Concealed-enciphering machine-reading anti-fcke method for holographic mobile database

A mobile database and database technology, applied in the direction of electrical digital data processing, special data processing applications, computer parts, etc., can solve the problems of single pattern, easy to decipher anti-counterfeiting combination, loss of anti-counterfeiting, etc.

Inactive Publication Date: 2005-02-16
龙涛 +1
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are problems in traditional anti-counterfeiting technology: (1) Anti-counterfeiting combination is easy to be deciphered. For example, traditional anti-counterfeiting methods such as fluorescent ink, magnetic ink, and temperature-changing ink are characterized by printing specific graphics on specific parts of the product with special inks , symbols, etc., and then use special means to detect
The information on the carrier is hidden in the corresponding pattern, but the pattern itself is visible. This kind of anti-counterfeiting information is non-invisible, and the pattern is single, which cannot form an anti-counterfeiting chain. After cracking, it can be forged in large quantities.
Moreover, the encrypted database only exists in the computer and cannot be reflected on the carrier, which makes the carrier itself unable to uniquely represent the truth, which is also a shortcoming of the current anti-counterfeiting
In addition, modern material science is also used at present to anti-counterfeit the characteristic information on the carrier by using special light source to irradiate the invisible material with various colors of fluorescence, but this kind of information anti-counterfeiting method is only a single layer of invisibility. The content of its information can be known, so it is easy to be obtained by counterfeiters and loses the purpose of anti-counterfeiting

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Concealed-enciphering machine-reading anti-fcke method for holographic mobile database
  • Concealed-enciphering machine-reading anti-fcke method for holographic mobile database
  • Concealed-enciphering machine-reading anti-fcke method for holographic mobile database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0009] Anti-counterfeiting of the seal: the anti-counterfeiting seal of the present invention has an invisible holographic mobile database. The anti-counterfeiting seal and graphics generated by this technology are completely different from the traditional anti-counterfeiting technology. It not only has patterns and text, but also can be: photos, fingerprints, All digitizable information such as palm prints, signatures, sounds, texts, etc. The specific content of the invisible holographic self-contained mobile database is determined by the requirements of the user or the application field. The holographic self-contained mobile database is movable, and the seal transferred by the seal can still be reliable under less than 50% damage or defacement Obtain all the information of the seal accurately and accurately. This is the most fundamental requirement for the anti-counterfeiting and digitalization of the seal. The characteristics of the seal itself are that it is impossible to guar...

Embodiment 2

[0016] Anti-counterfeiting of bills: bills contain not only patterns and texts, but also photos, fingerprints, palm prints, signatures, sounds, texts and other digitized information. The specific content of the invisible holographic self-carried mobile database is determined by the requirements of the user or application field. The characteristics of the self-contained mobile database are determined by the characteristics of the bill itself. This holographic self-contained mobile database is movable. The carrier of the database-the anti-counterfeiting pattern in the bill can still be reliably damaged or defaced under the condition of less than 50% , Accurately obtain all the information of the carrier.

[0017] The content of the holographic self-portable mobile database of the bill is encrypted by the current 128-bit digital certificate. In order to realize the holographic self-portable mobile database on the bill, multi-dimensional codes (one-dimensional code, two-dimensional co...

Embodiment 3

[0024]The anti-counterfeiting method of the certificate: There are not only patterns and words in the certificate, but also all digitized information such as photos, fingerprints, palm prints, signatures, sounds, and words. The specific content of the invisible holographic self-carried mobile database is determined by the requirements of the user or application field. The characteristics of the self-contained mobile database are determined by the characteristics of the certificate itself, and the holographic self-contained mobile database is movable. This can greatly expand the information form and volume of traditional certificates. The holographic self-carrying mobile database means that the anti-counterfeiting pattern in the database carrier-certificate can reliably and accurately obtain all the carrier's information even when less than 50% is damaged or defaced. This is the most fundamental requirement for certificate anti-counterfeiting electronic and digitalization. Because ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a holographic self-carried mobile database cryptomorphic encryptionmahcine-redable anti-false method for package, bill, ticket, negotiable securities, seal, maker and trademark, document, certificate and credentials, identification card, important contract and others. Said method includes the following steps: utilizing computer compression and encryption technique to make the characteristic information recorded by carrier by undergone the process of encryption treatment and be stored in computer database system; using code anti-false technique to make the described characteristic information be changed into one several enciphered databases, and using correspondent identification reader to fetch said enciphered information. Said invention also provides the operation method and concrete steps of said system.

Description

Technical field [0001] The invention relates to an anti-counterfeiting method for packaging, bills and tickets, valuable securities, seals, logos or trademarks, documents, certificates and certificates or cards, important documents, contracts and the like. Background technique [0002] Traditional anti-counterfeiting technologies in the field of printing and seals are mainly based on material anti-counterfeiting or printing technology anti-counterfeiting. Mainly include: paper anti-counterfeiting, laser anti-counterfeiting, fluorescent anti-counterfeiting, magnetic anti-counterfeiting, temperature change anti-counterfeiting, special plate printing and other means. These technologies have played an anti-counterfeiting role to a certain extent for a period of time. However, traditional anti-counterfeiting technologies have problems: (1) Anti-counterfeiting combinations are easy to decipher. For example, traditional anti-counterfeiting methods such as fluorescent inks, magnetic inks...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06K5/00G06K9/76
Inventor 龙涛卢华宁
Owner 龙涛
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products