1, the bar code. In the late 40s of this century, someone at IBM in the United States began to study concentric circular (so-called bull's eye) code markings for commodities. By the 1970s, the bar code scanning technology was improved and continuously improved, and was adopted by the international standard ISO.
Bar-coded barcodes for product identification are currently widely used in China. Their main purpose is to identify, price and manage products. The bar code printed with the colorless anti-counterfeit ink is invisible to the naked eye, and only the fluorescent or ultraviolet and ultra-red fluorescent bar code is visible under the ultraviolet irradiation, and can also be read by a special pen. This is the bar code used for anti-counterfeiting. In the aspect of card fraud prevention, in 1987, some people launched two-dimensinal bar codes, which can store personal photos, personal information, and passwords of the holders. The information has a large capacity and is more suitable for confidentiality. However, such two-dimensional code cards are highly individual and cannot be rewritten and are only suitable for mass production. The use of personal identification cards is limited. PDF417 code came out in 1990, this is a newer and better one in the QR code. PDF417 code can encode up to 1848 letters or 2739 characters or mixed characters, with features such as high density, high capacity, reliable decoding, strong error correction ability, and good confidentiality, which can not only be stored in personal nature Information such as the situation, address, telephone number, etc., can also be stored in personally identifiable signs such as photographs, blood types, fingerprints, and retinal blood vessel maps. It has been reported that the PDF417 code has been used on the United States military licenses and car driving licenses in the United States and Canada.
Because the general two-dimensional bar code is easy to copy, the United States intermic company developed a hidden paper bar code, and monopolize the technology, in 1996 China's bar code also developed a paper stealth bar code system, fill the gaps in the country, the Institute developed Invisible bar code Invisible media is integrated with paper through special photochemical processing. It cannot be peeled off. It can only be used once. It cannot be recognized by the human eye. It can not be copied by visible light photography or copying. Only a certain wavelength can be used for scanning when distinguishing. The reader reads the information in the barcode. At the same time, this scanner is also compatible with common black and white barcodes. The bar code that has been monopolized by Japan has also been successfully developed in 1995. Metal bar code book, toughness, high mechanical strength, not easily deformed, long-term use in harsh outdoor environments, weather, high and low temperature, acid and alkali corrosion resistance, suitable for machinery, electronics and other famous products. Laser guns can be read long distances, compatible with universal code system without electromagnetic interference. The two codes developed by the barcode can be loaded with product name, factory name, code, code, and many other information according to user requirements to achieve automatic identification and anti-counterfeiting.

2, matrix code. The matrix code belongs to a kind of two-dimensional bar code. It encodes the graphic and data and converts it into a two-dimensional array of black and white squares. The information of this code is expressed by small squares of data.
This matrix code is also called ID matrix code. It is generally possible to enter texts or various data and passwords for any of the following 2000 countries. The matrix image can be as large or small as needed, ranging from 14 square inches to a minimum of 0.001 square inches.
There are two kinds of matrix codes: (1) Vericode: This was invented by U.S. Veritec, Inc. In 1987 it filed a U.S. patent. This code, except that the border is a black box, each box in the box is an element of the matrix. The black square element has a value of 1 and the blank square element has a value of 0. The square outside the border is used for orientation, and each square of the border is used to compose the matrix element data. Its coding capacity is very large, with a capacity of 215'15-1=1.6'1067 different graphic symbols. (2) Data matrix code (Datacode). The difference from Vericode is that two of the four sides of the box are all black, and the other two are all white, which is bounded by the diagonal of the square, half (two sides) is all black and the other half white. Its coding capacity is 212'12-1 = 1.6'1043. This code focuses on the storage of information, and Vericode focuses on the security of information.
The matrix printed on the logo or merchandise needs to input the pattern of the code to the computer through the CCD camera. After the pattern recognition and processing, all the stored information of the matrix pattern can be displayed on the computer. This code can be widely used on various tickets or merchandise.

3, machine reading code. The readable optical character is printed on a carrier such as a card, and when it is recognized, it is read by a dedicated reader. Machine reading code has established international standards and can quickly and accurately check passports and other cards. There are two lines of machine-readable codes on the two columns of the U.S. passport. The application of passport readers facilitates rapid customs clearance.

4, magnetic code. Write a password on the magnetic stripe or print it with magnetic ink. Use a magnetic decoder to read. Generally, the magnetic medium can be fixed on a specific position on the surface of the paper or the card or the certificate by means of printing, coating or pasting. At present, magnetic code has been used in financial, communications control and other fields. Since general commercial codes are easily altered and counterfeited, watermark magnetics have been introduced in recent years. Watermark magnetic strips are manufactured in the process of wet embossing, and the computer creates a two-element interval between the patterns. After drying, the magnetic stripe is retained in the magnetic oxides, resulting in a unique and unchangeable 12-digit number. When reading, a special watermark magnetic verification track is added to the ordinary magnetic head, and the presence or correctness of the watermark magnetic number is interpreted to verify the authenticity.
The magnetic strip can also be combined with a hologram to make a holographic magnetic strip anti-counterfeiting technology. That is, the magnetic and light information is locked together to integrate anti-counterfeiting. The resulting raster numbers and bar code numbers are independent, but they complement each other to form a huge identification number of holographic magnetic cards, which is more conducive to anti-counterfeiting and confidentiality. A holographic magnetic card reader is used for detection.
The above two magnetic code technologies have been used for card security.

5, smart cards (smart cards). The integration or injection molding of an integrated circuit on a plastic card can be performed inside the card, so that the card has the functions of storage and microcomputer. This card is also called an Integrated Circuit Card. It was invented by the French in 1974. Its capacity is much larger than that of magnetic cards. The storage capacity of foreign products can reach several kilobytes. Personal data such as photos, blood types, fingerprints, etc. can be accepted. Since the confidentiality is good, it can be run independently without relying on the database, so it is very practical, and the memory can be divided into many application areas to achieve one card and multiple uses.
Due to the low cost of IC cards and the continuous improvement in anti-counterfeit performance, the general magnetic card has become a trend for most cards such as credit cards, ID cards, driver's licenses, passports, etc., and can be extended to a variety of bills and valuable commodities. .
In order to deal with counterfeit credit cards, Europay international, MasterCard and VISA credit card companies have jointly launched smart credit cards and announced their EMV standards. A smart card is a smart card that is placed on an ordinary credit card. The smart card uses a chip that stores a lot of information and is not easily counterfeited. As the production of wafers is a high-tech, large-scale investment, coupled with the encryption logic inside the card, it can be bound to the counterfeiter's hands and feet. In addition to using this card as a credit card, cardholders can also use it as a card for mobile phones, long-term customer cards for shops, and even as a bus card for bus transportation, achieving the purpose of multiple cards.

6, Laser card (Laser card). Has been applied in Europe, America and Japan. Its storage is greater. At present, the maximum capacity of a card is up to 6.6 Mbytes. Because the data on the card cannot be rewritten, the card itself is durable, high temperature resistant, and is not afraid of magnetic fields, static electricity interference and X-ray radiation, so it is popular with people. The laser card has three application forms: hardware encryption, software encryption, and human character record encryption.
This card does not have a strong self-management function like an IC card. Since information is exposed on the card, the counterfeiter can decipher once it has been provided with a set of reading and writing devices and software so that it can lose its anti-counterfeiting function. If the IC card and the laser card can be comprehensively utilized, a new composite card will be developed and its anti-counterfeiting performance will be better.

Short Eyelashes

Short Eyelashes,Fake Lashes,Short Strip Lashes,Short False Eyelashes

Zhengzhou Cuka Electronic Commerce Co., Ltd. , https://www.cukalashes.com