait, but also much content, which the adversary cannot completely copy. The buyer can go to the service network to pick up goods by establishing the off-line service network completely, media such as membership cards and U shields are provided before picking up goods, or passwords are input, fingerprints can be checked in places with conditions to verify the identity, and the characteristics under the lines are difficult to copy by the enemy. This can be done at the beginning (before the service site sends a verification request to the central control unit) and only a call notification is made to pick up the goods, which does not guarantee that the person who picked up the goods is the true buyer.
Of course, the use of irregular materials is troublesome and high in cost, and under the condition of low requirements, people only need to use anti-counterfeiting codes. With the development of economy, the requirements of people on the quality of commodities are higher and higher, and the use of irregular materials is also higher and higher.
2. Money and bill
The irregular materials can be used for anti-counterfeiting of commodities, and people find a plurality of important purposes of the irregular materials soon, counterfeiting of entity currency is forbidden frequently, the counterfeit currency causes great harm to common people and huge harm to governments and national finances, manufacturing cost of the entity currency is very high due to counterfeiting prevention, in order to prevent counterfeiting, a country must reissue new-style currency at regular intervals, old-style currency is abandoned, and huge waste is caused.
Nowadays, the counterfeiting of 1 yuan currency is increasingly common, and the cost is unacceptable when the country uses a higher-level anti-counterfeiting technology for the currency with the low denomination, so that some places begin to refuse to use 1 yuan coins, and the embarrassment can be changed by irregular materials.
Many banks, however, can only use the method of printing the crown word number in order to avoid the user from being responsible for the counterfeit money. This is not only cumbersome, but also unreliable.
Banknotes are present in order to reduce the cost of manufacturing currency. Chinese people often honor the 1 st country in the world where paper money is created. However, the technology of making coins in China has been lagged behind in the western world for a long time, and although the technology of China is continuously improved, the technology of China still does not exceed that of the western world. If we can create currency with lower cost and higher security than paper money and a new technology for checking the authenticity of the currency, a new chapter of currency history will be opened, and honor will be brought to Chinese again for 1 time.
We can manufacture solid currency from irregular materials (resistive materials are particularly suitable) which can be manufactured at low cost, but at high imitation costs, far exceeding the manufacturing costs. This currency is hereinafter referred to as "true cryptocurrency", meaning currency that uses a true random password (password).
At present, networking verification is used on currency detectors, but the range of application is small, and the networking verification is really important for the anti-counterfeiting of currency. The unique number is used for each 1 entity currency, and the currency number and the number of the checking device are uploaded at each 1-time checking, so that the existence of the counterfeit currency can be judged as long as the number of the currency number and the number of the checking device are more than 1. However, the possibility of checking the counterfeit money and the original money at the same time is low, and the existence of the counterfeit money can be judged more reliably only if the distance spanned by the same number 1 in a certain time exceeds a certain standard. If the time exceeds the standard and the distance is lower than the standard, accurate judgment is difficult to make. Moreover, the requirement for the server is high, the spatial span of the places where a large number of numbers appear and the transfer speed are calculated at the same time, and the implementation cost is high.
Networking records, which make the currency flow traceable, can prevent actions such as counterfeit currency, money laundering, etc. to some extent, but are still insufficient, and have 1 important defect: when the same 1 number appears in many places simultaneously, it is difficult to distinguish the authenticity. So the networked verification must be combined with the use of irregular materials.
When the same 1 currency number appears in multiple places simultaneously, the authenticity can be distinguished: the true secret coin can be checked in the regular (approved and reliable) service network (the server is called checking server in bank or out of bank for short), when checking each 1 time, the user inserts it into the special device, the device reads its number and sends the checking request (including service network number, currency number, etc.) to the central server; the central server calls out the number of the previous service network point (the server is hereinafter referred to as the server 1) for verifying the currency according to the currency number, and sends a verification request to the server 1 (if the verification is carried out for the 1 st time after the delivery, the verification request is directly sent to a production plant); the service network returns the checking position (1 position or 1 group position) corresponding to the currency number; the central server forwards the inspection position to the inspection server; the checking server obtains a checking result according to the checking position and returns the checking result; the server in the previous step 1 verifies the checking result and returns the checking result; if the verification result is passed, the ping server randomly generates 1 or 1 group of new ping positions again, and records the ping result. When the authenticity is checked in the next 1 time, a new checking service network point sends a verification request (comprising a service network point number, a currency number and the like) … … to the central server, so that the central server can also verify the identity of the service network point to prevent counterfeit service network points from stealing anti-counterfeit information. The identities of the bearer, payer, payee (e.g., username, identification number, etc.) may also be verified and recorded simultaneously, as conditions permit. In the method, the system does not need to store a large amount of anti-counterfeiting information, and the cost is lower. Moreover, the system does not need to frequently calculate the moving speed of the same number 1, and the calculation load is small. In the past, the cost of transmitting a true random password was high, but in the above-mentioned method using a true secret token, the password is transmitted by the user himself, and the cost is low.
In order to improve the security, in each verification of 1 time, the central server calls the verification position verified in the last verification of 1 time and sends the verification position to the verification server, the verification server obtains the verification result, and if the verification is passed, the central server sends a verification request to the server 1. Since the inspection position and the inspection result have been leaked out on the network, the value thereof has been reduced. This may improve the reliability of the verification to the ping server, but may increase the cost. The central server records the checking position and the checking result, which increases the burden of the central server, but reduces the burden of the service network points and improves the payment speed.
If the same currency belongs to more than 1 person at the same time, counterfeit currency is necessary, and the method can be realized only by combining informatization and electronic commerce.
Sometimes, dirt exists on the true secret coin, which affects the inspection, and if the inspection position is sent at the moment, sensitive information can be leaked. The checking device can check the true and secret coin, if the serious pollution is found, the warning can be sent out to require the operator to clean the true and secret coin, and the operation can be continued only if the standard is met.
The verification method completed in the relay is very safe, but the number of service outlets is limited, the checking equipment (hereinafter referred to as simple terminals) used by the small stores outside the service outlets is not reliable enough, the online time of 24 hours cannot be guaranteed, and the verification method completed in the relay cannot be used. If the simple terminal randomly generates 1 or 1 group of new checking positions again and records the checking result, the data may be stolen when the authenticity is checked for the next 1 time. But the small stores usually only collect money with less money, the collection has no motivation to use the false money, the collection only pays attention to the receipt of the false money, and therefore the stores have strong willingness to prevent the false money. The simple terminal for the small shop can be very simple, and the communication function can be realized by using a computer and a mobile phone, so that the simple terminal is far cheaper than the conventional currency detector and is easy to popularize.
While the small shop usually needs to change for selling things, in order to prevent the small shop from paying false money, the money number and the terminal number can be uploaded to the central server when checking the money, a mail can be sent to a mail box of a buyer (which can be provided by the system without charge), the money can be stamped, and the like, so that the source can be found when the false money is detected. In addition, information of a plurality of positions can be recorded in a production plant for verification.
In addition, the customer may consider that the money checked by the simple terminal found by the small store is not reliable, and in order to improve the security, the customer may not send the check result by the small store, and the check result may be sent by the mobile phone of the customer and returned to the customer.
For lower value currencies, the cost can be reduced by: the link of asking for the checking position from the server is omitted, the checking position and the checking result are directly sent out by the terminal, the server only records the checking results of some specific positions, and the terminal only checks the positions. To improve security, the ping location used by the terminal is randomly selected from these locations. To increase the processing speed, the inspection position may be adjusted 1 time per day or per batch of banknotes. In order to reduce the cost of storing the anti-counterfeiting information, only the numerical value of a specific digit (for example, 3 rd digit) after a decimal point can be stored. The verification result of a plurality of positions may not be verified every 1 time of verification, and the verification result of fewer positions may be verified, which is low in cost. To increase the difficulty of the attack (the adversary listening to the information and making a copy), the ping positions of the adjacent 2 verifications can be made different. Moreover, recording the inspection results of multiple locations makes the replication cost high and is not worth replicating. However, if the inspection results of a plurality of very similar locations are recorded at the same time, the difficulty of copying is greatly increased, and it is difficult to precisely copy such materials by the conventional technique. In fact, the cost of duplication is higher than the currency value, so that the true coin with a smaller currency value only needs to record and check less position information, and the true coin with a larger currency value only needs to record and check more position information.
The counterfeiting of the true secret currency is greatly different from the counterfeiting of the traditional currency. With 1 currency number, only the appearance at 1 is allowed. Even if the adversary copies the money which is completely the same as the original money, the counterfeit money is difficult to formally circulate, and the way of recording the number of the checking device enables the circulation of the counterfeit money to be easily traced, so that the counterfeit money is meaningless. The counterfeit money is difficult to change hands, and a plurality of people do not want to buy and accept the counterfeit money. Even if a counterfeiter can use the counterfeit money 1 or 2 times, the cost is very high, and the profit is little. The counterfeit cost of the conventional coin is similar to the manufacturing cost of the government, the government does not have great advantages, and the ratio of the counterfeit cost to the production cost of the genuine and confidential coin is very large.
In order to prevent the circulation of counterfeit money, a system can be established, the true secret money can only be circulated in 1 province of the same 1 country (the serial number of the region can be added at the beginning of the serial number), the true secret money and the foreign currency need to be converted into the currencies circulated by other provinces and countries, namely the true secret money is deposited in a bank (becoming electronic currency) before the foreign province and the country, and then the true secret money is converted into the entity currency after the foreign province and the country; or after the entity currency is brought to the foreign province and the country, the entity currency is exchanged into the entity currency circulated in the foreign province and the country in a regular bank, and then the entity currency is intensively transferred to the original province and country by the bank; the currency of the adjacent provinces can be directly transported in a centralized way by the bank without being exchanged. Thus, the central server can be set up in different countries, and the server can be set up in each province, which not only reduces the burden of the server, but also avoids the condition that the verification cannot be carried out due to the network failure among the provinces. The long-distance transport with a large amount of entity money is also avoided as much as possible in the past, so the measures can not bring great trouble to people. The money can be issued by a level 1-saving organization, so that the physical money does not need to be transported remotely, and the transportation cost is reduced.
According to the report of the New York Union store, the American Cash Accident 2/3 circulates in foreign countries worldwide, so the threat of counterfeiting is mainly foreign. And more RMB are used abroad. With conventional methods, it is difficult to reliably prevent counterfeiting of physical currency used in remote countries. If the issuing organization is directly set up in a foreign country and the true secret coin is verified through the server of the issuing organization in a networking way, the authentication cost can be very low and the effect is much better.
The password of the true secret coin can be classified into 3 types, wherein the 1 type is the password used by a simple terminal, a manual terminal and the like, the 1 type is the password used by a service network node, and the 1 type is the password used for verification. The password used by the core is not used normally, and is reused if the password is not matched with the position or other suspicious conditions occur. After confirming that the currency is true, the checking position can be determined again, the checking result is recorded, and the currency number is changed.
In addition, the serial number of the true secret coin can be changed regularly (the true secret coin can be measured according to time or using times), the checking position is determined again, the checking result is recorded, and the like, which is called currency updating for short, so that the attack of a terminal which is counterfeited to be legal by an enemy can be prevented. The irregular material can be used continuously, and because the information is truly random, and the new checking position is truly random, after the number is changed, the enemy can hardly determine the information of the true secret coin with the new number, and the cost of the modification is low, but the modification is reliable. In the currency update, not only the number but also the position of the irregular material can be changed to increase the difficulty of the attack (increase the cost of the attack). It is not only possible to move in the left-right direction but also to rotate. In order to move, the outer edge of the irregular material can be added with a plurality of parts for fixing. The inspected area should also be less than the entire surface of the irregular material. The frame for fixing the irregular material can be made of hard plastic, and the irregular material can be taken out and installed by heating the plastic. The method is convenient to operate and low in cost, and can also be used for: the irregular material does not change the position, but 1 part is added on the true coin, which is called as a transformation data area for short, the transformation parameter of the randomly generated checking position is printed on the true coin, and the checking position is adjusted according to the parameter during each checking. The calculation amount is small, so the implementation is easy, the frequency of currency change can be high, the currency change is not needed after hundreds of times of use, the counterfeit prevention effect is very effective, and the serial number of the prior currency is difficult to change. While changing the parameters for currency updates, the irregular material does not move, which is advantageous for manufacturing.
The anti-counterfeiting characteristics and information of the prior entity currency are usually static, and only new anti-counterfeiting technologies can be continuously adopted for preventing counterfeiting, and the new technologies can be rapidly mastered by enemies. In order to prevent possible counterfeiting, governments can develop new technologies in advance and eliminate old technologies only according to a certain period, the development cost is very high, and the elimination of the old technologies can cause huge waste. In the past, the printing technology is leaked for many times, and the loss caused by the leakage is extremely huge. Many new coinage techniques are very complex and difficult to implement. For example, new edition of U.S. dollars has been released since 2011 in 5 months and 10 months in the same year and 8 days in 2013 in 10 months, more than 2 years have passed, and two-degree publication of the production process of printing has been in the meantime that significant quality problems and serious losses have occurred. The technology completely changes the situation, and the same 1 true secret coin can be used all the time as long as the true secret coin is not damaged (the serial number is variable, and irregular materials are not changed). The used technology is simple, the implementation difficulty is low, the cost is low, and the basic reason is that the anti-counterfeiting information is variable, truly random and difficult to completely copy.
In addition, the combination with informatization is also very important. Conventional paper money is required to be manufactured very highly, and paper quality, ink, and the like are not qualified if there is a slight change, so that the manufacturing is difficult and the cost is high. Especially color-changing printing, optically variable inks, are very costly. The manufacturing cost of the true secret coin is much lower. And each country often issues new edition paper currency, and the currency examine machine in the past is hardly adapted to these changes, and if only there is change such as pattern, the intelligent machine can be solved through the method of update data, but just can't do nothing to new type anti-fake characteristic, and the expense of change upgrading currency examine machine, ATM is huge too. The intelligent currency detector has stronger performance but is more expensive, while the true dense currency detector has lower price but far better performance.
The true secret may be such that: to protect the examination area, a sheath 1 may be provided outside the resistive material, and a portion containing the resistive material, hereinafter referred to as an inner core, is provided, as shown in fig. 1. For easy examination, the shape of the sheath may be rectangular, etc., and a circle does not facilitate the orientation of the currency. If the length is the same as the width, it is not convenient to determine the positive direction of the currency, the length may be 1.5 times the width, etc. There may also be 1 hole for fixing currency, hereinafter referred to as fixing hole. To reduce the inspection cost, currencies having different denominations may be used in the same size. The genuine coins with different currency types are preferably the same size. The situation of clamping and missing money is easily caused by different sizes, the design of the money counter is difficult, and the probability of wrong money amount statistics is increased. And because the sizes are the same, the true and secret coins with different currency values can be stored separately and easily. The former currency is often different in size, so that the currency is difficult to sort.
The thickness of the paper money is very small, and each paper money can only be separated by methods such as money twisting and the like, so the condition of inaccurate counting is often generated, while the thickness of the true dense money is larger, the separation is easy, and the condition of inaccurate counting is greatly reduced. To reduce the storage space, the size can be made smaller.
The service life of the paper money is short, the paper money is circulated for 300 times on average, the service life of the paper money is only 1/100 times of the service life of the coin, and the situations of residue, old, rotten, falling of a safety line and the like are easy to occur. Although the service life of the coin is long, the coin is hard to be counterfeit because of the hardness, and the pattern and the like are difficult to be made on the coin, so that the counterfeit is relatively more, and the coin is generally only used for the money with small currency value. For the government, the cost of manufacturing coins is also high, and the financial burden is also large. The cost of recycling old coin versions, which are currently over 2% counterfeit by pound 1 coins in old versions, is very high in the uk, according to england bank disclosure.
In order to distinguish the front side, the back side, the left side and the right side of the checking device, 1 bar code or magnetic strip, metal strip, etc. for representing the position information (for example 0123 on the front side from left to right and 4567 on the back side) can be respectively arranged in the middle of the front side and the back side of the sheath, and in addition, the number, the currency value, the currency type, etc. are marked, and the part for bearing the information is hereinafter referred to as an information area. The front and back sides are marked with currency numbers, conversion parameters (same numerical values) and the like, so that the cost of the checking device can be reduced, and the cost is higher when 1 sensing device is respectively arranged on the front and back sides. The information area can also be positioned on the upper side and the lower side as well as the left side and the right side 2, and the position of the mark (square, star, etc.) of the currency value can be different according to the currency value, and the color can also be different, so that the currency value is easier to distinguish, and the method is favorable for rapidly counting the total amount and distinguishing the currency type and the currency value. In nature, the money may be stored upside down, left to right, and up to down, so the denomination mark should be present on the 2-side. For 1 pile of true dense coins, the side face of the coin can be photographed, and the photos can be automatically counted by using software in a computer, a mobile phone and the like, so that the method is fast and accurate. When the account is checked, the cash and the account can be checked quickly, and even if the account is not checked immediately, the operator can be proved not to be fake if the account is checked together with the photo. The traditional mechanical cash counter can be omitted, and cameras of a computer and a mobile phone can be used, which are not imaginable for the prior paper money. This is also a barcode technology, and the past barcodes are not well adapted to this situation, and a new type of barcode needs to be developed. In the past, China has not led to the development of a new type of barcode, which changes history.
If the currency is small, in order to facilitate the identification of the currency value by human eyes, the information can be carried by not using a bar code (or a magnetic strip, a metal strip and the like), but paint for displaying the currency value is coated on the surface; the checking device can also be additionally provided with 1 magnifier to facilitate reading the bar code, so that the characters can be larger, and the bar code can be smaller. To prevent compromise, the transformation parameters may be encrypted. The space of the information area is very limited, especially the side information area, it is not easy to represent so much information in such a small space, and the kinds of money are many, so 1 standard must be established to make each kind of money easily distinguishable. For example, a two-dimensional code representing currency, how many elements should be. The country that established the standard at the earliest can use a more easily discernable, simple code. In the past, different currency detectors are adopted for the detection of the currency of different countries, customers often have doubts about the performance of the currency detectors, and due to the great difference of anti-counterfeiting characteristics, the currency detectors of the same country can detect the currency of different countries by adopting the technology, so that the functions of the currency detectors can be greatly increased, the cost of banks and governments is reduced, and the currency detection device is also beneficial to commerce and trade among different countries.
Establish 1 groove that is used for placing the inner core in the middle of the sheath, can establish 1 iron sheet on the sheath (can not establish on the surface to increase the space of printing currency value), set up 1 magnet in the corresponding position on the inner core, can fix sheath and inner core in order to protect the inner core when not examining, pull out the inner core when examining. In order to pull out the inner core, 1 notch can be reserved at the opening of the groove, 1 part for transmission is arranged outside the resistance material and is contacted with the resistance material by a rubber wheel, and the inner core is pulled out and pushed in. Or arranging a bulge 1 at the tail end of the inner core, and pulling out and pushing in the inner core by a mechanical hand. In order to prevent the inner core from slipping, 1 protrusion can be arranged on the inner core, 1 blocking object and 1 corresponding groove are arranged on the sheath, and the anti-slipping groove is referred to as an anti-slipping groove hereinafter, and is shown in figures 2 and 6. The inner core should also be marked with numbers, currency, etc. so that data can be recovered when the numbers, etc. on the sheath are damaged or the sheath is confused, which part is also referred to as information area hereinafter.
The sides of the inner core may be used to determine the inspection position, the long side being hereinafter referred to as the calibration side and the short side being hereinafter referred to as the start side. In order to improve the strength, the edge can be made of materials such as steel sheets, and the plastic is easy to wear and deform. The position of the probe can not be accurately determined only by using a common ruler, and the requirement on precision is high. The position of the probe can be manually determined by using a vernier caliper, and the conventional vernier caliper can be purchased only by tens of yuan, so that the method is easy to implement (the method can be used for a precise terminal, and is shown below). And we need to adopt 2 rectangular steel sheets, hereinafter referred to as auxiliary sheets, the long side of which is a straight line (the precision requirement is higher) and is perpendicular to the adjacent side (the precision requirement is not high). The position of the probe can be expressed in x, y coordinates. The body of the vernier caliper is flush with the calibration edge, the left cutting edge of the measuring jaw is attached to the starting edge, and the x coordinate is determined by the right cutting edge. When the reading is made to coincide with the target value, the auxiliary piece is attached to the right cutting edge, and the auxiliary piece is fixed by a fastening screw. The edge of the vernier caliper is perpendicular to the edge of the measuring jaw, so that the long edge of the auxiliary sheet is perpendicular to the calibrating edge. And measuring the position of the auxiliary sheet which is consistent with the target value of the y coordinate, attaching another 1 auxiliary sheet to the right cutting edge, and fixing the auxiliary sheet by fastening screws. The intersection of the edges of the 2 auxiliary pieces is the position where the probe should be.
2V-shaped notches can be arranged on 2 edges of the inner core, and the top points of the 2 notches are used for positioning. The inspection position can be limited to the line of the points at the top end of the notch, which can improve the positioning accuracy and speed. New gaps can be carved at regular intervals to increase the difficulty of attack. The non-conductive paint can be used for printing marks such as grid lines and the like for positioning, or metal lines are printed on the surface of the non-conductive material outside the resistance material, and the metal lines are positioned by the conductive property of the probe. Iron oxide can also be patterned and magnetized, which can be positioned with a magnetic head. If the surface of the resistance material is covered with steel, the resistance material can be directly magnetized. The prior art of positioning by using a magnetic head is mature, has high positioning precision and low price, and is easy to realize. The magnetic head is not contacted with the resistance material, so the magnetic head is not easy to wear.
For the currency with lower currency value, a plastic-lined steel sheet for 1 positioning (the plastic is not lined can change the conductive property of a resistance material and the like) can be arranged on an inner core, the positioning sheet is called as a positioning sheet hereinafter, and the checking position is selected only on the edge of the positioning sheet, so that the randomness of the checking position is reduced, but the positioning precision is higher, the positioning speed is higher, and the method is more suitable for occasions with low requirements. If the spacer is made of plastic, it may be deformed greatly due to temperature change. The positioning sheet and the inner core can be fixed by welding, gluing and the like. The position of the locating plate can be changed at regular intervals so as to increase the difficulty of attack. The position of the locating plate can be randomly generated by using a random function and the like without a computer, so that the manufacturing cost is low.
When the raw material particles for manufacturing the resistance material are small, a fine change in the inspection position results in a large change in the inspection result, so that the positioning accuracy needs to be high. In order to reduce the positioning accuracy, reduce the cost of the checking device and improve the checking speed, the double-sided circuit board (hereinafter referred to as target board) can be manufactured: the surface 1 of the copper foil is provided with a plurality of flat metal sheets (for example, 1 square millimeter) with large area (hereinafter, referred to as measuring targets), see fig. 3, the lower end is also provided with a plurality of metal sheets (hereinafter, referred to as contact targets), a lead or a via hole, a metal foil and the like are connected with the measuring targets and the contact targets, the measuring targets are insulated, and the contact targets are also insulated, see fig. 4 (which is a schematic diagram, the thickness of the copper foil is drawn to be large, and the copper foil is difficult to distinguish according to the actual size). On 2 sides of the resistive material, 1 target plate is respectively arranged (the upper and lower directions are opposite), see fig. 5, so that the probe can be inspected only by contacting the target, which can greatly reduce the positioning precision requirement. The whole of the target board with the resistive material mounted thereon may also be referred to as a resistive material.
We can manufacture the target plate by: a plurality of plastic strips with rectangular cross sections are manufactured, 3 surfaces of the plastic strips are printed with liquid mixed with copper (or other metals, the same below) powder to form lines (the copper powder can be made in an oxidation-resistant mode, the copper powder can be ground by an iron wheel, the ground iron powder can be mixed into the lines) at a certain distance, and then more metal (a copper foil with thicker thickness and higher strength is formed) is plated by an electroplating method, so that the production can be completed quickly and on a large scale, and the formed whole is called as a c plate for short. In this way, each 1 copper foil is formed into a c shape, 2 sections of the tail end become a measuring target and a contact target, the measuring target and the contact target are connected by the copper foil (hereinafter referred to as a guide foil), and sufficient space is reserved between the measuring target and the contact target for insulation. Then a plurality of c plates are stacked together (glue can be coated firstly), and then the c plates are heated and pressed to form a whole, namely the target plate with the measuring target, the contact target and the guide foil, wherein the position and the size of each measuring target are specific.
We can also do this: a plurality of plastic strips with rectangular cross sections are manufactured, 3 surfaces of the plastic strips are wrapped with copper foils, glue can be coated on a plastic block for tight combination, latticed rubber is pressed on the plastic strips, then the plastic strips are immersed in liquid, the parts except a measuring target and the like are corroded, and then the plastic strips are cleaned, so that the c plate is formed. And then a plurality of c plates are stacked together, and then are heated and pressed to form the target plate.
We can also do this: cutting a plurality of rectangular copper foils, folding and pressing for 2 times to form a c shape, cutting off the c-shaped part, putting a plastic block in the middle (gluing can be performed on the plastic block for tight combination), cutting into small blocks (the thickness is about 1 mm), plugging the small blocks with the small plastic blocks which are not wrapped with the copper foils to form 1 strip, putting the strip on a plastic sheet with a certain size together to form a c plate, stacking the c plates together, heating and pressing to form a whole. The method needs to cut for multiple times, is low in efficiency, and can also cut a plurality of small blocks for 1 time by using a plurality of blades. The method for manufacturing the target plate is more, and the metal foil can be plated on the plastic strip by an electroless plating method, so that the cost is higher. Of course, the substrate can be drilled and the via holes are plated with copper, so that the cost is high, but the positions of the via holes can be random, and the safety is high.
Then, the measuring target and the contact target (the metal exposed on the surface) can be electroplated with more metals such as copper, nickel and the like to improve the strength, a rubber plate can be placed on the substrate, a plurality of holes are formed on the rubber plate, and the shielded part can not be plated with the metal. After plating, the rubber plate is removed and can be recycled. The holes in the rubber plate for plating the contact targets may be slightly larger than the contact targets and have different shapes, which may increase the difficulty of attack. The target may then be plated with tin or the like to prevent oxidation. The measuring target can be protected by sticking a plastic film with a plurality of holes on the surface, and the positions of the holes are positioned above the measuring target and are slightly smaller than the measuring target. Although the randomness of the data is adversely affected by the fixed position and shape of the foil, the number of combinations of inspection positions is very large if the number of targets is large, and the current replication technology is considered to be nearly infinite.
In order to achieve good contact between the resistive material and the target plate, the resistive material may be first tin-plated on the contact target, heated and pressed to form the resistive material, and then the resistive material at a certain temperature is pressed to the target plate, which may melt (partially) the tin on the contact target and then cooled. Alternatively, after the resistive material is pressed, the surface of the resistive material is heated for a short time after the temperature is reduced and then pressed against the target plate. This uncertainty in melting can also present significant challenges to the attack. The contact position between the contact target and the resistance material is 1 surface, so that the randomness of the inspection result is greatly improved, and the difficulty of attack is also greatly improved.
For currency with lower currency value, the number of the targets can be reduced, the area of each target can be increased, the cost of the checking device can be reduced, the cost of manufacturing the true secret currency (a protective layer can be printed by adopting a screen printing method without exposure) can be reduced, and the like. The insulating portion around the target is small, so that the area of the target can be large, the possibility that the probe touches the target to be found is large, but the possibility that the probe touches the target around the target to be found by mistake is also large, and the difficulty is brought to printing, so that the manufacturing cost is increased, therefore, the insulating portion is not as small as possible, if the insulating portion is large, a screen printing protective film can be adopted, the exposure is not needed, the unexposed part is not needed to be cleaned, and the method is suitable for the currency with low currency value. By using the target, the inspection can be performed without using a probe, the tip of the probe is sharp and is easy to damage the target, and the small roller can be contacted with the target plate. In addition, the irregular material without the target plate can be manufactured, and the requirement on positioning accuracy is high, so that the inspection cost is high, the method is not easy to be widely adopted, and the method is suitable for occasions with high requirements on bank cards, identity cards and the like.
The resistance material is used as the currency, the hardness is high, the service life is long, the resistance material is not easy to deform, and the thickness is large. The anti-counterfeit label made of the resistance material can be bent, and the adhered part of the anti-counterfeit label is not flat, so that the thickness of the anti-counterfeit label needs to be reduced, materials which are not easy to bend, such as graphite, and materials which are easy to bend, such as tin, are reduced. The base material of the target plate is made of a material which is easy to bend.
The device for checking the true secret currency is hereinafter referred to as a checking machine, generally, the checking machine is divided into 4 types, 1 type is used for processing more currency, the structure is more complex, and the checking machine is hereinafter referred to as a network point terminal; the type 1 is used for processing small shops with less money and the like, only the inner core provided with the measuring target can be checked, the structure is simple, namely the checking speed is high due to the simple terminal; the type 1 can be positioned by manual operation of a user, only an inner core provided with a measuring target can be inspected, and the inner core is called a manual terminal for short, so that the cost is low, and the inspection speed is high; the type 1 can be automatically or manually positioned, can be used for checking inner cores without measuring targets, is called a precision terminal for short, has slightly high cost, low checking speed and high precision, and can be used for currencies with higher currency values, checks, bank cards and the like (see below). Usually only cores provided with targets need to be used, only for high monetary values etc. cores without targets. The person receives the money, may suspect the true or false, even if the person uses the checking machine to check, it is not reliable, and can be relieved by carrying 1 manual terminal with oneself.
The network point terminal is divided into a sorting part, an inspection part and the like. Sorting part, separating funnel, conveying belt, mechanical arm, etc. and it may be controlled by one-chip computer. The currency may not be oriented generally. The sales volume of the website terminal is also large, so banks, large stores and the like are concerned about the authenticity of the currency, the amount of the currency received every day is huge, and even if the proportion of counterfeit currency is low, the loss is large. The currency is poured from a hopper with a triangular cross-section with 1 vertical side and 2 vertical and inclined conveyors below, see fig. 7, where it is easily caught by a horizontal conveyor (toothed belt). The hopper is left with 1V-shaped opening for the outgoing currency, the height of which can be 1.4 currency widths, so that the erected currency can be laid down, followed by 1 segment of horizontal conveyor belt, hereinafter referred to as horizontal conveyor belt, see fig. 8; teeth with a height of about 0.8 currency thickness, 1 baffle in front of it, and a gap of about 1.5 currency thickness, which allows the separation of the overlapping currency; the distance between 2 tines is slightly longer than the length of the banknote, so that there is only 1 banknote between 2 tines; there are 1 brush which can rotate backward above it, so that the coin is positioned in front of the teeth behind, thus the position of the coin can be determined preliminarily and the handling is convenient. In order to facilitate the mechanical arm to extend and grasp the currency, gaps can be arranged on the teeth, and holes can also be arranged on the conveying belt.
In practice, when a customer inputs money, the input money is often too much to be checked immediately, and the money needs to be stored first. In addition, the currency checking is that the currency number is sent out firstly, then the checking position is received, then the checking result can be obtained, if the checking position is waited after the number is sent out for each 1 currency, the processing speed is lower, the currency can be sent out firstly and then stored, and the corresponding currency is checked after the checking position is received. Money can be stored as follows: the coin is accessed by a component similar to a bullet belt, which is a belt with a plurality of holes, hereinafter referred to as an access belt, the size and distance of the holes are fixed, and the coin can be accessed at any position at any time by referring to fig. 9. The structure of the device for depositing and withdrawing the currency is similar to a magnetic tape, 2 ends are fixed on 2 reels, 2 guide rollers are further arranged, and 2 rotating directions are respectively used for depositing and withdrawing, and the structure is shown in figure 10. To facilitate locating the access location, a marker may be placed adjacent each aperture. To facilitate insertion of currency into the aperture, a projection may be provided on the access band. The apparatus for reading the position information, the money number, the conversion parameter, etc. may be provided on the horizontal conveyor belt, and if the apparatus is provided at a position such as the access belt, the processing speed may be reduced.
When checking the currency, the inner core is pulled out first, and then the edge of the inner core is used for positioning. Then, the single chip microcomputer correspondingly changes the checking position according to the positive, negative, left and right sides of the currency, and then adjusts the position of the probe and checks the currency. If the currency is checked on one side, the direction of the currency needs to be adjusted (the two-side checking is not used, and the combination of the probe positions is more), and the currency can be sorted by a mechanical arm. To facilitate the orientation of the banknote, 1 hole, hereinafter referred to as a directional hole, may be provided at corner 1 (e.g. the upper left corner of the front). In front of the horizontal conveyor belt, there are 1 coin receiving table, the system senses that the coin falls into the coin receiving table, and after the coin is basically in place, 4 push rods push the coin to a preset position accurately. The direction of rotation is determined according to the orientation hole. The rotating part 2 is a part which is rotated in the vertical direction (for the person with the reverse side facing upwards) first, and then is a part which is rotated in the horizontal direction (for the person with the left-right error), and the latter can be rotated backwards, so that the 2 persons can not interfere. In order to avoid interference, only 2 clamps (such as left and upper, right and lower) are needed, and the clamps are reset after the work is finished. If the user is wrong in both right and left directions, 2 rotations are required. The currency can be directly conveyed to the goods opening by the mechanical arm after rotating only by the currency which rotates in the vertical direction. The money is positioned in a specific direction by the manipulator, which is high in cost and slow in processing speed, so that the checking method without direction adjustment is preferably adopted.
For a manual terminal and a simple terminal, only single-side checking can be carried out, the position of the probe is manually adjusted firstly, then the inner core of the currency is pulled out, the checked 1 surface is downward and is placed into a coin slot, and the position is adjusted.
Nowadays, electronic money (bank cards, electronic money corresponding to virtual payment account) is used more and more, because the use is very convenient, and the physical money still has some advantages, such as credible value (the amount of the fund corresponding to 1 bank card is uncertain, a seller cannot be sure that the fund is enough to pay the goods), fear of damaging the fund due to virus or hacker attack, and the like, so that the electronic money still has strong vitality. Especially in protecting property, the advantages are unmatched. Banks seem powerful but are in fact very fragile, with many banks losing customer data in the event of 911. The establishment of a disaster backup center is not only expensive, but also difficult to ensure that all data is accurate. Electronic money is easy to lose and tamper due to the limitation of the form of the electronic money, and the defects can be exactly compensated by physical money. In the past, entity currency rarely has a large face value, the reason 1 is that the face value of the entity currency stimulates the desire of huge counterfeiting, once the counterfeiting succeeds, huge harm is caused, but the current situation changes, the larger the face value of the true dense currency is, the larger the effect of protecting property is, the face value can be completely 1 ten thousand and 1 million, even the face value (such as 235 ten thousand) is determined according to the requirement of a client, and the defect that the amount of the entity currency is fixed can be overcome. Of course, too large a face value may be inconvenient to use, and arbitrary determination of the face value may result in lower security, which needs to be avoided. The use of true secret coins (which can be similar to the existing entity's large-volume deposit list) must be networked (while the true secret coins with larger face value often actively go to a reliable service network to operate instead of a roadside shop, so the relay verification method described above is just suitable), enemies cannot directly use the true secret coins, if the use is combined with the identity verification of an operator, even if the true secret coins are stolen, thieves cannot use the true secret coins, and the identity of the true secret coins is exposed, which is 1 of the most important use of the true secret coins.
For convenient use, the operation can be as follows: each bank or central bank sets up 1 special warehouse (hereinafter referred to as true secret coin bank) in each 1 city, the user needs to deposit money or pay, and can apply for the bank, the true secret coin bank changes the owner of the true secret coin with the corresponding amount into the current user, and then the new checking position and the checking result of the true secret coin are encrypted (as numbers or two-dimensional codes and the like), and then printed into paper materials (hereinafter referred to as certification materials with the action similar to deposit list) and delivered to the user through the way under the line, and the user can certify that the paper materials are the owner of the money according to the above. In order to facilitate users, paper documents can be only stored in bank outlets, and the users can call the documents according to the index numbers and can also use a U shield and the like to carry out remote operation. The paper document is used as a fundamental operation basis, so that the possibility of data loss is greatly reduced. The transmission can be encrypted by an on-line approach, and even simple encryption is difficult to crack because the encrypted object is truly random. The certification material can be transmitted to a corresponding service network point, so that the user can carry the certification material. The user pays, and the original certification material needs to be delivered to the bank, just like cashing deposit receipt 1. The proving material is 1 evidence of the true secret coin, the electronic operation is carried out through the proving material, the proving material is more convenient, and if a user personally delivers the true secret coin to a payee, the proving material is not only troublesome, but also unsafe. The position of the true secret coin is not changed, but the ownership is changed, so that the method is convenient and safe. Operators using genuine banknotes need to indicate their identity and perform a reliable check (e.g. using bank cards, identification cards, etc.) to improve security. The medium with the true secret money as a representative value is much more reliable than the medium for storing data such as a magnetic tape and a hard disk (a conventional bank). In the conventional electronic money, data is easily lost. The true secret coins are different, if the true secret coins are stored in a warehouse, the true secret coins are not easy to damage, and paper certificates stored by a user are not easy to lose. If the user stores the true secret coin, the bank can store the paper certificate or record the data on the optical disk in real time, so the data is not easy to lose. The entity currency and the electronic currency have advantages and disadvantages, and can be really successful only by reasonably fusing the entity medium and informatization.
Many people will be reluctant to idle the fund and need to deposit the fund into the bank, and the large amount of true secret money can be used as the principal money of deposit. If the bank were to credit the deposit, the funds could be obtained using the authentic coin as a mortgage and the information of the person using the coin registered.
In the past, people often draft funds by bills such as checks, drafts and the like, and true secret coins can play the same role, and the specific method is as follows: the accurate terminal for checking the true secret coin can be produced (the functions of calculation, networking and the like can be finished by a computer and a mobile phone of a client), the operation is finished by the client, and the terminal is low in price and easy to popularize. The customer firstly arrives at a service network point (hereinafter referred to as a coin outlet point) to receive a plurality of true secret coins, the coin outlet point (which can be used for randomly determining and recording a plurality of groups of check positions and check results (used as passwords, encryption keys and keys for checking money), the check positions are hereinafter referred to as password positions, encryption key positions and key positions for checking, and the true secret coins are delivered to the customer. When the client wants to send out the fund, 1 true secret coin is taken out and the serial number is sent to the coin outlet point, the coin outlet point returns to the password position, the client uses the precision terminal to obtain the password according to the password, and returning to the coin outlet point, after the password passes the verification, returning to the encryption key position and checking the key position by the coin outlet point, obtaining the encryption key by the precision terminal according to the encryption key, inputting the account number, the amount and other information of the payee into the computer by the client, encrypting and sending the collection account number and the like to the coin outlet point, decrypting the coin outlet point to obtain the collection account number and the like, and the received account number and the like are encrypted and returned by the check key, the precision terminal obtains the check key according to the position of the check key, the account number and the like are decrypted, and if the payment is matched with the record, returning a response of passing the verification to the currency outlet point, completing the payment of the fund (such as sending a payment instruction to a modern payment system) by the currency outlet point, and returning a response of successful payment after the payment is successful. In addition, the true secret coin can also play the role of a conventional invoice and the like: the tax bureau or the bank delivers the true secret money to the enterprise, and the enterprise finishes the operation by using the true secret money when declaring the tax.
The use of true secret currency to transmit password and secret key is much safer than paper bills, electronic certificates, U shields and the like, and the method integrates the convenience of electronic operation and the safety of entity media, thereby having great value and magical function.
3. Membership cards, bank cards, identity cards, or the like
Irregular materials are suitable for membership cards and the like. The membership card is usually only used in the same 1 place, so that after each verification, a new checking position can be directly and randomly generated by the same 1 server, and a checking result is recorded, so that the new checking position and the checking result can not be leaked on the network, and more anti-counterfeiting information does not need to be stored, so that the storage cost is lower.
Irregular materials can also be used for manufacturing bank cards, hereinafter referred to as secret cards. The bank card of the prior magnetic medium is easy to copy and is gradually eliminated, people start to replace the bank card with a chip card, but the production cost of the chip card is higher, the verification cost is higher, and theoretically, the chip card can also be copied as long as related keys and the like are cracked (particularly after the quantum computing technology is successfully obtained), but the manufacturing cost of the real card is very low, the copying is very difficult, the verification cost is also lower, and therefore, the advantages are very great. If the card is used only in the same location as 1, the method of using the card can be the same as that of using the membership card. If the operation is carried out on the network, in order to prevent the leakage of the verification data caused by the repeated use of irregular materials, the true secret coin can be reused to send out a password to verify the identity.
If the card is used in a different location (bank outlet or terminal), this can be done: when issuing, 1 checking position is randomly determined for 1 card in issuing unit (factory or bank) of the real card, and checking result is obtained, then the checking result and card number are stored in issuing unit; the 1 st network point using the card sends out the verification request to the issuing unit, the issuing unit returns the checking position after receiving the request, the network point gets the checking result according to the checking position and returns the checking result to the issuing unit, the issuing unit gets the verification result according to the checking position and returns the verification result to the central server, the central server forwards the message to the network point, after receiving the message, the network point randomly determines 1 new checking position, gets the checking result and stores the checking result and the card number in the server of the network point; then, each time of verification, a verification request is sent to the last 1 mesh point, the last 1 mesh point returns to the checking position, after the checking result is obtained, the last 1 mesh point completes the verification, and returns the verification result; after the verification is passed, a new inspection position is generated again, and the inspection result is recorded. Before each verification 1 time, the verification position and the verification result are not disclosed on the network, so that even if the real card is stolen, an adversary cannot obtain useful data, and the information is transmitted by using the real card in a highly safe way. And the authentication request is sent, the number of the network point must be marked, and the real network point can also receive the relevant information and respond, so that the fake network point server is difficult to cheat (cheat to check the position, use a fake card and the like).
The privacy card may also be used to pass keys, passwords, etc. After 1 card passes the verification of 1 reliable network, the server of the network randomly generates 2 (group) new checking positions (hereinafter referred to as key positions and password positions), and the obtained checking results are respectively used as keys and passwords after certain processing (for example, the number of data bits is fixed). The amount of money transferred, account number, etc. are encrypted with the key the next time the user uses the privacy card. The password can be used for indicating the identity when the server returns the confirmation information and preventing the disguise of the enemy.
If the user does not think of bank operation and wants to finish the operation at home, the operation can be carried out as follows: the user hands the card to the bank, the equipment of the bank randomly determines a plurality of checking positions and records checking results, and the user goes home and uses a precision terminal and a manual terminal to finish the operation. If the same 1 security card is used for multiple times, the probability that the same 1 checking position is used again is high, which increases the security risk. In this regard, we can also do this: the user gets a plurality of true secret coins from the coin outlet point in advance, the coin outlet point binds the information of the true secret coins with the account number of the user, and when the user goes home, the identity is indicated by the true secret card, and then the true secret card is used for encryption and the like. This can combine the convenience of electronic payment with the security of physical media, which will likely bring the bank card to 1 new era.
If the user does not have a manual terminal or the like, the user can borrow the information from the service point, and in order to improve the security, the user can not send out the check result and the like from the service point but only send out the check result and the like through the mobile phone of the user, so that the adversary can be prevented from stealing the check result (mainly an encryption key) and the like.
The advantage of a privacy card over a genuine (physical) currency is that the amount paid can vary. In the past, cash is often used for small payment, and large payment is mostly carried out in an electronic way (particularly by a bank). And perhaps, future true secret cards are used mainly for small (electronic) payments, and (physical) true secret coins are used for large payments, exactly the opposite of today.
Electronic payments are now becoming more widely used, and many are prepaid payments (transfer of funds from prepaid accounts) which may be secure every 1 payment (such as the anti-counterfeit payment technique described above), but funds in prepaid accounts are usually transferred from bank cards, which is a risky link, and once an adversary is able to gain his or her grip, the amount of funds stolen can be very large. In the past, no perfect technology for transferring accounts between a payment platform and a bank system exists, and the safety can be greatly improved by using irregular materials in the link. Each bank can issue a rechargeable card made of irregular materials, randomly determine a plurality of groups of checking positions before sending out the rechargeable card, record checking results, and respectively take the checking results as a password, a key for encrypting the rechargeable amount, a key for encrypting a return receiving result and the like (the corresponding checking positions are hereinafter referred to as password positions, rechargeable key positions, return key positions and the like), and then the rechargeable card is transmitted to each service network point through a safe way; when the user recharges, firstly, the service network checks the identity (the prior art can be adopted, and the secret card can also be used), and then, a recharging request (including the card number) is sent out; the bank calls out the password position, the recharging key position and the returning key position according to the card number and sends the password position, the recharging key position and the returning key position to the service network; the service network obtains an inspection result according to the positions, encrypts the recharge amount and the related account according to the inspection result, and sends the recharge amount and the related account to the bank; after the bank finishes recharging, the recharging amount is encrypted by a return key and returned to the service network; the service network obtains a decryption key according to the returned key, decrypts the returned ciphertext, and sends a notification of successful recharging to the user if the amount of money conforms to the record. If a plurality of users recharge from the same 1 bank, a plurality of encryption keys can be used for 1 time. Of course, it is also possible to operate directly with a true card (without using a special recharge card), whereas the so-called bank cards of the past are usually used only for inter-bank transfers, such a true card being rather not a bank card.
In addition, the irregular material can also be used as a certificate for identity certification. Today, in many important situations, people use fingerprints as a basis for determining the identity of an individual. However, since fingerprints are 1 static object, an adversary can reproduce fingerprints using a material such as rubber to deceive the adversary. In more important situations, people also use smart cards to prove identity, and passwords generated by the smart cards are changed, but the passwords are often generated by fixed algorithms, are regularly recyclable and can be cracked. If the identification (hereinafter referred to as a true secret card) is made of irregular materials, a direct random password and a secret key can be used, so that an adversary cannot crack the password and the secret key. The essential difference between the technology and the smart card 1 is that the data is generated by using a special medium which is difficult to copy, particularly in the online verification occasion, an adversary cannot cheat through the traditional electronic equipment at all, and the traditional situation that a hacker attacks through methods such as key cracking and the like cannot happen, so that the technology is the most safe technology for verifying the identity of a person in the online environment at present, and the technology and the smart card have wide and important application in the fields of national security, national defense and the like. The cost of the prior passport and the like is high, and the cost of the real secret card is much lower.
4. Signature
The irregular material is provided in the process of seeking an anti-counterfeiting method for commodities, but soon, the irregular material is found to be not only used for anti-counterfeiting of the commodities, but also has multiple purposes. It can also be used as 1 signature with extremely high security. Signature is the thing that proves the acceptance of the contract by the first and second parties. Handwritten signatures may be imitated. Electronic signatures cannot guarantee absolute security, and as long as the key is stolen or cracked, anyone can forge the electronic signature. And with irregular materials, much more reliable.
1 person can obtain 1 irregular material after the terms of one contract 1 are approved, randomly determine the checking position and record the checking result; then the text of the contract and the irregular materials are delivered to a reliable mechanism (such as a notarization department) together for storage, so that ordinary people can hardly contact the irregular materials again; when the signer needing to prove the contract surely signs the contract, the signer can inform the signer of the original checking position and the original checking result for checking the irregular materials; the organization for storing the irregular materials obtains the checking results according to the checking positions and compares the checking results, if 2 persons are matched, the signer of the contract can be proved to really sign the contract, because the irregular materials are difficult to copy and ordinary persons are difficult to know the checking positions. If the signer of the contract is certified multiple times and the contract is indeed signed, multiple groups of checking positions can be determined in advance and the checking results are recorded.
5. Secure transmission of information
Irregular materials may also be used for secure transmission of information. The secure transmission of information is very important. The most secure encryption method is the one-time pad, but the transfer of the key is often difficult. The irregular material can be used as a carrier of 1 kind of keys, and the amount of information contained in the irregular material is almost unlimited, so that if the checking position cannot be known, the keys carried by the 1 irregular material cannot be read out, and the generated ciphertext cannot be decoded. Generally, the irregular material can be transmitted separately from the information of the checking position so as to prevent the attack of the enemy. The specific method can be as follows: randomly determining 1 group of checking positions aiming at 1 irregular material to obtain a checking result, and converting the checking result into an encryption key according to a certain rule; encrypting the plaintext by using the encryption keys to generate a ciphertext; transmitting the irregular material, the checking position and the ciphertext separately; after the receiver of the information obtains the irregular material, the checking position and the ciphertext, the checking result is obtained according to the irregular material and the checking position, and the checking result is converted into a decryption key according to a certain rule; the ciphertext is decrypted by the decryption keys to generate plaintext.
In addition, the irregular material can also be used for bearing a ciphertext, and if a certain 1 plaintext is corresponding to 1 irregular material, the characteristics of each 1 position on the irregular material can be obtained, and which key is used for decryption. The key, and the location of the verification, and the irregular material are then separately transmitted to the recipient of the message. Even if 1 of the keys and the irregular materials is obtained by an adversary, the plaintext cannot be cracked. The specific method can be as follows: randomly determining 1 group of inspection positions and obtaining an inspection result aiming at 1 irregular material, and obtaining data according to the inspection result and a certain rule; according to the data and the plaintext, a decryption key is obtained according to a certain rule; transmitting the irregular material, the checking position and the decryption key separately; after the receiver of the information obtains the irregular material, the checking position and the decryption key, the checking result is obtained according to the irregular material and the checking position, and the decryption key is used to be converted into a plaintext according to a certain rule.
Irregular materials, 1 new-born thing, have many characteristics and uses, and are not known at present.
Drawings
FIG. 1 is a front view of a genuine coin as the core is pulled out
FIG. 2 enlargement of the core
FIG. 3 schematic representation of a target
FIG. 4c is a schematic view of the structure of the plate
FIG. 5 is a schematic view of the structure of the resistive material with 2 target plates
FIG. 6 a cross-sectional view of the sheath
Fig. 7 is a perspective view of a funnel of a dot terminal
FIG. 8 schematic of a horizontal conveyor
FIG. 9 schematic view of an access tape
FIG. 10 is a schematic view showing the structure of a money depositing and dispensing apparatus
Wherein: notch 1, fixed hole 2, target plate 6, notch 7, calibration edge 8, magnet 10, transmission part 11, measuring target 12, metal foil 13, contact target 14, plastic strip 15, resistance material 16, anti-slip groove 17, inner core-placing groove 18, funnel 19, V-shaped hole 20, horizontal conveyor belt 21, baffle plate 22, teeth 23, gap 24, brush 25, convex part 26, pore 27, mark 28, reel 29, guide roller 30, access belt 31
Detailed Description
The manufacturing method of the resistance material can be as follows:
mixing powdery materials with different resistivity;
the powdery materials are made into 1 body by a heating and pressing method;
then 1 or 2 target plates are added on the upper and lower surfaces.
The target plate comprises a plurality of targets and contact targets, and the targets are connected with the contact targets through metal foils.
The method for manufacturing the target plate may be:
a plurality of plastic strips with rectangular cross sections are manufactured,
printing lines on the 3 surfaces of the substrate at a certain distance by using liquid mixed with metal powder,
plating a certain amount of metal by an electroplating method;
then a plurality of plastic strips are stacked together and heated and pressed to form a whole;
then, a certain amount of metal is electroplated on the metal exposed on the surface.
The process of verifying the anti-counterfeiting material of the irregular label made of the resistance material can be as follows:
when the user purchases on the internet, the platform records the order number (the order information comprises a user name and the like), and binds the order number with the anti-counterfeiting code of the corresponding commodity. When the user receives the commodity, the server of the service station sends an anti-counterfeiting code and the like, and after the platform confirms the identity of the user according to the anti-counterfeiting code and the order number, the platform returns an inspection position to the service station; the service station obtains an inspection result aiming at the irregular label according to the inspection position, returns the inspection result to the platform, and obtains a verification result according to the inspection result.

Claims (2)

1. A method for manufacturing an anti-counterfeiting material is characterized in that,
mixing powdery materials with different resistivity;
the powdery materials are made into 1 body by a heating and pressing method;
then 1 or 2 circuit boards are added on the upper and lower surfaces, the circuit board comprises a plurality of metal sheets for contacting with the probe, a plurality of metal sheets for contacting with the whole body made of the powder with different resistivity, and the metal sheets for contacting with the probe, the metal sheets for contacting with the whole body made of the powder with different resistivity are connected by metal foils.
2. The method for producing a forgery prevention material according to claim 1, wherein the method for producing a circuit board comprising a plurality of metal pieces for contacting with a probe and a plurality of metal pieces for contacting with the whole made of the powder having different specific resistance comprises the steps of,
a plurality of plastic strips with rectangular cross sections are manufactured,
printing lines on the 3 surfaces of the substrate at a certain distance by using liquid mixed with metal powder,
plating a certain amount of metal by an electroplating method;
then a plurality of plastic strips are stacked together and heated and pressed to form a whole;
then, a certain amount of metal is electroplated on the metal exposed on the surface.
CN202011175721.8A 2017-11-27 2017-11-27 Application of novel anti-counterfeiting material in commodity anti-counterfeiting, currency anti-counterfeiting, bank card and the like Pending CN112406354A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011175721.8A CN112406354A (en) 2017-11-27 2017-11-27 Application of novel anti-counterfeiting material in commodity anti-counterfeiting, currency anti-counterfeiting, bank card and the like

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011175721.8A CN112406354A (en) 2017-11-27 2017-11-27 Application of novel anti-counterfeiting material in commodity anti-counterfeiting, currency anti-counterfeiting, bank card and the like
CN201711254446.7A CN109835084B (en) 2017-11-27 2017-11-27 Application of novel anti-counterfeiting material in anti-counterfeiting payment, currency anti-counterfeiting, bank card and the like

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201711254446.7A Division CN109835084B (en) 2017-11-27 2017-11-27 Application of novel anti-counterfeiting material in anti-counterfeiting payment, currency anti-counterfeiting, bank card and the like

Publications (1)

Publication Number Publication Date
CN112406354A true CN112406354A (en) 2021-02-26

Family

ID=66882736

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201711254446.7A Active CN109835084B (en) 2017-11-27 2017-11-27 Application of novel anti-counterfeiting material in anti-counterfeiting payment, currency anti-counterfeiting, bank card and the like
CN202011175721.8A Pending CN112406354A (en) 2017-11-27 2017-11-27 Application of novel anti-counterfeiting material in commodity anti-counterfeiting, currency anti-counterfeiting, bank card and the like

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201711254446.7A Active CN109835084B (en) 2017-11-27 2017-11-27 Application of novel anti-counterfeiting material in anti-counterfeiting payment, currency anti-counterfeiting, bank card and the like

Country Status (1)

Country Link
CN (2) CN109835084B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024060346A1 (en) * 2022-09-21 2024-03-28 海南时空科技股份公司 Rubber tapping and latex collecting control method and system, front end, and server

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110473461A (en) * 2019-09-10 2019-11-19 上海双一防伪科技有限公司 A kind of production method of texture anti-fake label
CN110789248B (en) * 2019-10-12 2021-06-08 中钞印制技术研究院有限公司 Encrypted anti-counterfeiting element
CN111055595B (en) * 2020-03-04 2020-10-27 深圳市鹏航印刷有限公司 Magnetic suction type electrostatic dispersion anti-counterfeiting particle printing robot assembly line

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101540005A (en) * 2009-04-10 2009-09-23 顾泽苍 Method for processing random figure code
CN101770590A (en) * 2009-01-04 2010-07-07 郑阿奇 Resistance-based true random anti-counterfeiting product containing self-certification information and method thereof
CN103518212A (en) * 2011-03-04 2014-01-15 维萨国际服务协会 Payment card system and method
CN104497714A (en) * 2014-12-09 2015-04-08 上海印钞有限公司 Carving gravure ink with conductivity and anti-counterfeiting file printed by same
WO2016133601A2 (en) * 2015-01-09 2016-08-25 Sri International Unclonable rfid chip and method

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3843075C2 (en) * 1988-12-21 2003-08-14 Gao Ges Automation Org Security document with an electrically conductive security element embedded in it
DE10149265A1 (en) * 2001-10-05 2003-04-17 Giesecke & Devrient Gmbh Security marking for goods or packages, used in authentication or logistics tracking, comprises overprinting with inks having different spectral properties
CN1388477A (en) * 2002-07-01 2003-01-01 许毅群 Comprehensive anti-fake mark and its making process
JP2004178432A (en) * 2002-11-28 2004-06-24 Konica Minolta Holdings Inc Ic card and manufacturing method for the same
CN102191722B (en) * 2011-04-14 2013-08-28 保定钞票纸业有限公司 Multiple anti-counterfeit watermark paper and manufacturing method thereof
CN202473074U (en) * 2011-09-30 2012-10-03 张春元 Random texture anti-counterfeiting label
CN202608159U (en) * 2012-02-29 2012-12-19 3M中国有限公司 Safe-guarding and anti-counterfeiting thin film
DE102012220703B4 (en) * 2012-11-13 2017-11-02 Bundesdruckerei Gmbh Security feature for a value and / or security product, the security and / or security product and method for producing the security feature
CN103572659B (en) * 2013-09-24 2016-03-09 广东冠豪高新技术股份有限公司 A kind of anti-counterfeiting carbonless copy paper and preparation method
CN106149467A (en) * 2015-03-23 2016-11-23 樊官保 A kind of friction variable color or roll wipe look cheque paper and manufacture method thereof
CN104988798B (en) * 2015-07-24 2017-06-06 中国人民银行印制科学技术研究所 A kind of anti-false fiber and preparation method thereof
US10385239B2 (en) * 2016-04-04 2019-08-20 Intertape Polymer Corp. Carton sealing tape with a plurality of security features
CN106192561A (en) * 2016-07-08 2016-12-07 广东松炀再生资源股份有限公司 A kind of Anti-fake thermosensitive paper and production method thereof
CN107169218B (en) * 2017-05-26 2020-09-01 陕西科技大学 Simulation method for digital information implantation of paper
CN107100033A (en) * 2017-06-07 2017-08-29 合肥励仙电力工程有限公司 A kind of preparation method of false proof paper products

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101770590A (en) * 2009-01-04 2010-07-07 郑阿奇 Resistance-based true random anti-counterfeiting product containing self-certification information and method thereof
CN101540005A (en) * 2009-04-10 2009-09-23 顾泽苍 Method for processing random figure code
CN103518212A (en) * 2011-03-04 2014-01-15 维萨国际服务协会 Payment card system and method
CN104497714A (en) * 2014-12-09 2015-04-08 上海印钞有限公司 Carving gravure ink with conductivity and anti-counterfeiting file printed by same
WO2016133601A2 (en) * 2015-01-09 2016-08-25 Sri International Unclonable rfid chip and method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024060346A1 (en) * 2022-09-21 2024-03-28 海南时空科技股份公司 Rubber tapping and latex collecting control method and system, front end, and server

Also Published As

Publication number Publication date
CN109835084A (en) 2019-06-04
CN109835084B (en) 2021-07-16

Similar Documents

Publication Publication Date Title
US8497983B2 (en) Optical authentication
KR101168932B1 (en) Methods and apparatuses for creating authenticatable printed articles and subsequently verifying them
CN109835084B (en) Application of novel anti-counterfeiting material in anti-counterfeiting payment, currency anti-counterfeiting, bank card and the like
US7978899B2 (en) Currency processing system with fitness detection
US20060294583A1 (en) Authenticity Verification
CN106570710A (en) Commodity anti-counterfeiting method and device
US20070234058A1 (en) System and method for authenticating products
JP5253463B2 (en) Optical authentication
WO2006120398A1 (en) Authenticity verification by means of optical scattering
TW200806004A (en) Copying
CN104881811B (en) Management method, system and device for electronization of bill information
US20200033834A1 (en) Proving Material Identity with Quantum Randomness -- Financial and General Applications
KR100588238B1 (en) Bank cheque system with cheques having magnetized strips and/or storage chips
CN101385037A (en) Optical authentication
CN112116865A (en) Product insurance fidelity anti-counterfeiting method and marker
KR101114542B1 (en) Discrimination method and apparatus for forgery of wertpapier, and Recording medium thereof
CN115760151A (en) Management method and system of jewelry tracing information
JP2018504829A (en) Method for authenticating and verifying a security document based on measuring relative position variations in different processes involved in the creation of the security document
CN111222980B (en) Method for carrying out export credit item lower discount based on blockchain and storage medium
KR100965332B1 (en) Method for producr item tracking
KR101903370B1 (en) Electronic accounting server and system to issue revenue stamp having the same
KR101619151B1 (en) System for detecting forged or altered checks and the method thereof
CN116596550A (en) Digital certificate anti-counterfeiting system, terminal and cloud public platform for geographic mark products
KR20180098212A (en) Electronic accounting server and system to issue revenue stamp having the same
KR20150142663A (en) Electronic accounting server and system to issue revenue stamp having the same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
DD01 Delivery of document by public notice

Addressee: Wu Ningfei

Document name: Notice of passing preliminary examination of invention patent application

DD01 Delivery of document by public notice
DD01 Delivery of document by public notice

Addressee: Wu Ningfei

Document name: Notice of publication and substantive examination of invention patent application

DD01 Delivery of document by public notice
DD01 Delivery of document by public notice

Addressee: Wu Ningfei

Document name: Notification of eligibility

DD01 Delivery of document by public notice
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20210226

WD01 Invention patent application deemed withdrawn after publication