Background technology
The development of anti-counterfeiting technology can be divided into following several stages:
First generation product: the product take laser anti-counterfeit as representative.Laser anti-counterfeit is the higher anti-counterfeiting technology of a kind of technical threshold, and this series products once was a comparatively desirable anti-counterfeiting technology through the several generations development, because technology is extensively promoted, antifalse effect descends gradually, the false proof field of gradually fading out.
Second generation product: query formulation numerical code anti-fake label.The consumer can be by the true and false of mobile phone short message internet checking digital label, this technology has very large defective, scrape off coating obtain number do not go the inquiry can copy, also can be digital next imitated by bribing purchase, the inquiry end also may be counterfeiting, and can't inquire about before purchase, anti-fake effect is very limited.
Third generation product: the texture anti-fake technology, this texture has the advantages such as randomness and uniqueness.Making is more loaded down with trivial details, and the product category coverage rate is very limited, and it is not convenient to implement checking, can't distinguish intuitively whenever and wherever possible that very large use limitation is arranged, and the personator can mix pearl by ichthyosauru by imitateing application, and is hard to tell whether it is true or false.
The 4th generation product: the product of safety line cheque paper technology and application thereof, antifalse effect is good, the imitated expensive large non-general enterprises of threshold can be used, application has limitation, imitated possibility is very big, present this technology is extensively grasped.
The 5th generation product: the method for anti-counterfeit of internet or communication network inquiry comparison is exactly with anti-counterfeiting characteristic information such as multimedia picture, video, coding, symbol, figures, records, inquires about the technology of comparison anti-counterfeiting information with Internet resources and communication resources.This type of technology is varied, can be summed up as the anti-counterfeiting technology that open or ostensible anti-counterfeiting information and the anti-counterfeiting information of hiding or bury compare and distinguish true from false to them.How to see and think that this technology is very fresh very novel, go into seriously and find that it carries out information recording/with common search database in fact and the user side search inquiry is as broad as long, someone is incorporated in the false proof very novel very science of feeling to it, it but is exactly heavily bullet of old song, there be very large defective and careless mistake, it be exactly that genuine piece do not conform to is exactly fake and poor products that the comparison of two kinds of information conforms to, and everybody can imitate and use without any false proof value such as the method.This technology early has application on each businessman's Antiforge inquiry server, fact proved that its antifalse effect is very limited, only rests on the information inquiry comparison function, and its whole false proof measure is very empty very empty, does not have application and the operation of practical significance.
In recent years, various antifalsification label manufacturing technologies are constantly updated, such as, profiling, wet profiling, the Concealed label of nuclear track, heat, concealed code, anti-forgery ink printing and electronic tag etc., scientific and technological content is very high, imitation difficulty is also very high,, existing all technology have separately weak point, otherwise identify loaded down with trivial details, or damage label after the identification, identification has the experience restriction, label is with high costs, or identification has the restriction of specific specialized equipment, so that does not have a kind of technology to obtain market to approve widely and use.With high content of technology, check and correction identification lacks understandable convenience, and the effective property of technology and abuse property.Anti-counterfeiting technology before summing up, they have individual common ground is exactly that the anti-counterfeiting technology use is in free state, and utilization is unfettered, and the mixed pearl phenomenon of ichthyosauru is serious, and anti-pseudo-pattern is outmoded, and antifalse effect is very limited.
Summary of the invention
False proof participant has false proof user and false proof discriminating side (comprising consumer, law enfrocement official etc.) in the anti-pseudo-pattern of tradition, false proof user uses anti-counterfeiting technology or anti-fake product that oneself product is implemented false proof measure and sticks anti-counterfeiting mark and introduce to the market, and false proof discriminating side identifies the evaluation true and false to anti-counterfeiting mark.Anti-pseudo-pattern like this exists very large defective and drawback, from the anti-pseudo-pattern of tradition, can find, false proof user uses anti-counterfeiting technology or anti-fake product not restricted by any rule or certain agreement, use freely, it is false proof that the willing investment of user can use anti-counterfeiting technology or anti-fake product to carry out to a certain product, and described a certain product can be that genuine piece can be fake and poor products also certainly.Here it is, and why commodity counterfeit prevention feature is available in all varieties but is a fake and poor products.All there is the problem of technology abuse in existing any anti-counterfeiting technology, causes serious abuse even high-end technology also has ageing meeting.The anti-pseudo-pattern of tradition often all is from the high threshold high investment of the high barrier of hi-tech the defence barrier to be set, and the result is because impermanent effectively solution of the defective of the pattern that adopts existence itself prevented pseudo problem.
Internet or communication network inquiry anti-counterfeiting technology abuse are especially serious, and its technical essential of this type of anti-counterfeiting technology is open or ostensible anti-counterfeiting characteristic information is inquired about the matching identification true and false with the anti-counterfeiting information of hiding or bury; Although these type of various technology procedures are different, have plenty of visual information and have plenty of sightless information or electronic information, but changeable not from Qi Zong, it is genuine piece that i.e. two kinds of information comparisons conform to, do not conform to is fake and poor products, its anti-counterfeiting characteristic information is at random various changeable, the user can generate at random by own wish, anti-counterfeiting characteristic Information generation technical threshold low cost is little, the anti-counterfeiting technology method is used freely and is not restricted, and everybody can imitate application as long as know method for anti-counterfeit, reaches the effect of the mixed pearl of ichthyosauru, therefore, this type of anti-counterfeiting technology is used and is had serious abuse.Here it is why this type of technology the reason of market approval and widespread use appears not obtaining in nearly 10 years.This type of anti-counterfeiting technology except inquire about convenient, substantially do not have false proof value to say.If the anti-counterfeiting characteristic information exchange is crossed the commodity of label Indirect Loaded, also exist label to steal and use and bribe the drawback of buying use.The fact is verified, and this type of technology does not possess practicality.Under the anti-pseudo-pattern of tradition, anti-pseudo problem can effectively not solved, and fake and poor products is walked crosswise the situation in market and can not taken on a new look.
According to the problem that false proof present situation exists, analysis conventional prevent pseudo-pattern, innovate a kind of with the leading lower method for anti-counterfeit of identifying with smart mobile phone of third party, the problem that it can the current anti-pseudo-pattern existence of fine solution.The false proof activity of false proof user and false proof discriminating side is leading and management is leading lower in third party technology, has thoroughly solved false proof abuse, has usurped and the problem of malice falsifying, uses smart mobile phone identification to make true and false identification realize the automation and intelligentification judicial convenience; The low little antifalse effect of input cost of anti-counterfeiting information generation technique threshold significantly is a kind of ideal method for anti-counterfeit.
The method for anti-counterfeit of taking as the leading factor with smart mobile phone identification with the third party is to belong to network verification anti-counterfeiting technology, what it was different from the anti-pseudo-pattern of tradition is that third-party involvement is arranged, false proof participation role also has third party's anti-counterfeiting technology provider except false proof user and false proof discriminating side.The third party also carries out scientific and effective management to whole false proof activity except anti-counterfeiting technology is provided; Faith mechanism between false proof user and the false proof discriminating side is leading and leading lower foundation of management in third party technology, and false proof activity long-term sustainable is efficiently carried out.
The anti-counterfeiting technology content that anti-counterfeiting technology provider provides comprises: (1) provides false proof service clearance; (2) false proof service regulation is formulated and leading enforcement; (3) to highly effective false proof provide technical service and management; (4) omnidistance leading false proof activity is responsible for false proof.
Fixing approximately of third-party participation and rule, false proof activity no longer is the one-side behavior of false proof user, and false proof user more cannot do at will; The third party is by the effective management with software engineering means, and false proof user can follow agreed specifications and use anti-counterfeiting technology, thus solve between the user abuse, usurp, the problem of falsifying maliciously.This method for anti-counterfeit focuses on false proof use management, inquires about false proof emphasis anti-counterfeiting information generated query with existing network and compares completely differently, and it focuses on false proof use management, and next is only the management of anti-counterfeiting information comparison; Only have false proof use management science effectively not make mistakes, anti-counterfeiting information verification comparison just has false proof value.
Take the method for anti-counterfeit of identifying with smart mobile phone as the leading factor with the third party, the third party is exactly the anti-counterfeiting technology provider, elaborates below the leading realization of third party is false proof.(anti-counterfeiting technology provider is hereinafter referred to as the third party)
1, the leading false proof activity of third party at first will provide the server that carries out false proof activity, and server is the place that all false proof participants are set up service relation, also is the place that the Antiforge electronic information recording/is preserved.
2, the third party formulates false proof target anti-counterfeiting technology is provided, and formulates false proof operation regulation, agreement, obligation and responsibility; The third party illustrates anti-counterfeiting technology effect and the false proof target that will reach and anti-counterfeiting technology is provided for false proof user, formulate false proof operation regulation and agreement, the operation regulation of formulation can impel anti-counterfeiting technology to use has rule to follow, and the Rule content of formulation comprises at least: the content of false proof user's legal identity authentication content, the content of using signatory agreement, appointment third party entry information in coding; Sign the agreement that has legal validity according to the false proof user of operation regulation and third party, both sides keep appointments, fulfil separately obligation and the responsibility of bearing separately, must verify through the anti-counterfeiting technology provider according to regular false proof user's legal identity can qualified use anti-counterfeiting technology after qualified, prevents that from the source anti-counterfeiting technology method from being abused.
3, the third party provides the software technical tool of anti-counterfeiting technology and use according to false proof target and anti-counterfeiting technology requirement to false proof user.Anti-counterfeiting technology comprises: anti-counterfeiting information generation technique, Antiforge electronic information storage technology, anti-counterfeiting information verification recognition technology instrument, solution abuse are usurped the technology of malice falsifying.
Anti-counterfeiting information generation technique means comprise that the employing printing generates, carves generation, paper technology generation, textile technology, electronic technology generates and other can generate the various technology of suitable false proof needs.Anti-counterfeiting characteristic information on commodity or its packing material generate, the network anti-counterfeit technical characterstic is exactly that its anti-counterfeiting characteristic information has the polytrope of diversity randomness, anti-counterfeiting characteristic information can be numeral, symbol, figure, bar shaped, netted, concave-convex and not reproducible electronic information, material can be paper, printing ink, wood, cloth, fiber, glass, metal, mineral matter, so long as any type of information that unique not reproducible suitable user uses can load into anti-counterfeiting information, can be fit to self product demand loading generation according to user self wish.
The phenomenon of usurping falsifying by the false proof abuse of anti-counterfeiting technology requirement containment occurs, anti-counterfeiting characteristic information is after commodity or the generation of its packing material, one piece of coding that is provided by the third party is provided in the anti-counterfeiting characteristic block of information, coding can be that two-dimension code, bar code or other form anti-counterfeiting technology provider can control manageable coding, the third party carries out the scientific and effective management with the software engineering means to the anti-counterfeiting characteristic information coding, and the third party usurps the phenomenon of falsifying and occurs by the control and management of label coding being contained false proof abuse.Coded message and anti-counterfeiting characteristic information combination become complete anti-counterfeiting information.
The third party utilizes the software engineering means that the anti-counterfeiting mark coding is effectively managed, and is usurped with the falsifying phenomenon by abuse with the containment anti-counterfeiting mark to occur, and concrete management method is described as follows:
(1) provide the coding made and anti-counterfeiting characteristic information after the packing of product is complete by the third party, the two is carried in abreast respectively one and forms knockdown anti-counterfeiting mark on product package material, the relative position information feature between the two is to generate at random after the two loading is finished; Only have when coding and anti-counterfeiting characteristic information load respectively finish after, the anti-counterfeiting information of product is just calculated complete formation, avoids very dexterously the generation of the stolen phenomenon of anti-counterfeiting mark.
(2) coding is the coding of anti-counterfeiting mark as a whole, and an anti-counterfeiting mark is joined a unique coding; Coding is information comparison object of reference during as the verification of the anti-counterfeiting characteristic information true and false; Anti-counterfeiting mark has had coding, and false proof discriminating side uses verification software just can ask for fast corresponding standby anti-counterfeiting mark information of depositing and is used for the verification use; Anti-counterfeiting characteristic information has coding as information comparison object of reference, and verification software utilization coding is done check and correction as object of reference one by one to anti-counterfeiting information, thereby judges the true and false of being tested commodity.
(3) specify third party's entry information in coding according to rule, the information content of typing includes third party's network address and anti-counterfeiting mark subject matter manufacturer identity information content; False proof discriminating side just can obtain third party's network address and can login third party website to download false proof verification software with coded scanning software scans coding, scan to obtain and is tested anti-counterfeiting information being tested anti-counterfeiting mark with verification software false proof discriminating side, the quilt that software obtains is tested anti-counterfeiting information and is compared with corresponding standby anti-counterfeiting characteristic information of depositing and obtain check results and show the check results content, and the check results content includes anti-counterfeiting mark subject matter manufacturer identity information content and the anti-counterfeiting characteristic information checking resultant content of anti-counterfeiting technology provider typing in coding; When being tested the anti-counterfeiting information check results and be true anti-counterfeiting characteristic information, false proof discriminating side also should examine the anti-counterfeiting mark subject matter manufacturer identity of being tested the demonstration of commodity production merchant identity and verification software, examining conforms to, and could final decision to be tested commodity are genuine pieces, otherwise are fake and poor products; This just means that can only there be typing in false proof use businessman the anti-counterfeiting mark of self identity to be carried in the enterprising line scanning of product that oneself produces and uploads third-party server and preserve, and so false proof discriminating side can be conformed to anti-counterfeiting mark subject matter manufacturer identification checkup by the commodity production merchant identity of verification when verification.
Anti-counterfeiting mark subject matter manufacturer identity information content is to specify third party's typing in coding, subject matter manufacturer identity information content is: this product is that the XX board product that XX company produces please be checked, and also can otherwise express the information that subject matter manufacturer identity can be described; Third party's application technology means all can't be changed or delete in addition anyone of these identity information content third parties; Third party's application software technology means make the false proof businessman that uses be merely able to have the anti-counterfeiting mark scanning of its own identity to be uploaded to the preservation of third-party server record in order to the verification use typing, that is to say that product that false proof user wants oneself is produced does when false proof, must be that the anti-counterfeiting technology provider asks for typing and has the coding of himself identity could implement false proof operation to the third party, not have typing that coding and the self-editing coding of self identity arranged and the coding of stealing other people all can't upload to third-party server and preserves; Because can be shown to false proof discriminating side to anti-counterfeiting mark subject matter manufacturer identity during false proof verification software verification is used for examining being tested commodity production merchant identity, therefore false proof use businessman also is merely able to have the anti-counterfeiting mark of self identity to be carried on the product that oneself produces typing, if deliberate to be carried on the product of other people production, manufacturer's identity that verification software shows is tested commodity production merchant identity with quilt and just can not conformed to, and therefore premeditated falsifying is impossible realization.
More than being exactly third party's application software technology means carries out scientific and effective management to the anti-counterfeiting mark coding, has thoroughly stopped false proof abuse, has usurped and the phenomenon of malice falsifying occurs; The third party solves the technology that abuse is usurped the falsifying problem with the software engineering means by the control and management to the anti-counterfeiting mark coding, is the core technology of this method for anti-counterfeit, is this method for anti-counterfeit innovative technology, also is the claimed technology of this method for anti-counterfeit; Management solves abuse, usurps with falsifying and prevent that the technology of pseudo problem all belongs to the claimed technology of this method for anti-counterfeit to the anti-counterfeiting mark coding-control by the third party.
(4) anti-counterfeiting mark has anti-transfer measure, the personator can't be shifted reuse, and anti-transfer measure can adopt friable material to produce label, and label is carried in product unpacking place, and the not transferable secondary of label is used.
Antiforge electronic information storage technology, software is uploaded in the scanning that false proof user's computing machine is installed the third party to be provided, the scanning device of anti-counterfeiting mark can be distinguished or scan to outfit, and scanning device is connected with computing machine, is uploaded to third-party server and records preservation scanning anti-counterfeiting information; The anti-counterfeiting mark that provides typing that false proof user self identity information is arranged by the third party only is provided, and false proof user can be scanned and upload the third-party server preservation in order to the verification use, and anti-counterfeiting mark in addition can't be uploaded.The scanning that the third party provides is uploaded software and can be scanned anti-counterfeiting mark at a high speed, and the anti-counterfeiting information that obtains is uploaded preservation, guarantees user's production efficiency.
Embodiment
At first, the third party provides complete reliable false proof appropriate technology, and applicable technology comprises that scanning uploads software, verification software, is applicable to the anti-counterfeiting information generation technique of all kinds of commodity, formulates rigorous false proof rule tightly; When false proof user determines to use anti-counterfeiting technology, its legal identity must at first be used agreement through the approved qualified anti-counterfeiting technology of can contracting of anti-counterfeiting technology provider, formally become false proof user; False proof user disposes necessary hardware facility, after all anti-counterfeiting technology demands were equipped with and finish, false proof user just can ask for typing to the anti-counterfeiting technology provider and is carried in by the coding of self identity and form combined anti-fake with anti-counterfeiting characteristic information on the product that oneself produces and identify the false proof activity of enforcement; The anti-counterfeiting technology that the third party provides must by the anti-counterfeiting technology requirement possess be strictly on guard against the abuse usurp the function of falsifying, the third party also should provide verification to identify accurate verification software to false proof discriminating side; False proof discriminating side at first uses coded scanning software and sign is scanned obtains third party's network address when needing verification, and the login third party website is downloaded verification software and is used for true and false verification identification and uses; The personnel of law enforcement agency especially consumer can be known the true and false of commodity as long as with the smart mobile phone that verification software is installed commodity false proof mark is carried out scanned for checkout, determine again to buy after can before buying, discerning the false from the genuine, in order to avoid buy fake and poor products, fake and poor products is eliminated in selling the way.