﻿{"id":416891,"date":"2013-05-13T15:00:40","date_gmt":"2013-05-13T13:00:40","guid":{"rendered":"http:\/\/www.any.hu\/?post_type=blog&#038;p=416891"},"modified":"2017-05-24T07:49:15","modified_gmt":"2017-05-24T07:49:15","slug":"how-far-is-technology-fraud-vs-protection","status":"publish","type":"post","link":"https:\/\/www.any.hu\/en\/how-far-is-technology-fraud-vs-protection\/","title":{"rendered":"How far is technology? \u2013 Fraud vs. Protection"},"content":{"rendered":"<p>Numerous counterfeited tickets are being sold to the Depeche Mode concert to be held on 21st May in Pusk\u00e1s Ferenc Stadium \u2013 warns the organiser Livenation in its announcement. According to their notice, the tickets are extremely similar to the original ones, the difference is undefinable by naked eyes. Each ticket will be checked electronically by its barcode; entrance into the stadium will be possible only with original, valid, unspent tickets.\u201d \u2013 <em>Source: quart.hu<\/em><\/p>\n<p>The question may come up, whether really those entered the stadium who bought the original tickets or the owners of the fraud tickets can watch the concert because they arrived earlier and stiffed the barcode reader.<\/p>\n<p>Despite the recent modern technologies everything can be easily counterfeited; fancy goods or cheaper products as well. Let\u2019s just think about the recent past news; security stickers on Tig\u00e1z meters and Budapest transport tickets were counterfeited in quite huge numbers, but there were also news about how fake Erzs\u00e9bet vouchers were printed.<\/p>\n<p>According to a slogan, \u201cone always has to be one step ahead of the forgers\u201d, but sometimes we feel that exactly the opposite of this phrase is true. Nevertheless the modern, developed technologies exist and can be reached on the side of protection as well, but it is good to know how they can be applied efficiently.<\/p>\n<p>Not only perfect copies are made, but products can be cloned electronically as well, that\u2019s why complex solutions, meaning a combination of visual security elements (with ones that are invisible to the naked eye) and the electronic protection. Apparent security elements \u2013 such as hologram and serial number \u2013 can be seen by the user, but even control of electronic data can be solved with wide-spread smart phones; data coded into QR codes can be read in a second and the originality of the product can be checked in offline or online systems. The third security element that cannot be read by naked eyes neither in coded format, it can be checked with special reader devices by issuers or accepters.<\/p>\n<p>There are efficient document security methods, quick and convenient complex solutions. Experts of our document security laboratory work on having the edge over forgers, as we can protect our Clients\u2019 values this way.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>G\u00e1bor Zs\u00e1mboki<\/strong><\/p>\n<p>CEO<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Numerous counterfeited tickets are being sold to the Depeche Mode concert to be held on 21st May in Pusk\u00e1s Ferenc Stadium \u2013 warns the organiser Livenation in its announcement. According to their notice, the tickets are extremely similar to the original ones, the difference is undefinable by naked eyes. Each ticket will be checked electronically [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[11],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How far is technology? \u2013 Fraud vs. Protection<\/title>\n<meta name=\"description\" content=\"There are efficient document security methods, quick and convenient complex solutions\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.any.hu\/en\/how-far-is-technology-fraud-vs-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How far is technology? \u2013 Fraud vs. Protection\" \/>\n<meta property=\"og:description\" content=\"There are efficient document security methods, quick and convenient complex solutions\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.any.hu\/en\/how-far-is-technology-fraud-vs-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"ANY Security Printing Company\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ANY-Biztons%c3%a1gi-Nyomda-632566636783568\/\" \/>\n<meta property=\"article:published_time\" content=\"2013-05-13T13:00:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-05-24T07:49:15+00:00\" \/>\n<meta name=\"author\" content=\"adminisztrator\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ANYPLC\" \/>\n<meta name=\"twitter:site\" content=\"@ANYPLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"adminisztrator\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.any.hu\/en\/how-far-is-technology-fraud-vs-protection\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.any.hu\/en\/how-far-is-technology-fraud-vs-protection\/\"},\"author\":{\"name\":\"adminisztrator\",\"@id\":\"https:\/\/www.any.hu\/en\/#\/schema\/person\/b81b6ec057a1f78e80cf8facb7995e28\"},\"headline\":\"How far is technology? \u2013 Fraud vs. Protection\",\"datePublished\":\"2013-05-13T13:00:40+00:00\",\"dateModified\":\"2017-05-24T07:49:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.any.hu\/en\/how-far-is-technology-fraud-vs-protection\/\"},\"wordCount\":387,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.any.hu\/en\/#organization\"},\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.any.hu\/en\/how-far-is-technology-fraud-vs-protection\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.any.hu\/en\/how-far-is-technology-fraud-vs-protection\/\",\"url\":\"https:\/\/www.any.hu\/en\/how-far-is-technology-fraud-vs-protection\/\",\"name\":\"How far is technology? \u2013 Fraud vs. Protection\",\"isPartOf\":{\"@id\":\"https:\/\/www.any.hu\/en\/#website\"},\"datePublished\":\"2013-05-13T13:00:40+00:00\",\"dateModified\":\"2017-05-24T07:49:15+00:00\",\"description\":\"There are efficient document security methods, quick and convenient complex solutions\",\"breadcrumb\":{\"@id\":\"https:\/\/www.any.hu\/en\/how-far-is-technology-fraud-vs-protection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.any.hu\/en\/how-far-is-technology-fraud-vs-protection\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.any.hu\/en\/how-far-is-technology-fraud-vs-protection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.any.hu\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How far is technology? \u2013 Fraud vs. Protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.any.hu\/en\/#website\",\"url\":\"https:\/\/www.any.hu\/en\/\",\"name\":\"ANY Security Printing Company\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.any.hu\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.any.hu\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.any.hu\/en\/#organization\",\"name\":\"ANY Biztons\u00e1gi Nyomda\",\"url\":\"https:\/\/www.any.hu\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.any.hu\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.any.hu\/wp-content\/uploads\/2017\/05\/any-logo-hu.png\",\"contentUrl\":\"https:\/\/www.any.hu\/wp-content\/uploads\/2017\/05\/any-logo-hu.png\",\"width\":320,\"height\":43,\"caption\":\"ANY Biztons\u00e1gi Nyomda\"},\"image\":{\"@id\":\"https:\/\/www.any.hu\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ANY-Biztons\u00e1gi-Nyomda-632566636783568\/\",\"https:\/\/x.com\/ANYPLC\",\"https:\/\/www.linkedin.com\/company\/any-security-printing-company-plc\",\"https:\/\/www.youtube.com\/user\/AllamiNyomdaBlog\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.any.hu\/en\/#\/schema\/person\/b81b6ec057a1f78e80cf8facb7995e28\",\"name\":\"adminisztrator\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.any.hu\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/43bc392a2b6505d71317f6931231fe2f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/43bc392a2b6505d71317f6931231fe2f?s=96&d=mm&r=g\",\"caption\":\"adminisztrator\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How far is technology? \u2013 Fraud vs. Protection","description":"There are efficient document security methods, quick and convenient complex solutions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.any.hu\/en\/how-far-is-technology-fraud-vs-protection\/","og_locale":"en_US","og_type":"article","og_title":"How far is technology? \u2013 Fraud vs. Protection","og_description":"There are efficient document security methods, quick and convenient complex solutions","og_url":"https:\/\/www.any.hu\/en\/how-far-is-technology-fraud-vs-protection\/","og_site_name":"ANY Security Printing Company","article_publisher":"https:\/\/www.facebook.com\/ANY-Biztons%c3%a1gi-Nyomda-632566636783568\/","article_published_time":"2013-05-13T13:00:40+00:00","article_modified_time":"2017-05-24T07:49:15+00:00","author":"adminisztrator","twitter_card":"summary_large_image","twitter_creator":"@ANYPLC","twitter_site":"@ANYPLC","twitter_misc":{"Written by":"adminisztrator","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.any.hu\/en\/how-far-is-technology-fraud-vs-protection\/#article","isPartOf":{"@id":"https:\/\/www.any.hu\/en\/how-far-is-technology-fraud-vs-protection\/"},"author":{"name":"adminisztrator","@id":"https:\/\/www.any.hu\/en\/#\/schema\/person\/b81b6ec057a1f78e80cf8facb7995e28"},"headline":"How far is technology? \u2013 Fraud vs. Protection","datePublished":"2013-05-13T13:00:40+00:00","dateModified":"2017-05-24T07:49:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.any.hu\/en\/how-far-is-technology-fraud-vs-protection\/"},"wordCount":387,"commentCount":0,"publisher":{"@id":"https:\/\/www.any.hu\/en\/#organization"},"articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.any.hu\/en\/how-far-is-technology-fraud-vs-protection\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.any.hu\/en\/how-far-is-technology-fraud-vs-protection\/","url":"https:\/\/www.any.hu\/en\/how-far-is-technology-fraud-vs-protection\/","name":"How far is technology? \u2013 Fraud vs. Protection","isPartOf":{"@id":"https:\/\/www.any.hu\/en\/#website"},"datePublished":"2013-05-13T13:00:40+00:00","dateModified":"2017-05-24T07:49:15+00:00","description":"There are efficient document security methods, quick and convenient complex solutions","breadcrumb":{"@id":"https:\/\/www.any.hu\/en\/how-far-is-technology-fraud-vs-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.any.hu\/en\/how-far-is-technology-fraud-vs-protection\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.any.hu\/en\/how-far-is-technology-fraud-vs-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.any.hu\/en\/"},{"@type":"ListItem","position":2,"name":"How far is technology? \u2013 Fraud vs. Protection"}]},{"@type":"WebSite","@id":"https:\/\/www.any.hu\/en\/#website","url":"https:\/\/www.any.hu\/en\/","name":"ANY Security Printing Company","description":"","publisher":{"@id":"https:\/\/www.any.hu\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.any.hu\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.any.hu\/en\/#organization","name":"ANY Biztons\u00e1gi Nyomda","url":"https:\/\/www.any.hu\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.any.hu\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.any.hu\/wp-content\/uploads\/2017\/05\/any-logo-hu.png","contentUrl":"https:\/\/www.any.hu\/wp-content\/uploads\/2017\/05\/any-logo-hu.png","width":320,"height":43,"caption":"ANY Biztons\u00e1gi Nyomda"},"image":{"@id":"https:\/\/www.any.hu\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ANY-Biztons\u00e1gi-Nyomda-632566636783568\/","https:\/\/x.com\/ANYPLC","https:\/\/www.linkedin.com\/company\/any-security-printing-company-plc","https:\/\/www.youtube.com\/user\/AllamiNyomdaBlog"]},{"@type":"Person","@id":"https:\/\/www.any.hu\/en\/#\/schema\/person\/b81b6ec057a1f78e80cf8facb7995e28","name":"adminisztrator","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.any.hu\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/43bc392a2b6505d71317f6931231fe2f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/43bc392a2b6505d71317f6931231fe2f?s=96&d=mm&r=g","caption":"adminisztrator"}}]}},"_links":{"self":[{"href":"https:\/\/www.any.hu\/en\/wp-json\/wp\/v2\/posts\/416891\/"}],"collection":[{"href":"https:\/\/www.any.hu\/en\/wp-json\/wp\/v2\/posts\/"}],"about":[{"href":"https:\/\/www.any.hu\/en\/wp-json\/wp\/v2\/types\/post\/"}],"author":[{"embeddable":true,"href":"https:\/\/www.any.hu\/en\/wp-json\/wp\/v2\/users\/2\/"}],"replies":[{"embeddable":true,"href":"https:\/\/www.any.hu\/en\/wp-json\/wp\/v2\/comments\/?post=416891"}],"version-history":[{"count":0,"href":"https:\/\/www.any.hu\/en\/wp-json\/wp\/v2\/posts\/416891\/revisions\/"}],"wp:attachment":[{"href":"https:\/\/www.any.hu\/en\/wp-json\/wp\/v2\/media\/?parent=416891"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.any.hu\/en\/wp-json\/wp\/v2\/categories\/?post=416891"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.any.hu\/en\/wp-json\/wp\/v2\/tags\/?post=416891"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}