Anti-counterfeit cipher graph
An anti-counterfeiting and password technology, which is applied in the field of anti-counterfeiting password maps, can solve the problems of not being able to prevent the anti-counterfeiting password counterfeiting method, and that the anti-counterfeiting password cannot be reused.
Inactive Publication Date: 2014-07-23
何顺标 +1
View PDF0 Cites 0 Cited by
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
[0002] With the improvement of anti-counterfeiting marks and anti-counterfeiting technology, the packaging of some products has become difficult to counterfeit. If the technology of anti-counterfeiting password or anti-counterfeiting identification code is used, it is impossible to counterfeit its packaging, because it cannot be counterfeited. Anti-counterfeiting password, the so-called anti-counterfeiting password or anti-counterfeiting identification code technology, is to give a product an anti-counterfeiting password to prove the authenticity of the product, and it will become invalid after use. An anti-counterfeiting password cannot be reused. Products using this technology Most of them are expensive commodities, because the price is very high and there is a great counterfeit value, the use of such technologies as anti-counterfeit passwords or anti-counterfeit identification codes can only prevent general counterfeiting, and it cannot prevent the use of purchasing packages to obtain anti-counterfeit passwords The counterfeiting method, because it has a shortcoming, as long as the anti-counterfeiting password that has not been used can be obtained to the counterfeit product as a proof of authenticity, because many anti-counterfeiting passwords are not used, most of them are in the package, and the counterfeit In order to obtain the anti-counterfeiting passwords, a large number of anti-counterfeiting passwords are obtained by purchasing and packaging methods, and a large number of counterfeit products are counterfeited by obtaining anti-counterfeiting passwords that have not been used.
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreImage
Smart Image Click on the blue labels to locate them in the text.
Smart ImageViewing Examples
Examples
Experimental program
Comparison scheme
Effect test
Embodiment Construction
[0007] Such as figure 1 Shown: the anti-counterfeit password that prevents counterfeiting is hidden in the anti-counterfeit password diagram, if there is no way to solve the diagram, the only correct anti-counterfeit password cannot be obtained. As long as the anti-counterfeit password diagram is placed in the package, and the method of deciphering the diagram is placed in the product, counterfeiters can be prevented from obtaining the anti-counterfeit password by purchasing the package.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more PUM
Login to view more
Abstract
The invention relates to protection of a commodity from being counterfeited. An anti-counterfeit cipher graph is adopted to protect the commodity from being counterfeited. By adoption of the anti-counterfeit cipher graph, common counterfeit can be prevented, and a counterfeit method that purchases packages to obtain anti-counterfeit ciphers is prevented. The anti-counterfeit cipher graph is used for concealing an anti-counterfeit cipher protecting the commodity from being counterfeited. Without a graph solving indicating method, the anti-counterfeit cipher concealed by the anti-counterfeit cipher graph cannot be found. Only by putting the anti-counterfeit cipher graph and the graph solving indicating method into the package and the commodity respectively, counterfeiters are prevented from obtaining the anti-counterfeit ciphers through package purchasing methods, so that the package purchasing methods of the counterfeiters are failed and the commodity is protected from being counterfeited.
Description
technical field [0001] The invention relates to an anti-counterfeit code generated by an anti-counterfeit code diagram and a drawing method to prevent commodities from being counterfeited, and to prevent counterfeiters from obtaining anti-counterfeit codes with purchased packages. Background technique [0002] With the improvement of anti-counterfeiting marks and anti-counterfeiting technology, the packaging of some products has become difficult to counterfeit. If the technology of anti-counterfeiting password or anti-counterfeiting identification code is used, it is impossible to counterfeit its packaging, because it cannot be counterfeited. Anti-counterfeiting password, the so-called anti-counterfeiting password or anti-counterfeiting identification code technology, is to give a product an anti-counterfeiting password to prove the authenticity of the product, and it will become invalid after use. An anti-counterfeiting password cannot be reused. Products using this technolo...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more Application Information
Patent Timeline
Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G09C5/00
Inventor 何顺标
Owner 何顺标
Who we serve
- R&D Engineer
- R&D Manager
- IP Professional
Why Eureka
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Social media
Try Eureka
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap