Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-counterfeit cipher graph

An anti-counterfeiting and password technology, which is applied in the field of anti-counterfeiting password maps, can solve the problems of not being able to prevent the anti-counterfeiting password counterfeiting method, and that the anti-counterfeiting password cannot be reused.

Inactive Publication Date: 2014-07-23
何顺标 +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the improvement of anti-counterfeiting marks and anti-counterfeiting technology, the packaging of some products has become difficult to counterfeit. If the technology of anti-counterfeiting password or anti-counterfeiting identification code is used, it is impossible to counterfeit its packaging, because it cannot be counterfeited. Anti-counterfeiting password, the so-called anti-counterfeiting password or anti-counterfeiting identification code technology, is to give a product an anti-counterfeiting password to prove the authenticity of the product, and it will become invalid after use. An anti-counterfeiting password cannot be reused. Products using this technology Most of them are expensive commodities, because the price is very high and there is a great counterfeit value, the use of such technologies as anti-counterfeit passwords or anti-counterfeit identification codes can only prevent general counterfeiting, and it cannot prevent the use of purchasing packages to obtain anti-counterfeit passwords The counterfeiting method, because it has a shortcoming, as long as the anti-counterfeiting password that has not been used can be obtained to the counterfeit product as a proof of authenticity, because many anti-counterfeiting passwords are not used, most of them are in the package, and the counterfeit In order to obtain the anti-counterfeiting passwords, a large number of anti-counterfeiting passwords are obtained by purchasing and packaging methods, and a large number of counterfeit products are counterfeited by obtaining anti-counterfeiting passwords that have not been used.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-counterfeit cipher graph

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0007] Such as figure 1 Shown: the anti-counterfeit password that prevents counterfeiting is hidden in the anti-counterfeit password diagram, if there is no way to solve the diagram, the only correct anti-counterfeit password cannot be obtained. As long as the anti-counterfeit password diagram is placed in the package, and the method of deciphering the diagram is placed in the product, counterfeiters can be prevented from obtaining the anti-counterfeit password by purchasing the package.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to protection of a commodity from being counterfeited. An anti-counterfeit cipher graph is adopted to protect the commodity from being counterfeited. By adoption of the anti-counterfeit cipher graph, common counterfeit can be prevented, and a counterfeit method that purchases packages to obtain anti-counterfeit ciphers is prevented. The anti-counterfeit cipher graph is used for concealing an anti-counterfeit cipher protecting the commodity from being counterfeited. Without a graph solving indicating method, the anti-counterfeit cipher concealed by the anti-counterfeit cipher graph cannot be found. Only by putting the anti-counterfeit cipher graph and the graph solving indicating method into the package and the commodity respectively, counterfeiters are prevented from obtaining the anti-counterfeit ciphers through package purchasing methods, so that the package purchasing methods of the counterfeiters are failed and the commodity is protected from being counterfeited.

Description

technical field [0001] The invention relates to an anti-counterfeit code generated by an anti-counterfeit code diagram and a drawing method to prevent commodities from being counterfeited, and to prevent counterfeiters from obtaining anti-counterfeit codes with purchased packages. Background technique [0002] With the improvement of anti-counterfeiting marks and anti-counterfeiting technology, the packaging of some products has become difficult to counterfeit. If the technology of anti-counterfeiting password or anti-counterfeiting identification code is used, it is impossible to counterfeit its packaging, because it cannot be counterfeited. Anti-counterfeiting password, the so-called anti-counterfeiting password or anti-counterfeiting identification code technology, is to give a product an anti-counterfeiting password to prove the authenticity of the product, and it will become invalid after use. An anti-counterfeiting password cannot be reused. Products using this technolo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G09C5/00
Inventor 何顺标
Owner 何顺标
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products