CN2216694Y - Cipher anti-false identifier - Google Patents
Cipher anti-false identifier Download PDFInfo
- Publication number
- CN2216694Y CN2216694Y CN 95203425 CN95203425U CN2216694Y CN 2216694 Y CN2216694 Y CN 2216694Y CN 95203425 CN95203425 CN 95203425 CN 95203425 U CN95203425 U CN 95203425U CN 2216694 Y CN2216694 Y CN 2216694Y
- Authority
- CN
- China
- Prior art keywords
- password
- code
- product
- cipher
- covering layer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Landscapes
- Credit Cards Or The Like (AREA)
Abstract
The utility model relates to a cipher anti-counterfeiting identifier, composed of a carrier (1), a printed code (2), a cipher (3) and a covering layer (4). The cipher (3) is printed at the back face of the covering layer (4) which is a label of a product. An identity is designed, made and encoded on a producer's product or an operator's product. Each identity is provided with one or more code and corresponding buried ciphers which only belong to the identity. Adopting the identity, the complex technical behavior of identifying whether a product is true or not can be transformed into the simple behavior of verifying the cipher by telephoning. Besides, the identification is accurate and reliable.
Description
The utility model relates to a kind of cipher counterfeit-proof product, particularly a kind of sign that it is provided with password, makes things convenient for the consumer to discern the false from the genuine.
In order to reduce the fake and forged harm that production, operator and consumer are caused, people have invented all anti-fake products and method for anti-counterfeit, as methods such as laser anti-counterfeit trade mark, watermark, special paper China ink, lead sealings, but the high chi in road, magic high a zhang, nearly all best brand of product is still palmed off, still is forged.This is that they are difficult to effectively utilize by rule of thumb the true and false that product is discerned in these false proof measures because modern science and technology highly developed be enough to make the adulterator to accomplish to mix the spurious with the genuine, and the consumer is not well-trained.The method of setting up magnetic electron false proof " release " on product is also arranged, and the product of same a kind of specifications and models of producing because of its same factory all uses same " release ", because of its " release " is general, so still be worth forging, also can forge.And the consumer must buy special-purpose " truth identification device " and distinguish true from false, and inconvenience is differentiated.
The purpose of this utility model be to provide a kind of utilize phone inquire about discrimination simple, be convenient to the anti-counterfeiting mark discerning, can not forge.
Task of the present utility model is finished like this: on the false proof product of needs, as: trade mark, packing material, bottle cap, on the object plane such as seal and label, make a kind of cipher counterfeit-proof sign of utilizing phone to inquire about discrimination, its organization plan is, select above-mentioned object plane as the sign carrier, establish code at seal on the carrier, password, and password buried with coating or other material covering layers such as (as the scraps of paper), make it and directly to be seen by the people, code is encoded by certain rule, each sign all seal is provided with one or more codes of only giving it, and each code all is equipped with one or more groups password.The cipher counterfeit-proof sign of making like this, be index with each code again, the corresponding information that code is represented stores in the news file storehouse that the service of Help by Phone authentication password can be provided (in computer) with corresponding password encryption, and indicates the telephone number in its news file storehouse on sign.
Adopt the product of the utility model cipher counterfeit-proof sign, when buyer's desire is differentiated authenticity of products, just can open covering layer, see its password that the news file storehouse of setting up of making a phone call to is gone, by artificial or computer automatic sound information system verification encrypted message; If password is correct, then its code information just can be accessed, represent that promptly its product is a genuine piece, otherwise, if the password mistake, then its code information can't access, represent that this product is a clone, be repeated to utilize that each code information should be disposable for preventing the code information in the news file storehouse, promptly meet once accessing checking, the requirement that just is eliminated or cancels.
Adopt the product of the utility model cipher counterfeit-proof sign, production, operator's product can not be emitted by puppet, and this is because each sign all has one or more codes that only belong to it, and its corresponding password is arranged.Has only its product of purchase, just have the right to open its sign and go up buried password, if password authentification is correct, then this code information in the news file storehouse is promptly cancelled after the disposable use, prevented to utilize its code and password once more, even if adulterator's superb skill, the product of forgery and genuine piece striking resemblances, can't in batches pseudo-ly produce the proper password that meets its code also, more the code forged and password can't be sent and deposit in the news file storehouse that producer sets up.
Below in conjunction with embodiment and accompanying drawing thereof the utility model is described further.Embodiment only in order to explain the utility model, can not think restriction of the present utility model.
Embodiment 1
Description of drawings:
Fig. 1 is a kind of cut-open view of the utility model cipher counterfeit-proof sign.
Referring to Fig. 1, be example with famous Chinese alcoholic drinks's Maotai, suppose that brewery was from January 1st, 96.Each of dispatching from the factory bottle wine, all adopt this cipher counterfeit-proof sign, then can, with the carrier (1) of bottle cap for this cipher counterfeit-proof sign, sequentially thereon, with sequence code (2) and password at random (3) on the computer spray printing machine spray printing: 6000001.3675 6000002.2479 6000003.9783 ... 6188889.3388 ... last bottle of producing up to this year, to 1 year promptly 97 years again by 7000001.4353 7000002.3940 7000003.2749 ... encode in order so always, each bottle cap is all printed be provided with a code (2) of only giving it, the password of arbitrarily writing (3), telephone number (5) with same news file storehouse, as 0898-6212392, password (3) applies with the relatively poor coating of adhesion (4) or other material (as the scraps of paper) hides, make it and directly to be seen, and be index with each sequence code (2), the brand of the wine that it is represented, specification, feature, information such as quality store in the computerized information file store that manufacturer sets up with password encryption.Example: a buyer prepares to buy one bottle of Maotai in shop, Chinese somewhere, its authentication code is numbered 6188889, but do not know to be true or false? at this moment the buyer just can wipe the coating (4) of burying password (3) earlier off, see that its password is " 3388 ", put through phone 0898-6212392 again and inform that telephonist's code is " 3388 " for the password of " 6188889 ", because password is correct, so " 6188889 " code information can manually be accessed from the computerized information file store by the telephonist, demonstrate the brand of this code product, specification, feature, information such as quality, at this moment the telephonist just can inform the brand of its code product of buyer at once, specification, feature, information such as quality, and can clearly inform " meeting above-mentioned feature; the product that your desire is bought is authentic genuine article, thanks ".Otherwise if password bad, then the telephonist can not access its code information from the computerized information file store, just can inform the consumer at once: " the password mistake, beware of imitations, the product that your desire is bought is that puppet is emitted product ".
It below only is an example of implementing, cipher counterfeit-proof is identified in the actual application, can design and produce on the different use objects, that is to say that carrier (1) can be the various different product or the position of product, as trade mark, packing material, bottle cap, seal and label etc.Covering layer (4) is used for burying password (3), is not seen, is not stolen by the people by the people to guarantee its password (3).That is to say that password (3) must hide buries, and code (2) can cover and can not cover.According to different needs, covering layer (4) also can select for use different material to become different shapes.Code (2), password (3) are a kind of digital code informations, can print to be set on the carrier (1), also can print the inner face that is set to covering layer (4).The cipher counterfeit-proof sign that designs and produces like this, discern the false from the genuine by inquiring its password of checking by telephone, thereby the complex behavior of the pure technology of differentiating authenticity of products, changed into the simple behavior that inquires by telephone, the adulterator also can't send code, the password archives of forging and deposit in the ad hoc news file storehouse of producer, so, adopt the product of this cipher counterfeit-proof sign to forge, discern simple and reliable.
Claims (3)
1, a kind of cipher counterfeit-proof marker that utilizes phone to inquire about discriminating is characterized in that:
A, it is to be made of code (2) password (3), covering layer (4) that carrier (1), seal are established;
B, the code (2) of encoding by certain rule, each sign all seal is provided with one or more codes of only giving it, and each code (2) all is equipped with one or more groups password (3);
C, password (3) are buried on the carrier (1) by covering layer (4).
2, according to the described marker of claim 1, its feature also is to identify and is provided with the telephone number (5) that the news file storehouse of authentication password service is provided for the inquiry.
3, according to claim 1 or 2 described markers, its feature is that also described covering layer (4) is a kind of label of product, and password (3) seal is located at its back side.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 95203425 CN2216694Y (en) | 1994-12-07 | 1995-02-07 | Cipher anti-false identifier |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 94117444 CN1124389A (en) | 1994-12-07 | 1994-12-07 | Anti-fake method by product cipher |
CN94117444.1 | 1994-12-07 | ||
CN 95203425 CN2216694Y (en) | 1994-12-07 | 1995-02-07 | Cipher anti-false identifier |
Publications (1)
Publication Number | Publication Date |
---|---|
CN2216694Y true CN2216694Y (en) | 1996-01-03 |
Family
ID=34065481
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 95203425 Ceased CN2216694Y (en) | 1994-12-07 | 1995-02-07 | Cipher anti-false identifier |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN2216694Y (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000008621A1 (en) * | 1998-08-08 | 2000-02-17 | Mingfa Chen | Structure vein anti-counterfeit method |
CN101398918B (en) * | 2007-09-26 | 2012-02-22 | 武传来 | False proof code coding method based on digital belt |
US11836804B2 (en) | 2019-01-27 | 2023-12-05 | Hainan Paipaikan Information Technology Co., Ltd. | Anti-fake packing method for product liability insurance |
-
1995
- 1995-02-07 CN CN 95203425 patent/CN2216694Y/en not_active Ceased
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000008621A1 (en) * | 1998-08-08 | 2000-02-17 | Mingfa Chen | Structure vein anti-counterfeit method |
CN101398918B (en) * | 2007-09-26 | 2012-02-22 | 武传来 | False proof code coding method based on digital belt |
US11836804B2 (en) | 2019-01-27 | 2023-12-05 | Hainan Paipaikan Information Technology Co., Ltd. | Anti-fake packing method for product liability insurance |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6623041B1 (en) | Method for discerning false from genuine | |
CN102163291B (en) | Laser marking multi-encrypted two-dimensional code fingerprint anti-counterfeit authentication method and system | |
US7438237B2 (en) | Method for identification and authenticating without specific reader an identifier | |
CN102054183B (en) | Product anti-counterfeiting system and method based on wireless radio frequency identification and digital watermarks | |
WO2018068519A1 (en) | Anti-counterfeiting texture recognition method | |
CN101987536B (en) | Digital color identification system-based anti-counterfeit digital code printing method and inquiry method | |
CN106960352A (en) | A kind of method for anti-counterfeit based on picture uniqueness | |
RU2199781C1 (en) | Method for branding commodity, or part, or structure for its identification (alternatives) and system for identifying commodity, of part, or structure branded by this method (alternatives) | |
US20210350193A1 (en) | Anti-counterfeiting image code embedded in a decorative pattern of a ceramic tile and anti-counterfeiting method thereof | |
CN2563669Y (en) | Three-dimension grain anti-fake mark | |
CN111882327A (en) | Anti-counterfeiting tracing method with identity characteristics and capable of actively feeding back information to system | |
CN2216694Y (en) | Cipher anti-false identifier | |
CN1124389A (en) | Anti-fake method by product cipher | |
CN101013499A (en) | Method for identifying and inquiring about genuine-fake commodity with communication technology | |
CN2507711Y (en) | Light-transmission material sign plate with antiforging marker | |
CN1123944A (en) | Method of preventing counterfeit by secret code and the product | |
CN2552093Y (en) | Transfer anti-forge identifying sign | |
CN108875866A (en) | A kind of two dimensional code article identity dicode identification method | |
CN100532715C (en) | Paper false-proof method | |
CN102081879B (en) | Method for preventing counterfeit by describing superposition state of printed lines and spots and fiber yarns and fiber particles contained in carrier | |
CN201662818U (en) | Anti-fake certification device with laser-marking and multi-encrypting two-dimensional code fingerprint | |
CN2432646Y (en) | Telephone inquiry antifalse label | |
CN214311764U (en) | Magnifying glass, anti-counterfeiting mark system and anti-counterfeiting structure system | |
CN1206160A (en) | Magnetic card and IC card product anti-fake method | |
CN214311766U (en) | Anti-counterfeiting structure system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C57 | Notification of unclear or unknown address | ||
DD01 | Delivery of document by public notice |
Addressee: Chen Mingfa Document name: Closing notice |
|
C57 | Notification of unclear or unknown address | ||
DD01 | Delivery of document by public notice |
Addressee: Chen Mingfa Document name: Notice of acceptance of invalid declaration |
|
C57 | Notification of unclear or unknown address | ||
DD01 | Delivery of document by public notice |
Addressee: Chen Mingfa Document name: payment instructions |
|
C35 | Partial or whole invalidation of patent or utility model | ||
IW01 | Full invalidation of patent right |
Decision date of declaring invalidation: 19991129 Decision number of declaring invalidation: 1640 |