Utility model content
The purpose of this utility model is to provide a kind of anti-copy file, and the anti-copy file is readily identified, and identification is high,
It is false proof reliable, and make simple, quick, with low cost, so as to overcome existing anti-copy documenting complex process, cost higher
The problems such as.
To achieve the above object, the utility model is adopted the following technical scheme that:
A kind of anti-copy file, including file base layer, the file base layer are provided with anti-counterfeit recognition area, the anti-counterfeit recognition
Anti-copy printing layer is printed with area, the anti-copy printing layer includes the first color of different colourity printings is respectively adopted
Spend printing layer, the second colourity printing layer and the 3rd colourity printing layer, wherein, the first colourity printing layer use rgb value for
The colourity printing of (68,68,68), the second colourity printing layer uses rgb value to be printed for the colourity of (0,0,0), the printing of the 3rd colourity
Layer uses rgb value to be printed for the colourity of (240,240,240).
As a further improvement, partly being overlapped between the first colourity printing layer and the second colourity printing layer.
The second colourity printing layer is partially overlapping on the first colourity printing layer.
The second colourity printing layer prints in the overlapping part provided with least one using rgb value as the colourity of (0,0,0)
The comparison mark of system.
The first colourity printing layer, the second colourity printing layer and the 3rd colourity printing layer are set in a row, wherein, it is described
The end of first colourity printing layer and the head end of the second colourity printing layer overlap mutually, and the head end of the 3rd colourity printing layer is immediately
In the second colourity printing layer end.
The first colourity printing layer, the second colourity printing layer and the 3rd colourity printing layer are printed on anti-dummy string respectively,
The mark that compares is before the anti-dummy string of the second colourity printing layer.
The anti-dummy string is from the GUID automatically generated.
There is the friendship of a character bit in the head end of the end of the first colourity printing layer and the second colourity printing layer
It is folded, it is described to compare a character being labeled as located at the overlapping part, false proof word of the character close to second printing layer
The first character of string is accorded with, and is overlapped mutually with the ultimate character of the anti-dummy string of first printing layer.
Described compare is labeled as character "-".
The file base layer is paper layer.
Due to using above-mentioned technical proposal, the utility model at least has advantages below:
(1) the anti-counterfeit recognition area of the anti-copy file of the utility model need not take the big quantity space of file base layer, can be in maximum
Limit retains original document form, also, anti-copy file is readily identified, and identification is high, only need to can be real by visual discrimination
Existing false proof purpose is false proof simple, reliable.
(2) making of the anti-copy file of the utility model is simple, quick and with low cost, specialty need not be used anti-during making
Pseudo- software, and the limitation using specialties and special ink can be departed from, documenting speed can be effectively improved.
(3) the anti-copy printing layer in anti-counterfeit recognition area uses the form of character string, simple and convenient, and character string can be using automatic
The GUID of generation, it is easy to generate, identifier is not repeated reliably, with good uniqueness, therefore is alternatively arranged as
The security code of certification identification.
(4) it is overlapping by setting, and mark further is compared in overlapping part setting, it can to print the first colourity
Layer, the colour difference of the second colourity printing layer have good identification, prevent from being difficult identification, or cause erroneous judgement.
Embodiment
The utility model is based primarily upon following principle there is provided a kind of anti-copy file.The existing most of office of in the market
Common grating duplicator is when it is (240,240,240), (0,0,0), the image of (68,68,68) three kinds of colourity mixing to duplicate RGB
(RGB as shown in fig. 1, is from top to bottom followed successively by figure for (240,240,240), (68,68,68), the chromatic diagram of (0,0,0)
As example), due to grating blind spot, common grating duplicator can not duplicate aobvious to the image that colourity is RGB (240,240,240)
Show.Therefore, according to this point, the utility model is poor using colour, realizes the anti-copy scheme of visual file.
Anti-copy file described in the utility model, including file base layer, the file base layer are provided with anti-counterfeit recognition area,
Anti-copy printing layer is printed with the anti-counterfeit recognition area, the anti-copy printing layer includes different colourity printings are respectively adopted
The first colourity printing layer, the second colourity printing layer and the 3rd colourity printing layer, wherein, the first colourity printing layer is adopted
Printed with rgb value for the colourity of (68,68,68), the second colourity printing layer uses rgb value to be printed for the colourity of (0,0,0), the 3rd
Colourity printing layer uses rgb value to be printed for the colourity of (240,240,240).
Above-mentioned file base layer can be that paper layer can also be that other can carry out the material of ink printing, such as plastics, with
Paper document best results.If above-mentioned file is duplicated, then the 3rd colourity printing layer will be unable to display, if artificial adjust
Whole gray level image, the 3rd colourity printing layer is shown by force, then the first colourity printing layer and the second colourity printing layer will be colourless
Difference.Therefore, as long as according to whether the 3rd colourity printing layer of display combines the aberration for comparing the first and second colourity printing layers, you can
Whether be the hard-copy file forged, realize simple and reliable false proof if judging current file.
Compared in order that obtaining and aberration easily being carried out between the first colourity printing layer and the second colourity printing layer, preferably
Ground, sets between the first colourity printing layer and the second colourity printing layer that to there is part overlapping, and set in crossover region can be with
The comparison mark contrasted for both.Specifically, the second colourity printing layer can be set and is partially overlapping in the first colourity printing
On layer, the comparison that the second colourity printing layer is printed provided with least one in its overlapping part using rgb value as the colourity of (0,0,0)
Mark.Because the colourity of the second colourity printing layer under normal circumstances is deeper, comparison, which is marked in the first colourity printing layer, easily to be sent out
Now with identification, it is to avoid be difficult identification, or cause erroneous judgement.
Further, in order to prevent anti-counterfeit recognition area space occupied on file base layer excessive, and anti-counterfeit stamping is simplified
The setting form of brush layer, it is preferable that the first colourity printing layer, the second colourity printing layer and the 3rd colourity printing layer are in a row
Set, wherein, the end of the first colourity printing layer and the head end of the second colourity printing layer overlap mutually, the 3rd colourity print
The head end of brush layer is immediately in the second colourity printing layer end.It is preferred that above-mentioned printing layer can use simple character string
Form, it is easy to set, saves space, reduced form.
It is described in detail below in conjunction with accompanying drawing and the specific embodiment anti-copy file above-mentioned to the utility model.Should
Understand, the embodiment is merely to illustrate and unrestricted the utility model.
It is a kind of anti-copy certificate of embodiment of the utility model as shown in Figure 3, the certificate file is paper document, i.e.,
The file base layer is paper layer.Described anti-counterfeit recognition area 1, the anti-counterfeit recognition are provided with the lower left corner of the certificate file
Anti-copy printing layer as shown in Figure 2 is printed with area 1.
Specifically, as shown in Figure 2, the anti-copy printing layer includes setting in a row the first colourity printing layer, the
Two colourity printing layers and the 3rd colourity printing layer, the leftmost side are the first color for using rgb value to be printed for the colourity of (68,68,68)
Printing layer is spent, the rightmost side is the 3rd colourity printing layer of the colourity printing for using rgb value to be (240,240,240), in the middle of both
To use the second colourity printing layer that rgb value is printed for the colourity of (0,0,0).False proof word is printed on respectively in three colourity printing layers
Symbol string, wherein, marked before the anti-dummy string of the second colourity printing layer provided with described compares, i.e. character "-".
The character "-" close to the anti-dummy string of second printing layer the first character, and with the false proof word of first printing layer
The ultimate character of symbol string overlaps mutually, i.e., the end of described first colourity printing layer exists with the head end of the second colourity printing layer
One character bit it is overlapping.
The anti-dummy string of anti-copy printing layer is from the GUID (GUID automatically generated in above-mentioned Fig. 2
Code), GUID is easily generated, and identifier is not repeated reliably, the unique generation worked out using GUID
Code, with good uniqueness, therefore is alternatively arranged as the security code of certification identification and uses.If not using GUID codes, and use
Other patterns or word, are also feasible in the utility model.
Specifically, the implementation method of the anti-copy printing layer of character string forms is as follows in Fig. 2:GUID is generated with system algorithm
Code, the "-" got rid of in generated GUID codes obtains 32 character codes, and the 32 character codes segmentation interception of acquisition is obtained
Three character strings, are 10 (the calling character string A in the following text) of interception since the 1st (including the 1st) respectively, from the 11st (including the
11) start to intercept 11 (calling character string B in the following text), 11 (calling character string C in the following text) is intercepted since the 22nd (including the 22nd).
By character string B with color RGB (68,68,68) export, then will before character string C plus character "-" then with color RGB (0,0,
0) export, the "-" that character string C is above added is covered in the character string B last characters exported to distinguish color, this
In because character string B, C color distinction is smaller, character string is not blocked using "-", can be with apparent carry out color contrast, finally
Character string A is exported in character string C back with color (240,240,240).
Due to using above technical scheme, above-mentioned certificate file is if there is duplicating, then the 3rd section of character string will be unable to
It has been shown that, if artificially adjusting gray level image, by the 3rd section of character string display, then preceding two sections of character strings are by no color differnece, Ke Yiqing
It is clear to discern whether as copy, and GUID codes are unique code of each certificate, can as certificate unique anti-counterfeiting mark.
It is described above, only it is preferred embodiment of the present utility model, not makees any formal to the utility model
Limitation, those skilled in the art make a little simple modification, equivalent variations or modification using the technology contents of the disclosure above,
Fall in protection domain of the present utility model.