CN1180875A - Anti-forged method for combined goods - Google Patents
Anti-forged method for combined goods Download PDFInfo
- Publication number
- CN1180875A CN1180875A CN 96118920 CN96118920A CN1180875A CN 1180875 A CN1180875 A CN 1180875A CN 96118920 CN96118920 CN 96118920 CN 96118920 A CN96118920 A CN 96118920A CN 1180875 A CN1180875 A CN 1180875A
- Authority
- CN
- China
- Prior art keywords
- password
- commodity
- counterfeit
- feature
- agency
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 36
- 238000004891 communication Methods 0.000 claims abstract description 6
- 238000012856 packing Methods 0.000 claims description 9
- 238000003860 storage Methods 0.000 claims description 4
- 239000011229 interlayer Substances 0.000 claims 1
- 238000004321 preservation Methods 0.000 claims 1
- 238000007639 printing Methods 0.000 description 5
- 238000004519 manufacturing process Methods 0.000 description 4
- 238000004806 packaging method and process Methods 0.000 description 4
- 238000011161 development Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 230000002265 prevention Effects 0.000 description 2
- 238000007789 sealing Methods 0.000 description 2
- 208000019901 Anxiety disease Diseases 0.000 description 1
- 241000406668 Loxodonta cyclotis Species 0.000 description 1
- 230000036506 anxiety Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000009223 counseling Methods 0.000 description 1
- 230000001066 destructive effect Effects 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 235000013601 eggs Nutrition 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 229920002457 flexible plastic Polymers 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Landscapes
- Credit Cards Or The Like (AREA)
Abstract
A combined antiforge method for commodities features that it integrates communication means such as telephone, cipher technique and computer network, resulting in high reliability and low cost.
Description
Commodity counterfeit prevention is an important topic of market economy, also is current a great problem.Now antiforge method for commodities all with special entity structure or visible carrier with customizing messages for debating other mark.The former is connected significant parts that shape is special, manufacture difficulty big, general producer impotentia is made or directly process such structure somewhere and recognize for the consumer on commodity or its packing, adopt special bottle cap or the askew box of body and " Verbatim " three cun flexible plastic discs as some bottled commodity; The latter special, manufacture difficulty is big, printing or scribe information such as some patterns or literal on the advanced carrier, as laser anti-counterfeit tag.These two kinds of methods all have a same shortcoming, and promptly need extensively, inform the consumer meticulously: the commodity that have which type of special construction or which type of pattern or literal are only genuine piece.If propaganda work is not in place, then the consumer may think the puppet product by mistake to be genuine pieces, and obviously consequence is very serious.And in fact, their common fatal shortcomings are that they all can be copied.Just take laser anti-counterfeit tag to go ahead, as long as there is the laser making apparatus just can copy anti-fake mark true to nature.
On the other hand, some producer does not have ability oneself to produce anti-fake mark and entrusts him to go into to make, and the producer is easy to directly method for making or even makes finished product and illegally resell and cause confusion to others.In order to overcome the shortcoming of existing method for anti-counterfeit, this patent invention is a kind of can accomplish method for anti-counterfeit safe against all possibilities, and it makes full use of communication apparatus such as modern computer network and phone and combines with the cryptographic technique of using always.Because the anti-counterfeiting information that adopts is not to depend on certain single carrier, but the organic assembling of several simple method for anti-counterfeit, so this method can accomplish that nobody can successfully copy, pretend to be, and guards one's interest most effectively.1, method for anti-counterfeit
The present invention is a kind of method for anti-counterfeit of the commodity that circulate.It is made up of following step: (1), choose password
Sparsely produce a series of natural numbers far away but that do not wait at interval of being separated by by artificial or computer, as the password of commodity.Promptly several numbers of only choosing only a few in a certain section natural number are as password, and proportion is the smaller the better.Certainly password also can be numeral, character, pattern, literal and other customizing messages, the independent or permutation and combination that mixes.It is best that password only uses once, and the multiple-effect fruit is poor more more for access times.(2), make password tab
These passwords are printed (printed or scribe, down together) (or other material is made at a piece of paper sheet, down together) on the A, the opaque scraps of paper of topped another piece (or make by other material on scraps of paper A, down together) B as overcoat, is used for printing on the hidden A scraps of paper password, then A+B becomes the label that fuses, and the password on it just becomes the password of this label.On B, can also print other contents such as symbol, pattern or explanation.The topped of B sheet should accomplish, can see the password that is printed on the A after B or its a certain specific little part are torn.If can adopt certain printing process, in case feasible password exposure, it will little by little disappear, and will be then better.(3), give commodity cipher
The label of making is attached on commodity or its packing, accomplishes and to tear in good condition that then tag pin is exactly the password of these commodity.Certain password also can directly be printed on commodity itself or it is packed on one's body this, and then the opaque overcoat of topped one deck, and then this password is exactly the password of these commodity.Label should paste (or directly printing) certain position on the body of commodity own, makes must cause its damage in case reinstate these commodity; Or at sealing part or other special position of commodity packaging, make the commodity packaging of must breaking seal must cause its damage, even password destroys.(4), password sends storage
Producer's password storage of the label on the commodity in the database of computer (or with other method storage) of at every turn will dispatching from the factory, and in time provide to the various places of dealer net agency (or devolution).Various places agency also can obtain these passwords and is stored in the database of oneself by computer network communication or other method.This job requirement is carried out with being kept absolutely secret, and is preferably all computerized.(5), announce querying method
Producer should announce various places agency telephone counseling hotline wire size sign indicating number and direct automatic inquiry's telephone number number of database computer or computer network address to the consumer.And how propaganda is inquired about.(6), revealed secrets inquiry
The consumer removes the password overcoat up to seeing commodity cipher when buying commodity, then with phone or other communication tool and the inquiry of local sales office.Whether the password that can find commodity is the some passwords in agency's database, and can know whether these commodity are sold, and when sells, thereby judges the true and false of commodity.(7), sell cancellation
Each agency or general headquarters of producer should nullify for the code number of being found, and the time of promptly noting this time inquiry is as the answer information of inquiring about from now on.Still can be in some time after nullifying to this cipher inquiry, but the answer that obtains is the selling time of the commodity of this password correspondence.Time has been grown, and this password thoroughly can be deleted with relevant record.(8), nullify feedback
In the total data storehouse that agency can be regularly feeds back to factory with the password of nullifying and relevant information,, and corresponding password is nullified and deleted in each agency so that regularly to the issue of various places agency.2, false proof mechanism (1) is if counterfeit merchandise, and has only so when its password is identical with a certain password in the database, just can pretend to be successfully.But because the password in the database is covert,, be difficult to identically, thereby pretend to be possibility of success very little with the password of lane database so the password of counterfeit can only disorderly be compiled.If password is produced at random by computer,, can accomplish that so none knows concrete password, till commodity are sold again by computer control.(2), the adulterator wants to pretend to be successfully, must obtain the password in the database.If can copy the password of many commodity that dispatch from the factory, then can realize the same number of product of pretending to be.But because overcoat is opaque, the unique way that know the commodity cipher that dispatches from the factory is to tear the password overcoat, will be easy to purchased person and find out possibility of not going out on sale and tear after the overcoat commodity.That is to say that wanting to forge commodity scraps a genuine piece possibly, " killing the hen to get the eggs " can not be also.Obviously be unpractical with the pseudo-product of this way manufacturing.(3) if password is not to adopt sparse natural number, but adopt adjacent natural number, then the adulterator can obtain indivedual passwords from selling commodity, infers that then adjacent with it natural number pretends to be as password, and then possibility of success exists.But this method requires password sparse distribution, spacing in natural number not to wait, and makes and infers that possibility of success is very little.For example 100,000, only select 100 natural numbers as password in 000,001 to 100,001,000,000, and a password only uses once, then infer possibility of success have only ten thousand/.In 10,000 counterfeits, there are 9,909 nineteen commodity to be taken as and are counterfeit.That obviously forges has little significance.Certain sparse requirement causes the password figure place to increase, and along with the continuation of production and sales work, the password figure place may continue to increase.Fortunately natural number is unlimited.Can not cause password resource anxiety.(4), the adulterator can obtain a real password from selling commodity, and produce the identical a collection of commodity of password with it, sale then.But because in case there is real password to feed back to agency's (being queried to), then this password will be canceled, promptly producer thinks that genuine piece sells.That is to say that a password can only be sold a genuine piece.So this batch counterfeit is on the cancellation ground of this password, portion also can't be pretended to be genuine piece.The possibility of pretending to be success is arranged in other area, but a local success is a at most.If nullify data by general headquarters to the various places announcement and do same cancellation, then this batch commodity only just might fill very once before cancellation is received in various places, thereby a ground pretends to be portion also can't guarantee, did not do a good job in portion and did not all pretend to be genuine piece.So the adulterator can't make a profit.(5), label also can be attached on the big packing of commodity, on chest, so that become the case buyer to judge the true and false.(6), because the way that adopts once feedback to nullify immediately if there is the people deliberately to disturb, constantly to agency's database input natural number, then might makes certain password be canceled, and then corresponding genuine piece can't be sold, can only return and produce house, cause trouble and waste.If agency is artificial, then can judges the marplot and stop it.But it is, then at one's wit's end if computer is automatic.Fortunately the possibility of thing generation is very little.Just choosing ratio with the password described in the step (3) goes ahead.From the probability angle, 10000 natural numbers of every input just can be run into a password, cause a commodity to sell.But the natural number of 10000 ten long numbers of input is not an a piece of cake, and he must not mind communication fee.So the possibility that the marplot occurs is little, and harm is very little, moreover ratio can also be littler.In fact, computer also can be stipulated each number number that receives, and surpassing is on-hook, and the person of needs redials again.In case also can make computer find continuous a plurality of bad password then on-hook, avoid the chafferer to carry out destructive activity or break a code with the robotization means.(7), to prevent to utilize second hand packing to make puppet.The consumer who has is deeply convinced undoubtedly by the commodity of buying or other reason causes not going to open the password overcoat, does like this and causes intact label or packing to flow into society.Certainly can produce the puppet product that to pretend to be success with it.In order to overcome this problem, step (3) is pointed out: label should paste (or directly printing) certain position on the body of commodity own, makes must cause its damage in case reinstate these commodity; Or at sealing part or other special position of commodity packaging, make the commodity packaging of must breaking seal must cause its damage, even password destroys.Thereby make in no case to have intact packing or flow of commodity society, unless packing was not opened or commodity were not used.3, technical characterstic
The computer of one of information carrier is the trend of current social development in this patent method, and is seen everywhere now, need not increase input.The making of label has no special requirements, and is very simple, and expense is very low, and to compare cost much lower with other method.Only need make a call to when the consumer buys words time local phone (or individual cases following make a call to one long-distance, expense summary height is a bit) expense is not high.Certainly some goes into Please ring for assistance just can confirm whether be genuine piece, that has just saved this expense, this also can be described as and makes concessions in the consumer.Another advantage of this method is: in case counterfeit is arranged, then local agency can obtain information soon.As seen, this method for anti-counterfeit can make the no place of counterfeiting merchandise, and forms the effect a kind of elephant the " nuclear prestige take the photograph ", and the adulterator is hoped and emerging regret.Therefore, the inventive method is the best approach of advanced information society's commodity counterfeit prevention, is the direction of following anti-counterfeiting technology development.
Claims (8)
- Anti-forged method for combined goods1, a kind of antiforge method for commodities, it makes full use of communication apparatus such as modern computer network and phone and cryptographic technique be combined into commonly used.It is realized by following steps: (1) is chosen password, (2) and is made password tab, (3) and give commodity cipher, (4) password and send storage, (5) and announce that querying method, the inquiry of (6) revealed secrets, (7) are sold and nullify and (8) nullify feedback, it is characterized in that it requires manufacturer to give commodity a password, with all secret preservations of the commodity cipher that dispatches from the factory; Commodity purchaser obtains after the password and producer's password check, thereby judges the true and false of commodity.
- 2,, it is characterized in that the password that it uses should be a series of codings far away and that spacing does not wait of being separated by according to the said method for anti-counterfeit of claim 1.
- 3, according to the said method for anti-counterfeit of claim 1, its feature is that also producer sends to each area office (or devolution) in the whole dealer net with password, and buyer and local agency directly verify.
- 4, according to the said method for anti-counterfeit of claim 1, its feature is also that password can be made in and is attached in the interlayer of label on commodity or its packing again, or password directly is printed on commodity or packing goes up and overcoat topped it.
- 5, according to the said method for anti-counterfeit of claim 1, its feature is also that and if only if, and commodity purchaser is torn or is removed after the password overcoat, know the password on it, and can be true and false to arbitrary agency password for inquiry, whether commodity sell, thereby confirm the true and false of commodity.
- 6, according to the said method for anti-counterfeit of claim 1, its feature is that also it requires agency that the password that is queried to is nullified, and this time query time is sold time keeping as commodity.
- 7, according to the said method for anti-counterfeit of claim 1, its feature also is to sell cancellation and will carries out in all databases in whole dealer net.
- 8, according to the said method for anti-counterfeit of claim 1, its feature also be the password that uses can be numeral, character, pattern, literal and other customizing messages separately or the permutation and combination that mixes.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN 96118920 CN1180875A (en) | 1996-12-17 | 1996-12-17 | Anti-forged method for combined goods |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN 96118920 CN1180875A (en) | 1996-12-17 | 1996-12-17 | Anti-forged method for combined goods |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN1180875A true CN1180875A (en) | 1998-05-06 |
Family
ID=5125420
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN 96118920 Pending CN1180875A (en) | 1996-12-17 | 1996-12-17 | Anti-forged method for combined goods |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN1180875A (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN100520794C (en) * | 2004-02-21 | 2009-07-29 | 李哲洙 | Method for servicing an electronic certificate for a big-name brand |
| CN112381553A (en) * | 2020-11-20 | 2021-02-19 | 王永攀 | Product anti-counterfeiting method |
-
1996
- 1996-12-17 CN CN 96118920 patent/CN1180875A/en active Pending
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN100520794C (en) * | 2004-02-21 | 2009-07-29 | 李哲洙 | Method for servicing an electronic certificate for a big-name brand |
| CN112381553A (en) * | 2020-11-20 | 2021-02-19 | 王永攀 | Product anti-counterfeiting method |
| CN112381553B (en) * | 2020-11-20 | 2024-05-28 | 王永攀 | Product anti-counterfeiting method |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7996319B2 (en) | Authentication and tracking system | |
| CN101957905A (en) | Checking technology and security label | |
| WO2008024944A2 (en) | Authentication process | |
| CN1387156A (en) | Antiforge combined encode method | |
| CN208093041U (en) | Binary multidimensional random anti-counterfeit device | |
| CN1180875A (en) | Anti-forged method for combined goods | |
| CN110717566A (en) | Anti-counterfeiting electronic code label, commodity with anti-counterfeiting electronic code and anti-counterfeiting verification method | |
| CN1264882A (en) | Antiforge marker printing and recognition system for commodities | |
| CN108573654A (en) | Binary multidimensional random anti-counterfeit device | |
| EP1332485A1 (en) | Method for authenticating correspondence between primary and secondary packages of a product | |
| CN1186281A (en) | Dual code anti-faking method | |
| CN1492364A (en) | Method for producing anti-fake label capable of inquiring random figure arrangement matrix | |
| CN1263319A (en) | Plain code and cipher code reference, telephone, computer interconnection network anti-false inquiry tag | |
| CN1044749C (en) | Anti-forge cipher trademark | |
| CN113592510A (en) | Commodity anti-counterfeiting information control method | |
| CN1226040A (en) | Anti-fake system and method using information mark to distinguish true and false | |
| RU14765U1 (en) | PARTY OF PRODUCTS WITH PROTECTIONS FROM FALSE | |
| CN2456235Y (en) | Dual code antifakery card | |
| CN1192561A (en) | Marking system and the use thereof | |
| CN2355397Y (en) | Coded labels | |
| CN211555334U (en) | Trademark anti-counterfeit label based on change background characteristic | |
| EP0760991A1 (en) | Identification markers and methods for forming the same | |
| RU14888U1 (en) | PARTY OF PRODUCTS WITH AUTHENTICITY TESTS | |
| CN1241765A (en) | Cipher anti-fake method and cipher label for ensuring the truth of product in various links | |
| CN1282139C (en) | Anti-fake method |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| SE01 | Entry into force of request for substantive examination | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C06 | Publication | ||
| PB01 | Publication | ||
| C01 | Deemed withdrawal of patent application (patent law 1993) | ||
| WD01 | Invention patent application deemed withdrawn after publication |