WO2013063871A1 - 一种基于二维图形编码防伪的方法、标签及标签制作方法 - Google Patents

一种基于二维图形编码防伪的方法、标签及标签制作方法 Download PDF

Info

Publication number
WO2013063871A1
WO2013063871A1 PCT/CN2012/070164 CN2012070164W WO2013063871A1 WO 2013063871 A1 WO2013063871 A1 WO 2013063871A1 CN 2012070164 W CN2012070164 W CN 2012070164W WO 2013063871 A1 WO2013063871 A1 WO 2013063871A1
Authority
WO
WIPO (PCT)
Prior art keywords
dimensional graphics
code
dimensional
graphic
print carrier
Prior art date
Application number
PCT/CN2012/070164
Other languages
English (en)
French (fr)
Inventor
岳铁刚
冯林
Original Assignee
Yue Tiegang
Feng Lin
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yue Tiegang, Feng Lin filed Critical Yue Tiegang
Publication of WO2013063871A1 publication Critical patent/WO2013063871A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • G06K19/06056Constructional details the marking comprising a further embedded marking, e.g. a 1D bar code with the black bars containing a smaller sized coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/08Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
    • G06K19/10Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards
    • G06K19/18Constructional details
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/74Image or video pattern matching; Proximity measures in feature spaces
    • G06V10/75Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video features; Coarse-fine approaches, e.g. multi-scale approaches; using context analysis; Selection of dictionaries
    • G06V10/757Matching configurations of points or features
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/80Recognising image objects characterised by unique random patterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/003Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/95Pattern authentication; Markers therefor; Forgery detection

Definitions

  • the invention relates to an anti-counterfeiting method, a label and a label making method, in particular to a method, a label and a label making method based on two-dimensional graphic encoding anti-counterfeiting.
  • Anti-counterfeiting is to solve a problem that is not easy to forge and easy to identify.
  • the purpose of anti-counterfeiting is mainly to distinguish products of different merchants.
  • the anti-counterfeiting method is mainly for consumers to realize the identification of authenticity directly through the naked eye without tools.
  • the principle of this anti-counterfeiting technology is to make anti-counterfeiting marks with special printing technology, such as Holographic anti-counterfeiting, because this printing technology is difficult, especially the template is difficult to plagiarize, so the anti-counterfeiting cost is very high.
  • anti-counterfeiting is a special mark made by special equipment and technology, such as laser anti-counterfeiting code and recessive ink anti-counterfeiting. , anti-counterfeiting, anti-counterfeiting, etc., because this kind of anti-counterfeiting features are difficult to identify with the naked eye, it is necessary to use a special inspection instrument to distinguish the authenticity, so its applicability is not wide, it can only be used for the anti-counterfeiting of valuables.
  • password anti-counterfeiting technology which is to compile a set of digital random passwords for the product, print the password on the logo and cover it.
  • the password is stored in a computer database that can be queried by the consumer. After the product is purchased, the consumer tears the password on the identifier by phone, fax or the Internet for comparison and identification. The same is true, the difference is false, and this A password is obtained through a complex operation. It is difficult to calculate the algorithm, and it is difficult to know all the other correct passwords through a password, which has certain anti-counterfeiting. However, since a series of numbers can be solved by a computer program exhaustive algorithm, its anti-counterfeiting is not high.
  • the two-dimensional graphic coding can not only identify each product but also perform anti-counterfeiting identification. It is more difficult to crack through a computer program than a digital code, but the two-dimensional graphics coding is actually a digital code consisting of ' ⁇ ' and ⁇ ', or can be solved by the exhaustive method of computer programs. On the other hand, criminals can still Scan the 2D graphics code and print it out for counterfeiting. Its security is also not particularly high.
  • a method of anti-counterfeiting through texture is conceived, mainly to change the anti-counterfeiting feature of the anti-counterfeiting printing of the electronic code into a structural texture inherent to the non-human-made marking material, which is to intentionally manufacture the fiber-optic structure.
  • the graphics on the paper are scanned and stored in a database that can be queried, and then the anti-counterfeiting mark is divided into 12 small squares. The consumption is used to query the 12 small squares for the presence or absence of fibers or cores to identify the true and false.
  • the method prevents the criminals from copying the graphics, the query procedure is complicated, the comparison is very complicated, the consumer query rate is also very low, and a large number of identifiers are not queried, which means that no anti-counterfeiting is used.
  • the object of the present invention is to solve the problems existing in the prior art, and to provide a method, a label and a label making method based on two-dimensional graphic encoding anti-counterfeiting.
  • the present invention provides a method for encoding anti-counterfeiting based on two-dimensional graphics, the method comprising: printing a two-dimensional graphics code on a product; the image reading device reads a two-dimensional graphics code identified on the product; acquiring an image reading device The two-dimensional graphics coding information; determining whether the two-dimensional graphics coding information is consistent with the two-dimensional graphics coding information stored in the database; if consistent, indicating that the product is genuine, if not, indicating that the product is a fake;
  • the two-dimensional graphics are encoded into one, and the two-dimensional graphics code is printed on two print carriers, and the second print carrier is pasted on the first print carrier.
  • the method further includes:
  • the method further includes:
  • the boundary position information in the two-dimensional graphic encoding read by the image reading device is stored in the database. The positional information of the dividing line is compared;
  • the method further comprises:
  • the hole distribution map and the image corresponding to the two-dimensional graphics code are found, and Sending the hole distribution map and the graphic to the display device for display;
  • the present invention also provides a label based on two-dimensional graphics encoding anti-counterfeiting, the label comprising a two-dimensional graphics code printed on a product, the two-dimensional graphics encoding being stored in a database, wherein the two-dimensional graphics encoding One, and the two-dimensional graphic code is printed on two print carriers, and the second print carrier is attached to the first print carrier.
  • the boundary between the first print carrier and the second print carrier can be read by the image reading device, and the position information of the boundary line in the two-dimensional graphics code is stored in the database corresponding to the two-dimensional graphics code.
  • the hole and the graphic are distributed on the first printing carrier and directly under the second printing carrier, and the distribution map and the graphic of the hole are stored in the database corresponding to the two-dimensional graphic code.
  • the present invention further provides a method for fabricating an anti-counterfeit label based on a two-dimensional graphics, characterized in that the method comprises the following steps:
  • Randomly attaching the second print carrier to the first print carrier of the product, printing the two-dimensional graphics code stored in the data on the two print carriers, and reading the two-dimensional graphics code by the two-dimensional graphics code reading device Obtaining a position of a boundary line in the two-dimensional graphic code, and storing the position information and the two-dimensional graphic code correspondingly in a database.
  • the two-dimensional graphics code After printing the two-dimensional graphics code stored in the data on the two print carriers, the two-dimensional graphics code is read by the two-dimensional graphics code reading device to obtain the position of the boundary line in the two-dimensional graphics code, and This location information and the two-dimensional graphics code are stored in the database. Further, the method comprises the following steps:
  • the boundary line can be read by the image reading device, and the computer-generated two-dimensional graphic coded image and image reading can be distinguished by the presence or absence of the boundary line.
  • the two-dimensional graphic coded image read by the device avoids the problem that the illegal molecules generate the two-dimensional graphic coded image through the computer, and can prevent the problem that the illegal molecule breaks the two-dimensional graphic coding database by the exhaustive method, thereby improving the security of the present invention. .
  • the graphic can be used as a lottery prize for the lottery, which is beneficial to the consumer to actively perform the anti-counterfeiting query operation, thereby improving the query rate of the anti-counterfeiting mark, so that Anti-counterfeiting security is higher.
  • the various advantages of the anti-counterfeiting technology of the present invention are integrated: 1.
  • the consumer can easily recognize the anti-counterfeiting query by using ordinary tools (such as a mobile phone); 2.
  • the consumer can easily obtain the real information (via the mobile phone), and will It is compared with the products in the hand; 3.
  • the logo is easy to print and easy to manufacture, so the production cost is low; 4.
  • the production technology of the logo cannot be obtained by the reverse engineering principle of the logo itself; 5.
  • the logo of each product is different, so The cost of copying a criminal will be high.
  • all the loopholes of counterfeiting of counterfeit molecules are blocked, so that the possibility of counterfeiting is almost zero, and the cost of counterfeiting is very large, while the production cost of legal producers is 4 low. Therefore, the anti-counterfeiting method of the present invention is low in cost The book is cheap and the security is very high.
  • FIG. 1 is a schematic exploded view of a three-dimensional structure of a label according to Embodiment 1 of the present invention.
  • FIG. 3 is a schematic exploded view of a three-dimensional structure of a label according to Embodiment 2 of the present invention.
  • Embodiment 4 is a flow chart of a method for label production according to Embodiment 2 of the present invention.
  • an anti-counterfeit label based on two-dimensional graphic coding the label includes a two-dimensional graphic code 1 1 printed on a product outer package 10 (also printed on a casing of the product), the two-dimensional The graphic code 1 1 is stored in the database of the server.
  • the central portion of the two-dimensional graphic code 1 1 is printed on a paper strip 12 affixed on an outer package, and a peripheral portion of the two-dimensional graphic code 11 is printed on the outer package 10, and the paper strip 12 is A frangible sticker is adhered to the outer package 10.
  • boundary line 121 between the paper strip 12 and the outer package 10, and the paper strip 12 is randomly adhered to the outer package 10, so the relative position of the boundary line in the two-dimensional graphic code image is randomly changed.
  • the relative position information of the boundary line in the two-dimensional graphic coded image is stored in the intermediate database of the server corresponding to the two-dimensional graphic code.
  • the two-dimensional graphics code 1 1 is printed on two print carriers on different planes, and two different print carriers have a boundary line, it can be judged by the presence or absence of the boundary line that the two-dimensional graphics code is printed on two Different print carriers are on the same print carrier, which prevents the illegal molecules from synthesizing the two-dimensional graphics code through software and then performing exhaustive methods for verification. If the criminals want to pass the verification, they must print the two-dimensional graphics code on two print carriers, then read the two-dimensional graphics code through the image reading device, and then try to verify, which undoubtedly adds a huge amount to the counterfeiters. Explain the cost of the book.
  • the method for making the security label is:
  • S2 printing the two-dimensional graphic code 1 1 stored in the database in the area where the paper strip 12 is pasted;
  • S3 reading the two-dimensional graphic printed on the paper strip 12 and the outer package 10 by using the two-dimensional graphic encoding reading device Code 11;
  • the consumer When the consumer performs the anti-counterfeiting identification, the consumer first reads the two-dimensional graphic code printed on the paper strip and the outer packaging box by using an image reading device (such as a camera or a scanner), and encodes the two-dimensional graphic code by wire or Wirelessly transmitting to the server on the network side, the server acquiring the two-dimensional graphic coded image, and analyzing whether the two-dimensional graphic code read by the image reading device includes a boundary line between the paper strip and the outer package, if If not, the two-dimensional graphics coding is invalidated by the display device (such as the display of the computer or the display of the mobile phone); if so, whether the two-dimensional graphic coding information read by the image reading device is further determined in the database The stored two-dimensional graphics coding information is consistent.
  • an image reading device such as a camera or a scanner
  • the two-dimensional graphics coding is notified to the consumer through the display device. If there is a match, the boundary position information in the two-dimensional graphics coding read by the image reading device is obtained. Compared with the location information of the dividing line stored in the database; if they are consistent, it indicates that Product is genuine, if the two positions are not the same, it indicates that the product is counterfeit goods.
  • the relative position information of the boundary between the first print carrier and the second print carrier and the two-dimensional graphic code image is stored in the data, and the position of the boundary line is analyzed and judged. Consistent, this will prevent criminals from making fake labels by mimicking the label making process.
  • this embodiment proposes another anti-counterfeiting method, a label, and a method of manufacturing the label.
  • a square hole 101 is also provided in the outer package 10 of the product.
  • the square hole 101 is randomly placed at the position of the outer package by a punching device (including a laser shell drilling device and a pin punch device).
  • the specification randomly prints the graphic 13 in the area where the square hole is located (the picture in this embodiment is a bird, in fact, it can be other pictures, and the images of the products are not the same).
  • Figure 13 is randomly printed on the square hole as the reference area where the square hole is located.
  • the strip 12 covers the square hole 101 and the graphic 13 together, and the square hole 101 and the graphic 13 appear when the paper strip 12 is torn.
  • the graphic 13 having the square hole is read by the image reading device and stored in the database of the server, and the graphic 13 and the two-dimensional graphic code are stored in the database of the server. Since the graphic contains a square hole, even if the counterfeiter can download the graphic and print it by computer program exhaustive method to download the graphic, the counterfeiter needs to punch the graphic, because of the hole The position is random with respect to the graphic, so it is difficult for the counterfeiter to punch the square hole through the displayed graphic, thereby increasing the cost for the counterfeiter. In order to facilitate the printing of graphics, you can use the method of printing the text first, and then the square hole (you can also take the method of randomly punching the holes first, then printing the graphics).
  • the method for making the anti-counterfeit label is as follows:
  • the consumer When the consumer performs the anti-counterfeiting identification, the consumer first reads the two-dimensional graphic code printed on the paper strip and the outer packaging box by using an image reading device (such as a camera or a scanner), and encodes the two-dimensional graphic code by wire or Wirelessly transmitting to the server on the network side, the server acquiring the two-dimensional graphic coded image, and analyzing whether the two-dimensional graphic code read by the image reading device includes a boundary line between the paper strip and the outer package, if No, through the display device (such as a computer monitor or hand The display screen of the machine informs the consumer that the two-dimensional graphics coding is invalid; if yes, further determines whether the two-dimensional graphics coding information read by the image reading device is consistent with the two-dimensional graphics coding information stored in the database, if not, Then, the display device is notified to the consumer that the two-dimensional graphic encoding is illegal; if there is a match, the boundary position information in the two-dimensional graphic encoding read by the image reading device is
  • a graphic with a square hole opposite to the two-dimensional graphic encoding information find a graphic with a square hole opposite to the two-dimensional graphic encoding information, and display the graphic with the square hole through a display device (such as a screen of a display or a mobile phone);
  • the speaker compares the graphic with square holes marked on the outer box of the product with the displayed graphic with square holes. If the two images are identical, the product is genuine, if two images Inconsistent, it indicates that the book is a fake.
  • the graphic can be used as a lottery prize for the lottery, which is beneficial to the consumer to actively perform the anti-counterfeiting query operation, thereby improving the query rate of the anti-counterfeiting mark, so that Anti-counterfeiting security is higher.
  • the square holes are only the embodiments exemplified in the present invention, and the shapes thereof may be various, such as a prism, a triangle, and an ellipse.
  • the above embodiments are only intended to illustrate the technical solutions of the present invention, and the present invention is not limited thereto.
  • the present invention has been described in detail with reference to the preferred embodiments, those skilled in the art should understand that the technical solutions of the present invention may be modified or equivalent.
  • the spirit and scope of the present invention should be construed as being included in the scope of the appended claims.

Abstract

本发明涉及一种基于二维图形编码防伪的方法、标签及该标签制作方法。通过第一印刷载体和第二印刷载体分界线的有无能够区分出计算机生成的二维图形编码图像与图像读取装置读取的二维图形编码图像,从而避免了不法分子通过穷举法破解二维图形编码数据库的问题;由于随机将第二印刷载体粘接在第一印刷载体上,并且将第一印刷载体和第二印刷载体的分界线与二维图形编码图像的相对位置信息存储在数据中,并且分析判断分界线的位置是否一致,这样就可以防止不法分子通过模仿标签的制作过程去制作假冒的标签。通过在图文区域打孔,而孔的位置是随机变化的,不法分子如果要模仿既要知道孔的位置,又要通过机器进行精确定位打孔,增加了仿冒的成本。

Description

说 明 书
一种基于二维图形编码防伪的方法、 标签及标签制作方法 【技术领域】
本发明涉及一种防伪方法、 标签及标签制作方法, 特别涉及一种基于二维 图形编码防伪的方法、 标签及该标签制作方法。
【背景技术】
防伪是要解决一个问题, 既不易伪造, 又易于识别。 防伪的目的主要是为 了将不同商家的产品作区分。 在计算机、 网络以及 3C技术发展成熟以前, 防 伪的方法主要是消费者直接通过肉眼无需借助于工具即可实现真伪的辨认,这 种防伪技术的原理是用特殊的印刷技术制作防伪标志, 如全息防伪, 由于这种 印刷技术比较难, 特别是模板难以抄袭, 所以防伪成本很高, 通过印刷后的成 品很难通过逆向工程知道模板, 所以防伪性还是很高的, 但是正是因为其模板 难以制止, 而且印刷成本高, 所以 4 对每一个产品印刷不同的全息图形, 同 样的一个全息图形会印刷在大量的产品上, 所以如果只要能够破解其模板, 其 被仿冒所构成的损失将是非常巨大的。
随着科技的不断发展, 仅通过肉眼很难以直接分别出真伪, 所以需要借助 专门的仪器设备, 这种防伪是利用特殊的设备和工艺制作的特殊标志, 例如激 光防伪码、 隐性油墨防伪、 超能防伪、 网纹防伪等, 由于这种防伪特征用肉眼 难于识别, 需要用专门的检验仪器才能分别出真伪, 所以其适用性不广, 只能 用于贵重物品的防伪上。
随着计算机、 互联网以及 3C技术的发展, 人们开始借助远程服务器辨别 真伪, 比如密码防伪技术, 它是给产品编一组数字随机密码, 将此密码印在标 志上并遮盖起来, 同时将此密码存入可供消费者查询的计算机数据库中, 消费 者在购买产品后通过电话、 传真或因特网, 将标识物上密码撕开输入进行比较 识别, 相同就是真的, 不同就是假的, 而这一密码是经过复杂运算得到的, 通 说 明 书 过密码 4艮难推算出其算法, 也就 ^艮难通过一个密码知道其他全部正确的密码, 具有一定的防伪性。 但是由于一连串的数字可以通过计算机程序穷举算法破 解, 所以其防伪性也不高。
为了防止不法分子通过计算机程序穷举法破解数字密码,人们引入了二维 图形编码防伪技术。是用某种特定的几何图形按一定规律在平面(二维方向上) 分布的黑白相间的图形记录数据符号信息的; 在代码编制上巧妙地利用构成计 算机内部逻辑基础的" 0"、 Ί "比特流的概念, 使用若干个与二进制相对应的几 何形体来表示文字数值信息,通过图象输入设备或光电扫描设备自动识读以实 现信息自动处理: 二维条码 /二维图形编码能够在横向和纵向两个方位同时表 达信息, 因此能在很小的面积内表达大量的信息。 所以, 二维图形编码不仅可 以对每一个商品进行身份识别, 还能够进行防伪标识。 虽然二维图形编码相比 数字码更难以通过计算机程序破解 , 但是二维图形编码实质还是由' Ό"和 Ί "组 成的数字编码, 还是可以通过计算机程序的穷举法来破解的, 另一方面, 不法 分子还是可以将二维图形编码扫描然后再打印出来进行仿冒,所以其安全性还 不是特别高。
为了防止图形被复制打印, 人们想到了一种通过纹理防伪的方法, 主要是 将电码防伪印刷的防伪特征一数字密码变成非人为制造的标识材质固有的结 构纹理, 即将人们有意制造带纤维的纸张上的图形进行扫描后存入可以查询的 数据库中, 然后将防伪标志分成 12个小方格, 消费通过电话查询这 12个小方 格内有无纤维或者核对其图形来识别真假,这种方法虽然防止了不法分子复制 图形, 但是由于其查询程序也是艮复杂, 对比起来非常复杂, 消费者查询率也 非常低, 大量的标识物没有被查询, 等于没有使用防伪。
总结现有的防伪技术, 发明人认为, 一个良好的防伪技术必须具备以下几 个要素:
1 .消费者容易辨认(如上述的纹理辨认则太复杂), 无需借助工具, 或者 借助简单的工具; 2.消费者容易获取(如通过手机即可)到真实的信息, 并且 将其与手中的产品作对比; 3.标识容易印刷, 并且容易制作, 这样生产成本低 廉; 4.标识的制作技术不能通过标识本身运用逆向工程原理得到; 5.各个产品 说 明 书 的标识是不同的, 这样不法分子复制的成本会 4艮高。
而现有的防伪技术均不能全部达到上述的几点要求,所以其防伪的安全性 并不高。
【发明内容】
本发明的目的就是为了解决现有技术存在的问题,提出了一种基于二维图 形编码防伪的方法、 标签及标签制作方法。
本发明的具体技术方案如下:
本发明提供一种基于二维图形编码防伪的方法, 该方法包括: 在产品上印 刷二维图形编码; 图像读取装置读取标识在产品上的二维图形编码; 获取图像 读取装置读取的二维图形编码信息; 判断所述二维图形编码信息是否与数据库 中存储的二维图形编码信息一致; 如一致, 则表明该产品为正品, 如果不一致, 则表明该产品为伪品; 其特征在于:
所述的二维图形编码为一个, 并且该二维图形编码印刷在两个印刷载体上, 所述第二印刷载体粘贴在第一印刷载体的上。
该方法进一步包括:
判断所述图像读取装置读取的二维图形编码中是否包含有第一印刷载体和 第二印刷载体的分界线, 如果有则进一步判断所述二维图形编码信息是否与数 据库中存储的二维图形编码信息一致。
该方法进一步包括:
随机将第二印刷载体粘在第一印刷载体上, 在两个印刷载体上印刷二维图 形编码后通过二维图形编码读取装置读取所述二维图形编码, 获取该二维图形 编码中的分界线的位置, 并将这一位置信息以及二维图形编码对应存储在数据 库中;
在所述图像读取装置读取的二维图形编码信息与数据库中存储的二维图形 编码信息一致后, 将图像读取装置读取的二维图形编码中的分界线位置信息与 数据库中存储的分界线的位置信息相比较;
如一致, 则表明该产品为正品, 如果不一致, 则表明该产品为伪品。 说 明 书 该方法进一步包括:
随机在产品的第一印刷载体上打孔, 并且以孔为基准在孔所在的区域随机 印刷图文, 然后将第二印刷载体随机粘在第一印刷载体上, 且第二印刷载体将 孔和图文遮住, 通过图像读取装置读取孔的分布图以及图文, 并将孔分布图和 图文与二维图形编码对应存储在数据库中;
在图像读取装置读取的二维图形编码中的分界线位置信息与数据库中存储 的分界线的位置信息一致后, 找出与该二维图形编码相对应的孔分布图和图文, 并将该孔分布图和图文发送给显示装置显示出来;
将产品上标识的孔分布图和图文与显示出来的孔分布图和图文相比较, 如 果两个孔分布图和图文一致, 则表明该产品为正品, 如果两个孔分布图和图文 不一致, 则表明该产品为伪品。
本发明还提供一种基于二维图形编码防伪的标签, 该标签包括印刷在产品 上的二维图形编码, 所述二维图形编码存储在数据库中, 其特征在于, 所述的 二维图形编码为一个, 并且该二维图形编码印刷在两个印刷载体上, 所述第二 印刷载体粘贴在第一印刷载体的上。
第一印刷载体和第二印刷载体的分界线能够被图像读取装置所读取, 且所 述分界线在二维图形编码中的位置信息与二维图形编码对应存储在数据库中。
所述在第一印刷载体上且位于第二印刷载体正下方分布有孔和图文, 所述 孔的分布图和图文与二维图形编码对应存储在数据库中。
本发明另提供一种基于二维图形编码防伪标签的制作方法, 其特征在于, 该方法包括如下步骤:
随机将第二印刷载体粘在产品的第一印刷载体上, 在两个印刷载体上印刷 存储在数据中的二维图形编码后, 通过二维图形编码读取装置读取所述二维图 形编码, 获取该二维图形编码中的分界线的位置, 并将这一位置信息以及二维 图形编码对应存储在数据库中。
在两个印刷载体上印刷存储在数据中的二维图形编码后, 通过二维图形编 码读取装置读取所述二维图形编码, 获取该二维图形编码中的分界线的位置, 并将这一位置信息以及二维图形编码对应存储在数据库中。 说 明 书 进一步的, 该方法包括如下步骤:
随机在产品的第一印刷载体上打孔, 并且以孔为基准在孔所在的区域随机 印刷图文, 然后将第二印刷载体随机粘在第一印刷载体上, 且第二印刷载体将 孔和图文遮住, 通过图像读取装置读取孔的分布图和图文, 并将孔分布图和图 文与二维图形编码对应存储在数据库中。
本发明有益的技术效果在于:
由于第一印刷载体和第二印刷载体不在同一平面上, 所以可以通过图像读 取装置读取其分界线, 通过分界线的有无从而能够区分出计算机生成的二维图 形编码图像与图像读取装置读取的二维图形编码图像, 从而避免了不法分子通 过计算机生成二维图形编码图像的问题, 能够防止不法分子通过穷举法破解二 维图形编码数据库的问题, 提高了本发明的安全性。
由于随机将第二印刷载体粘接在第一印刷载体上, 并且将第一印刷载体和 第二印刷载体的分界线与二维图形编码图像的相对位置信息存储在数据中, 并 且分析判断分界线的位置是否一致, 这样就可以防止不法分子通过模仿标签的 制作过程去制作假冒的标签。
通过在图文区域打孔, 而孔的位置是随机变化的, 不法分子如果要模仿既 要知道孔的位置, 又要通过机器进行精确定位打孔, 增加了仿冒的成本, 使得 安全性更加提高。
另一方面, 由于第二印刷载体将图文遮住后, 可以通过将图文作为抽奖的 奖品标识, 如此则有利于消费者积极去进行防伪查询操作, 提高了本防伪标识 的查询率, 使得防伪安全性更高。
综合本发明防伪技术的各种优点: 1 .消费者容易辨认, 仅需借助普通的工 具(如手机 )即可实现防伪查询; 2.消费者容易获取到真实的信息(通过手机 ), 并且将其与手中的产品作对比; 3.标识容易印刷, 并且容易制作, 这样生产成 本低廉; 4.标识的制作技术不能通过标识本身运用逆向工程原理得到; 5.各个 产品的标识是不同的, 这样不法分子复制的成本会很高。 通过上述的各种手段 将不法分子仿冒的漏洞全部堵上, 使得仿冒的可能性几乎为零, 而且仿冒的成 本非常巨大, 而合法生产商的生产成本却 4艮低。 所以本发明的防伪方法成本低 说 明 书 廉, 安全性非常高。
【附图说明】
图 1 为本发明实施例 1 的标签立体结构展开示意图;
图 2为本发明实施例 1 的标签制作的方法流程图;
图 3为本发明实施例 2的标签立体结构展开示意图;
图 4为本发明实施例 2的标签制作的方法流程图。
【具体实施方式】
为了使发明的目的、 技术方案及优点更加清楚明白, 以下结合附图及实施 例, 对本发明进行进一步详细说明。 应当理解, 此处所描述的具体实施例仅仅 用以解释本发明, 并不用来限定本发明。
实施例 1
如图 1所示,一种基于二维图形编码的防伪标签, 该标签包括印刷在产品 外包装盒 10上(也可以印刷在产品的外壳上) 的二维图形编码 1 1 , 所述二 维图形编码 1 1存储在服务器的数据库中。所述二维图形编码 1 1 的中心部分印 刷在外包装盒上粘贴的纸条 12上,所述二维图形编码 1 1 的外围部分印刷在所 述外包装盒 10上, 所述纸条 12为易碎贴, 粘在所述外包装盒 10上。
所述纸条 12和外包装盒 10之间具有分界线 121 , 所述纸条 12随机粘接 在外包装盒 10上, 所以分界线在二维图形编码图像中的相对位置是随机变化 的,该分界线在二维图形编码图像中的相对位置信息与二维图形编码对应存储 在服务器的中数据库中。
由于二维图形编码 1 1 是印刷在两个处于不同平面上的印刷载体上, 并且 两个不同印刷载体具有分界线,通过分界线的有无可以判断所述二维图形编码 是印刷在两个不同的印刷载体上, 还是同一个印刷载体上, 这样可以防止不法 分子通过软件合成二维图形编码然后进行穷举法进行尝试验证。如杲不法分子 想通过验证, 必须将二维图形编码打印在两个印刷载体上, 然后再通过图像读 取装置读取二维图形编码, 然后进行尝试验证, 这无疑给造假者增加了巨大的 说 明 书 成本。
如图 2所示, 制作该防伪标签的方法为:
S1: 将纸条 12随机粘贴在所述外包装盒 10上;
S2: 在粘贴有纸条 12的区域打印存储在数据库中的二维图形编码 1 1 ; S3: 采用二维图形编码读取装置读取印刷在纸条 12和外包装盒 10上的 二维图形编码 11 ;
S4:获取二维图形编码 11 中纸条 12和外包装盒 10分界线 121 的位置信 息, 并将该位置信息与所述二维图形编码 11对应存储在数据库中。
消费者在进行防伪鉴定时, 消费者首先采用图像读取装置 (比如摄像头或 者扫描仪)读取印刷在纸条和外包装盒上的二维图形编码, 并且将该二维图形 编码通过有线或者无线的方式发送给网络侧的服务器, 服务器获取所述二维图 形编码图像, 分析判断所述图像读取装置读取的二维图形编码中是否包含有纸 条和外包装盒的分界线, 如果没有, 则通过显示装置 (如电脑的显示器或者手 机的显示屏)告知消费者二维图形编码无效; 如果有, 则进一步判断所述图像 读取装置读取的二维图形编码信息是否与数据库中存储的二维图形编码信息一 致, 如不一致, 则通过显示装置告知消费者二维图形编码不合法; 如有一致, 则将图像读取装置读取的该二维图形编码中的分界线位置信息与数据库中存储 的分界线的位置信息相比较; 如一致, 则表明该产品为正品, 如果两个位置不 一致, 则表明该产品为伪品。
由于随机将纸条粘接在外包装盒上, 并且将第一印刷载-体和第二印刷载体 的分界线与二维图形编码图像的相对位置信息存储在数据中, 并且分析判断分 界线的位置是否一致, 这样就可以防止不法分子通过模仿标签的制作过程去制 作假冒的标签。
实施例 2
在上述实施例 1 的基础之上, 本实施例提出了另外一种防伪方法、 标签以 及该标签的制作方法。 如图 3所示, 位于所述纸条 12的正下方, 在所述产品 的外包装盒 10上还设置有一个方孔 101。 这个方孔 101是通过打孔装置 (包 括激光烧壳打孔设备以及针式打孔装置) 随机打该外包装盒的所述位置上的, 说 明 书 在方孔所在的区域随机印刷图文 13 (本实施例中的图文为一只小鸟, 实际上, 还可为其他的图文, 而且各个产品的图文也不尽相同), 该图文 13是以方孔为 基准随机印刷在方孔所在的区域的。 所述纸条 12将所述方孔 101和所述图文 13一起遮盖住, 撕开所述纸条 12即可出现所述方孔 101和图文 13。
将具有方孔的图文 13 通过图像读取装置读取后存储在服务器的数据库 中, 并且将该图文 13与二维图形编码对应存储在服务器的数据库中。 由于图 文中包含有方孔,所以造假者即使能够通过计算机程序穷举法试出二维图形编 码从而下载图文并打印下来, 但是造假者后还需要对图文进行打孔, 由于孔的 位置相对于所述图文是随机的, 所以, 造假者难以通过显示出来的图文去打方 孔, 给造假者增加了成本。 为了便于印刷图文, 可以采用先印刷图文, 再打方 孔的方法 (也可以釆取先随机打孔, 然后再印刷图文的方式) 。
如图 4所示, 制作该防伪标签的方法为:
S1 : 在产品的外包装盒上印刷图文 13;
S2: 在图文 13区域随机打方孔 101 ;
S3: 通过图像读取装置读取带有方孔 101 的图文图形;
S4:将带有方孔 101的图文图形与二维图形编码 1 1对应存储在数据库中;
S5: 将纸条 12随机粘贴在所述外包装盒 10上并遮盖住所述方孔 101和 图文 13;
S6: 在粘贴有纸条 12的区域打印存储在数据库中的二维图形编码 1 1; S7: 釆用二维图形编码读取装置读取印刷在纸条 12和外包装盒 10上的 二维图形编码 11 ;
S8:获取二维图形编码 11 中纸条 12和外包装盒 10分界线 121 的位置信 息, 并将该位置信息与所述二维图形编码 11对应存储在数据库中。
消费者在进行防伪鉴定时, 消费者首先采用图像读取装置(比如摄像头或 者扫描仪)读取印刷在纸条和外包装盒上的二维图形编码, 并且将该二维图形 编码通过有线或者无线的方式发送给网络侧的服务器,服务器获取所述二维图 形编码图像,分析判断所述图像读取装置读取的二维图形编码中是否包含有纸 条和外包装盒的分界线, 如果没有, 则通过显示装置(如电脑的显示器或者手 机的显示屏)告知消费者二维图形编码无效; 如果有, 则进一步判断所述图像 读取装置读取的二维图形编码信息是否与数据库中存储的二维图形编码信息 一致,如不一致,则通过显示装置告知消费者二维图形编码不合法;如有一致, 则将图像读取装置读取的该二维图形编码中的分界线位置信息与数据库中存 储的分界线的位置信息相比较; 如一致, 则找出与该二维图形编码信息相对 的具有方孔的图文, 并将该具有方孔的图文通过显示装置(例如显示器或者手 机的屏幕)显示出来; 此时, 消费说者将产品外包装盒上标识的具有方孔的图文 与显示出来的带有方孔的图文相比较, 如果两个图文完全一致, 则表明该产品 为正品, 如果两个图文不一致, 则表明该产书品为伪品。
通过在图文区域设置孔, 而孔的位置是随机变化的, 不法分子如果要模仿 既要知道孔的位置, 又要通过机器进行精确定位打孔, 增加了仿冒的成本, 使 得安全性更加提高。 另一方面, 由于第二印刷载体将图文遮住后, 可以通过将 图文作为抽奖的奖品标识, 如此则有利于消费者积极去进行防伪查询操作, 提 高了本防伪标识的查询率, 使得防伪安全性更高。
所述方孔仅为本发明所列举的实施例, 其形状可以是多样的, 如棱形、 三 角形以及橢圓形均可。 总之, 以上实施例仅用以说明本发明的技术方案而非限制, 尽管参照较佳 实施例对本发明进行了详细说明, 本领域的普通技术人员应当理解, 可以对本 发明的技术方案进行修改或者等同替换, 而不脱离本发明技术方案的精神和范 围, 其均应涵盖在本发明的权利要求范围当中。

Claims

权 利 要 求 书
1 .一种基于二维图形编码防伪的方法, 该方法包括: 在产品上印刷二维图形 编码; 图像读取装置读取标识在产品上的二维图形编码; 获取图像读取装置读 取的二维图形编码信息; 判断所述二维图形编码信息是否与数据库中存储的二 维图形编码信息一致; 如一致, 则表明该产品为正品, 如果不一致, 则表明该 产品为伪品; 其特征在于:
所述的二维图形编码为一个, 并且该二维图形编码印刷在两个印刷载体上, 所述第二印刷载体粘贴在第一印刷载体的上。
2.根据权利要求 1所述的基于二维图形编码防伪的方法,其特征在于,该方 法进一步包括:
判断所述图像读取装置读取的二维图形编码中是否包含有第一印刷载体和 第二印刷载体的分界线, 如果有则进一步判断所述二维图形编码信息是否与数 据库中存储的二维图形编码信息一致。
3.根据权利要求 2所述的基于二维图形编码防伪的方法,其特征在于,该方 法进一步包括:
随机将第二印刷载体粘在第一印刷载体上, 在两个印刷载体上印刷二维图 形编码后通过二维图形编码读取装置读取所述二维图形编码, 获取该二维图形 编码中的分界线的位置, 并将这一位置信息以及二维图形编码对应存储在数据 库中;
在所述图像读取装置读取的二维图形编码信息与数据库中存储的二维图形 编码信息一致后, 将图像读取装置读取的二维图形编码中的分界线位置信息与 数据库中存储的分界线的位置信息相比较;
如一致, 则表明该产品为正品, 如果不一致, 则表明该产品为伪品。
4.根据权利要求 3所述的基于二维图形编码防伪的方法, 其特征在于, 该 方法进一步包括:
随机在产品的第一印刷载体上打孔, 并且以孔为基准在孔所在的区域随机 印刷图文, 然后将第二印刷载体随机粘在第一印刷载体上, 且第二印刷载体将 孔和图文遮住, 通过图像读取装置读取孔的分布图以及图文, 并将孔分布图和 图文与二维图形编码对应存储在数据库中; 权 利 要 求 书 在图像读取装置读取的二维图形编码中的分界线位置信息与数据库中存储 的分界线的位置信息一致后, 找出与该二维图形编码相对应的孔分布图和图文, 并将该孔分布图和图文发送给显示装置显示出来;
将产品上标识的孔分布图和图文与显示出来的孔分布图和图文相比较, 如 果两个孔分布图和图文一致, 则表明该产品为正品, 如杲两个孔分布图和图文 不一致, 则表明该产品为伪品。
5.—种基于二维图形编码防伪的标签,该标签包括印刷在产品上的二维图形 编码, 所述二维图形编码存储在数据库中, 其特征在于, 所述的二维图形编码 为一个, 并且该二维图形编码印刷在两个印刷载体上, 所述第二印刷载体粘贴 在第一印刷载体的上。
6. 根据权利要求 5所述的防伪标签, 其特征在于, 第一印刷载体和第二 印刷载体的分界线能够被图像读取装置所读取, 且所述分界线在二维图形编码 中的位置信息与二维图形编码对应存储在数据库中。
7.根据权利要求 6所述的防伪标签,其特征在于,所述在第一印刷载体上且 位于第二印刷载体正下方分布有孔和图文, 所述孔的分布图和图文与二维图形 编码对应存储在数据库中。
8.—种基于二维图形编码防伪标签的制作方法, 其特征在于, 该方法包括如 下步骤:
随机将第二印刷载体粘在产品的第一印刷载体上, 在两个印刷载体上印刷 存储在数据中的二维图形编码后, 通过二维图形编码读取装置读取所述二维图 形编码, 获取该二维图形编码中的分界线的位置, 并将这一位置信息以及二维 图形编码对应存储在数据库中。
9.根据权利要求 8所述的基于二维图形编码防伪标签的制作方法,其特征在 于, 在两个印刷载体上印刷存储在数据中的二维图形编码后, 通过二维图形编 码读取装置读取所述二维图形编码, 获取该二维图形编码中的分界线的位置, 并将这一位置信息以及二维图形编码对应存储在数据库中。
10. 根据权利要求 9 所述的基于二维图形编码防伪标签的制作方法, 其特 征在于, 进一步的, 该方法包括如下步骤: 权 利 要 求 书 随机在产品的第一印刷载体上打孔, 并且以孔为基准在孔所在的区域随机 印刷图文, 然后将第二印刷载体随机粘在第一印刷载体上, 且第二印刷载体将 孔和图文遮住, 通过图像读取装置读取孔的分布图和图文, 并将孔分布图和图 文与二维图形编码对应存储在数据库中。
PCT/CN2012/070164 2011-11-02 2012-01-10 一种基于二维图形编码防伪的方法、标签及标签制作方法 WO2013063871A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201110343638 2011-11-02
CN201110343638.1 2011-11-02

Publications (1)

Publication Number Publication Date
WO2013063871A1 true WO2013063871A1 (zh) 2013-05-10

Family

ID=47334650

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/070164 WO2013063871A1 (zh) 2011-11-02 2012-01-10 一种基于二维图形编码防伪的方法、标签及标签制作方法

Country Status (2)

Country Link
CN (3) CN105205524A (zh)
WO (1) WO2013063871A1 (zh)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2843630A1 (en) * 2013-08-29 2015-03-04 International Currency Technologies Corporation Valuable document recognition system with QR code recognizability
EP3113083A2 (en) 2015-07-01 2017-01-04 Dimitri Marinkin Method for protecting the authenticity of an object, item, document, packaging and/or a label from imitation, forgery and theft
US9854127B2 (en) 2015-07-01 2017-12-26 Dmitri Marinkin Method for protecting the authenticity of an object, item, document, packaging and/or a label from imitation, forgery and theft
CN109472337A (zh) * 2018-11-05 2019-03-15 上海中商网络股份有限公司 一种基于随机特征的标签防伪方法和装置
CN113568155A (zh) * 2021-06-21 2021-10-29 深圳视见医疗科技有限公司 一种载玻片
CN116227524A (zh) * 2023-05-05 2023-06-06 杭州蚂蚁酷爱科技有限公司 防伪码的生成与验证方法、基于标签的防伪系统

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1980800A (zh) * 2004-05-05 2007-06-13 德国捷德有限公司 有价文件
CN101763767A (zh) * 2008-12-23 2010-06-30 郑阿奇 一种具有双重加密编码的防伪识别方法
CN101976366A (zh) * 2010-10-25 2011-02-16 中拍讯业(北京)电子商务有限公司 防伪标识联动自毁装置及防伪验证方法

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2149104C1 (ru) * 1995-11-13 2000-05-20 ОРЕЛЛ ФЮССЛИ БАНКНОТ ИНДЖИНИРИНГ Лтд Защищенный документ с защитной маркировкой и способ его изготовления
JP3882609B2 (ja) * 2001-12-20 2007-02-21 富士ゼロックス株式会社 電子写真用トナー、電子写真用現像剤、及びそれらを用いた画像形成方法
CN2580540Y (zh) * 2002-11-28 2003-10-15 淄博泰宝防伪技术产品有限公司 一次性揭启覆膜分条防伪标识
CN1569492A (zh) * 2004-04-29 2005-01-26 张翼鲲 并图核对防伪方法
CN100595799C (zh) * 2007-02-07 2010-03-24 张健 一种二维货币自动识别方法及系统
CN101013539B (zh) * 2007-02-08 2010-08-11 李峰 分切式防伪结构、制作方法及防伪方法
CN101561863A (zh) * 2008-04-14 2009-10-21 北京中科诚通科技发展有限公司 用手机、扫描仪、摄像头识别防伪印刷品的防伪识别系统
CN101673387A (zh) * 2009-10-23 2010-03-17 深圳劲嘉彩印集团股份有限公司 一种商品数码防伪方法
CN201892956U (zh) * 2010-10-25 2011-07-06 中拍讯业(北京)电子商务有限公司 防伪标识联动自毁装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1980800A (zh) * 2004-05-05 2007-06-13 德国捷德有限公司 有价文件
CN101763767A (zh) * 2008-12-23 2010-06-30 郑阿奇 一种具有双重加密编码的防伪识别方法
CN101976366A (zh) * 2010-10-25 2011-02-16 中拍讯业(北京)电子商务有限公司 防伪标识联动自毁装置及防伪验证方法

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2843630A1 (en) * 2013-08-29 2015-03-04 International Currency Technologies Corporation Valuable document recognition system with QR code recognizability
EP3113083A2 (en) 2015-07-01 2017-01-04 Dimitri Marinkin Method for protecting the authenticity of an object, item, document, packaging and/or a label from imitation, forgery and theft
US9854127B2 (en) 2015-07-01 2017-12-26 Dmitri Marinkin Method for protecting the authenticity of an object, item, document, packaging and/or a label from imitation, forgery and theft
CN109472337A (zh) * 2018-11-05 2019-03-15 上海中商网络股份有限公司 一种基于随机特征的标签防伪方法和装置
CN109472337B (zh) * 2018-11-05 2023-07-04 上海中商网络股份有限公司 一种基于随机特征的标签防伪方法和装置
CN113568155A (zh) * 2021-06-21 2021-10-29 深圳视见医疗科技有限公司 一种载玻片
CN116227524A (zh) * 2023-05-05 2023-06-06 杭州蚂蚁酷爱科技有限公司 防伪码的生成与验证方法、基于标签的防伪系统
CN116227524B (zh) * 2023-05-05 2023-08-08 杭州蚂蚁酷爱科技有限公司 防伪码的生成与验证方法、基于标签的防伪系统

Also Published As

Publication number Publication date
CN105205524A (zh) 2015-12-30
CN105205523A (zh) 2015-12-30
CN102831530B (zh) 2016-01-06
CN102831530A (zh) 2012-12-19

Similar Documents

Publication Publication Date Title
WO2013063872A1 (zh) 一种基于二维码防伪的方法、标签及标签制作方法
US10789463B2 (en) Method and apparatus for authentication of a 3D structure
US9666008B2 (en) Optically variable security device, and article employing same and method for verifying the authenticity of an article
US11042738B2 (en) Simple authentication of elements in blister packages
US9548863B2 (en) Method for unambiguous marking of an object
WO2013063871A1 (zh) 一种基于二维图形编码防伪的方法、标签及标签制作方法
JP5071592B2 (ja) 印字された微小識別マークによる一般人が容易に出来る真贋判定方法
JP4775727B1 (ja) 印刷物の微小マークによる一般人が容易にできる真贋判定方法
CN101142605A (zh) 保护产品使其免受伪造的方法
WO2013063873A1 (zh) 一种防伪方法、标签及标签制作方法
CN106408063B (zh) 打印介质及其生成方法和扫描方法和标签
CN202306599U (zh) 一种基于二维码的防伪标签
CN104233907B (zh) 具有智能微缩二维码的防伪纸及其制备方法和应用
TWM519760U (zh) 具有機器可讀圖像之卡
US20150076219A1 (en) Tactile anti-forgery method using random emboss
US20230062427A1 (en) Method and system for protection against counterfeiting
CN207133844U (zh) 一种防伪印刷产品
CN101094286B (zh) 分级微型安全标记
CN107169548A (zh) 一种防伪印刷产品和防伪印刷产品的验证方法
JP2005208775A (ja) 電子認証シート及び該電子認証シートを認証するための電子認証システム
CN103500532A (zh) 随机浮凸触感防伪方法
CN101807362A (zh) 一种结构纹理数码安全线防伪产品及方法
JP2001341810A (ja) 真正物品判別システム及びそれに用いるコンピュータ並びに物品タグ
WO2012124084A1 (ja) 商品認証システムおよび商品認証方法
US20240070683A1 (en) Method and system for protection against counterfeiting

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12844844

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 06/10/2014)

122 Ep: pct application non-entry in european phase

Ref document number: 12844844

Country of ref document: EP

Kind code of ref document: A1