Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Commodity anti-counterfeiting code construction and verification method

A commodity anti-counterfeiting code and verification method technology, which is applied in the field of digital anti-counterfeiting of commodities, can solve the problems of high risk of reuse and embezzlement, difficulty in identification, and high cost, and achieve the effects of improving anti-counterfeiting efficiency, reducing anti-counterfeiting costs, and increasing confidentiality

Active Publication Date: 2013-03-27
周锡卫
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. Clear code: use special materials, special patterns, special codes, etc. to make anti-counterfeiting marks, and identify authenticity through observation and comparison; generally speaking, the cost is high, and identification is difficult, especially the risk of reuse and embezzlement is high Big
[0005] 2. Hidden code: hide all or part of the anti-counterfeiting code or logo and place the same part as the hidden part on a third party, and verify the authenticity by opening the hidden part and comparing it with the one placed by the third party; generally speaking, mostly Valid once, single-way verification, practicality and credibility are compromised
This method is simple and easy to operate, and the cost is extremely low, but the anti-counterfeiting effect is not good, because the main code and the secondary code have been marked on the product in a clear and static form before the product leaves the factory (possibly on the inner and outer packaging). This is easy for counterfeiters to copy or reuse, and because this method marks the main and secondary codes on the inner and outer two-layer packaging respectively, it is not convenient for multiple inquiries, that is, if you want to verify, you must destroy the outer packaging, which is extremely difficult. Greatly restrict the effective circulation of goods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Commodity anti-counterfeiting code construction and verification method
  • Commodity anti-counterfeiting code construction and verification method
  • Commodity anti-counterfeiting code construction and verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Take medicine, tobacco, and alcohol as examples for illustration, but the technology and scope of the present invention are not limited to the content of this example:

[0042] 1. On the product packaging production line, install a special software system for the control system of the digital or barcode printing device;

[0043] The clear code MM and the hidden code YM of the anti-counterfeiting code are generated by a special software system. The specific method is: the i-th anti-counterfeiting code is generated, the pointer Si of a certain algorithm in the algorithm library SFK is randomly selected, and according to the normal serial number and corresponding attributes of the product on the production line The encoding takes the digital string Pi with the length of the digital string W as agreed, and then calls the algorithm f(Si) in SFK according to the algorithm pointer Si in YMn, calculates and codes to form Mi, forms the plain code MMi together with the algorithm p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of commodity digital counterfeit prevention, and particularly relates to a commodity anti-counterfeiting code construction and verification method. Since clear code MM with an algorithm pointer and concealed code YM with commodity circulation state Zk and commodity circulation path Lm are used as anti-counterfeiting codes, code security is improved, dynamic coding and verification can be realized, commodity circulation can be traced. According to the encoding technical scheme with the algorithm pointer, multiple communication ways, multi-role multi-direction true and false identification can be realized, commodity can be identified, complete anti-counterfeiting effectiveness can be ensured, anti-counterfeiting effect is improved comprehensively while anti-counterfeiting cost can be reduced, and channel conflict can be eliminated. By the new anti-counterfeiting and verification technical scheme, existing resources are utilized efficiency, and commodity anti-counterfeiting effects with low cost, operational easiness, reusability and multiple ways for inspection are achieved.

Description

technical field [0001] The invention belongs to the technical field of commodity digital anti-counterfeiting, and in particular relates to a method for constructing and verifying a commodity anti-counterfeiting code. Background technique [0002] The importance of anti-counterfeiting is self-evident, so I won't elaborate here. [0003] From the perspective of anti-counterfeiting code structure, common anti-counterfeiting methods can be divided into: [0004] 1. Clear code: use special materials, special patterns, special codes, etc. to make anti-counterfeiting marks, and identify authenticity through observation and comparison; generally speaking, the cost is high, and identification is difficult, especially the risk of reuse and embezzlement is high Big. [0005] 2. Hidden code: hide all or part of the anti-counterfeiting code or logo and place the same part as the hidden part on a third party, and verify the authenticity by opening the hidden part and comparing it with t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K19/06G06Q30/00
Inventor 周锡卫
Owner 周锡卫
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products