WO2015035701A1 - Etiquette anti-contrefaçon, son procédé de fabrication et procédé anti-contrefaçon - Google Patents

Etiquette anti-contrefaçon, son procédé de fabrication et procédé anti-contrefaçon Download PDF

Info

Publication number
WO2015035701A1
WO2015035701A1 PCT/CN2013/086949 CN2013086949W WO2015035701A1 WO 2015035701 A1 WO2015035701 A1 WO 2015035701A1 CN 2013086949 W CN2013086949 W CN 2013086949W WO 2015035701 A1 WO2015035701 A1 WO 2015035701A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
identifier
particles
label
layer
Prior art date
Application number
PCT/CN2013/086949
Other languages
English (en)
Chinese (zh)
Inventor
林于翔
孙福军
Original Assignee
深圳市同盛绿色科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市同盛绿色科技有限公司 filed Critical 深圳市同盛绿色科技有限公司
Publication of WO2015035701A1 publication Critical patent/WO2015035701A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09FDISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
    • G09F3/00Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
    • G09F3/02Forms or constructions
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
    • B42D25/29Securities; Bank notes
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09FDISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
    • G09F3/00Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
    • G09F3/02Forms or constructions
    • G09F2003/0276Safety features, e.g. colour, prominent part, logo

Definitions

  • the present invention relates to the field of anti-counterfeiting technology, and in particular to an anti-counterfeit label, a method for manufacturing an anti-counterfeit label, and an anti-counterfeiting method.
  • Anti-counterfeiting is an important proposition in the trading of goods.
  • the existing anti-counterfeit labels are mainly for general products, and the anti-counterfeiting labels are not too complicated, because the manufacturing complexity will increase the cost.
  • anti-counterfeit labels only need to resist the imitation of the anti-counterfeit labels by the general imitation manufacturers.
  • the imitation manufacturers are very likely to counterfeit the anti-counterfeit labels, thereby realizing counterfeit precious items. the goal of.
  • the technical problem to be solved by the present invention is to provide an anti-counterfeit label, a method for manufacturing the anti-counterfeit label, and an anti-counterfeiting method, which can ensure the uniqueness of the anti-counterfeit label and improve the reliability of anti-counterfeiting.
  • the present invention provides an anti-counterfeit label comprising a base layer and a drip film layer, which is formed by dispersing a colloid comprising a plurality of particles to the base layer, and drying and solidifying. Among them, at least the number and position of the particles in the drip layer are random.
  • the base layer is printed with a coordinate system, a random number of the particles are randomly distributed in the coordinate system, and one of the droplet layers is first recorded after the formation of the coordinates of the particles, forming a predetermined length of coordinates
  • the sequence is recorded in the database to verify the authenticity when it is to be verified.
  • all of the particles in one of the drip layer layers have two or more colors, and the distribution of colors is also random.
  • the diameter of the particles is between 0.1 mm and 1 mm.
  • the diameter of the particles is between 1 micrometer and 10 micrometers.
  • the anti-counterfeit tag further includes a first identifier and a second identifier, the first identifier and the second identifier being disposed on the base layer, wherein the first identifier is used to identify the drip layer The starting position, the second identifier is used to identify the end position of the drip layer.
  • the present invention provides an anti-counterfeiting method, comprising the steps of: scanning and acquiring an image of an anti-counterfeit label, wherein the anti-counterfeit label comprises a base layer and a drip layer, wherein the drip layer comprises a plurality of particles After the colloid is dispersed and solidified by the base layer, at least the number and position of the particles in the drip layer are random; the number and position of the particles in the drip layer are identified to obtain verification data; If the correct result of matching the verification data is found, if the correct result of the matching is found, it is determined that the anti-counterfeit label is a real label, otherwise it is determined to be a false label, wherein the correct result is in the drip layer After the coordinates of all the particles are dispersed, a coordinate sequence of a predetermined length is formed as a correct result to be recorded in the database to verify the authenticity when to be verified.
  • the step of identifying the number and position of the particles in the drip layer to obtain verification data comprises: sequentially combining the number and position of the particles in the identified drip layer into the first data; One of a predetermined number of digits in the number of the mobile device generated when the first data is identified, a code of a predetermined number of bits in the International Mobile Subscriber Identity (IMSI), and a code of a predetermined number of bits in the International Mobile Equipment Identity (IMEI) Combining the second data; combining the first data and the second data into the final verification data in sequence.
  • IMSI International Mobile Subscriber Identity
  • IMEI International Mobile Equipment Identity
  • the step of scanning and acquiring the image of the security label includes: collecting an image of the security label behind the first identifier when scanning the first identifier; stopping collecting when scanning the second identifier An image subsequent to the second identifier, wherein the first identifier and the second identifier are disposed on the base layer, the first identifier is used to identify a starting position of the drip layer The second identifier is used to identify the end position of the drip layer.
  • the step of scanning and acquiring the image of the security label includes: collecting an image of a security label of a preset range behind the first identifier when the first identifier is scanned, wherein the first identifier The symbol is disposed on the base layer, and the first identifier is used to identify a starting position of the drip layer.
  • the present invention provides a method for manufacturing an anti-counterfeit label, comprising the steps of: adding a plurality of particles to a colloid; dispersing the colloid-containing colloid onto a base layer to form a film containing the particles; The film is dried and cured wherein at least the number and location of the particles in the film are random.
  • step of dispersing the particle-containing colloid onto the base layer comprises: dropping, adding or spraying the particle-containing colloid onto the base layer.
  • the method further comprises the step of: forming the film containing the particles before: printing a coordinate system on the surface of the substrate, the film being in a printing coordinate system, wherein a random number of the particles Randomly distributing in the coordinate system; the step of drying and solidifying the film comprises: recording coordinates of all or a predetermined number of particles in the film, obtaining a coordinate sequence of a predetermined length, and recording in a database for verification when to be verified True or false.
  • the step of printing a coordinate system on the surface of the base layer comprises: printing a coordinate system, a first identifier, and a second identifier on the surface of the base layer, wherein the first identifier is used to identify the drip film The starting position of the layer, the second identifier is used to identify the end position of the drip layer.
  • step of adding a plurality of particles to the colloid comprises: adding a plurality of particles to the transparent colloid and stirring.
  • the particles have a diameter between 0.1 mm and 1 mm, or between 1 and 10 microns.
  • the anti-counterfeit label of the present invention comprises a base layer and a drip layer, which is formed by dispersing a colloid comprising a plurality of particles to the base layer, and drying and solidifying, wherein the drip layer is At least the number and location of the particles are random.
  • FIG. 1 is a flow chart of an embodiment of an anti-counterfeiting method of the present invention
  • FIG. 2 is a flow chart of an embodiment of an optical recognition method of the present invention
  • FIG. 3 is a flow chart of another embodiment of the optical recognition method of the present invention.
  • FIG. 4 is a schematic structural view of an embodiment of an anti-counterfeit label of the present invention.
  • FIG. 5 is a schematic structural view of another embodiment of the anti-counterfeit label of the present invention.
  • FIG. 6 is a schematic structural view of still another embodiment of the anti-counterfeit label of the present invention.
  • FIG. 7 is a schematic structural view of still another embodiment of the anti-counterfeit label of the present invention.
  • FIG. 9 is a flow chart of an embodiment of a method for manufacturing an anti-counterfeit label of the present invention.
  • FIG. 11 is a schematic structural diagram of an embodiment of a mobile device according to the present invention.
  • FIG. 12 is a schematic structural diagram of another embodiment of a mobile device according to the present invention.
  • FIG. 13 is a schematic structural diagram of still another embodiment of a mobile device according to the present invention.
  • FIG. 1 is a flowchart of an embodiment of an anti-counterfeiting method according to the present invention, including:
  • Step S101 The first data that uniquely identifies the corresponding object is saved in the authentication server.
  • the first data that uniquely identifies the corresponding object is the anti-counterfeiting information of the object. Due to the uniqueness of the first data, the authenticity of the object can be discriminated based on the first data.
  • Step S102 The mobile device acquires first data obtained by identifying the anti-counterfeiting information, where the first data is used to uniquely identify the corresponding object.
  • the anti-counterfeiting information is used to uniquely identify the corresponding object, and may indicate that the object is not a counterfeit product.
  • the mobile device After the mobile device identifies the anti-counterfeiting information, the first data is obtained, and the first data can uniquely identify the corresponding object.
  • the mobile device can use the built-in camera to identify the anti-counterfeiting information.
  • the step S102 specifically includes: capturing, by using a mobile device with a camera, an image of the identifier or the anti-counterfeit tag located on the object, and performing optical recognition to obtain the first One data.
  • the image of the identification or security label on the object includes, but is not limited to, text, characters, combinations of text and characters, two-dimensional codes or barcodes, and the like.
  • the image of the anti-counterfeit label on the object is collected by a mobile device with a camera, wherein the anti-counterfeit label comprises a base layer and a drip layer, and the drip layer is formed by dispersing a colloid containing a plurality of particles to the base layer, and drying and solidifying, the drip layer At least the number and location of the particles in the particle are random.
  • Anti-counterfeit labels also known as anti-counterfeiting labels or anti-counterfeiting labels, can be pasted, printed, transferred on the surface of the subject matter, or on the label of the subject matter, or on the attachments of the subject matter (such as commodity listings, business cards, and security cards). logo.
  • the anti-counterfeiting feature of the anti-counterfeit label and the method of identification are the soul of the anti-counterfeit label.
  • the droplet layer of the anti-counterfeit label contains a plurality of particles, and the number and position of the particles are random. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
  • A includes: scanning an image of the security label on the object with a mobile device with a camera; collecting an image of the security label behind the first identifier when scanning the first identifier; scanning the second identifier At the same time, the acquisition of the image behind the second identifier is stopped, wherein the first identifier is disposed in front of the security label, and the second identifier is disposed behind the security label.
  • A includes: scanning, by using a mobile device with a camera, an image of the security label on the object; and when scanning the first identifier, acquiring an image of the security label of the preset range behind the first identifier, wherein, An identifier is placed in front of the security label.
  • the image of the security label of the preset range behind the first identifier may be acquired.
  • A includes: collecting an image of the security label of the preset range in front of the terminator when the terminator is scanned (ie, the location where the second identifier is located), wherein the terminator is disposed after the security tag.
  • Setting the first identifier and the second identifier in front of and behind the security label, or setting the first identifier in front of the security label, can improve the speed of scanning recognition and reduce the load of the mobile device when performing identification.
  • the number and position of the particles in the drip layer are optically identified, and the number and position of the particles in the identified drip layer are sequentially combined into the first data.
  • the format of the first data is defined by a predetermined rule.
  • the first data requirement is 10 characters. If the number of bits of the specified coordinates is two digits, the default specifies that only five pieces of information are represented, and the number of characters is insufficient.
  • the position coordinates are (0, 2) and (5, 3), respectively, combined in the direction of the abscissa from small to large to 0253 (the number of bits of the specified coordinates is Two) or 00020503 (the number of bits in the specified coordinates is four), then the first data is 0253000000 or 0002050300; the direction in which the ordinate is large to small is 5302 (the number of bits of the specified coordinates is two) or 05030002 ( The number of bits for the specified coordinates is four bits, and the first data is 5302000000 or 0503000200.
  • the rule of the format of the first data is not limited to the above manner, and is not limited herein.
  • B specifically: optically recognizing the number, position and color of the particles in the drip layer, and identifying the drip film
  • the number, position and color of the particles in the layer are sequentially combined into the first data, wherein all the particles in the drip layer are at least one color, and if the color of the particles is two or more, the distribution of the colors is also random. of.
  • the first data is 0253010400 (the number of bits of the specified coordinates is two bits) or the 000205030104 (the number of bits of the specified coordinates is four bits).
  • Step S103 After acquiring the first data, the mobile device locally generates second data, where the second data includes unique data associated with the local device of the mobile device.
  • the second data is a number of predetermined digits in the number of the mobile device, or a code of a predetermined number of bits in the International Mobile Subscriber Identity (IMSI), or a code of a predetermined number of bits in the International Mobile Equipment Identity IMEI.
  • IMSI International Mobile Subscriber Identity
  • IMEI International Mobile Equipment Identity
  • the mobile subscriber's number, the International Mobile Subscriber Identity (IMSI), and the International Mobile Equipment Identity IMEI are unique data associated with the mobile device's native to each mobile device.
  • the second data includes a predetermined number of digits in the number of the mobile device, an International Mobile Subscriber Identity (IMSI) or a code of a predetermined number of bits in the International Mobile Equipment Identity IMEI. Data that is unique to the mobile device can be obtained, and the privacy of the user can be protected. For example, the number of the mobile device is 13777778888, and the next 6 digits are reserved, and the second data is 778888.
  • the second data may also be time data scanned by the mobile device locally, or location data scanned by the mobile device locally, or a combination of time data and location data scanned by the mobile device.
  • the time data scanned by the mobile device and the location data scanned by the mobile device are both unique data associated with the local device of the mobile device. Therefore, the second data may also be time data scanned by the mobile device or moved.
  • the scanning time is 10:15 on May 20, 2013, the location is Beijing
  • the second data may be the time data 1305201015 scanned by the mobile device, or the second data may be the location data scanned by the mobile device.
  • the second data is 1305201015beijing.
  • the location scanned by the mobile device is the location of the GPS positioning navigation. If the mobile device does not have the GPS navigation function or does not enable the GPS navigation function, the mobile device The location scanned by the machine is the location where the number of the mobile device belongs.
  • the code of the predetermined number of bits in the number of the mobile device, the International Mobile Subscriber Identity (IMSI) or the International Mobile Equipment Identity (IMEI), and the time data of the mobile device's local scanning may be moved.
  • the location data scanned by the device, or the combined data of the time data scanned by the mobile device and the scanned location data are combined to obtain the second data, which is not limited herein.
  • Step S104 The mobile device sends verification data to the authentication server, where the verification data is combined data including the first data and the second data, or mapping data of the first data and the second data, and the first data is in the authentication server. Find the correct result of matching the verification data, and then obtain the identification result. If the correct result can be found, the authentication result is judged as the real label, otherwise it is judged as a false label, wherein the correct result is the first data as correct.
  • the results are recorded in the database to verify the authenticity when verification is required.
  • the verification data is combined data including the first data and the second data, or mapping data of the first data and the second data, and the mapping data refers to another set of data corresponding to the first data and the second data,
  • the first data is 1234
  • the second data is 5678
  • the mapping data ABCD of the first data and the mapping data of the second data are EFGH
  • the mapping data in which the first data and the second data are combined is ABCDEFGH.
  • the mapping data may be back-mapped in the verification server to obtain the first data and the second data.
  • the mapping data of the first data and the mapping data of the second data are also unique, respectively, the correct result of matching the verification data may be searched in the authentication server by using the mapping data of the first data, and then The identification result is obtained.
  • the mobile device sends the verification data to the authentication server, and the authentication server searches for the correct result of the matching verification data according to the first data. If the correct result of the matching is found, the authentication result is determined that the security label is a real label, otherwise the virtual label is determined as a false label. Among them, the correct result is that the first data is recorded as a correct result in the database to verify the authenticity when it is to be verified.
  • Step S105 The mobile device receives the authentication result from the authentication server.
  • the authentication result is sent to the mobile device, and the mobile device receives the authentication result from the authentication server.
  • the authentication server returns the authentication result to the mobile device as a real label, and returns the current first data and the second data.
  • the authentication server returns the authentication result to the mobile device as a non-authentic label, and returns the current first data and the second data, for example,
  • the second data is the last six digits of the mobile device number, and the second data obtained by the mobile device itself is 788888.
  • the verification result is a real label
  • the first data obtained this time is attached 01021548498.
  • the second data 788888 when the verification result is a non-real label, the first data 0121548498 and the second data 788888 obtained this time are also attached when the verification result is returned.
  • the authentication server saves the first verification data in the authentication server, and when transmitting the authentication result to the mobile device, the second data or the verification data stored in the verification data corresponding to the first data is verified for the first time.
  • the mapping data of the second data is also sent to the mobile device. If the verification data corresponding to the first data is not saved, the second data or the mapping data of the second data of the verification data corresponding to the first data is not transmitted. .
  • the authentication result is a real label, if the mobile device does not receive the mapping data of the second data or the second data from the authentication server, it indicates that the product corresponding to the anti-counterfeiting information is the first verification, if the mobile device receives the authentication server.
  • the second data or the mapping data of the second data indicates that the product corresponding to the anti-counterfeiting information is not the first verification, and has been verified.
  • the second data obtained by the mobile device itself is 1305301305beijing
  • the second data from the authentication server is 1305201015beijing, indicating that the product has been verified in Beijing at 10:15 on May 20, 2013. This product has been used by people.
  • the second data is the last six digits of the mobile device number, and the second data obtained by the mobile device itself is 788888
  • the authentication server does not send the second data, it indicates that the product is the first verification
  • the second data sent by the authentication server is 788888, it indicates that the user uses the mobile device to perform the second verification on the product
  • the second data sent by the authentication server is 785512, the product is performed on the other mobile device for the second time. Verification, or the product has been verified, or the product has been used.
  • the authentication server sends the authentication result to the mobile device.
  • the authentication may be determined according to the actual situation, and is not limited to the foregoing manner, and is not limited herein.
  • the mobile device obtains the first data obtained by identifying the anti-counterfeiting information, where the first data is used to uniquely identify the corresponding object; after acquiring the first data, the mobile device locally generates the second data; The mobile device transmits authentication data to an authentication server; the mobile device receives an authentication result from the authentication server. Since the first data and the second data are data representing uniqueness, in particular, the first data is used to uniquely identify the corresponding object. In this way, the uniqueness of the anti-counterfeiting information is ensured, and the counterfeiter cannot copy, thereby improving the reliability of the anti-counterfeiting. .
  • step S102 when the mobile device acquires the identification of the anti-counterfeiting information, an optical identification method is involved.
  • FIG. 2 and FIG. 3 are flowcharts of two embodiments of the optical identification method of the present invention, including:
  • Step S201 optically scanning the first optical scanning area.
  • the first identifier is disposed in front of the second optical scanning area, and the second identifier is disposed behind the second optical scanning area.
  • the step S201 specifically includes: performing a progressive optical scan on the first optical scanning area according to the row direction, and scanning only the first scanning point in the previous row.
  • the first optical scanning area is subjected to progressive optical scanning in a column direction, and each line scans only the first scanning point.
  • the first identifier is disposed at the forefront of the scanning direction in the second optical scanning area.
  • the scanning method is that each line sweeps from the head to the tail, and the non-optical scanning area also takes a lot of time during the scanning, and also increases the load of the scanning device. In the above manner, the purpose of fast scan recognition can be achieved, and the load of the scanning device is reduced.
  • Step 202a and step S202b are two different scanning recognition modes, and one of them may be selected.
  • Step S202a optically identifying a predetermined range of the second optical scanning area behind the first identifier when the first identifier is scanned.
  • the first identifier When the first identifier is set only in front of the second optical scanning area, only the second optical scanning area of the preset range behind the first identifier can be optically identified.
  • Step S202b When the first identifier is scanned, the second optical scanning area behind the first identifier is optically recognized, and when the second identifier is scanned, the second optical scanning area is stopped from being optically recognized.
  • first identifier and the second identifier are respectively disposed in front of and behind the second optical scanning area, only the second optical scanning area between the first identifier and the second identifier is optically identified.
  • the second optical scanning area is an anti-counterfeit label.
  • the anti-counterfeit label comprises a base layer and a drip layer, which is formed by dispersing a colloid comprising a plurality of particles into the base layer and drying and solidifying, and at least the number and position of the particles in the drip layer are random.
  • Anti-counterfeit labels also known as anti-counterfeiting labels or anti-counterfeiting labels, can be pasted, printed, transferred on the surface of the subject matter, or on the label of the subject matter, or on the attachments of the subject matter (such as commodity listings, business cards, and security cards). logo.
  • the anti-counterfeiting feature of the anti-counterfeit label and the method of identification are the soul of the anti-counterfeit label.
  • the droplet layer of the anti-counterfeit label contains a plurality of particles, and the number and position of the particles are random. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
  • step S202b may also be: optically identifying a predetermined range of second optical scanning regions preceding the terminator when scanning the terminator (ie, the location where the second identifier is located).
  • the terminator When the terminator is set only after the second optical scanning area, only the second optical scanning area of the preset range in front of the terminator can be optically recognized.
  • Embodiments of the present invention perform optical scanning on a first optical scanning area; optically identifying a predetermined range of second optical scanning areas behind the first identifier when scanning the first identifier; or scanning to the first And an identifier, the second optical scanning area behind the first identifier is optically recognized, and when the second identifier is scanned, optical recognition of the second optical scanning area is stopped; wherein the first An identifier is disposed in front of the second optical scanning area, and the second identifier is disposed behind the second optical scanning area. Since the first identifier and the second identifier are set or only the first identifier is set, the identified starting position is identified. In this way, scanning and identification can be quickly performed, reducing the load on the scanning device.
  • step S102 if the image of the security label located on the object is collected by the mobile device, the anti-counterfeit label of the present invention shown in the following figure, the anti-counterfeiting method related to the anti-counterfeit label, and the manufacturing method of the anti-counterfeit label are also involved here. .
  • FIG. 4 is a schematic structural diagram of an anti-counterfeit label according to an embodiment of the present invention.
  • the anti-counterfeit label 10 includes a base layer 101 and a drip layer 102.
  • the drip layer 102 is composed of a colloid 1022 including a plurality of particles 1021. After being dispersed into the base layer 101, it is formed by drying and solidification, wherein at least the number and position of the particles 1021 in the drip film layer 102 are random.
  • Anti-counterfeit label 10 also known as anti-counterfeit label or anti-counterfeit trademark, can be pasted, printed, transferred on the surface of the subject matter, or on the label of the subject matter, or on the attachment of the subject matter (such as merchandise listing, business card and security card), with anti-counterfeiting The identity of the role.
  • the anti-counterfeiting feature of the anti-counterfeit label and the method of identification are the soul of the anti-counterfeit label.
  • the drip film in the anti-counterfeit label comprises a plurality of particles, and the number and position of the particles are random. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
  • FIG. 5 is a schematic structural view of another embodiment of the anti-counterfeit label of the present invention.
  • the anti-counterfeit label 20 includes a base layer 201 and a drip layer 202.
  • the drip layer 202 is a colloid comprising a plurality of particles 2021. After 2022 is dispersed into the base layer 201, it is formed by drying and solidification, wherein at least the number and position of the particles 2021 in the drip film layer 202 are random.
  • the base layer 201 is printed with a coordinate system 2011, a random number of particles 2021 are randomly distributed in the coordinate system 2011, and a droplet layer 202 is first recorded after the formation of the coordinates of all the particles 2021 thereof, and a coordinate sequence forming a predetermined length is recorded in the database. Verify the authenticity when it is to be verified. By printing the coordinate system on the base layer, the anti-counterfeiting accuracy of the security label can be increased.
  • the particle when recording or identifying the coordinates of a particle, if the coordinates of the particle are not easily determined, the particle may be ignored, or the coordinate of the particle may be determined by an algorithm for determining the coordinate. If the number of particles in the drip layer is large, and the number of characters of the particle is combined more than the preset number of characters, the characters after the preset number of characters are ignored.
  • the color of all the particles 2021 in one drip layer 202 can be divided into one type, and if the color is two or more, the distribution of colors is also random. As shown in FIG. 5, there are two color particles, which are red particles 20211 and yellow particles 20212, respectively.
  • the diameter of the particles is between 0.1 mm and 1 mm, such as 0.1 mm, 0.5 mm or 1 mm.
  • a common scanning device can distinguish individual particles; the other case is the diameter of the particles.
  • ordinary scanning devices cannot distinguish individual particles, and special scanning equipment with tools such as magnifying glasses or low power microscopes is required. Resolve individual particles.
  • the diameter of the particles is not limited to the above 0.1 mm to 1 mm and 1 to 10 ⁇ m, such as 2 mm, 50 ⁇ m, and the like.
  • the colloid in the anti-counterfeit label may be transparent or not transparent. If it is not transparent, it has special requirements for particles or scanning equipment, such as scanning equipment with X-ray irradiation function, or particle belt. There is some kind of marker, and the scanning device is a scanning device with the identification of the marker.
  • the security label 30 further includes a first identifier 303 and a second identifier 304.
  • the first identifier 303 and the second identifier 304 are disposed on the base layer 301.
  • An identifier 304 is used to identify the starting position of the drip layer 302, and a second identifier 304 is used to identify the end position of the drip layer 302.
  • the first identifier and the second identifier indicate the starting position and the ending position of the drip layer. In this way, when the first identifier is not scanned, the data may not be collected, and when the second identifier is scanned The data can be terminated, thereby increasing the speed of scanning and collecting the data of the security label and reducing the load on the scanning device.
  • the anti-counterfeit label in the above FIG. 4 to FIG. 7 may further include a coating covering the base layer and the uppermost layer of the drip film layer, and the coating covers the anti-counterfeiting information of the anti-counterfeit label to protect the exposure of the anti-counterfeiting information.
  • the coating covers the anti-counterfeiting information of the anti-counterfeit label to protect the exposure of the anti-counterfeiting information.
  • FIG. 8 is a flowchart of another embodiment of the anti-counterfeiting method of the present invention.
  • the embodiment is a flowchart of an anti-counterfeiting method when the anti-counterfeit tag is the anti-counterfeit tag described in FIG. 4 to FIG. 7 , and includes:
  • Step S301 Scan and collect an image of the security label, wherein the anti-counterfeit label includes a base layer and a drip layer, and the drip layer is formed by dispersing a colloid containing a plurality of particles into the base layer, and drying and solidifying, and the particles in the drip layer are at least The quantity and location are random.
  • Anti-counterfeit labels also known as anti-counterfeiting labels or anti-counterfeiting labels, can be pasted, printed, transferred on the surface of the subject matter, or on the label of the subject matter, or on the attachments of the subject matter (such as commodity listings, business cards, and security cards). logo.
  • the anti-counterfeiting feature of the anti-counterfeit label and the method of identification are the soul of the anti-counterfeit label.
  • the droplet layer of the anti-counterfeit label contains a plurality of particles, and the number and position of the particles are random. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
  • the step of scanning and collecting the image of the security label includes: collecting an image of the security label behind the first identifier when scanning the first identifier; and stopping collecting the second identifier after scanning the second identifier
  • the image wherein the first identifier and the second identifier are disposed on the base layer, the first identifier is used to identify a starting position of the drip layer, and the second identifier is used to identify a termination position of the drip layer.
  • the step of scanning and collecting the image of the security label includes: collecting an image of the security label of the preset range after the first identifier when the first identifier is scanned, wherein the first identifier is set on the base layer, first The identifier is used to identify the starting position of the drip layer.
  • the first identifier When the first identifier is set only in front of the image of the security label, only the image of the security label of the preset range behind the first identifier may be collected.
  • Step S302 Identifying the number and position of the particles in the drip layer to obtain verification data.
  • the step S302 specifically includes: identifying the number, position, and color of the particles in the drip layer, wherein all the particles in the drip layer may be one color, and if there are two or more colors, the color distribution is also random. of.
  • the color of the particles is increased, and the distribution of the colors is also random. In this way, the difficulty of counterfeiting the security label is further increased, and the reliability of the security label is improved.
  • the step S302 may specifically include the following content:
  • C1 The number and position of the particles in the identified drip layer are sequentially combined into the first data.
  • C2 one of a predetermined number of digits in the number of the mobile device generated when the first data is to be identified, a code of a predetermined number of bits in the International Mobile Subscriber Identity (IMSI), and a code of a predetermined number of bits in the International Mobile Equipment Identity IMEI The two are combined into the second data.
  • IMSI International Mobile Subscriber Identity
  • IMEI International Mobile Equipment Identity
  • C3 The first data and the second data are sequentially combined into the final verification data.
  • the first data basically represents the uniqueness of the security label
  • the second data is a predetermined number of digits in the number of the mobile device generated when the first data is identified, the international mobile user
  • the combination of the code of the predetermined number of bits in the identification code IMSI and the code of the predetermined number of bits in the international mobile device identification code IMEI further increases the uniqueness of the verification data and improves the reliability of the anti-counterfeiting. If the second data is generated by identifying at least the time data and the location data is sequentially combined, this further increases the uniqueness of the verification data and improves the reliability of the anti-counterfeiting.
  • Step S303 Find the correct result of the matching verification data in the database. If the correct result of the matching is found, it is determined that the anti-counterfeit label is a real label, otherwise it is determined to be a false label, wherein the correct result is all the particles in the falling layer After the coordinates are dispersed, a coordinate sequence of a predetermined length is formed as a correct result to be recorded in the database to verify the authenticity when to be verified.
  • a coordinate sequence forming a predetermined length is recorded as a correct result in the database, and the verification data is obtained by identifying the number and position of the particles in the drip layer, and thus, in the database If the matching verification data can be found, the anti-counterfeit label is a real label, otherwise it is a fake label. If the verification data includes the combined data of the first data and the second data, and the correct result of the matching verification data is searched according to the first data, if the correct result of the matching is found, the authentication result is determined that the security label is a real label, Otherwise it is judged to be a false label.
  • Embodiments of the present invention scan and collect images of security labels, identify the number and location of particles in the drop layer to obtain verification data, and find the correct results in the database that match the verification data. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
  • FIG. 9 is a flowchart of an embodiment of a method for manufacturing an anti-counterfeit label according to the present invention, including:
  • Step S401 adding a plurality of particles to the colloid.
  • the materials of the particles herein include, but are not limited to, plastics, metals, ceramics, and the like, and are not limited herein.
  • Colloid also known as colloidal dispersion, is a type of dispersion system in which the diameter of the dispersed particles is between the crude dispersion system and the solution. It may be transparent or non-transparent, and is not limited.
  • step S401 comprises: adding a plurality of particles to the transparent colloid and stirring.
  • Step S402 Dispersing the colloid containing the particles onto the base layer to form a film containing the particles.
  • the step of dispersing the colloid containing the particles onto the base layer comprises: dropping, adding or spraying the colloid containing the particles onto the base layer.
  • the step of forming the film containing the particles comprises: printing a coordinate system on the surface of the substrate, the film being in a printing coordinate system, wherein a random number of particles are randomly distributed in the coordinate system.
  • Printing the coordinate system on the surface of the base layer can better identify the random position coordinates of a random number of particles, and improve the anti-counterfeiting precision of the anti-counterfeit label.
  • the step of printing a coordinate system on the surface of the base layer includes: printing a coordinate system, a first identifier, and a second identifier on the surface of the base layer, wherein the first identifier is used to identify a starting position of the falling film layer, and the second identifier Used to identify the end position of the drip layer.
  • the first identifier and the second identifier respectively identify the starting position and the ending position of the drip layer, which further clarifies the spatial extent of the drip layer.
  • Step S403 The film is dried and solidified, wherein at least the number and position of the particles in the film are random.
  • step S403 the method further includes:
  • D1 Record the coordinates of all or a predetermined number of particles in the film, obtain a coordinate sequence of a predetermined length, and record it in a database to verify the authenticity when it is to be verified.
  • the coating is covered on the base layer and at the top of the drip layer.
  • the coating covers the anti-counterfeiting information of the anti-counterfeit label to protect the exposure of the anti-counterfeiting information.
  • the coating may be scraped off.
  • a condition is that the diameter of the particles is between 0.1 mm and 1 mm, such as 0.1 mm, 0.5 mm or 1 mm, within which a conventional scanning device can resolve individual particles;
  • the diameter of the particles is between 1 micrometer and 10 micrometers, for example 1 micrometer, 5 micrometers or 10 micrometers, in this range, ordinary scanning devices cannot distinguish individual particles, and need to use tools such as a magnifying glass or a low power microscope.
  • Special scanning equipment is able to distinguish individual particles. For anti-counterfeiting labels, if it is necessary to distinguish the individual particles by means of special scanning equipment with tools, this will undoubtedly increase the difficulty of counterfeiting counterfeiting and further improve the reliability of anti-counterfeiting.
  • the diameter of the particles is not limited to the above 0.1 mm to 1 mm and 1 to 10 ⁇ m, such as 2 mm, 50 ⁇ m, and the like.
  • Embodiments of the present invention add a plurality of particles to a colloid; disperse the colloid containing the particles onto the base layer to form a film containing the particles; and dry and solidify the film, wherein at least the number and position of the particles in the film are random. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
  • the anti-counterfeiting method is as shown in FIG.
  • FIG. 10 is a flowchart of still another embodiment of the anti-counterfeiting method of the present invention, including:
  • Step S501 The first data that uniquely identifies the corresponding object is saved in the authentication server.
  • the first data that uniquely identifies the corresponding object is the anti-counterfeiting information of the object. Due to the uniqueness of the first data, the authenticity of the object can be discriminated based on the first data.
  • Step S502 The mobile device scans and collects an image of the security label, wherein the anti-counterfeit label includes a base layer and a drip layer, and the drip layer is formed by dispersing a colloid containing a plurality of particles into the base layer, and drying and solidifying, and the particles in the drip layer At least its number and location are random.
  • Anti-counterfeit labels also known as anti-counterfeiting labels or anti-counterfeiting labels, can be pasted, printed, transferred on the surface of the subject matter, or on the label of the subject matter, or on the attachments of the subject matter (such as commodity listings, business cards, and security cards). logo.
  • the anti-counterfeiting feature of the anti-counterfeit label and the method of identification are the soul of the anti-counterfeit label.
  • the droplet layer of the anti-counterfeit label contains a plurality of particles, and the number and position of the particles are random. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
  • Step S502 includes: collecting an image of the security label behind the first identifier when scanning the first identifier; and stopping collecting the image behind the second identifier when scanning the second identifier, wherein the first identifier is set In front of the security label, the second identifier is placed behind the security label.
  • step S502 includes: collecting an image of a security label of a preset range behind the first identifier when the first identifier is scanned, wherein the first identifier is disposed in front of the security label.
  • the first identifier When the first identifier is set only in front of the image of the security label, only the image of the security label of the preset range behind the first identifier may be collected.
  • step S502 includes: collecting an image of the security label of the preset range in front of the terminator when the terminator is located (ie, the location where the second identifier is located), wherein the terminator is disposed after the security tag.
  • Step S503 Identify the number and position of the particles in the drip layer, and combine the number and position of the particles in the identified drip layer into the first data in order.
  • the format of the first data is defined by a predetermined rule.
  • the first data requirement is 10 characters. If the number of bits of the specified coordinates is two digits, the default specifies that only five pieces of information are represented, and the number of characters is insufficient.
  • the position coordinates are (0, 2) and (5, 3), respectively, combined in the direction of the abscissa from small to large to 0253 (the number of bits of the specified coordinates is Two) or 00020503 (the number of bits in the specified coordinates is four), then the first data is 0253000000 or 0002050300; the direction in which the ordinate is large to small is 5302 (the number of bits of the specified coordinates is two) or 05030002 ( The number of bits for the specified coordinates is four bits, and the first data is 5302000000 or 0503000200.
  • the rule of the format of the first data is not limited to the above manner, and is not limited herein.
  • Step S503 specifically includes: identifying the number, position, and color of the particles in the drip layer, and sequentially combining the number, position, and color of the particles in the identified drip layer into the first data, wherein the drip layer is The color of all particles is at least one. If the color of the particles is two or more, the distribution of colors is also random.
  • the first data is 0253010400 (the number of bits of the specified coordinates is two bits) or the 000205030104 (the number of bits of the specified coordinates is four bits).
  • Step S504 After acquiring the first data, the mobile device locally generates second data, where the second data includes unique data associated with the local device of the mobile device.
  • the second data is a number of predetermined digits in the number of the mobile device, or a code IMSI of a predetermined number of bits in the International Mobile Subscriber Identity, or a code of a predetermined number of bits in the International Mobile Equipment Identity IMEI.
  • the mobile subscriber's number, the International Mobile Subscriber Identity (IMSI), and the International Mobile Equipment Identity IMEI are unique data associated with the mobile device's native to each mobile device.
  • the second data comprises a number of predetermined digits in the number of the mobile device, or a code of a predetermined number of bits in the International Mobile Subscriber Identity (IMSI) or the International Mobile Equipment Identity IMEI
  • the code for the predetermined number of bits so that both the uniqueness of the mobile device data and the privacy of the user can be protected.
  • the number of the mobile device is 13777778888, and the next 6 digits are reserved, and the second data is 778888.
  • the second data may also be time data scanned by the mobile device locally, or location data scanned by the mobile device locally, or a combination of time data and location data scanned by the mobile device.
  • the time data scanned by the mobile device and the location data scanned by the mobile device are both unique data associated with the local device of the mobile device. Therefore, the second data may also be time data scanned by the mobile device or moved.
  • the scanning time is 10:15 on May 20, 2013, the location is Beijing
  • the second data may be the time data 1305201015 scanned by the mobile device, or the second data may be the location data scanned by the mobile device.
  • the second data is 1305201015beijing.
  • the location scanned by the mobile device is the location of the GPS positioning navigation. If the mobile device does not have the GPS navigation function or does not enable the GPS navigation function, the mobile device The location scanned by the machine is the location where the number of the mobile device belongs.
  • the predetermined number of digits in the number of the mobile device may be associated with the mobile device.
  • the combined time data of the scanned time data, the location data scanned by the mobile device, or the combined time data of the mobile device and the scanned location data are combined to obtain the second data, which is not limited herein.
  • Step S505 The mobile device sends verification data to the authentication server, where the verification data is combined data including the first data and the second data, or mapping data of the first data and the second data, and the first data is in the authentication server. Find the correct result of matching the verification data, and then obtain the identification result. If the correct result can be found, the authentication result is judged as the real label, otherwise it is judged as a false label, wherein the correct result is the first data as correct. The results are recorded in the database to verify the authenticity when verification is required.
  • the verification data is combined data including the first data and the second data, or mapping data of the first data and the second data, and the mapping data refers to another set of data corresponding to the first data and the second data,
  • the first data is 1234
  • the second data is 5678
  • the mapping data ABCD of the first data and the mapping data of the second data are EFGH
  • the mapping data in which the first data and the second data are combined is ABCDEFGH.
  • the mapping data may be back-mapped in the verification server to obtain the first data and the second data.
  • the mapping data of the first data and the mapping data of the second data are also unique, respectively, the correct result of matching the verification data may be searched in the authentication server by using the mapping data of the first data, and then The identification result is obtained.
  • the mobile device sends the verification data to the authentication server, and the authentication server searches for the correct result of the matching verification data according to the first data. If the correct result of the matching is found, the authentication result is determined that the security label is a real label, otherwise the virtual label is determined as a false label. Among them, the correct result is that the first data is recorded as a correct result in the database to verify the authenticity when it is to be verified.
  • Step S506 The mobile device receives the authentication result from the authentication server.
  • the authentication result is sent to the mobile device, and the mobile device receives the authentication result from the authentication server.
  • the authentication server returns the authentication result to the mobile device as a real label, and returns the current first data and the second data.
  • the authentication server returns the authentication result to the mobile device as a non-authentic label, and returns the current first data and the second data, for example,
  • the second data is the last six digits of the mobile device number, and the second data obtained by the mobile device itself is 788888.
  • the verification result is a real label
  • the first data obtained this time is attached 01021548498.
  • the second data 788888 when the verification result is a non-real label, the first data 0121548498 and the second data 788888 obtained this time are also attached when the verification result is returned.
  • the authentication server may save the first verification data in the authentication server, and when transmitting the authentication result to the mobile device, verify the second data in the verification data corresponding to the first data that is saved for the first time or
  • the mapping data of the second data is also sent to the mobile device, and if there is no saved verification data corresponding to the first data, the mapping of the second data or the second data of the verification data corresponding to the first data is not transmitted. data.
  • the authentication result is a real label, if the mobile device does not receive the mapping data of the second data or the second data from the authentication server, it indicates that the product corresponding to the anti-counterfeiting information is the first verification, if the mobile device receives the authentication server.
  • the second data or the mapping data of the second data indicates that the product corresponding to the anti-counterfeiting information is not the first verification, and has been verified.
  • the second data obtained by the mobile device itself is 1305301305beijing
  • the second data from the authentication server is 1305201015beijing, indicating that the product has been verified in Beijing at 10:15 on May 20, 2013. This product has been used by people.
  • the second data is the last six digits of the mobile device number, and the second data obtained by the mobile device itself is 788888
  • the authentication server does not send the second data, it indicates that the product is the first verification
  • the second data sent by the authentication server is 788888, it indicates that the user uses the mobile device to perform the second verification on the product
  • the second data sent by the authentication server is 785512, the product is performed on the other mobile device for the second time. Verification, or the product has been verified, or the product has been used.
  • the authentication server sends the authentication result to the mobile device.
  • the authentication may be determined according to the actual situation, and is not limited to the foregoing manner, and is not limited herein.
  • the mobile device scans and collects an image of the anti-counterfeit label, identifies the number and position of the particles in the drip layer, and combines the number and position of the particles in the identified drip layer into a sequence.
  • a data the mobile device locally generates second data after acquiring the first data; the mobile device transmits verification data to an authentication server; the mobile device receives an authentication result from the authentication server. Since the first data and the second data are both unique data, in particular the first data, in the above manner, the uniqueness of the verification data can be ensured, thereby improving the reliability of the anti-counterfeiting.
  • FIG. 11 is a schematic structural diagram of an embodiment of a mobile device according to the present invention.
  • the mobile device includes: a scan acquisition module 11 , a first data obtaining module 12 , a second data obtaining module 13 , a sending module 14 , and a receiving module 15 .
  • the mobile device of the present embodiment can perform all the steps in the method flow shown in FIG.
  • the scan acquisition module 11 is configured to scan and collect an image of the security label.
  • the anti-counterfeit label includes a base layer and a drip layer.
  • the drip layer is formed by dispersing a colloid containing a plurality of particles into the base layer, and drying and solidifying. At least the number and location of the particles are random.
  • the scan collection module 11 is further configured to: when scanning the first identifier, collect an image of the security label behind the first identifier; and when scanning the second identifier, stop collecting the image behind the second identifier, where The first identifier is placed in front of the security label and the second identifier is placed behind the security label.
  • the scan collection module 11 is further configured to: when scanning the first identifier, collect an image of the anti-counterfeit label of the preset range behind the first identifier, where the first identifier is disposed in front of the anti-counterfeit label.
  • the first data obtaining module 12 is configured to identify the number and position of the particles in the drip layer, and sequentially combine the number and position of the particles in the identified drip layer into the first data.
  • the first data obtaining module 12 is specifically configured to identify the number, position, and color of the particles in the drip layer, and combine the number, position, and color of the particles in the identified drip layer into the first data, where The color of all particles in the drip layer is at least one, and if the color is two or more, the distribution of colors is also random.
  • the second data obtaining module 13 is configured to generate second data by the mobile device after acquiring the first data, where the second data includes unique data associated with the local device of the mobile device.
  • the second data may be a number of predetermined digits in the number of the mobile device, or a code of a predetermined number of bits in the International Mobile Subscriber Identity (IMSI), or a code of a predetermined number of bits in the International Mobile Equipment Identity IMEI.
  • IMSI International Mobile Subscriber Identity
  • IMEI International Mobile Equipment Identity
  • the second data may also be time data scanned by the mobile device locally, or location data scanned by the mobile device locally, or a combination of time data and location data scanned by the mobile device.
  • the sending module 14 is configured to send the verification data to the authentication server, where the verification data is combined data including the first data and the second data, or mapping data of the first data and the second data, where the first data is in the authentication server. Find the correct result of matching the verification data, and then obtain the identification result. If the correct result can be found, the authentication result is judged as the real label, otherwise it is judged as a false label, wherein the correct result is the first data as correct.
  • the results are recorded in the database to verify the authenticity when verification is required.
  • the receiving module 15 is configured to receive the authentication result from the authentication server.
  • the mobile device scans and collects an image of the anti-counterfeit label, identifies the number and position of the particles in the drip layer, and combines the number and position of the particles in the identified drip layer into a sequence.
  • a data the mobile device locally generates second data after acquiring the first data; the mobile device transmits verification data to an authentication server; the mobile device receives an authentication result from the authentication server. Since the first data and the second data are both unique data, in particular the first data, in the above manner, the uniqueness of the verification data can be ensured, thereby improving the reliability of the anti-counterfeiting.
  • FIG. 12 is a schematic structural diagram of another embodiment of a mobile device according to the present invention.
  • the mobile device includes: a first data obtaining module 21, a second data obtaining module 22, a sending module 23, and a receiving module 24.
  • the mobile device of this embodiment may perform step S102 to step S105 in the method flow shown in FIG. 1 .
  • the first data obtaining module 21 is configured to acquire first data obtained by identifying the anti-counterfeiting information, where the first data is used to uniquely identify the corresponding object.
  • the first data obtaining module 21 is specifically configured to collect an image of the identification or anti-counterfeit label located on the object by using the mobile device with the camera, and perform optical recognition to obtain the first data.
  • Identification or security labels include, but are not limited to, text, or characters, or a combination of text and characters, or a two-dimensional code or barcode.
  • the first data obtaining module 21 includes: a third collecting unit and a first data obtaining unit.
  • the third collecting unit is configured to collect an image of the anti-counterfeit label on the object by using a mobile device with a camera, wherein the anti-counterfeiting label comprises a base layer and a drip layer, and the drip layer is dispersed and solidified by a colloid containing a plurality of particles to the base layer. Formed, at least the number and location of the particles in the drip layer are random.
  • the first data obtaining unit is configured to optically identify the number and position of the particles in the drip layer, and sequentially combine the number and position of the particles in the identified drip layer into the first data.
  • the first data obtaining unit is specifically configured to optically identify the number, position, and color of the particles in the drip layer, and sequentially combine the number, position, and color of the particles in the identified drip layer into the first data, where The color of all particles in the drip layer is at least one, and if the color is two or more, the distribution of colors is also random.
  • the first data obtaining module 21 further includes a first collecting unit, configured to scan an image of the security label on the object with the mobile device with the camera; and collect the first identifier when scanning the first identifier The image of the security label is followed by the image; after scanning the second identifier, the image behind the second identifier is stopped, wherein the first identifier is disposed in front of the security label, and the second identifier is disposed behind the security label.
  • a first collecting unit configured to scan an image of the security label on the object with the mobile device with the camera; and collect the first identifier when scanning the first identifier The image of the security label is followed by the image; after scanning the second identifier, the image behind the second identifier is stopped, wherein the first identifier is disposed in front of the security label, and the second identifier is disposed behind the security label.
  • the first data obtaining module 21 further includes a second collecting unit, configured to scan an image of the security label on the object with the mobile device with the camera; and collect the first identifier when scanning the first identifier An image of a security label of a preset range followed by a first identifier disposed in front of the security label.
  • a second collecting unit configured to scan an image of the security label on the object with the mobile device with the camera; and collect the first identifier when scanning the first identifier An image of a security label of a preset range followed by a first identifier disposed in front of the security label.
  • the second data obtaining module 22 is configured to generate second data by the mobile device after acquiring the first data, where the second data includes unique data associated with the local device of the mobile device.
  • the second data may be a number of predetermined digits in the number of the mobile device, or a code of a predetermined number of bits in the International Mobile Subscriber Identity (IMSI), or a code of a predetermined number of bits in the International Mobile Equipment Identity IMEI.
  • the second data may also be time data scanned by the mobile device locally, or location data scanned by the mobile device locally, or a combination of time data and location data scanned by the mobile device.
  • the sending module 23 is configured to send the verification data to the authentication server, where the verification data is combined data including the first data and the second data, or mapping data of the first data and the second data, where the first data is in the authentication server. Find the correct result of matching the verification data, and then obtain the identification result. If the correct result can be found, the authentication result is judged as the real label, otherwise it is judged as a false label, wherein the correct result is the first data as correct.
  • the results are recorded in the database to verify the authenticity when verification is required.
  • the receiving module 24 is configured to receive the authentication result from the authentication server.
  • the mobile device obtains the first data obtained by identifying the anti-counterfeiting information, where the first data is used to uniquely identify the corresponding object; after acquiring the first data, the mobile device locally generates the second data; The mobile device transmits authentication data to an authentication server; the mobile device receives an authentication result from the authentication server. Since the first data and the second data are data representing uniqueness, in particular, the first data is used to uniquely identify the corresponding object. In this way, the uniqueness of the anti-counterfeiting information is ensured, and the counterfeiter cannot copy, thereby improving the reliability of the anti-counterfeiting. .
  • FIG. 13 is a schematic structural diagram of two embodiments of a mobile device according to the present invention.
  • the mobile device includes: a scanning module 31 and an optical identification module 32.
  • the mobile device of the present embodiment can perform all the steps in the method flow shown in FIG. 2 and FIG.
  • the scanning module 31 is configured to optically scan the first optical scanning area.
  • the first identifier is disposed in front of the second optical scanning area, and the second identifier is disposed behind the second optical scanning area.
  • the scanning module 31 is specifically configured to perform progressive optical scanning on the first optical scanning area in a row direction, and scan only the first scanning point in front of each line.
  • the scanning module 31 is further configured to perform progressive optical scanning of the first optical scanning area in a column direction, and scan only the first scanning point in front of each line.
  • the first identifier is disposed at the forefront of the scanning direction in the second optical scanning area.
  • the optical identification module 32 is configured to optically identify a predetermined range of second optical scanning regions following the first identifier when the first identifier is scanned. Or for optically recognizing the second optical scanning area behind the first identifier when scanning the first identifier, and optically recognizing the second optical scanning area when scanning the second identifier.
  • the second optical scanning area is an anti-counterfeit label.
  • the anti-counterfeit label comprises a base layer and a drip layer, which is formed by dispersing a colloid comprising a plurality of particles into the base layer and drying and solidifying, and at least the number and position of the particles in the drip layer are random.
  • Embodiments of the present invention perform optical scanning on a first optical scanning area; optically identifying a predetermined range of second optical scanning areas behind the first identifier when scanning the first identifier; or scanning to the first And an identifier, the second optical scanning area behind the first identifier is optically recognized, and when the second identifier is scanned, optical recognition of the second optical scanning area is stopped; wherein the first An identifier is disposed in front of the second optical scanning area, and the second identifier is disposed behind the second optical scanning area. Since the first identifier and the second identifier are set or only the first identifier is set, the identified starting position is identified. In this way, scanning and identification can be quickly performed, reducing the load on the scanning device.

Abstract

L'invention concerne une étiquette anti-contrefaçon (10), son procédé de fabrication et un procédé anti-contrefaçon. L'étiquette anti-contrefaçon (10) comprend une couche (101) de substrat et une couche (102) de dépôt de film. La couche (102) de dépôt de film est formée par séchage et solidification après la dispersion de colloïdes (1022) comprenant de multiples particules (1021) sur la couche (101) de substrat. Le nombre ou les positions des particules (1021) dans la couche (102) de dépôt de film sont aléatoires. En utilisant l'étiquette anti-contrefaçon (10) et le procédé anti-contrefaçon, le caractère unique de l'étiquette anti-contrefaçon (10) est garanti, ce qui améliore la fiabilité de la lutte contre la contrefaçon.
PCT/CN2013/086949 2013-09-16 2013-11-12 Etiquette anti-contrefaçon, son procédé de fabrication et procédé anti-contrefaçon WO2015035701A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310423054.4 2013-09-16
CN201310423054.4A CN104464504B (zh) 2013-09-16 2013-09-16 防伪标签、防伪标签的制造方法以及防伪方法

Publications (1)

Publication Number Publication Date
WO2015035701A1 true WO2015035701A1 (fr) 2015-03-19

Family

ID=52664987

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/086949 WO2015035701A1 (fr) 2013-09-16 2013-11-12 Etiquette anti-contrefaçon, son procédé de fabrication et procédé anti-contrefaçon

Country Status (2)

Country Link
CN (1) CN104464504B (fr)
WO (1) WO2015035701A1 (fr)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107154213A (zh) * 2017-07-14 2017-09-12 山东泰宝防伪技术产品有限公司 智能随机特征识别防伪标识及其制备方法
CN109118943A (zh) * 2017-06-22 2019-01-01 杭州沃朴物联科技有限公司 一种基于三维随机图形的防伪标签
CN109118945A (zh) * 2017-06-22 2019-01-01 杭州沃朴物联科技有限公司 一种基于二维随机图形的防伪标签
CN109472337A (zh) * 2018-11-05 2019-03-15 上海中商网络股份有限公司 一种基于随机特征的标签防伪方法和装置
CN113470507A (zh) * 2020-03-31 2021-10-01 无锡市龙创印刷科技有限公司 一种粒子码与热烫转移双防伪标签的生产工艺

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106504638A (zh) * 2017-01-11 2017-03-15 北京谱福溯码信息技术开发有限公司 一种三维防伪标签生产工艺
CN106782042A (zh) * 2017-01-11 2017-05-31 北京谱福溯码信息技术开发有限公司 一种三维防伪标签
CN113293653B (zh) * 2021-05-28 2022-04-05 浙江德邦印务有限公司 一种防伪票据生产工艺

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4767205A (en) * 1986-01-28 1988-08-30 Flow Cytometry Standards Corporation Composition and method for hidden identification
CN1366281A (zh) * 2001-01-19 2002-08-28 张绍美 微粒坐标定位防伪标签及其制作方法
CN2694403Y (zh) * 2004-04-09 2005-04-20 李威 多色对位防伪标识物
EP1354304B2 (fr) * 2000-12-20 2011-03-23 AlphaFox Systems Limited Systemes de securite, d'identification et de verification
CN203038321U (zh) * 2012-10-15 2013-07-03 李成 防伪系统和防伪标识物
CN103208067A (zh) * 2013-03-13 2013-07-17 张小北 防伪系统及其标签的形成、嵌入、解读、鉴别及权属改变方法

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2434754Y (zh) * 2000-07-07 2001-06-13 李占武 设有随机分布的单元标识体的防伪标识物
CN2457688Y (zh) * 2001-01-03 2001-10-31 张绍美 网格微粒防伪标贴
CN103165020B (zh) * 2011-12-13 2015-04-22 中国人民银行印制科学技术研究所 一种防伪产品以及制造方法、防伪检验设备以及方法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4767205A (en) * 1986-01-28 1988-08-30 Flow Cytometry Standards Corporation Composition and method for hidden identification
EP1354304B2 (fr) * 2000-12-20 2011-03-23 AlphaFox Systems Limited Systemes de securite, d'identification et de verification
CN1366281A (zh) * 2001-01-19 2002-08-28 张绍美 微粒坐标定位防伪标签及其制作方法
CN2694403Y (zh) * 2004-04-09 2005-04-20 李威 多色对位防伪标识物
CN203038321U (zh) * 2012-10-15 2013-07-03 李成 防伪系统和防伪标识物
CN103208067A (zh) * 2013-03-13 2013-07-17 张小北 防伪系统及其标签的形成、嵌入、解读、鉴别及权属改变方法

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109118943A (zh) * 2017-06-22 2019-01-01 杭州沃朴物联科技有限公司 一种基于三维随机图形的防伪标签
CN109118945A (zh) * 2017-06-22 2019-01-01 杭州沃朴物联科技有限公司 一种基于二维随机图形的防伪标签
CN109118945B (zh) * 2017-06-22 2024-04-26 杭州沃朴物联科技有限公司 一种基于二维随机图形的防伪标签
CN107154213A (zh) * 2017-07-14 2017-09-12 山东泰宝防伪技术产品有限公司 智能随机特征识别防伪标识及其制备方法
CN109472337A (zh) * 2018-11-05 2019-03-15 上海中商网络股份有限公司 一种基于随机特征的标签防伪方法和装置
CN109472337B (zh) * 2018-11-05 2023-07-04 上海中商网络股份有限公司 一种基于随机特征的标签防伪方法和装置
CN113470507A (zh) * 2020-03-31 2021-10-01 无锡市龙创印刷科技有限公司 一种粒子码与热烫转移双防伪标签的生产工艺

Also Published As

Publication number Publication date
CN104464504A (zh) 2015-03-25
CN104464504B (zh) 2017-11-21

Similar Documents

Publication Publication Date Title
WO2015035701A1 (fr) Etiquette anti-contrefaçon, son procédé de fabrication et procédé anti-contrefaçon
WO2015035702A1 (fr) Procédé anti-contrefaçon et dispositif mobile
WO2020226316A1 (fr) Appareil de transfert et procédé de fabrication d'un afficheur à micro-del l'utilisant
WO2014029196A1 (fr) Procédé et système de reconnaissance basés sur des mesures anti-contrefaçon par code-barres dimensionnel
WO2016209020A1 (fr) Appareil de traitement d'image et procédé de traitement d'image
WO2018074870A1 (fr) Procédé de fourniture d'objet de réalité augmentée et serveur utilisant une authentification d'image
WO2020032482A1 (fr) Procédé et système de fourniture de transaction financière au moyen d'une carte vide
WO2013187663A1 (fr) Dispositif de terminal utilisateur permettant de fournir un service d'achat électronique, et procédés associés
WO2018166091A1 (fr) Procédé, système et terminal de signature de prêt en face à face, et support d'enregistrement lisible par ordinateur
WO2014171680A1 (fr) Terminal mobile, serveur de sécurité et procédé de paiement de celui-ci
WO2020101420A1 (fr) Procédé et appareil de mesurer des caractéristiques optiques d'un dispositif de réalité augmentée
WO2021177695A1 (fr) Dispositif électronique pour fournir des informations de transaction et procédé de fonctionnement associé
WO2019143050A1 (fr) Dispositif électronique et procédé de commande de mise au point automatique de caméra
WO2018160031A1 (fr) Feuille anti-contrefaçon utilisant des caractéristiques visuelles en fonction de l'angle, de la direction et de la distance de visualisation, et procédé de fabrication et procédé de reconnaissance associés
WO2016080653A1 (fr) Procédé et appareil de traitement d'images
WO2015035704A1 (fr) Procédé de reconnaissance optique et dispositif mobile
WO2015035703A1 (fr) Procédé anti-contrefaçon et dispositif mobile
WO2015035705A1 (fr) Procédé de reconnaissance optique et dispositif mobile
WO2016175422A1 (fr) Dispositif de tampon mobile
WO2017014348A1 (fr) Terminal mobile et son procédé de commande
WO2024043613A1 (fr) Dispositif serveur pour fournir un service de gestion et de génération de curriculum vitae, et son procédé de fonctionnement
WO2014178578A1 (fr) Appareil et procédé de génération de données d'image dans un terminal portable
WO2017026651A1 (fr) Procédé de commerce électronique
WO2020149500A1 (fr) Procédé et appareil pour l'enregistrement d'une clé partagée
WO2023128113A1 (fr) Serveur de gestion d'informations d'objet dangereux apte à estimer la taille réelle d'un objet dangereux sur une route conjointement avec un terminal de collecte d'informations monté sur un véhicule, et son procédé de fonctionnement

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13893296

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13893296

Country of ref document: EP

Kind code of ref document: A1