In recent years, the number of criminal cases of counterfeit and counterfeit crimes in China has increased, and it has become a major public hazard that has plagued Chinaâ€™s national economy. Premier Zhu Rongji recently pointed out: â€œIf counterfeiting cannot be stopped, China has no hope.â€ At present, the level of domestic counterfeiting activities has been The development of hand-made and low-tech craftsmanship and the development of high-tech counterfeits will be even more severe in the beginning of the 21st century. It will use modern science and technology and the latest methods to develop Chinaâ€™s unique and difficult-to-break anti-counterfeit technologies, focusing on the development of anti-counterfeiting technologies. The idea and route, and should vigorously develop instrument identification.
As counterfeiters have more and more experience and their technologies have been continuously improved, the external shape of counterfeit products will continue to improve. Therefore, higher requirements have been put forward for chief pseudo technologies. Some counterfeit products are even more comparable to genuine ones in terms of overall quality. They are not only beautifully packaged, but also contain replicas of anti-counterfeiting labels that are believed to be genuine.
Some of the methods that have caused new sales of counterfeit products will also come to light. With the widespread use of the Internet, purchasers can receive counterfeit products through electronic devices or postal companies without having to meet manufacturers. This will create greater difficulties for counterfeiting. All indications are that the victims of counterfeiting must unite in their operations and force increasingly sophisticated and well-equipped dangerous enemies to surrender. To achieve this victory in the struggle, all victims must be strengthened in unity, vigilance, creativity, perseverance, and do their utmost to expel the counterfeiters and their distribution products.
The rise of information network anti-counterfeiting technology At present, China's commonly used anti-counterfeiting technologies in documents, securities, and products include laser holography, ink, anti-counterfeiting paper, watermarks, and magnetic cards. For example, the new version of RMB 100, which has been in circulation since October 1, 1999, has adopted the current international advanced fixed portrait watermarks, red and blue colored fiber, magnetic microtext safety lines, hand-carved heads, trapped denominations, and offset microtext. There are many technologies such as the denomination of light variable ink, complementary patterns of yin and yang, and engraving and gravure printing. These can be collectively referred to as physical anti-counterfeiting technologies. With technical advancement, such anti-counterfeiting technology can achieve good results in the initial stage of promotion and application, but as time passes, this new technology may become a mature technology that the general public can master. Therefore, anti-counterfeiting technology Need to be replaced in order to achieve the effect of continued security.
Information network anti-counterfeiting technology workers have adopted another anti-counterfeiting method. Each product is assigned a unique anti-counterfeit label containing a security code. As the products circulate together, the anti-counterfeit code will be archived in the anti-counterfeiting data center. Consumers can make real-time inquiries through various multimedia terminal devices of the pseudo query network system to determine the authenticity of the product.
Information network anti-counterfeiting technology can be based on information technology, network technology, centralized or distributed centralized database technology, bar code technology, cryptographic technology, computer technology, network communication technology, etc., based on anti-counterfeiting function design and system security. Its network structure may include a network control center, an e-mail system, a vendor coded terminal, a network management center, a verification terminal, and the like. The information entered by the manufacturer at the vendor's encoder terminal is encrypted and processed into an anti-counterfeiting label (eg, a specific number, bar code, etc.) that corresponds to each product, and is added to the inner and outer packages of the product on the production line. , To various users; In addition, the manufacturers will also anti-counterfeit identification information through the e-mail system to the network control center, Feng network control center and then transmitted to the local network management center and the verification terminal and generate verification database. After consumers purchase goods, they can use various terminals (telephones, computers, touch screens, etc.) to transmit the information of anti-counterfeit labels (digital, bar code, etc.) to the full-certification terminal for verification. The verification terminal then feeds the verification results back to consumers. On the other hand, it is transmitted to the network management center, which then transmits to all other terminals and network control centers of the center. If the verified product is a genuine product, the product data is eliminated from the database after being fed back to the consumer. The information network, as a technical worker, aims to use the latest technology of the modern information society, integrates traditional password verification principles, and takes a new perspective to deal with the difficulties faced by the field of anti-counterfeiting. Provide product tracking services for brand-name product manufacturers and consumers, prevent the emergence of large quantities of counterfeit products, and create a counterfeit situation for all people to provide good...
The rise of information network anti-counterfeiting technology has a close relationship with the arrival of the current information age. At present, this technology has been applied in some domestic provinces and departments. Compared with the traditional method, its main advantage is that it forms a comprehensive anti-counterfeit engineering system for goods from the inside to the outside, which not only facilitates consumers to make inquiries, but also strengthens the supervision of manufacturers and governments on products.
Information network anti-counterfeiting technology also has some problems that need to be further solved in the process of development. For example, the capacity of the database over time will become larger and larger, and counterfeiters can still try to sell counterfeit products after posing as authentic products and causing confusion.
At the beginning of the 21st century, the development trend of China's anti-counterfeiting technology, a variety of physical anti-counterfeiting technology and multimedia, computer, information network anti-counterfeiting technology, as well as a variety of technologies combined with the comprehensive anti-counterfeiting technology will be further developed.
2. The machine identification technology should be vigorously developed. This is an important link to achieve accurate and rapid identification of authenticity. In daily life, we have used some identification instruments or machines, such as microscopes, ultraviolet lamps, money detectors, magnetometers, laser pointers, scanners, etc., but these are still far from enough, and we should vigorously develop various types of This kind of high-tech special detector. Anti-counterfeit discriminators are designed to be easy to operate and can accurately and quickly display the answer for yes or no. After the successful development of various kinds of discriminators, they should mainly be placed in the sales center and related management departments to facilitate the use of the public.
3. As the field of research, development, promotion and application of anti-counterfeiting technology is expanding, more and more scientific and technical workers and management experts are involved in pre-school anti-counterfeiting. With the continuous deepening of anti-counterfeiting research work, a new branch of system engineering has gradually emerged â€“ anti-counterfeiting system engineering. Anti-counterfeit system engineering is the study of how to protect the subject matter from being forged with the most productive and economical anti-counterfeit systems. Anti-counterfeiting system engineering adopts systematic engineering research methods and protects the subject matter from being forged as a system. According to the objective needs of anti-counterfeiting, it analyzes various problems in scientific research, production, application, and management, and finds the solution to the problem. Good plan and put it into practice. Anti-counterfeiting system engineering is a fringe science, involving modern mathematics, modern physics, modern chemistry, mechanical engineering, electronic engineering, modern optics, computer engineering and multimedia technology, computer identification technology, modern communications engineering, and automation control. Engineering, modern information technology, modern network technology, cryptography, database technology, modern medicine, bioengineering, value engineering, modern management, psychology, criminal investigation and identification techniques and many other disciplines.