The way to recognize fake
The invention relates to a method of detection of counterfeit products. The technical result is to increase the level of protection from imitation products using an internal random structural pattern of the material of the carrier as identified by the label. In accordance with the invention, it is recommended to choose a material with a clear random pattern as a marker and choose random structural drawing of the specified token as identification information, which is read by the scan unit and then stored in the database of the computer system identification. Consumers can obtain relevant information about the structural pattern by phone, Fax or the Internet, confirming the genuineness or counterfeit products. 13 C.p. f-crystals, 2 Il. The invention relates to a technology for protecting products against counterfeiting. In particular, the invention relates to a method, which allows us to distinguish fake or manufactured under an assumed name products from genuine by verifying the identity of the pattern present on the product.Prior art In the application for a certificate for a utility is kryvaetsja label to identify fake products. Specified tag includes a storage medium carrying information about the authenticity of the products, number and encryption codes printed on the specified carrier, and a removable protective layer. Rooms and encrypted code is stored in a database of a computer identification system that can provide consumers with information on product codes. Thus, consumers can ascertain whether purchased a fake product, by simple transmission codes printed on the product, the database on the phone (by set). In line with this, the usual procedure for recognizing fakes is simply to request information over the telephone network. This patented method is adopted in the project to protect against forgery known as the "national system of identification of counterfeit products over the telephone network" launched by the Association of China for protecting products against counterfeiting. However, experience has shown that some manufacturers of fake products produce under a false name and provide its fake numbers, and codes using already used numbers, and codes of media or illegally copying already used media.In Chinese Pat is the information" revealed the protective label, bearing randomly distributed drop-point and several lines of observation, divided randomly into several sections. The number of divided sections of lines on each protective label varies in different labels. A trademark owner may enter into a computer formula and obtain for each label, the number of points coinciding with the lines. Then on each label is printed the number and the date of disclosure. In the day the owner publicise the correct values. The products, which is an incorrect number are fake. This method is inconvenient for consumers for the following reasons: first, consumers have to wait for a certain date printed on the label; secondly, they also have to view the relevant media, which specify these identification numbers or request them from the owner, previously described complex content printed on the label, such as typeface and the keys of Chinese characters, the number of sections of the reference lines, operating symbols, results and so on (the contents of the printed information is so complex that it is difficult to identify, but can be easily faked); and third, because saintete remain secret until a specific date and result is obtained only after as these relations shall be made public together with the correct number, then users can't expect to get the result and immediately determine whether the result is correct or not. In addition, this label can be easily faked for the following reasons: first, a certain number of points on a line can be in different places, it is easy to forge, because the exact location of the points is not known; secondly, the manufacturer of fake can get the code and make counterfeits in accordance with this code when the consumer will receive this information from the media; third, these points lie on the surface of the labels, and not be labeled a whole, so that these points can be easily faked, adding them by hand or typing.A brief statement of the substance of the invention the Purpose of this invention is to provide a convenient method of protection against counterfeiting, which you can use to check whether the purchased product is fake according to information provided by the database of a computer system identify, just passing on the phone (dialing) codes specified in the computer system the identification and characterization of sluchainoe to determine whether the product is fake.The purpose of this invention is achieved as follows.Products are coded, and each of them has at least one printed code that is different from that on other products, and the media with information to protect against forgery is installed on the product. This information, together with codes stored in a database of a computer system identification, which is connected to the telephone network or the Internet, and the system provides consumers with information to protect against forgery on request. The specified media is on the product and made of such materials that have a clear visible random structural pattern. This information is an image with random structural pattern on the media.Preferably, the image random structural pattern on the media could be captured using a digital scanner or digital camera, and the image in digital form would be stored together with the codes in the database of the computer system identification, which is connected to the telephone network or the Internet. Consumers can get the image by Fax or by using a connected computer is whether the product is fake.It is also preferred that some areas of the image could be selected as a checkpoint random structural pattern and certain labels have been set or printed as guidelines for finding the control points; the position of each control point relative to the reference point is displayed by the code provisions; signs of a random structural pattern codes are displayed, the same characteristics of random structural pattern shows the same codes, and the different characteristics of random structural pattern shows different codes; information about the location of control points and the structural characteristics of the pattern is stored in the database of the computer system identification, which is connected to the telephone network, in which this information is in the form of digital codes, comprising code provisions checkpoint codes and structural characteristics of the pattern or in the form of voice files that describe the position of the reference points and the structural characteristics of the pattern. Consumers may call to obtain information about the position of the control points and the structural characteristics of the pattern contained in the voice file in order to determine aulaye location of control points and the structural characteristics of the pattern, could be printed on the media. In addition, explanation, or illustration with a description of the relationship between digital code and the provisions of checkpoint and communication between the digital codes and characteristic structural pattern was printed on the media.It is also preferable to random structural pattern was not printed, and would represent the internal structure of the material of the carrier, which makes imitation products.Also preferably, as carriers you could choose any natural materials with distinct random structural pattern or distinct natural spots, such as a wooden plank, stone, tree leaves, shells, etc. that makes the imitation products.Also preferably, for formation of a clear random structural pattern as material carriers you could choose paper, plastic sheeting or sheets of complex structures with added colored fibers or fragments to ensure that this material could be distinguished from normal printed pattern. Such media are difficult to forge.Also preferably, for formation of a clear random structural pattern as the material of the dye, foreign inclusions, grains of irregular shape, or air bubbles are randomly generated in the manufacturing process, which makes imitation products.Also preferably, the material carriers you could choose the materials with their own three-dimensional structural pattern so that it was possible to distinguish this pattern from the printed pattern. The carrier is made of a material with three-dimensional structure, it is difficult to forge because this material has a wide range of surfaces with more complex structural pattern. Using planar printing device more difficult to forge the materials having the shape of a cylinder, a hemisphere, prism, rectangle, pyramid, as well as curved or slightly transparent materials.Also preferably fully or partially close codes in order to avoid too many unnecessary phone queries.Products that use this invention, as a carrier you can choose a certain part of the product and to make packaging and media one.In accordance with this invention, the structural pattern is a structural characteristic of the material of the carrier and may d, areas with different transparency, areas with an uneven surface defects, scratches, bubbles, whether or not containing a filler, etc.To determine the position of the control points and the structural pattern can be printed or installed on the media some marks as a guide. You can use different types of targets, such as coordinates, table, line, alphabet, number, character, word, arrow, circle, box, Pentagon, figurine, animal, side marker, diagonal marker, etc., it is Preferable to mark the position of the control points as accurately as possible, which makes imitation products.For recording, storing and positioning of control points can be applied codes provisions on checkpoints or near them, for example to apply codes of location coordinates.To ensure that consumers are accustomed to measure the size of the media and the landmark, the length of the carrier and guide you can choose a multiple of, for example, one-eighth or one-sixth the length or width of a particular banknotes (for example, one Chinese yuan) so that consumers could use this bill to compare with the size of the label.To ensure that consumers were comfortable the address database of the computer system identification was printed on the media.Brief description of drawings the Present invention is also described variants of the invention in the attached drawings. These options are given in order to better explain the essence of the invention is not limited to these options.In Fig.1 shows a top view tags for anti-counterfeiting in accordance with this invention, illustrating a method of protection against forgery using structural pattern.In Fig.2 shows a top view of another label for anti-counterfeiting in accordance with this invention, illustrating a method of protection against forgery using structural pattern.Preferred embodiments of the invention In Fig. 1 shows a top view of the protective label in accordance with this invention for illustrating a method of protection against forgery using structural pattern in accordance with this invention. This protective label is made from a specially made paper, in which the manufacturing process were added fiber and wood chips so as to form a structural pattern 2. Obviously, you can also add pieces of colored paper, colored wood powder, mica powder, etc. as a material for manufacturing the horizontal X-axis, serve as a point of reference 6, and near the landmark 6 printed at least one code 1, which is different from the code 1 any other reference point 6. In this embodiment, as the coordinate position of the selected codes codes 5, checkpoint 7 is selected in sixteen areas, coordinate codes provisions 5 (X. y) which are(1.1), (1.2), (1.3), (1.4),(2.1), (2.2), (2.3), (2.4), (3.1), (3.2), (3.3), (3.4), (4.1), (4.2), (4.3) and (4.4). Character 1' is used to denote the fiber of the structural pattern, the sign 2' is used to refer to wood chips structural pattern, and the sign 0' is used to denote the empty space (without structural pattern). Thus, by using the following digital codes 8, you can describe the position of these sixteen control points 7 and signs of structural pattern in them: (1.1)0', (1.2)0', (1.3)0', (1.4)1', (2.1)2', (2.2)0', (2.3)2', (2.4)0', (3.1)0', (3.2)1', (3.3)0', (3.4)0', (4.1)2', (4.2)2', (4.3)0', (4.4)2'. To simplify digital codes 8 uses digital compression. For example, the sequence of digital codes 8 can be represented in the form 0'0'0'1'2'0'2'0' 0'1'0'0'2'2'0'2'. Digital codes 8, representing the position of the control points 7 and the nature of structural pattern in them, referred to herein as compound code provisions and structural pattern. Finally, the digital codes 8 (composite codes) each match in the file name, which corresponds to codes 1, and each label is attached to the protected product (for example, to the bottle of wine). Consumers can transfer codes 1 by phone by dialing into a special database of the computer system identification and hear the following information about the positions of control points 7 and the structural characteristics of the pattern: "If on the product, information about which You ask, has this label is that in the areas of (1.4) and (3.2) are fibers in the areas of(2.1), (2.3), (4.1), (4.2) and (4.4) is a wooden chips, and in other areas the pattern is missing, the product is genuine, otherwise, it is fake." Consumers can hear the following voice information about constituent codes when dialing these constituent codes: Product information which You request has the correct composite codes provisions and structural pattern. If the information You request, the control points are located in those places and have the structural pattern that is specified composite codes, it is true, otherwise it is a fake." In addition, if the composite codes are incorrect, you will be notified the following computer voice information: "the Product of which You nd the label in accordance with this invention for illustrating a method of protection against forgery using structural pattern in accordance with this invention. Protective label is made of natural granite with polished surface. This stone is selected as the material for the recording medium 3. The label takes the form of a square with sides 63 mm (which is equal to the width of Chinese banknotes in denominations of one yuan) and 10 mm thick with white main background and distinct black structural pattern 2 (spots inherent in natural materials) in the background. On each label printed at least one sequence of codes 1, which differ from the codes any other label, and the coordinate reference point 6. Codes 1 partially hidden covering layer 4. Structural pattern 2 on the carrier 3 recorded using a scanner or digital camera connected with computer. The recorded image is saved to a file with a name corresponding to codes 1, in the database of a computer identification system that can automatically send a Fax and which is connected to the telephone network and the Internet. Finally, these labels are made of natural granite are pasted into the protected product (e.g., motor vehicle). Consumers can enter codes 1 (by set) in the database of the computer system identification via Fax or computer connected with the network to obtain a structural image of the pattern 2, so that h is th invention are as follows.1. The difficulty of counterfeiting. Structural pattern 2 used in this invention, is its own structural characteristics of natural or synthetic randomly generated three-dimensional material, and not characteristic of the surface, which can be fabricated by printing. Since the provisions checkpoint 7 and the signs of the structural pattern checkpoint 7 is determined, and the digital codes 8, reflecting the structural information of the control points 7 are as accurate as its own structural pattern is difficult to forge, putting his hand or printed.2. Ease of identification. As the user enters codes 1 in the database of the computer system identification via Fax or network-connected computer to receive the facsimile image of the structural pattern 2 labels, and then compares this image with the structural pattern 2 product, it is possible to immediately determine whether a product is real or fake. The user can also enter by phone by dialling) codes 1 to the database computer identification system for receiving voice information about the structural pattern 2 checkpoint 7, and then compare in delsym. It is well known that artificial structure figure of wood or marble is a two-dimensional pattern printed on the surface. After cutting the material inside the pattern is missing, so the printed pattern is easy to recognize.3. The invention eliminates the disadvantages of the prototype. As information codes 1 in the database matches the characteristics of the structural pattern 2 product, it is difficult to forge by replaying previously used codes, or re-copy, or print of the same code. Digital codes 8, which directly represent the codes provisions 5 checkpoint 7 and the structural characteristics of the pattern 2, and explanations that illustrate the relationship between the digital codes 8 and locations of control points 7 and characteristics of structural pattern 2 is printed on the carrier 3, and such information may be made public as a criterion for identification. It also uses the database of the computer system identification. The above features of the method in accordance with this invention to make an automatic, simple, convenient, fast and accurate query regarding the authenticity of the purchased product.The above options assessing these options and / or implement alternatives within the entity of the present invention, reflected in his description and drawings.
Claims1. The way to recognize a fake, including the coding of products to protect, printing on each product group codes that differ from the codes any other products, installation on each and every product carrier of information and the selection information on the specified media, information preservation, and production codes in the database of a computer identification system connected to the telephone network or the Internet to give consumers the information for identity authentication fact or fake products, characterized in that the method further includes the steps of selecting certain types of materials with distinct random structural pattern as the media and select an image random structural pattern on the media as information.2. The method according to p. 1, characterized in that the specified image random structural pattern recorded using a scanning device or camera in the form of digital images.3. The method according to p. 1, characterized in that said method also includes the selection of certain areas on the media as control points with the help of control points.4. The method according to p. 3, characterized in that said method also includes the use of code provisions to represent the location of the control points relative to the reference point and storing information, including information about the location of the control points, and typical signs of random structural pattern together with the codes in a database of a computer identification system connected to the telephone network to provide consumers with call information for authentication or counterfeit products.5. The method according to p. 1, characterized in that the random structural pattern is a random pattern of the internal structure of the material medium.6. The method according to p. 5, characterized in that the random pattern of the internal structure is a three-dimensional structural pattern.7. The method according to any of paragraphs.1-6, characterized in that the carrier is made of natural material which is clearly incidental structural pattern.8. The method according to any of paragraphs.1-6, characterized in that the carrier is made of plastic-coated paper sheet or composite material, which is added to the dyed fiber and bits of paper p is different, however, the specified carrier is made of plastic, glass, ceramic, or composite material with the addition of the dye, foreign inclusions, grains, irregular or air bubbles to obtain a clear random structural pattern in the manufacturing process.10. The method according to any of paragraphs.1-6, characterized in that the side length of the specified media and the landmark is a common multiple of one-eighth or one-sixth the length or width of a particular banknotes.11. The method according to any of paragraphs.1-6, characterized in that said information about the location is the code provisions applied by the marking at or near the breakpoints.12. The method according to any of paragraphs.1-6, characterized in that the digital codes received from the location information of the control points and characteristic codes printed on the specified media.13. The method according to p. 12, wherein the digital codes encode as follows: the same digital codes display the same signs of a random structural pattern, and different digital codes show different signs of random structural pattern; information incidental structural pattern of each checkpoint Express digital codes cootie codes in conjunction with codes position in a sequence.14. The method according to any of paragraphs.1-6, characterized in that the telephone number, Fax number or network address of the database type on the specified media.
- applying on a substrate having the form of a straight or curved strip, successive marking layers, each of the marking layer is used in liquid form, and after application of each marking layer before applying the next marking layer are drying and/or curing before the formation of multilayer building that is desired and the desired sequence of marking layers;
- separation of the substrate and the multilayer slipway from each other; and
- crushing of multi-layer building on the multi-layered particles without disturbing the sequence of marking layers
FIELD: holograms protection technologies.
SUBSTANCE: method includes recording a hidden image on hologram in form of two-dimensional matrix of light optical points, wherein individual check code is set in predetermined angles of matrix; also, for positioning protective hologram an image of point object is recorded on it, outside limits of mask aperture, and during reading of hidden image protective hologram is displaced until restored image of point object placed outside mask aperture, fits point aperture in micro-diaphragm, and until an electric signal with maximal amplitude is detected at output of positioning control photo-detector, which shows correctness of positioning of protective hologram.
EFFECT: higher efficiency.
2 cl, 7 dwg