In order to facilitate market access, comply with the requirements of market economy, and classify the products according to their functions and use characteristics, anti-counterfeiting technology products can now be classified into six categories:

1 security identification;

2 Structure and packaging anti-counterfeiting technology products;

3 security materials (security paper, security film, security ink, anti-counterfeit ink, etc.);

4 Computer multimedia anti-counterfeiting technology products;

5 biometric anti-counterfeiting technology products;

6 other anti-counterfeiting technology products.

Anti-counterfeiting technology products should be made to meet their requirements? For the first time in the world, China has explicitly proposed eight general technical requirements for anti-counterfeiting technology products.

1 Identity uniqueness: The uniqueness and non-transferability of anti-counterfeiting identification features of anti-counterfeiting technology products. For example, digital anti-counterfeiting, so that a product's anti-counterfeit identification of an identity code, each anti-counterfeit logo can only be used once, can not be transferred to use.

2 Stabilization period: Under the normal use conditions, the anti-counterfeit identification feature of the anti-counterfeiting technology product can be kept in the shortest time. For example, fluorescent inks and temperature-change inks have a decay period.

3 Security period: Under the normal use conditions, the anti-counterfeiting identification feature of the anti-counterfeiting technology product is successfully copied for the shortest time. This is what the customer is most concerned about. The commitment period should be set by the manufacturer.

4 anti-counterfeiting efforts: the identification of authenticity, to prevent the counterfeit counterfeit function of the durability and reliability. Anti-counterfeiting strength consists of the number of anti-counterfeiting identification features, the number of anti-counterfeiting technology exclusive, the difficulty of imitation, and the four elements that are copied into this size.

5 Use adaptability: The anti-counterfeiting technology's anti-counterfeiting identification features can adapt to the target or service object's use requirements.

6 Recognition performance: The anti-counterfeiting identification features of anti-counterfeiting technology products can be correctly identified through the senses or machines (instruments) within the required recognition time. The first-line recognition emphasizes the public common sense of anti-counterfeiting identification features, and can be recognized through the sense organs; the second-line recognition emphasizes recognition through simple instruments (such as magnifying glass, laser pen, ultraviolet fluorescent discriminator, etc.); the three-line recognition emphasizes the use of special instruments (such as DNA identification ) Identification by experts as the basis for judicial decisions. Second-line recognition and three-line recognition emphasize the hidden features of anti-counterfeiting identification features.

7 Environmental requirements for use: The anti-counterfeit performance of anti-counterfeiting technology products should meet the requirements for the normal use environment of the subject matter.

8 Technical security: The technology of designing and manufacturing anti-counterfeiting technology products should have security and confidentiality. In addition, the adaptability of economic costs should also be taken into consideration, ie, the use of anti-counterfeiting technology should be met while minimizing the cost of use.

The main tasks of anti-counterfeiting technology products are:

1 Anti-counterfeiting, protection of famous products;

2 Prevent financial fraud;

3 Maintain public safety.

How do anti-counterfeiting technology products achieve these three major tasks? Anti-counterfeit technology products accomplish these three main tasks through the following two functions: first, to prevent counterfeiting of goods; second, to prevent counterfeiting of personal identities. The following is a detailed description of the security of goods and documents.

Commodity anti-counterfeiting generally has three lines of defense: the first package of anti-counterfeiting, such as disposable packaging paper or packaging film, can have security features anti-counterfeit paper or security film; if it is bottled, for example, you can use a laser to burn a security seal mark, also You can use anti-counterfeiting packaging structure. The second line of defense is to put anti-counterfeiting marks on the goods or packaging, laser holography, printing anti-counterfeiting, nuclear micropore anti-counterfeiting, marking the distribution of anti-counterfeiting, digital anti-counterfeiting, etc.; generally use multiple integrated anti-counterfeiting, and available telephone, mobile phone, etc. Enter the number on the product that represents its unique identity, and you can learn the authenticity from the returned information. The third line of defense is called connotation security, that is, the use of material characteristics in the goods or commodity packaging, the use of non-transferable materials, the use of material characteristics of the amount of records and inspections, in order to achieve the uniqueness of use. For example, put edible non-toxic DNA in wine or medicine for verification.

Anti-counterfeit documents can also have two lines of defense. The first is anti-document artifacts, such as a financial magnetic card, which can be pre-programmed with a track on a genuine magnetic card and a code for permanent magnetic materials to be used for authenticity. The second line of defense is to identify the identity of the certificate holder, such as a bank card, and enter a password. The ATM machine can know the identity of the certificate holder; a confidential department passport or a national passport must be entered at the entrance. Fingerprints, faces, or irises are compared with fingerprints, faces, or irises that are reserved on passports or passports, as well as in-machine or database networks to determine the authenticity of the identity of the licensee.

Luxe ribbon jewelry boxes are usually boxes for individually packaging pieces of jewelry. They come in many types of designs and layouts, depending on the type of jewelry they are intended for: there are earring boxes, that come with slits in which earring hooks can be inserted; there are bracelet boxes, which are longer and slimmer and have elastic bands at both ends, keeping the bracelet in place and there are ring boxes, which are usually square or rectangular and have a slot in the middle, for one or two rings.

They are kept very simple as far as design goes and they tend to be made of cardboard, which is lighter and cheaper. However, most of them have some sort of decorative accessory, such as a ribbon, which amplifies their simple elegance.


Necklace Box

ANSHAN JIASHUN ARTS AND CRAFTS CO.,LTD , https://www.jhwls.com