Information anti-counterfeiting printing technolog

  • Detail

Packaging information anti-counterfeiting printing technology

since China's reform and opening up, the economy has developed rapidly and commodities are abundant. Enterprises engaged in the production of various products have strived to create brands and prospered the commodity market. But all kinds of fake and shoddy goods also flooded the market at an alarming rate, causing very serious economic losses. Therefore, anti-counterfeiting technology to prevent products from being forged and counterfeited has been produced. Printing anti-counterfeiting is one of the main anti-counterfeiting technologies of packaging. This paper briefly discusses the technology of printing anti-counterfeiting with information

1. Anti counterfeiting technology of human information bar code. Since the end of this century, IBM began to study concentric circle (so-called ox eye) code identification, which has been used in commodities, bar code technology has been continuously improved. At present, there are visible bar codes for commodity identification. Bar codes printed with colorless anti-counterfeiting ink that are invisible to the naked eye under visible light illumination, but can display fluorescent bar

codes under ultraviolet and infrared radiation. It adopts digital symbols or mixed coded characters, which has the characteristics of high density, high capacity, reliable decoding, strong error correction ability and good confidentiality. It can not only store personal photos and other natural conditions and address information, but also store signs for personal identification, such as photos, blood types, fingerprints, retinal vascular diagrams and other secondary bar codes (two djmensjnal bar codes). And the paper hidden bar code which is more difficult to copy than the general two-dimensional bar code and is integrated with the paper after special photochemical treatment. It cannot be peeled off and can only be used once. It cannot be recognized by human eyes, nor can it be photographed and copied with visible light. When identifying, it can only be read by a scanner emitting a certain wavelength. It has high strength and toughness, and is not easy to deform. It can be used in outdoor harsh environment for a long time. It is resistant to wind and rain, high and low temperature, acid and alkali corrosion. It is suitable for famous and high-quality products such as machinery and electronics. It is a metal bar code that can be read from a long distance by laser, is compatible with the general code system and is not subject to electromagnetic interference

the comprehensive anti-counterfeiting bar code of human body information after adding the anti-counterfeiting information of human characteristics to the two-dimensional bar code with information anti-counterfeiting function is an anti-counterfeiting method with stronger anti-counterfeiting function. Human body information that can be used to prevent counterfeiting includes:

(1) fingerprint information. Fingerprints are the patterns formed by the bulge of the mastoid line of the palm skin at the end of human fingers. They are the most important kind of fingerprints. The patterns formed on the hands and soles of feet are called palmprints

fingerprints can be divided into hundreds of patterns, and each fingerprint is arranged and combined into nearly 100 feature points by 13 points and lines of different shapes. In addition, the location and distribution of each feature point and line are different, which makes the specificity, stability and heredity of fingerprints reach the so-called "unchanged for life, ten thousand people. 3. The improvement of the original stretching device and clamp is different". It was reported in France that the detailed characteristics of fingerprints were summarized into four types by mathematical methods, and each fingerprint had about 100 details. After arrangement and combination, the number of people who went out was obtained. Then, based on the population of about 5billion in a century, each person had ten fingers, that is, 50billion fingers. After calculation, it is found that it takes 50 digit centuries for humans to have absolutely repeated fingerprints, so in fact, there can be no two people with exactly the same fingerprints in the world. Therefore, fingerprints are recognized as an absolutely reliable sign of personal identification, and have been used in forensic science for a long time. In ancient China, fingerprints have been used to prove personal identity and have been respected by countries all over the world. It can be seen that fingerprints are universally recognized and personal marks that cannot be counterfeited. As a special sign, fingerprint can be made into pattern identification. Password is printed into magnetic bar code with magnetic code anti-counterfeiting ink. The purpose of anti-counterfeiting can be achieved by the automatic fingerprint identification system when the packaging passes through the channel to prevent the export

(2) Palmprint and hand shape anti-counterfeiting. The formation and specificity of palmprint of human hand are the same as those of fingerprint. Only in use, because the palmprint is very large, it can be used as the same identification after overall separation. Some people use it as anti-counterfeiting of bulk goods to prevent some of the goods in boxes from being "transferred" and pretended to be genuine with some fakes

palm print can also be used in the security system of access

palm shape can be measured by anthropological methods to find out the differences between everyone, but its accuracy is far less than that of fingers and palmprints. But it can also be regarded as a method of distinguishing false

(3) DNA anti-counterfeiting. DNA (deoxyribonucleic acid) exists in all nuclear animals and plants, and all genetic information of organisms is stored in DNA molecules. The coding region in the DNA structure, that is, the genetic gene or gene sequence, accounts for a small proportion of DN in other companies. 1/10-1 of the total length of a is/30 in the world. This part is the so-called genetic code region

as far as human beings are concerned, there are about 100000 genetic genes, each of which is composed of four nucleotides, a, t, G and C, arranged in order on two complementary spiral DNA long chains. The total number of nucleotides is about 3billion. If you randomly check the DNA map of two people, the probability of being exactly the same is only one in 300 billion. This probability is far lower than the reciprocal of the world population before the dry day, so the value of identifying individuals can be regarded as 100%. Like human beings, any organism, whether animal or plant, as long as it is a eukaryote, has DNA in its nucleus, and this DNA fragment is polymorphic, which is a natural genetic code mark. Especially in higher animals and plants, the number of genes is extremely huge, which exceeds the alkaline gene comparison (). If it is used for anti-counterfeiting, only a few hundred BP is enough. It can be seen that DNA as a password, there is a very wide range of choices, which can be described as inexhaustible. In recent years, there have been reports of using DNA as password anti-counterfeiting at home and abroad, and DNA encryption ink has been introduced for signature

the Institute of biological DNA anti-counterfeiting technology of Shandong Normal University has passed expert identification. They constructed a new plasmid vector, achieved mass production of DNA molecules through DNA cloning technology, and established a detection method using PCR (polymerase chain reaction). Because DNA molecule is non-toxic and very stable, it can be dissolved in water and some polar solvents. Water or other solvents can be added to commodities or their packages as a medium to prevent counterfeiting. The biology research group of Shandong Normal University has mixed the plant DNA code of the mastered sequence into printing oil, glue, cosmetics and low alcohol Baijiu to study the feasibility of anti-counterfeiting for its commodities. Because PCR detection requires special equipment, at present, the DNA password is still an expert anti-counterfeiting method. In the litigation of the authenticity of batch products, reliable scientific evidence can be produced through expert identification, which plays a great role

the gold anti-counterfeiting technology institute of Nankai University is studying the grafting of ona gene double helix on photochemical recognition materials. The Institute has expanded a variety of base countries, gradually built a database, and has synthesized a variety of photochemical materials such as fluorescence, photochromism, magneto-optical, photoacoustic, etc. The barcode printed by these materials can simplify the existing detection methods, and the existence of the DNA code of the sequence can be determined by observing whether there are fluorescence or color indicators, so as to identify the authenticity

(4) anti counterfeiting of human fundus vascular images. The central artery of the optic membrane of the human eye is divided into upper and lower branches from the fundus to the optic nerve nipple, and then divided into four arterioles in the upper and lower temporal cases of the optic membrane, the upper and lower nasal cases, and the upper and lower nasal side. Each arteriole, each arteriole, is further divided into smaller and finer grades, so that capillaries extending in all directions are formed on the optic membrane, which is the fundus vascular map of the clinician observing the fundus diagnosis. The gradual branching and formation of these blood vessels, such as the step-by-step separation of towering trees, and the energy-saving design of affordable housing buildings submitted to the review and filing of construction drawing design, must meet the requirements of the guidance. The tree weight must form countless leaves, and there is no exactly the same fundus vascular map of the two. For example, if an individual fundus vascular has congenital or acquired variant vessels or old lesions of fundus, it adds a special sign of identification. Therefore, in forensic science, fundus retinal angiogram is regarded as one of the preferred methods of personal recognition

use a binocular CCD camera to take the retinal vascular map of the admitted fundus, and store and build a database after computer processing. As an image password, it is stored in the two-dimensional bar code. When the detected bar code passes through the detector during verification, the detector converts the information into numbers, compares it with the stored fundus retinal vascular image with a microcomputer processor, and finally draws a conclusion of affirmation or negation

(5) anti counterfeiting of human iris image. The iris of the human eye is located behind the cornea and before the lens. Its color varies with the amount and distribution of pigments. Except for some ethnic minorities, most of them are brown in China. Through the cornea, we can see that the iris is disc-shaped, and there is a small hole in the center called the pupil. The pupil can automatically shrink or expand according to the brightness of the environment. The disc-shaped iris is centered on the central pupil and has radial textures and pits around, like a skirt fold. The texture becomes straight when the pupil shrinks; When the pupil expands, the texture is wavy, and the subtle features such as texture, blood vessels and spots on the iris are different. It is reported that in 1993, IriScan company developed a device that can check the iris of human eyes - an automatic iris recognition instrument, which has obtained a patent. This instrument can take video images of iris from a few feet away to identify individuals. This method is more convenient to apply than the image of retinal vessels

(6) anti counterfeiting of vein image on the back of hand. The shape of the branches and distribution of the subcutaneous veins on the back of the hand are different, and their formation and significance are the same as those of the membranous vessels, but they are far less complex than the retinal vessels, and the vessels visible through the skin are limited. Because the methods of recording, storing and checking are relatively simple, it only needs to put the hand holding the fist under the camera for a few seconds, and the recorded image information is printed into a bar code. When the package with this kind of password passes through the detector, it is processed by the computer and compared with the stored image, and then it can be recognized or denied

(7) anti counterfeiting of facial features. People have different faces, or a pair of twins can be found by anthropological measurement. For example, anthropological methods are used to measure the points and lines between various anatomical parts of the face, and infrared ray is used to scan the thermal phase of the face, which can be used for personal recognition of human images, and computer automatic recognition system can also be established for anti-counterfeiting

2. Magnetic code. Write the password on the magnetic strip or print it with magnetic ink. Read with magnetic decoder. Generally, the magnetic medium can be fixed at a specific position on the surface of paper, cards and certificates by printing, coating or pasting. At present, magnetic codes have been used in finance, communication control and other fields. Because general commercial codes are easy to be altered and forged, watermarkmagnetics has been introduced in recent years. During the production of the watermark magnetic stripe, after the warm magnetic coating, the computer will make it produce a 2-bit interval of the pattern, and after drying, it will remain in the magnetic oxide to produce a unique 12 digit number that cannot be changed. When reading, add a special watermark magnetic verification track on the ordinary magnetic head to judge whether the watermark magnetic number exists and is correct, so as to distinguish the authenticity

magnetic stripe can also be combined with hologram to make full magnetic stripe anti-counterfeiting technology. That is, the magnetic and optical information are locked together for comprehensive anti-counterfeiting. The obtained raster numbers and bar code numbers are independent, but they complement each other to form a huge identification number of holographic magnetic card, which is more conducive to anti-counterfeiting and confidentiality. Holographic magnetic card reader is used for detection. Magnetic code technology has been used for magnetic code printing on solid packaging such as boxes and bottles<

Copyright © 2011 JIN SHI