WO2013063873A1 - 一种防伪方法、标签及标签制作方法 - Google Patents

一种防伪方法、标签及标签制作方法 Download PDF

Info

Publication number
WO2013063873A1
WO2013063873A1 PCT/CN2012/070245 CN2012070245W WO2013063873A1 WO 2013063873 A1 WO2013063873 A1 WO 2013063873A1 CN 2012070245 W CN2012070245 W CN 2012070245W WO 2013063873 A1 WO2013063873 A1 WO 2013063873A1
Authority
WO
WIPO (PCT)
Prior art keywords
dimensional code
graphic
product
database
hole
Prior art date
Application number
PCT/CN2012/070245
Other languages
English (en)
French (fr)
Inventor
李华容
Original Assignee
Li Huarong
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Li Huarong filed Critical Li Huarong
Publication of WO2013063873A1 publication Critical patent/WO2013063873A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • G06K19/06056Constructional details the marking comprising a further embedded marking, e.g. a 1D bar code with the black bars containing a smaller sized coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • G06K19/06121Constructional details the marking having been punched or cut out, e.g. a barcode machined in a metal work-piece

Definitions

  • the invention belongs to the technical field of anti-counterfeiting security, and relates to an anti-counterfeiting method, a label and a label making method. ⁇ Background technique ⁇
  • Anti-counterfeiting is to solve a problem that is not easy to forge and easy to identify.
  • Modern anti-counterfeiting is mainly used in industrialization and commercialization. There is only one merchant producing goods, but there are [products].
  • the purpose of anti-counterfeiting is mainly to distinguish the products of different merchants.
  • the principle is to use special printing technology to make anti-counterfeiting marks, such as holographic anti-counterfeiting. Because this printing technology is difficult, especially the template is difficult to copy, the anti-counterfeiting cost is very high.
  • This kind of anti-counterfeiting is a special mark made by special equipment and technology, such as laser anti-counterfeiting code, recessive ink anti-counterfeiting, super anti-counterfeiting, net Anti-counterfeiting, etc., because this anti-counterfeiting feature is difficult to identify with the naked eye, it is necessary to use a special inspection instrument to distinguish the authenticity, so its applicability is not wide and can only be used for the anti-counterfeiting of valuables.
  • a remote server such as password anti-counterfeiting technology
  • a remote server such as password anti-counterfeiting technology
  • compile a set of digital random passwords for the product print the password on the logo and cover it, and store the password in a computer database for consumers to query.
  • the password is torn open and input by phone, fax or internet.
  • the difference is fake, and the password is obtained through complicated operation.
  • the main method is to encode the graphics, and then convert the encoding of the graphics into a query password through a special algorithm.
  • the user queries the password on the computer.
  • the essence of this method is to verify the correctness of the password in the first step. If the password is verified by the exhaustive method, the criminal can still copy and print the graphic displayed on the computer to realize the correspondence between the graphic and the password, so the anti-counterfeiting property. Not too high.
  • the object of the present invention is to solve the problems existing in the prior art and to propose a new anti-counterfeiting method, label and label making method.
  • the invention provides an anti-counterfeiting method, characterized in that the method comprises:
  • the image reading device reads the two-dimensional code identified on the product
  • the graphic area marked on the product is provided with a square hole, and the displayed graphic also includes a square hole;
  • a circular hole is disposed in the white block of the two-dimensional code identified on the product; determining whether the circular hole is included in the two-dimensional code read by the image reading device, and if so, further determining the two Whether the dimension code information is consistent with the QR code information stored in the database.
  • the circular holes of the white area of the two-dimensional code are randomly distributed in the two-dimensional code, and the position information of the circular holes in the two-dimensional code is stored in the database corresponding to the two-dimensional code;
  • the position information of the circular hole in the two-dimensional code read by the image reading device and the circular hole stored in the database are The position information is compared; if they are consistent, the graphic text corresponding to the two-dimensional code information is found, and the graphic image is displayed on the display device.
  • the present invention also provides an anti-counterfeit label, an anti-counterfeit label, characterized in that the label comprises a two-dimensional code and a graphic printed on the product, the two-dimensional code information and the graphic corresponding in the database.
  • the graphic area identified on the product is provided with a square hole, and the square hole is randomly distributed in the graphic area, and the two-dimensional code information corresponds to a graphic image including a square hole in a database.
  • the invention further provides a method for manufacturing an anti-counterfeit label, characterized in that the method comprises the following steps:
  • a graphic is printed on the product, and a two-dimensional code corresponding to the graphic is printed in the database.
  • the method includes the following steps:
  • the method includes the following steps:
  • a punching device randomly performs a circular hole in the white block of the two-dimensional code, and obtains position information of the circular hole in the two-dimensional code of the punching device. And storing the location information in the database corresponding to the two-dimensional code.
  • the white block of the two-dimensional code has a circular hole, it does not prevent the image reading device from reading the correct two-dimensional code information, and can also distinguish the computer-generated two-dimensional code image by the presence or absence of the round hole.
  • the two-dimensional code image read by the image reading device avoids the problem that the illegal molecules generate the two-dimensional code image through the computer, and can prevent the problem that the illegal molecules break the two-dimensional code database by the exhaustive method, thereby improving the security of the present invention. Sex.
  • the various advantages of the anti-counterfeiting technology of the present invention are integrated: 1. The consumer can easily recognize the anti-counterfeiting query by using ordinary tools (such as a mobile phone); 2. The consumer can easily obtain the real information (via the mobile phone), and will It is compared with the products in the hand; 3.
  • the logo is easy to print and easy to manufacture, so the production cost is low; 4.
  • the production technology of the logo cannot be obtained by the reverse engineering principle of the logo itself; 5.
  • the logo of each product is different, so The cost of copying a criminal will be high.
  • FIG. 1 is a schematic perspective view of a three-dimensional structure of a label according to Embodiment 1 of the present invention.
  • FIG. 2 is a schematic exploded view of a three-dimensional structure of a label according to Embodiment 2 of the present invention.
  • Embodiment 3 is a flowchart of a method for label manufacturing according to Embodiment 2 of the present invention.
  • FIG. 4 is a schematic exploded view of a three-dimensional structure of a label according to Embodiment 3 of the present invention.
  • FIG. 5 is a flowchart of a method for manufacturing a label according to Embodiment 3 of the present invention.
  • an anti-counterfeit label comprising a two-dimensional code 1 1 and a graphic 12 printed on a product outer casing 10 (which can also be printed on the outer casing of the product), the graphic 12 is located
  • the periphery of the two-dimensional code 1 1 in the present embodiment, the graphic 12 is a bird (which may also be a logo of other animal graphics or products, etc.) located above the two-dimensional code 1 1 .
  • the two-dimensional code 11 and the graphic 12 are in a corresponding relationship in a database of the server, and the graphic 12 has a specific encoding in the database, and the specific encoding and the two-dimensional code are established by a special algorithm. contact.
  • the two-dimensional code includes a two-dimensional code graphic and two-dimensional code information, which are all stored in a database corresponding to the graphic.
  • the two-dimensional code 11 and the graphic 12 in a one-to-one correspondence in the database are simultaneously printed on the outer package of the product.
  • the two-dimensional code 11 and the graphic 12 are bound in advance in the server.
  • the image reading device (such as a camera or a scanner) is used to read the two-dimensional code, and the two-dimensional code is sent to the server on the network side by wire or wirelessly, and the server acquires the image.
  • Reading the two-dimensional code information read by the device determining whether the two-dimensional code information read by the image reading device is consistent with the two-dimensional code information stored in the database; if consistent, finding the opposite of the two-dimensional code information Graphic, and display the graphic through a display device (such as a screen of a display or a mobile phone); at this time, the consumer compares the graphic image on the product with the displayed graphic, if the two images are identical , indicating that the product is genuine, if the two images are inconsistent, it indicates that the product is a fake.
  • the combination of the two-dimensional code and the graphic text for anti-counterfeiting avoids the problem that the criminals use the digital code to perform the exhaustive method.
  • the criminal can also take the genuine map.
  • the text and the QR code are scanned and printed for a small amount of counterfeiting, and the illegal elements can also continuously test the correct two-dimensional code by using the exhaustive method, and the graphic corresponding to the two-dimensional code is downloaded and printed on the outside of the product. On the box.
  • the present embodiment provides a new anti-counterfeit label for the shortcomings of the foregoing embodiments.
  • the graphic 12 area setting on the product is set.
  • the square hole 121 is randomly placed in the area of the graphic 12 by a punching device (including a laser shell drilling device and a pin punch device), that is, the position of the square hole 121 on each product is different.
  • the number of square holes can also be different, and the size of the square holes can also be different, so that the shape of the square holes is richer.
  • the graphic 12 having the square hole is read by the image reading device and stored in the database of the server, and the graphic 12 and the two-dimensional code are stored in the database of the server. Since the graphic contains a square hole, the counterfeiter can download the image even if it can test the two-dimensional code through the computer program exhaustive method.
  • the text is printed, but the counterfeiter needs to punch the graphic. Since the position of the hole is random with respect to the graphic, it is difficult for the counterfeiter to punch the square hole through the displayed graphic. Increased costs.
  • the method for making the anti-counterfeit label is as follows:
  • the consumer When the consumer performs the anti-counterfeiting identification, the consumer first reads the two-dimensional code printed on the product by using an image reading device (such as a camera or a scanner), and sends the two-dimensional code to the network side by wire or wirelessly.
  • an image reading device such as a camera or a scanner
  • Server the server obtains the two-dimensional code image, and determines whether the two-dimensional code information read by the image reading device is consistent with the two-dimensional code information stored in the database; if they are consistent, the two-dimensional code information is found
  • the graphic is displayed on the display device (such as the screen of the display or the mobile phone), and the graphic displayed by the display device also has a square hole. At this time, the consumer identifies the graphic and the image on the product.
  • Example 3 In order to enhance the security of the anti-counterfeiting of the present invention, as shown in FIG. 4, on the basis of Embodiment 2, a white hole 111 is disposed in the white block of the two-dimensional code 11 identified on the product, and the circular hole 111 can be The image reading device reads that the position information of the circular hole 111 in the two-dimensional code is stored in a database. Similarly, the size, position and number of the circular holes in the two-dimensional code of each product may also be different.
  • the two-dimensional code 1 1 Since the two-dimensional code 1 1 has a circular hole, and the circular hole can be recognized by the image reading device, it does not prevent the image reading device from reading the correct two-dimensional code information, and can also pass through the round hole. Therefore, the computer-generated two-dimensional code image and the two-dimensional code image read by the image reading device can be distinguished, thereby preventing the illegal molecules from synthesizing the two-dimensional code through software and then performing an exhaustive method for attempting verification. If the criminal wants to pass the verification, the QR code must be punctured, and then the two-dimensional code is read by the image reading device, and then the verification is performed, which undoubtedly adds a huge cost to the counterfeiter.
  • the method for making the anti-counterfeit label is as follows:
  • the consumer When the consumer performs anti-counterfeiting identification, the consumer first reads the two-dimensional code printed on the paper strip and the outer packaging box by using an image reading device (such as a camera or a scanner), and the two-dimensional code is wired or wireless.
  • the method is sent to a server on the network side, the server acquires the two-dimensional code image, and analyzes whether the two-dimensional code read by the image reading device includes a round hole, and if not, displays the The device notifies the consumer that the two-dimensional code is invalid; if yes, further determining whether the two-dimensional code information read by the image reading device is consistent with the two-dimensional code information stored in the database, and if not, the consumer is notified by the display device
  • the two-dimensional code is illegal; if there is a match, the position information of the circular hole in the two-dimensional code read by the image reading device is compared with the position information of the circular hole stored in the database; if they are consistent, the same is found.
  • the graphic corresponding to the two-dimensional code information is displayed on the display device.
  • the consumer compares the graphic image marked on the product with the displayed graphic, and if the two images are consistent, it indicates The product is genuine. If the two images are inconsistent, it indicates that the product is a fake. If they are inconsistent, the display device notifies the consumer that the two-dimensional code is invalid.
  • consumers compare the images they need to compare the shape, size and color of the images. It is also necessary to compare the size and number of square holes and the same position in the graphic. All the above are the same. This product is genuine.
  • the circular holes and square holes are only the embodiments exemplified in the present invention, and the shapes thereof may be various, such as prisms, triangles, and ellipses.
  • the above embodiments are only intended to illustrate the technical solutions of the present invention, and the present invention is not limited thereto.
  • the present invention has been described in detail with reference to the preferred embodiments, those skilled in the art should understand that the technical solutions of the present invention may be modified or equivalent.
  • the spirit and scope of the present invention should be construed as being included in the scope of the appended claims.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

本发明涉及一种防伪方法、标签及该标签制作方法。将二维码和图文相结合进行防伪,避免了不法分子通过数字码进行穷举法破解的问题;通过在图文区域设置方孔,而方孔的位置是随机变化的,增加了仿冒的成本;由于二维码的白色区块中有圓孔,通过圆孔的有无从而能够区分出计算机生成的二维码图像与图像读取装置读取的二维码图像,从而避免了不法分子通过计算机生成二维码图像的问题;由于二维码的白色区块中的孔是随机打在二维码中的,仿冒者很难准确测量出孔在二维码中的位置,难以通过打孔装置去打孔,通过分析判断孔的位置是否一致,这样就可以防止不法分子通过模仿标签的制作过程去制作假冒的标签。

Description

一种防伪方法、 标签及标签制作方法
【技术领域】
本发明属于防伪安全技术领域,涉及一种防伪方法、标签及标签制作方法。 【背景技术】
防伪是要解决一个问题, 既不易伪造, 又易于识别。 现代防伪主要用于工 业化以及商业化中, 生产商品的商家只有一个, 而产品却有 [艮多。 防伪的目的 主要是为了将不同商家的产品作区分, 目前普遍使用防伪的方法有以下两种: 一种是消费者直接通过肉眼无需借助于工具即可实现真伪的辨认,这种防 伪技术的原理是用特殊的印刷技术制作防伪标志, 如全息防伪, 由于这种印刷 技术比较难, 特别是模板难以抄袭, 所以防伪成本很高, 通过印刷后的成品很 难通过逆向工程知道模板, 所以防伪性还是很高的, 但是正是因为其模板难以 制止, 而且印刷成本高, 所以 ^艮难对每一个产品印刷不同的全息图形, 同样的 一个全息图形会印刷在大量的产品上, 所以如果只要能够破解其模板, 其被仿 冒所构成的损失将是 ^常巨大的。
另外一种是消费需要借助工具才能实现真伪的辨认, 如特殊的仪器: 这种 防伪是利用特殊的设备和工艺制作的特殊标志, 例如激光防伪码、 隐性油墨防 伪、 超能防伪、 网纹防伪等, 由于这种防伪特征用肉眼难于识别, 需要用专门 的检险仪器才能分别出真伪,所以其适用性不广,只能用于贵重物品的防伪上。 还有一种是借助远程服务器, 比如密码防伪技术, 它是给产品编一组数字随机 密码, 将此密码印在标志上并遮盖起来, 同时将此密码存入可供消费者查询的 计算机数据库中, 消费者在购买产品后通过电话、 传真或因特网, 将标识物上 密码撕开输入进行比较识别, 相同就是真的, 不同就是假的, 而这一密码是经 过复杂运算得到的, 通过密码 4艮难推算出其算法, 也就 ^艮难通过一个密码知道 其他全部正确的密码, 具有一定的防伪性。 但是由于一连串的数字可以通过计 算机程序穷举算法破解, 所以其防伪性也不高。
为了防止筒单的数字被计算机穷举破解, 人们又增加了图形进行识别, 主 要方法是对图形进行编码,然后将该图形的编码经过特殊算法转换成一的查询 密码,用户通过查询密码在计算机上查询计算机显示的图形是否与商品上印刷 的图形是否相同。 这种方法的实质还是要第一步验证密码是否正确, 如果密码 通过穷举法验证后,不法分子还是可以通过计算机上显示的图形进行复制打印 即可实现图形与密码的对应,所以其防伪性也不高。为了防止图形被复制打印, 人们想到了一种通过纹理防伪的方法,主要是将电码防伪印刷的防伪特征一数 字密码变成非人为制造的标识材质固有的结构纹理, 即将人们有意制造带纤维 的纸张上的图形进行扫描后存入可以查询的数据库中, 然后将防伪标志分成
12个小方格, 消费通过电话查询这 12个小方格内有无纤维或者核对其图形来 识别真假, 这种方法虽然防止了不法分子复制图形, 但是由于其查询程序也是 很复杂, 对比起来非常复杂, 消费者查询率也非常低, 大量的标识物没有被查 询, 等于没有使用防伪。
总结现有的防伪技术, 发明人认为, 一个良好的防伪技术必须具备以下几 个要素:
1 .消费者容易辨认, 无需借助工具, 或者借助筒单的工具; 2.消费者容易 获取到真实的信息, 并且将其与手中的产品作对比; 3.标识容易印刷, 并且容 易制作, 这样生产成本低廉; 4.标识的制作技术不能通过标识本身运用逆向工 程原理得到; 5.各个产品的防伪标识是不同的, 这样不法分子复制的成本会 4艮 高。
而现有的防伪技术均不能全部达到上述几点要求,所以其防伪的安全性不 高。
【发明内容】
本发明的目的就是为了解决现有技术存在的问题,提出了一种新的防伪方 法、 标签及标签制作方法。
本发明的具体技术方案如下: 本发明提供一种防伪方法, 其特征在于, 该方法包括:
在产品上印刷二维码和图文;
图像读取装置读取标识在产品上的二维码;
获取图像读取装置读取的二维码信息;
判断所述二维码信息是否与数据库中存储的二维码信息一致;
如一致, 则找出与该二维码信息相对的图文, 并将该图文通过显示装置显 示出来;
将产品上标识的图文与显示出来的图文相比较, 如果两个图文一致, 则表 明该产品为正品, 如果两个图文不一致, 则表明该产品为伪品。
所述产品上标识的图文区域设置有方孔, 所述显示出来的图文也包含有方 孔;
将产品上的方孔相对于产品上图文的位置与显示出来的方孔相对于显示出 来图文的位置相比较, 如果方孔的相对位置一致, 则表明该产品为正品, 如果 方孔的相对位置不一致, 则表明该产品为伪品。
所述产品上标识的二维码的白色区块内设置有圓孔; 判断所述图像读取装 置读取的二维码中是否包含有所述的圓孔, 如果有则进一步判断所述二维码信 息是否与数据库中存储的二维码信息一致。
所述二维码的白色区域的圓孔随机分布在二维码中, 所述圓孔在二维码中 的位置信息与该二维码对应存储在数据库中;
在所述图像读取装置读取的二维码信息与数据库中存储的二维码信息一致 后, 将图像读取装置读取的二维码中圓孔的位置信息与数据库中存储的圓孔的 位置信息相比较; 如一致, 则找出与该二维码信息相对的图文, 并将该图文通 过显示装置显示出来。
本发明还提供一种防伪的标签, 一种防伪的标签, 其特征在于, 该标签包 括印刷在产品上的二维码和图文, 所述二维码信息和图文在数据库中相对应。
所述产品上标识的图文区域设置有方孔, 该方孔随机分布在所述图文区域, 所述二维码信息与包含有方孔的图文在数据库中相对应。
所述产品上标识的二维码的白色区块内设置有圓孔, 该圓孔能够被所述图 像读取装置读取, 所述圓孔在二维码中的位置信息存储在数据库中。 本发明另提供一种防伪标签的制作方法, 其特征在于, 该方法包括如下步 骤:
在产品上印刷图文, 并且印刷在数据库中与该图文相对应的二维码。
进一步的, 该方法包括如下步骤:
先在产品印刷图文, 然后再在图文区域随机打方孔, 然后将包含有方孔的 图文存储在数据库中, 所述方孔位于所述图文区域, 建立包含有方孔的图文与 二维码的对应关系。
进一步的, 该方法包括如下步骤:
以二维码中任意一黑色区块为基准, 采用打孔装置随机在二维码的白色区 块内打圓孔, 并获取该打孔装置所打圓孔在二维码中的位置信息, 并将该位置 信息与所述二维码对应存储在数据库中。
本发明有益的技术效果在于:
将二维码和图文相结合进行防伪, 避免了不法分子通过数字码进行穷举法 破解的问题, 如果不法分子破解了二维码后, 还需要将图文印刷在产品上, 增 加了不法分子仿冒的成本, 相比于仅用二维码进行防伪具有更高的安全性。
通过在图文区域设置方孔, 而方孔的位置是随机变化的, 不法分子如果要 模仿既要知道方孔的位置, 又要通过机器进行精确定位打孔, 增加了仿冒的成 本, 使得安全性更加提高。
由于二维码的白色区块中有圓孔, 既不会妨碍图像读取装置读取正确的二 维码信息, 同时还可以通过圓孔的有无从而能够区分出计算机生成的二维码图 像与图像读取装置读取的二维码图像, 从而避免了不法分子通过计算机生成二 维码图像的问题, 能够防止不法分子通过穷举法破解二维码数据库的问题, 提 高了本发明的安全性。
由于二维码的白色区块中的孔是随机打在二维码中的, 而孔在二维码中的 位置又只存储在服务器中, 所以仿冒者 ^艮难准确测量出孔在二维码中的位置, 所以也就难以通过打孔装置去打孔, 通过分析判断孔的位置是否一致, 这样就 可以防止不法分子通过模仿标签的制作过程去制作假冒的标签。 综合本发明防伪技术的各种优点: 1 .消费者容易辨认,仅需借助普通的工具 (如手机) 即可实现防伪查询; 2.消费者容易获取到真实的信息 (通过手机), 并且将其与手中的产品作对比; 3.标识容易印刷, 并且容易制作, 这样生产成本 低廉; 4.标识的制作技术不能通过标识本身运用逆向工程原理得到; 5.各个产品 的标识是不同的, 这样不法分子复制的成本会很高。 通过上述的各种手段将不 法分子仿冒的漏洞全部堵上, 使得仿冒的可能性几乎为零, 而且仿冒的成本非 常巨大, 而合法生产商的生产成本却艮低。 所以本发明的防伪方法成本低廉, 安全性非常高。
【附图说明】
图 1为本发明实施例 1的标签立体结构示意图;
图 2为本发明实施例 2的标签立体结构展开示意图;
图 3为本发明实施例 2的标签制作的方法流程图;
图 4为本发明实施例 3的标签立体结构展开示意图;
图 5为本发明实施例 3的标签制作的方法流程图;。
【具体实施方式】
为了使发明的目的、技术方案及优点更加清楚明白, 以下结合附图及实施 例, 对本发明进行进一步详细说明。 应当理解, 此处所描述的具体实施例仅仅 用以解释本发明, 并不用来限定本发明。
实施例 1
如图 1所示, 一种防伪标签, 该标签包括印刷在产品外包装盒 1 0上(也 可以印刷在产品的外壳上) 的二维码 1 1和图文 12, 所述图文 12位于二维码 1 1的外围, 具体的本实施例中, 所述图文 12为一只小鸟(也可为其他的动物 图形或者产品的商标等) , 位于二维码 1 1的上方。
所述二维码 1 1和图文 12在服务器的数据库中呈——对应关系,在数据库 中所述图文 12具有特定的编码, 该特定的编码与所述二维码通过特殊的算法 建立联系。 所述二维码包括二维码图形和二维码信息,其均与所述图文对应存储在数 据库中。
制作该防伪标签时,在产品的外包装上同时印刷在数据库中成一一对应关 系的二维码 11和图文 12。所述二维码 11和图文 12事先在服务器中进行绑定。
消费者在进行防伪鉴定时, 采用图像读取装置 (比如摄像头或者扫描仪) 读取二维码, 并且将该二维码通过有线或者无线的方式发送给网络侧的服务 器, 服务器获取所述图像读取装置读取的二维码信息, 判断所述图像读取装置 读取的二维码信息是否与数据库中存储的二维码信息一致; 如一致, 则找出与 该二维码信息相对的图文, 并将该图文通过显示装置(例如显示器或者手机的 屏幕)显示出来;此时,消费者将产品上标识的图文与显示出来的图文相比较, 如果两个图文一致, 则表明该产品为正品, 如果两个图文不一致, 则表明该产 品为伪品。 将二维码和图文相结合进行防伪,避免了不法分子通过数字码进行穷举法 破解的问题, 但是假如将图文和二维码直接印刷在产品上, 不法分子还可以将 正品的图文和二维码扫描并且打印出来进行少量的仿冒,并且不法分子还可以 采用穷举法不断的试出正确的二维码,并且将与二维码对应的图文下载后打印 在产品的外包装盒上。
实施例 2
本实施例针对上述的实施例所存在的缺点, 提出了一种新的防伪的标签, 如图 2所示, 在上述实施例 1 的基础之上, 所述产品上标识的图文 12区域设 置有一个方孔 121。 这个方孔 121是通过打孔装置(包括激光烧壳打孔设备以 及针式打孔装置)随机打在所述图文 12区域内的,也即各个产品上的方孔 121 的位置是不同的, 同时方孔的数量也可以不同, 方孔的大小也可不同, 这样是 为了具有方孔的图文形状更加丰富。
将具有方孔的图文 12 通过图像读取装置读取后存储在服务器的数据库 中, 并且将该图文 12与二维码对应存储在服务器的数据库中。 由于图文中包 含有方孔,所以造假者即使能够通过计算机程序穷举法试出二维码从而下载图 文并打印下来, 但是造假者后还需要对图文进行打孔, 由于孔的位置相对于所 述图文是随机的, 所以, 造假者难以通过显示出来的图文去打方孔, 给造假者 增加了成本。 为了便于印刷图文, 可以采用先印刷图文, 再打方孔的方法(也 可以采取先随机打孔, 然后再印刷图文的方式) 。
如图 3所示, 制作该防伪标签的方法为:
S1 : 在产品的外包装盒上印刷图文 12;
S2: 在图文 12区域随机打方孔 121 ;
S3: 通过图像读取装置读取带有方孔 121的图文图形;
S4: 将带有方孔 121的图文图形与二维码对应存储在数据库中;
S5: 然后再在产品上印刷与所述图文图形对应的二维码。
在消费者进行防伪鉴定时, 消费者首先采用图像读取装置 (比如摄像头或 者扫描仪)读取印刷在产品上的二维码, 并且将该二维码通过有线或者无线的 方式发送给网络侧的服务器, 服务器获取所述二维码图像, 判断所述图像读取 装置读取的二维码信息是否与数据库中存储的二维码信息一致; 如一致, 则找 出与该二维码信息相对的图文, 并将该图文通过显示装置 (例如显示器或者手 机的屏幕)显示出来, 显示装置显示出来的图文也带有方孔, 此时, 消费者将 产品上标识的图文与显示出来的图文相比较, 如果两个产品上的图文和图文中 的方孔的大小、 形状和位置一致, 则表明该产品为正品, 如果不一致, 则表明 该产品为伪品。 通过在图文区域设置孔, 而孔的位置是随机变化的, 不法分子如果要模仿 既要知道孔的位置, 又要通过机器进行精确定位打孔, 增加了仿冒的成本, 使 得安全性更加提高。 但是不法分子还是可以通过计算机程序穷举试出所述二维 码, 然后通过显示装置显示出来的孔的形状、 大小和位置去打孔, 分析了关于 孔的这些特征之后, 还是可以通过印刷机打印图文和打孔装置去打孔, 虽然模 仿较难, 但是只要能够破解出打孔设备打孔的程序规律, 还是可以仿冒的。 实施例 3 为了加强本发明防伪的安全性, 如图 4所示, 在实施例 2的基础上, 所述 产品上标识的二维码 11 的白色区块内设置有圓孔 111 , 该圓孔 111 能够被所述 图像读取装置读取, 所述圓孔 111 在二维码中的位置信息存储在数据库中。 同 理, 各个产品的二维码中的所述圓孔的大小、 位置和数量也可以是不同的。
在制作时, 在所述产品上印刷二维码后, 以二维码中任意一黑色区块为基 准, 采用打孔装置随机在二维码的白色区块内打圓孔, 并获取该打孔装置所打 圓孔在二维码中的位置信息, 并将该位置信息与所述二维码对应存储在数据库 中。
由于二维码 1 1 中具有圓孔, 而所述圓孔能够被图像读取装置所识别, 既 不会妨碍图像读取装置读取正确的二维码信息, 同时还可以通过圓孔的有无从 而能够区分出计算机生成的二维码图像与图像读取装置读取的二维码图像,这 样可以防止不法分子通过软件合成二维码然后进行穷举法进行尝试验证。如果 不法分子想通过验证, 必须将二维码打孔, 然后再通过图像读取装置读取二维 码, 然后进行尝试验证, 这无疑给造假者增加了巨大的成本。
如图 5所示, 制作该防伪标签的方法为:
S1 : 在产品的外包装盒上印刷图文 12;
S2: 在图文 12区域随机打方孔 121 ;
S3: 通过图像读取装置读取带有方孔 121的图文图形;
S4: 将带有方孔 121的图文图形与二维码对应存储在数据库中;
S5: 然后再在产品上印刷与所述图文图形对应的二维码;
S6: 以二维码中任意一黑色区块为基准,采用打孔装置随机在二维码的白 色区块内打圓孔 111 ;
S7: 获取该打孔装置所打圓孔 111在二维码中的位置信息;
S8: 将该位置信息与所述二维码对应存储在数据库中;
在消费者进行防伪鉴定时, 消费者首先采用图像读取装置 (比如摄像头或 者扫描仪)读取印刷在纸条和外包装盒上的二维码, 并且将该二维码通过有线 或者无线的方式发送给网络侧的服务器, 服务器获取所述二维码图像, 分析判 断所述图像读取装置读取的二维码中是否包含有圓孔, 如果没有, 则通过显示 装置告知消费者二维码无效; 如果有, 则进一步判断所述图像读取装置读取的 二维码信息是否与数据库中存储的二维码信息一致, 如不一致, 则通过显示装 置告知消费者二维码不合法; 如有一致, 则将图像读取装置读取的该二维码中 的圓孔位置信息与数据库中存储的圓孔的位置信息相比较; 如一致, 则找出与 该二维码信息相对的图文, 并将该图文通过显示装置显示出来, 此时, 消费者 将产品上标识的图文与显示出来的图文相比较, 如果两个图文一致, 则表明该 产品为正品, 如果两个图文不一致, 则表明该产品为伪品。 如不一致, 则通过 显示装置告知消费者二维码无效。 消费者在比较图文是否相同时, 不仅仅需要 比较图文的形状、 大小和颜色是否相同, 还需要比较方孔的大小、 数量以及在 图文中的位置是否相同, 以上全部相同, 才能表明该产品为正品。
所述圓孔和方孔仅为本发明所列举的实施例, 其形状可以是多样的, 如棱 形、 三角形以及橢圓形均可。 总之, 以上实施例仅用以说明本发明的技术方案而非限制, 尽管参照较佳 实施例对本发明进行了详细说明, 本领域的普通技术人员应当理解, 可以对本 发明的技术方案进行修改或者等同替换, 而不脱离本发明技术方案的精神和范 围, 其均应涵盖在本发明的权利要求范围当中。

Claims

权 利 要 求 书
1 .一种防伪方法, 其特征在于, 该方法包括:
在产品上印刷二维码和图文;
图像读取装置读取标识在产品上的二维码;
获取图像读取装置读取的二维码信息;
判断所述二维码信息是否与数据库中存储的二维码信息一致;
如一致, 则找出与该二维码信息相对的图文, 并将该图文通过显示装置显 示出来;
将产品上标识的图文与显示出来的图文相比较, 如果两个图文一致, 则表 明该产品为正品, 如果两个图文不一致, 则表明该产品为伪品。
2.根据权利要求 1所述的防伪方法,其特征在于,所述产品上标识的图文区 域设置有方孔, 所述显示出来的图文也包含有方孔;
将产品上的方孔相对于产品上图文的位置与显示出来的方孔相对于显示出 来图文的位置相比较, 如果方孔的相对位置一致, 则表明该产品为正品, 如果 方孔的相对位置不一致, 则表明该产品为伪品。
3.根据权利要求 1 或 2所述的防伪方法, 其特征在于, 所述产品上标识的 二维码的白色区块内设置有圓孔; 判断所述图像读取装置读取的二维码中是否 包含有所述的圓孔, 如果有则进一步判断所述二维码信息是否与数据库中存储 的二维码信息一致。
4.根据权利要求 3所述的防伪方法,其特征在于,所述二维码的白色区域的 圆孔随机分布在二维码中, 所述圓孔在二维码中的位置信息与该二维码对应存 储在数据库中;
在所述图像读取装置读取的二维码信息与数据库中存储的二维码信息一致 后, 将图像读取装置读取的二维码中圆孔的位置信息与数据库中存储的圓孔的 位置信息相比较; 如一致, 则找出与该二维码信息相对的图文, 并将该图文通 过显示装置显示出来。
5.—种防伪的标签,其特征在于,该标签包括标识在产品上的二维码和图文, 所述二维码信息和图文在数据库中相对应。
6. 根据权利要求 5所述的防伪标签, 其特征在于, 所述产品上印刷的图文 区域设置有方孔, 该方孔随机分布在所述图文区域, 所述二维码信息与包含有 方孔的图文在数据库中相对应。
7.根据权利要求 6所述的防伪标签,其特征在于,所述产品上标识的二维码 的白色区块内设置有圓孔, 该圓孔能够被所述图像读取装置读取, 所述圓孔在 二维码中的位置信息存储在数据库中。
8.—种防伪标签的制作方法, 其特征在于, 该方法包括如下步骤: 在产品上印刷图文, 并且印刷在数据库中与该图文相对应的二维码。
9.根据权利要求 8所述的防伪标签的制作方法, 其特征在于, 进一步的, 该 方法包括如下步骤:
先在产品印刷图文, 然后再在图文区域随机打方孔, 然后将包含有方孔的 图文存储在数据库中, 所述方孔位于所述图文区域, 建立包含有方孔的图文与 二维码的对应关系。
10.根据权利要求 9所述的防伪标签的制作方法, 其特征在于, 进一步的, 该方法包括如下步骤:
以二维码中任意一黑色区块为基准, 采用打孔装置随机在二维码的白色区 块内打圓孔, 并获取该打孔装置所打圓孔在二维码中的位置信息, 并将该位置 信息与所述二维码对应存储在数据库中。
PCT/CN2012/070245 2011-11-02 2012-01-11 一种防伪方法、标签及标签制作方法 WO2013063873A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2011103436682A CN103093173A (zh) 2011-11-02 2011-11-02 一种防伪方法、标签及标签制作方法
CN201110343668.2 2011-11-02

Publications (1)

Publication Number Publication Date
WO2013063873A1 true WO2013063873A1 (zh) 2013-05-10

Family

ID=48191253

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/070245 WO2013063873A1 (zh) 2011-11-02 2012-01-11 一种防伪方法、标签及标签制作方法

Country Status (2)

Country Link
CN (1) CN103093173A (zh)
WO (1) WO2013063873A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105740926A (zh) * 2016-01-28 2016-07-06 廖江龙 防伪方法及防伪系统

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104392260A (zh) * 2014-12-17 2015-03-04 肖学静 一种基于附加信息的二维码防伪方法
CN106372698A (zh) * 2015-07-24 2017-02-01 上海高研明鉴信息技术有限公司 多维防伪标签及其防伪验证方法
CN108665041B (zh) * 2018-05-09 2021-08-03 深圳市码云可变数据科技有限公司 二维码生成及识别方法、装置、计算机设备及存储介质
CN109472337B (zh) * 2018-11-05 2023-07-04 上海中商网络股份有限公司 一种基于随机特征的标签防伪方法和装置
CN110014763A (zh) * 2019-05-07 2019-07-16 中山易必固新材料科技有限公司 一种基于电子束固化的防伪标签制作方法和装置
CN111932281A (zh) * 2020-09-22 2020-11-13 北京大鱼梦想科技有限公司 一种防伪检测方法及装置

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060244253A1 (en) * 2003-09-22 2006-11-02 Sinosun Technology (Shen Zhen Ltd.) Texture coding label
CN101295343A (zh) * 2008-06-19 2008-10-29 福建鸿博印刷股份有限公司 二维码多重加密防伪印刷方法
CN101673387A (zh) * 2009-10-23 2010-03-17 深圳劲嘉彩印集团股份有限公司 一种商品数码防伪方法

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101561863A (zh) * 2008-04-14 2009-10-21 北京中科诚通科技发展有限公司 用手机、扫描仪、摄像头识别防伪印刷品的防伪识别系统

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060244253A1 (en) * 2003-09-22 2006-11-02 Sinosun Technology (Shen Zhen Ltd.) Texture coding label
CN101295343A (zh) * 2008-06-19 2008-10-29 福建鸿博印刷股份有限公司 二维码多重加密防伪印刷方法
CN101673387A (zh) * 2009-10-23 2010-03-17 深圳劲嘉彩印集团股份有限公司 一种商品数码防伪方法

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105740926A (zh) * 2016-01-28 2016-07-06 廖江龙 防伪方法及防伪系统

Also Published As

Publication number Publication date
CN103093173A (zh) 2013-05-08

Similar Documents

Publication Publication Date Title
CN103093355B (zh) 一种基于二维码防伪标签及标签制作方法
WO2013063873A1 (zh) 一种防伪方法、标签及标签制作方法
CN105706107B (zh) 二维条形码以及这种条形码的认证的方法
US8903181B2 (en) Low cost unique identification generation using combination of patterns and unique code images
US9666008B2 (en) Optically variable security device, and article employing same and method for verifying the authenticity of an article
US10201939B1 (en) Product authenticity verification system
US9153005B2 (en) Method and system for authenticating a secure document
CN106682912A (zh) 3d结构的认证方法
CN103208067B (zh) 防伪系统及其标签的形成、嵌入、解读、鉴别及权属改变方法
CN102054183B (zh) 基于无线射频识别和数字水印的产品防伪系统及方法
RU2651167C2 (ru) Способ и система для маркировки изделия, изделие, промаркированное таким образом, и способ и система для аутентификации промаркированного изделия
US20060020803A1 (en) Systems and methods for authentication of items or documents
CN102831530B (zh) 一种基于二维图形编码防伪的方法
JP6549692B2 (ja) 認証マークの送信
CN202306599U (zh) 一种基于二维码的防伪标签
CN109472335A (zh) 一种彩票防伪系统及防伪方法
US20150076219A1 (en) Tactile anti-forgery method using random emboss
KR20140040231A (ko) 태그 인증을 위한 방법 및 장치
US20130317996A1 (en) Systems and Methods for Tracking Status of Random Unique Code Strings and Generation of Random Unique Code Strings
KR101595766B1 (ko) 정품 인증용 라벨 및 그 라벨을 이용한 인증방법
US20130024387A1 (en) Systems and Methods for Tracking Assigned Code Strings
JP2017208032A (ja) 真贋判定方法
CN101546452B (zh) Gld信息编码综合防伪与识别方法
CN112418371B (zh) 用于区块链的安全三维码以及生成和解码方法
CN103500532A (zh) 随机浮凸触感防伪方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12845412

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12845412

Country of ref document: EP

Kind code of ref document: A1