CN101160772A - System and method for network-based object authentication - Google Patents

System and method for network-based object authentication Download PDF

Info

Publication number
CN101160772A
CN101160772A CNA2005800486019A CN200580048601A CN101160772A CN 101160772 A CN101160772 A CN 101160772A CN A2005800486019 A CNA2005800486019 A CN A2005800486019A CN 200580048601 A CN200580048601 A CN 200580048601A CN 101160772 A CN101160772 A CN 101160772A
Authority
CN
China
Prior art keywords
authentication
image
digital picture
processor
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2005800486019A
Other languages
Chinese (zh)
Inventor
阿尔弗烈德·V·阿拉西亚
阿尔弗烈德·J·阿拉西亚
托马斯·C·阿拉西亚
斯洛博丹·茨弗特科维奇
伊戈尔·伊利克
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Graphic Security Systems Corp
Original Assignee
Graphic Security Systems Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/068,350 external-priority patent/US7512249B2/en
Application filed by Graphic Security Systems Corp filed Critical Graphic Security Systems Corp
Publication of CN101160772A publication Critical patent/CN101160772A/en
Pending legal-status Critical Current

Links

Images

Abstract

A method is provided for determining whether an object is an authentic object to which an expected encoded image has been applied (S170). The expected encoded image having been constructed by encoding an authentication image using a set of one or more encoding parameters. The method comprises receiving a digital image of at least a portion of the test object including a target area where the expected encoded image would be applied if the test object is an authentic object (S120). The method further comprises determining the one or more encoding parameters (S130) and applying a digital decoding algorithm to the captured digital image to establish a decoding result (S150). The decoding result may then be compared to object authentication criteria to establish an authentication result (S160). In particular embodiments of the invention, the actions of receiving, determining, applying and comparing are carried out by an authentication server and the digital image is received from an inspection processor over a network.

Description

The system and method for based on network object authentication
The application is the U. S. application No.11/068 on February 28th, 2005 application, and 350 continuation applies for that partly it requires in the priority of the U.S. Provisional Application No.60/565300 of application on April 26th, 2004, at this in conjunction with full content with reference to them.The application also is involved in the U. S. application No.10/847 of on May 18th, 2004 application, 962 (' 962 applications) with in the U. S. application No.10/897 of application on May 18th, 2004,943 (' 943 applications), at this in conjunction with full content with reference to it.
Technical field
Present invention relates in general to forge the protection field, more specifically, relate to by using the object field of authentication of coded image.
Background technology
File is forged and the product imitation is a major issue of having utilized the whole bag of tricks to solve.Wherein more successful a kind of method is to use and is applied to or prints on hiding or implicit image on the protected object.These images are normally invisible under the assistance that does not make their visible particular devices.
A kind of method that forms hidden image is a coded image optically, therefore when printing, has only by the use corresponding decoding device and just can see image.This image in fact can be used for the mimeograph documents of arbitrary form, comprises legal document, identity card and paper, label, currency, stamp etc.Can also be applied to goods or packing in order to avoid goods is palmed off.
Can and the authentication image of decoded picture and expectation be compared the object of authentication application coded image by decode encoded images.Authentication image can comprise the specific information of authentication object or the information relevant with similar the group of objects product of concrete manufacturer or device fabrication (for example by).The generation of coded image and use can Be Controlled, thus they can not be replicated easily.In addition, can the configuration codes image so that tamper with a document or label on information very obvious.
The authentication of file and other object typically requires to use hardware decoder in " this area ", for example the lens of decode encoded images or microarray lens optically.These lens must have optical characteristics with corresponding to being used to encode and being applied to the parameter of authentication image, and must be by suitably directed, so that user's decoding and watch image.
Because can only be used to have the coded image of individual features, hardware decoder is not instrument flexibly comparatively speaking.Also existing use optical decoder device to come decode encoded images is unrealistic and undesirable situation.For example, use the authentication of optical decoder device to need scene (on-site) immediately decoded picture and authentication image to be compared.This requires the site inspection person of object to be certified must be able to differentiate decoded picture and the difference of expectation between the authentication image.This exists under a plurality of situations that may change in the expectation authentication image is unpractical.In addition, do not need site inspection person can read the information that is embedded in the decoded picture yet.
Summary of the invention
The invention provides system and method, come authentication document and other object by using the coded image that can be scanned and decode, and need not to use hardware based decoder.
One aspect of the present invention provides whether a kind of definite object is the method that has been employed the authentication object of expectation coded image.Constitute the expectation coded image by the collective encoding authentication image of using one or more coding parameters.This method comprises: if tested object is an authentication object, reception comprises the digital picture to the small part target area, tested object that will use the expectation coded image.This method also comprises: determine one or more coding parameters, and with the digital decoding algorithm application to the digital picture of being caught, to produce decoded result.Then, decoded result and target authentication criterion can be compared, to produce authentication result.In specific embodiments of the invention, carry out the action that receives, determines, uses and compare by certificate server, and receive digital picture from checking processor by network.
Description of drawings
Can more fully understand the present invention by reading following detailed description with the accompanying drawing, the relevant drawings mark is used to indicate same parts, wherein:
Fig. 1 is to use the demonstration graph of optical decoder device decoding printed encoded image;
Fig. 2 is the flow chart according to the authentication object method of the embodiment of the invention;
Fig. 3 is the schematic diagram according to the object Verification System of the embodiment of the invention;
Fig. 4 is the schematic diagram according to the object Verification System Network Based of the embodiment of the invention;
Fig. 5 is the schematic diagram of the digital decoding system that can use in embodiments of the present invention;
Fig. 6 is the schematic diagram of the decode system Network Based that can use in embodiments of the present invention;
Fig. 7 is the schematic diagram of the decode system Network Based that can use in embodiments of the present invention;
Fig. 8 is the based on network method flow diagram that interactive image decoding service is provided for the user.
Embodiment
The invention provides system and method, be used for other object of authentication document, commodity and the decodable coded image of use optics.Method of the present invention provides the digitally captured coded image that is applied to want authentication object.This can use scanner or other imaging device to produce the digital picture of being caught and realize.Then, be equipped with the data processor of digital decoder can be used to discern and decode, and from decoded result, extract mark and/or information from the coded image of the digital picture of being caught.Then, the mark of extraction and/or the information object or the file of coded image that can be used for authentication application.In certain embodiments, decoded picture does not need to be seen.In certain embodiments, can catch decoded picture by site inspection person, the inspector is transferred to the processor (or a series of processor) of separation with the image of catching, and image is decoded, and compare with desired image alternatively.Then, the result can be turned back to site inspection person or other authorized person.By other embodiment of following description and variation is conspicuous.
As previously mentioned, authentication method of the present invention typically uses and is embedded in background or source images and prints on coded image on the project that may be distorted, forge and copy.Just as used herein, term " coded image " is meant in background or the processed and/or hiding image of mode to use or to print in other image, and under the situation of not using decoding device, human eye can not the recognition coding image.Some coded images are hidden, and therefore are difficult to from background or main image it be identified.Other coded image can see at an easy rate that but not readable, this is by systemic scrambling or processing because of picture material.
The coded image that has meaning for the present invention is to be configured to use the image that carries out optical decoder based on the decoding device of lens.This imagery exploitation the advantage of particular type lens (for example biconvex lens), thereby come the sampled images content based on optical characteristics.For example, biconvex lens can be used for sampling and the enlarged image content based on lenticular layer (lenticule) frequency of lens.Typically, use a kind of employed image of encoding in the several different methods, described method relates to sets up the regular periods pattern that has with the corresponding frequency of biconvex lens that is used as decoder, and the corresponding distortion pattern of the content of introducing and coded image.These distortions can be very little, thereby be difficult to maybe to utilize bore hole to distinguish image from mode of rule.Can use specific photographic equipment to produce such coded image, as U.S. Patent No. 3,937 with analog form, 565 is disclosed, or produce coded image with digital form, as United States Patent (USP) 5,708,717 (' 717 patents) are disclosed, and the two in the lump at this as a reference.
Digitally coded image can be embedded in background or other image, thereby is difficult to only identify the existence of coded image.With reference to figure 1, can use main image or source images 20 and less important image 40 to form coded image 10, wherein watching the mode of less important image 40 that less important image 40 is embedded in the main image 20 by the decoding device 3030 of preset frequency.Identical with the coded image 10 of Fig. 1, main image can be greyish white or the color background image, maybe can comprise the visual image content, as pattern or photo or other mark pattern.Less important image can also be arbitrary form image or mark, and can comprise relevant with main image in some way mark.In example codes image 10, less important image 40 is based on the repeat pattern of vocabulary " Department ofTransportation ".Less important image can be encoded separately, merge then or be embedded in the main image, maybe can utilize and embed identical mode and come the coded auxiliary image, thereby realize telescopiny.As shown in Figure 1, can watch less important image by on coded image 10, decoding device 30 being set with correct direction.In the example of Fig. 1, decoding device has trunnion axis 32 and vertical axis 34, and coded image 10 has trunnion axis 22 and vertical axis 24.When the trunnion axis 32 of decoding device 30 during, can leak less important image with respect to 22 one-tenth α decodings of trunnion axis angular orientation of coded image 10.Decoding angle α is coding and embeds the coding parameter that produces before the less important image.
Embed less important image or can be divided into two kinds of universal methods with the method for main image co-registration.In first method, utilize preset frequency that the cyclic behaviour of rule is forced on the main image.This is mainly by realizing with the main image of preset frequency rasterisation.Then, less important image mapped is arrived main image, thereby can change the regular behavior of main image with comprising the corresponding position of less important image of picture material.These changes are very little, to such an extent as to be difficult to be discovered by human eye.Yet, when the biconvex lens that has with the corresponding frequency of preset frequency is set, thereby can change the mode that forms the less important image of the hiding main picture material of sampling to identify on main image.
In the second approach, at first the cyclic behaviour of rule is forced at less important image rather than main image, as long as wherein exist the content of less important image the change of this behavior just to occur.Then, less important image mapped is come to change by pixel ground the content of main image to main image based on the content of coded auxiliary image.
The another kind of method of embedded images is generally used for bank note and check.In this method, by generating hidden image in the direction that changes raster element in the visual image with the corresponding position of the content of hidden image.For example, the vertical light grid line of main image can become horizontal line with the corresponding position of hidden image.Typically can see hidden image by the bank note that tilts slightly.Yet, also by decode deviation in the main image of optical decoder device.This is because the grid stroke of main image is being hidden on the location of content and will extended along the length of the biconvex lens line of decoder, and exists on the position that hides content and have only a cross section (crosssection).This species diversity causes that hidden image seems brighter than viewable portion when watching by decoder.
All above-mentioned image encode methods and coded image result's thereof public thinking is that it relates to the deviation (for example, locus, tonal density, grating angle) from the cyclic behaviour of rule.Can gather to come the cyclic behaviour of formation rule and the deviation that Yin Qi produces based on employed coding method and predetermined coding parameter.Can make deviation apparent by the decoder that use has with one or more coding parameter corresponding characteristic.For example, wherein one of coding parameter can be the frequency of the cyclic behaviour of rule.Decoder (based on hardware or based on software) must dispose according to this frequency.For example, under the situation of biconvex lens, produce the lens frequency, so that frequency or the even-multiple of lens frequency identical of the cyclic behaviour of rule with the lens frequency.Then, biconvex lens can serve as content sampling device/amplifier, emphasizes the deviation from the cyclic behaviour of rule, and it is assembled in the less important image.
Biconvex lens can be used for decode content by the visual coded images of systemic scrambling and the coded image that is embedded in main image or background.Yet,, 350 (' 350 application as U.S. Patent application No.11/068) and described, also can be used to the coded image of decoding and digitally having produced or having caught based on the decoder of software.These decoders can be suitable for decoding Any Digit version of optical encoding image comprises also unprinted digital coding image and has scanned or be converted to by other means the printed encoded image of digital form.Digital coding image can be the hidden image that is embedded in background or the main image, maybe can be the visual image of systematicness adding or processing.Main image can be the blank image (for example grey frame) that does not have to discern content, maybe can be to have the real image that can discern content.
Be used for that digitally the software of decode encoded images in fact can be in conjunction with any data processor.For the purpose that realizes authentication method of the present invention, software can use any coding/decoding method, including, but not limited in the method described in the application of ' 350.It comprises the information of the main image of method (1) needs, less important image or both contents; Method (2) need be about any knowledge of picture material.Two kinds of Method types all need to be used to encode and embed the coding parameter of less important image.
As described in ' 350 applications, can use image acquisition equipment to scan or digitally catch printed encoded image.Term " image acquisition equipment " is meant and is used to catch or the establishing any being equipped with or system of the digital picture of spanned file or object or its target part as used herein.Image acquisition equipment including, but not limited to scanner, digital camera, have the system of the combination of analog video camera and frame grabber.Image acquisition equipment can be suitable for using visible light and invisible light (as UV and the IR) part in the electromagnetic spectrum to catch image.
Can handle the coded image (that is, having scanned or used the digitally captured printed encoded image of image acquisition equipment) of being caught by being suitable for using the processor that one or more decoding algorithms based on software produce decoded result.Method use such as the optical character identification (OCR), decoding processor can also be suitable for extracting mark and/or the information in the decoded picture, and the mark that extracted and/or information and predetermined authentication criterion are compared.As described below, decoding processor can be positioned at the position away from image acquisition equipment.
With reference now to Fig. 2,, the coded image that Basic Authentication method M100 according to the present invention can digitally decode and be caught.Method M100 can be used for the checkout object to determine whether to have used to this tested object the coded image of expectation, and the coded image of expectation has been applied to all authentication objects.Be typically referred to as by mandate source or authorization at this employed term " authentication " and produce object.The coded image of expectation is the version of code of predetermined authentication image.The coded image of expectation can be identical for each tested object, or for the different code-change image of each object.Can suppose not carry any object of expecting coded image and indicate non-authentication property, or indicate applied object or mark also not to change.
Method M100 is in S100 and the beginning of S110 place, and the use image acquisition equipment is caught the digital picture of authentication object and begun.The digital picture of being caught can comprise all or part of object, as long as it comprises that the expectation coded image will be applied to the target area on the authentication object.Can dispose the digital picture of being caught so that only catch the target area, maybe can be configured to the target area be comprised in wider in.Under any situation, the image of being caught can also comprise can discern leading mark, is used for discerning the target area part with suitable directed digital picture of being caught.At S120, the digital picture of catching is sent to certified processor.As discussing, some or all of certified processors can coexist and (that is, catch the position of the digital picture of tested object) in the checkpoint, and some or all of certified processors can be away from the checkpoint.In either case, certified processor can be connected with image acquisition equipment by network.
Certified processor can be configured to some or all remaining steps of automatic execution method M100.At S130, certified processor is identified for encoded authentication image to produce one or more coding parameters of expectation coded image.Parameters needed quantity can depend on employed concrete digital decoding method.Can from the data storage that when encoding, is provided with, obtain coding parameter.This data storage can be certified processor a part or with the certified processor ground that coexists, maybe can be arranged on independent data base processor or server that certified processor can be visited by network.Data storage can also be taked the form of magnetic stripe, laser card, smart card, processor chips, memory chip or bar code, and it can use or invest the object of having used coded image, or is associated with described object.Coding parameter and/or authentication image can be the object special uses, or can be constant for the specific collection of object.In certain embodiments, can ask receiving unit or all coding parameters, or determine according to picture material with coding.
Can utilize object boundary mark (landmark) to come the target area of directed digital picture of being caught at the S140 certified processor so that decoding.These boundary marks can be based on the intrinsic geometry of object, or can specifically be applied in coded image when being applied to authentication object.In the later case, the appearance of this boundary mark can be used as the initial authentication inspection.One of ordinary skill in the art will appreciate that if use following mode to come capture digital image: with respect to the accurately directed in the same manner all the time object of image acquisition equipment object, the numeral that then need not captured images is directed.For example, if tested object is can be by scanning pinpoint file, then the orientation of target area can enough be stablized, and the orientation of the digital picture of being caught is unnecessary.
In case the directed target area of institute's capture digital image, at S150, certified processor is applied to digital decoding method the digital picture of being caught to generate decoded result.Then, at S160, decoded result and authentication criterion are compared to determine authentication result.This can finish by the demonstration and the decoded result of the visual comparison of authentication image.Alternatively, OCR or other Figure recognition software can be used for the comparison of decoded result and authentication image.Comprise in authentication image under the situation of object specific information, the information content of decoded result can compare with the information that directly comes from object, rather than original authentication image.
At S170, determine based on the decoded result and the authentication of relatively making of authentication criterion.Should determine and to make or to make automatically the observation of decoded result by the people by certified processor.Under any situation, authentication result can be stored and/or return to the requestor of user or other mandate.In an embodiment, authentication is determined to make in the position away from the checkpoint, and authentication is determined to be sent to the checkpoint.This method finishes at S180.
With reference to figure 3, can utilize to comprise that digital picture obtains the object Verification System of equipment 110 and certified processor 120 and carry out the method according to this invention M100 and other method.Object Verification System 100 can also comprise encoded information database 130, and encoded information database 130 is included in the certified processor 120 or with certified processor 120 and communicates.Object Verification System 100 is configured to check and the authentication test object, to verify the authentication image that has coding on it.The some or all coding parameters and the authentication image that are used for encoded authentication image can be stored in encoded information database 130, so that be addressable for certified processor 120.
Image acquisition equipment 110 can be any apparatus that is suitable for being recorded to the digital picture of small part tested object, and described tested object comprises the target area that encoded authentication image is applied to authentication object.Certified processor 120 can be that configuration is used to receive the arbitrary data processor with processing digital images.Certified processor 120 comprises image receiver module 122, be used for optionally communicating by letter with image acquisition equipment 110, and reception is from institute's capture digital image of image acquisition equipment 110.Image receiver module 122 is sent to image processing module 124 with the digital picture of being caught.The digital picture of being caught also can be stored in the database in the certified processor.Image processing module 124 can be suitable for carrying out any required preliminary treatment before the digital picture of being caught of can digitally decoding.This can comprise the boundary mark of identification object region and directed in view of the above digital picture of being caught.
Certified processor 120 can also comprise decoder module 126 and authentication module 128.Can utilize the digital decoding software decoder module 126 of programming, described digital decoding software is suitable for carrying out one or more decoding algorithms to produce decoded result for the digital picture of being caught.Decoder module 126 can obtain the required any information (for example authentication image and decoding parametric) of coded image that decoding is caught from encoded information database.Decoded result can be sent to authentication module 128, and it compares decoded result to generate authentication result with one or more authentication criterions.Decoded result, authentication result or both can be stored in the memory, or in the database of Local or Remote, or are shown to inspector or other user of checkpoint.
The parts of Verification System 100 can interconnect via the suitable means that comprise by network.Certified processor 120 can adopt can be by single inspector in company with handing the portable processing apparatus form (as portable scanner or digital camera) that image acquisition equipment carries.In some embodiments of the invention, in fact image acquisition equipment and certified processor can be integrated in the individual unit.Alternatively, the inspector can only carry the numeral that optionally is connected to remote authentication processor 120 and obtain equipment 110.For example, scanning device can be configured to send the image caught to certified processor by Email.In another example, the radio telephone with imaging capability can be used to catch image and be forwarded to certified processor by communication network.The practical application of this respect is following scene: the possible buyer of product utilizes camera phone to catch the image of product, and sends an authentication request to certified processor.Authentication result can return to the requestor by telephone network, for example text message.
Verification System 100 also is suitable for using in the authentication of a large amount of similar objects, for example, and the packing item in the warehouse or a large amount of similar files.Can adaptive certified processor 120, so that can import or from the digital picture of being caught, derive the information relevant with single object.The digital picture that this permission is caught is related with special object.Therefore also allow the coded image that retrieving is used to decode is caught or be used for determining the required object own coding information of authentication result.
Be appreciated that if coded message is not the object special use, can utilize the single set of coded message to authenticate to have one group of tested object of equating expections coded image by certified processor 120.The set of this coded message can once obtain from encoded information database 130, and be stored in that decoding and authentication module are 126,128 addressable, in the memory of certified processor 120.
Need on single treatment facility, not carry out the function of certified processor.They can be distributed in a plurality of processors by network interconnection.In addition, decoding can be stored in different user by in the database of identical or different network-accessible from the required information of the coded image of being caught of tested object and decoding and authentication result.With reference to figure 4, Verification System 200 comprises one or more inspection processors 220, certificate server 240 and the database server 250 that optionally communicates each other by one or more networks 230,270,280.
Each checks that processor 220 communicates with one or more relevant image acquisition equipments 210, and described image acquisition equipment 210 is suitable for catching the digital picture of the object of partial test at least that will authenticate.Each checks that processor 220 can comprise image receiver module 222, is suitable for receiving the digital picture from data acquisition facility 210.Check that processor 220 can also comprise data transmission blocks 224, be suitable for comprising that by 280 transmission of first network authentication request of the digital picture of being caught is to certificate server 240.Selectively, sending module can send the digital picture of being caught and arrive database server, is used for authentication subsequently.Check that processor 220 can be configured for the data that input is associated with the object of therefrom having caught the optional network specific digit image.Selectively, check that processor can be equipped with the software that is used to handle the digital picture of being caught, with the identification information relevant with object with storage.For example, the digital picture of being caught can comprise discernible mark, as bar code or the numeric identifier that can encode, so that the information relevant with object to be provided.
Alternatively, check that processor 220 comprises image processing, decoding and the authentication module of oneself similar to the certified processor 120 of aforementioned Verification System 100.Can will maybe can store so that use subsequently by checking that decoding that processor produces and authentication result can be compared with the result who obtains from certificate server.In order to be beneficial to picture decoding, check that processor 220 can be configured to by second network 230 identical with first network 280 from database server 250 retrieve encoded parameter and/or authentication image.
Sending module 224 can be suitable for sending authentication request by first network 280.Except the digital picture of being caught, the request of transmission also comprises the additional information that is associated with the object of therefrom having caught digital picture.This can comprise by any decoding or the authentication result of checking that processor 220 produces.Can directly digital picture and any relevant information of being caught be sent to certificate server 240, or can temporarily be stored in database server 250 or other server, so that subsequently by certificate server 240 visits.Authentication request can also comprise additional information, as with position of particular exam processor and/or inspector/user-dependent information, user security information (for example the user name and password), checkpoint etc.
Certificate server 240 can comprise data reception module 242, is configured to from checking that processor 220 receives the digital picture and the relevant information of being caught.Data reception module 242 can be selected a ground or additionally be configured to and retrieve this information by second network 230 or different networks from database server 250.Data reception module 242 can be suitable for verifying user's voucher and provide turning back to the request affirmative acknowledgement of checking processor.If data reception module 242 can also be configured to user's voucher or the security information indication request that provided does not satisfy predetermined authorization criteria, then send the refusal of authentication request.
Certificate server 240 comprises and similar image processing, decoding and the authentication module 244,246,248 of the certified processor 120 of aforementioned Verification System 100.When obtain from authorized user authentication request and this authentication request and correlative coding information can with object when being associated, data reception module sends the digital picture of being caught to image processing module 244, to initiate decoding processing.One or more certificate server modules 242,244,246,248 can be suitable for the information of retrieve stored in database server 250.Database server 250 can comprise coded message server 252, has wherein stored some or all authentication image and the coding parameter of the authentication image that is associated with authentication object of being used to encode.Be appreciated that and store this coded message at a large amount of uncorrelated authentication object and the group of objects of different user.Retrieve this information based on the object information that provides with authentication request, or derive this information from the digital picture itself of being caught.Decoder module 242 can use the information that retrieves to generate decoded result, and authentication module 248 can use the information that retrieves to generate authentication result.
Certificate server 240 can also comprise sending module 249 as a result, is suitable for assembling and sending the authentication request response that comprises authentication result.In following examples, the request response can also comprise decoded result and/or other object-related information.Can will ask response to send to by first network 280 and check processor 220 or other preassigned receiving terminal.Select a ground or additionally send authentication results, decoded result or both, so that be stored in the authentication database 254 by second network 230.Other server that authentication database 254 can reside in database server 250 or be connected with network 230.One or more authentication monitoring processors 260 can pass through optionally access registrar database 254 of the 3rd network 270.This allows authorized user access registrar database to monitor authentication information and statistics single or accumulation.
Be appreciated that network 230,270 and 280 can be identical or different network.Any or all these networks can be the forms of local area network (LAN) or wide area network.For example, any or all these networks can be or comprise the internet, with a large number of users use that allows extensively to distribute.Network 280 can also be a communication network, can send digital picture from the image acquisition equipment of for example camera phone based on this network.The module and the function that are further appreciated that certificate server 240 can be in a plurality of servers that are distributed in interconnection and processors.
Verification System of the present invention has higher flexibility and can be widely used in multiple authentication scene.In the typical scene, encoded authentication image is applied to the packing of the product of the client manufacturer of being palmed off or forging.Can send the site inspection person that is equipped with portable inspection processor and image acquisition equipment to as the place in the warehouse of a large amount of packaging products of storage and so on.The inspector can utilize image acquisition equipment to scan or catch the digital picture of the target area of suspect product packing.Can import additional information by the inspector, as date, time, position, product ID etc.Alternatively, by checking the automatic importation of processor information.Be equipped with decoding and the authentication software of himself if check processor, then the inspector can authenticate suspect product immediately.Select a ground or additionally, check that processor can also be used for submitting authentication request to remote authentication server.Can send authentication request based on single project.Selectively, can gather the authentication image and relevant product information of being caught, and submit to as the part of single authentication request at a plurality of test events.For example, this makes it possible to use to check processor, and is connected with the networking irrelevant, thereby from a plurality of test events, gather verify data, be connected to network (as signing in to the Internet) then, to submit the single authentication request of criticizing to.
When receiving when checking the authentication request of processor, certificate server checking request, retrieval required image coding information arbitrarily from encoded information database, and handle the digital picture of being caught.The decoding image of being caught is also compared with the authentication criterion that retrieves, to determine authentication result.Then, authentication result can be stored in the authentication database.Then, by being connected to authentication database, the representative of manufacturer or other authorized user can the access registrar result.In certain embodiments, this can be by signing in to the controlled website of safety and submitting to the authentication result request at tested object to realize.
In certain embodiments, certificate server can be configured to pass through website visiting.Authorized user can Website login, uploads scan image, and receives authentication result immediately by its browser.The result can also be stored in the authentication database, be used for and to visit.
In certain embodiments, can use interface and data statement standard to realize based on network authentication service.For example SOAP and XML are so that the third party can link to each other with software its information service with authentication service.This method can realize seamless authentication request/response flow in various platforms and software application.
As mentioned above, can utilize the individual data processor to carry out the function of Verification System of the present invention and the action of authentication method, or be distributed in a plurality of processors of interconnection.For example, in certain embodiments, can carry out decoding and authentication function by different processors.Can utilize single processor or a plurality of network processing unit to carry out decoding function itself.
Fig. 5-7 has demonstrated according to type solution code system of the present invention.With reference to figure 5, the system 300 that is used for the digital picture that digital decoding catches is one-of-a-kind systems, can include only single decoding processor 310 and image acquisition equipment 320.Decoding processor 310 is configured to receive the digital picture of being caught from data acquisition facility, and handles as required, so that decoded result to be provided.Can utilize the required software of the specific decoded digital method of application to dispose decoding processor 310.The required some or all coded messages of decoding software can be stored in decoding processor 310 and/or can be provided by the user.
Typically, decoding processor 310 comprises screen or printer, makes the user of unit decode system 300 can scan packing or file, and sees decoded results immediately.The result can store, or can use separately, as " disposable (onthe the spot) " check system that abandons after watching user/inspector.
Another kind of decode system method is provided, so that gather a plurality of images of catching and relevant Item Information, then, can be that unit sends to concentrated decoding processor or server to criticize with it.With reference to figure 6, the decode system 400 of the type can comprise one or more inspection posts, and each inspection post has the image acquisition equipment 420 of checking processor 410 communications, and resident on the described inspection processor 410 have an image processing application program.In typical embodiment, image acquisition equipment 420 can be a scanner, and the image processing application program is configured to receive the scan image from scanner.Can be separately or the concentrated area scan image is sent to data collection processor 430.Data collection processor 430 can optionally be communicated by letter with checking processor 410 by network.In certain embodiments, inspection processor 410 can be configured to once gather and submit to a plurality of images to arrive data collection processor 430 with relevant object information.
Scan image can the information relevant with scanned objects or file send together.Data collection processor 430 is suitable for receiving the image of being caught and relevant object information from the inspection processor 410 of any amount.The image and relevant object information of being caught be can gather simultaneously, and decoding processor or server 450 submitted to by network 440.In a particular embodiment, network 440 is internets, can pass through web page access decoding processor 450.Monitoring processor 470 can visit the decoded result that decoding processor 450 generates by second network 460 identical with first network 440.
Utilizing decode system 400 in typical case, the inspector utilizes image acquisition equipment 420 scanning packaging label or files, and provides suitable information (as the position of collecting packing, date and time, product ID etc.) at each image of catching.When finished working day, the image of scanning and corresponding date were with the wholesale decoding processor 450 of decoding of giving.Decoded result can be stored in the decoding processor or the database that separates in.Decoded result can be by monitoring processor 470 visits of authorizing.In a particular embodiment, decoded result can receive also by the internet and can use web browser to watch, and web browser shows all scannings and decoded picture, and other data that provided by the inspector when scanning.
Information gathering that data acquisition that separates and decoding can distribute and the based on network decoding of concentrating.This can also the centralized stores decoded result, and is beneficial to automated validation.Can in the member of particular group of users (as brand protection group), share the result, and check by their management.The analysis of accumulation results can help to detect the whole world and local personation trend.The efficient of the current deterrence measure of seeing clearly different markets also is provided.Data acquisition and decode operation separate and independently another advantage be that the consumer can employ the contractor to scan packing in certain market, and need not to leak about packing the details of anti-counterfeiting characteristic.In addition, the inspector does not need continual network insertion, only need connect decoding processor (for example, working day or work week finish) once in a while.
Yet in some cases, the inspector may need to authenticate single project.If network insertion can be used when image is caught, then the collecting method of Fen Buing may unnecessarily postpone decoding and authentication.In addition, the method for distribution may need to exist special-purpose software to satisfy a plurality of file loadings from client end processor to central processing unit, and guarantees the integrality of this exchanges data.The optional model that is used for single decoding function is a kind of web application, is provided for uploading the single scanning document that is used to decode and receives immediately and show decoded picture.It is particularly useful that this model uses web browser to sign in in the decoding system environments website, based on the internet the inspector.Use the website, the inspector can upload single image of catching, and on his browser reception/demonstration decoded result.Need the individual of authentication individual packaging product to be extensive use of this method.For example, can be used for wishing to authenticate the pharmacists of single medicine packing, or wish to check the inspector of law court of single bank note or ID card.Only the equipment of Xuing is scanner (or other image acquisition equipment) and computer, and described computer can link to each other with internet, Intranet or by its other communication network that can arrive decoding server/processor.
Fig. 7 has demonstrated the based on network decode system 500 according to the embodiment of the invention.Decode system 500 can comprise one or more inspection processors 510, optionally communicates by letter with decoding server 540 by network 530.Each checks that processor 510 can have relevant image acquisition equipment 520, is used for capture digital image and sends to inspection department's reason device 510.Be appreciated that image acquisition equipment 520 and check that processor 510 can be combined as single processing unit.In typical enforcement, image acquisition equipment 520 is scanners, checks that processor 510 is configured to receive the scan image from scanner, and optionally it is uploaded to decoding server 540.
Network 530 can be a random communication network, for example internet, Intranet, cellular network or other communication network.In the specific embodiment of decode system 500, network 530 is internets, checks that processor 510 is equipped with web browser to set up by the website of decoding server 540 management and communicating by letter of decoding server 540.This provides the interaction capabilities with based on network decoding processing, and wherein the digital picture of being caught is uploaded to decoding server 540, and decoding server 540 is handled so that decoded result to be provided.Then, decoded result is turned back to the inspection processor, so that show and printing.
Decoding server 540 can comprise or have the one or more databases of visit, has wherein stored coded message at the specific user, is used to use suitable coding/decoding method.This information can be relevant in advance with product line, even relevant with specific products or file.Can also storing subscriber information and/or access rule, so that decoding server 540 can determine whether to authorize particular user login to system or receive specific decoded result.
Fig. 8 has been provided by a kind of digital image decoding service method that provides in conversation-based interactive network.Method starts from S200.At S210, login page is sent to the inspection processor for demonstration by web browser or similar application program.At S220, receive logging request from checking processor.Logging request can comprise the user profile of the user name and password and/or other needs.At S230, whether to determine login effective, and should set up the decoding session if checking log-on message.If log-on message is not associated with the validated user account, or relevant security information is not complementary with specific user's information, and then method proceeds to S232, carries out and checks to determine whether to reach the continuous login failure of predetermined number.Turn back to S210 if no, send error message and described method.Reach predefined failure restriction, stopped user account and in the S236 method ends at S234 so.
If receive effective login, this method proceeds to S240, based on obtaining coded message with user account and/or the information that is associated by the information that user interactions provides.For example, the information that provides of user can comprise product or file identification.Can from this information wherein and database that user and/or product information are associated, obtain coded message.Specific coding information can also be included in the information that the user provides.
The information that the user provides can be included in the prompting that maybe can respond the inspection processor that sends to the user in the logging request and provide.In specific embodiment, decoding server can be stored thereon and maybe can be visited and user or the related in advance one or more decodings configurations of user class.These decoding configuration expressions can be used to decode option of captured images of different product, file or other object.When having verified specific user's login, decoding server can be retrieved the decoding configured list that is associated with the user, and tabulation is sent to the inspection processor, so that be shown to the user.Then, the user can select decoding configuration, and described decoding configuration is suitable for the object of having caught in the digital picture that will decode.When receiving user's selection, so the required coded message of image that decoding processor can obtain to decode and be caught.
Specific decoding configuration may need capture digital image in a particular manner.For example, may must come scan image with particular orientation.Therefore, at S250, alternatively, scan instruction is sent to the inspection processor so that show.Then, the user can be scanned or with other suitable mode capture digital image and upload to decoding server.
At S260, receive the digital image file of being caught from user/decoding requestor.At S270, coded message and suitable coding/decoding method are used to handle the digital picture of being caught and obtain decoded result.At S280, decoded result is sent to the user that can show or print.Can in specific interactive sessions, upload and the appended drawings picture of any amount of decoding.At S290, receive de-registration request and in the S299 method ends.
Can easily understand those skilled in the art, the present invention has practicality and application widely.Under the prerequisite that does not break away from essence of the present invention or scope, except described herein, a plurality of embodiment of the present invention and adaptive and a plurality of variant, revise and be equal to that to be provided be conspicuous, or the present invention and advising in preceding description.
Although specific embodiments of the invention have been demonstrated and described in the front, be appreciated that the present invention is not limited to structure disclosed herein.Not under the prerequisite of its spirit or intrinsic propesties, the present invention can be presented as other particular form.

Claims (29)

1. whether a definite object is the method that has been employed the authentication object of expectation coded image, comprises by use that the set of one or more coding parameters is encoded to authentication image and constructs described expectation coded image, and this method comprises:
If tested object is an authentication object, the digital picture acceptance test object, that comprise at least a portion of the target area that will be employed the expectation coded image;
Determine one or more coding parameters; And
With the digital decoding algorithm application to the digital picture of catching, to produce decoded result.
2. according to the process of claim 1 wherein, carry out reception, determine and using action by decoding server, and receive from the digital picture of checking processor by network.
3. according to the method for claim 2, wherein, described network is the internet.
4. according to the method for claim 2, wherein, described network is a telecommunications network.
5. according to the process of claim 1 wherein, determine that action comprises: the described one or more coding parameters of retrieval from the decoded information database.
6. according to the method for claim 1, also comprise:
Decoded result and object authentication criterion are compared, to produce authentication result.
7. according to the method for claim 6, wherein, by certificate server carry out receive, determine, application and comparison, and receive from the digital picture of checking processor by network.
8. according to the method for claim 7, wherein, receive digital picture with the authentication request of object.
9. method according to Claim 8, wherein, authentication request comprises at least one in the set that is made of following content: object information, check processor information, applicant information, the user name and password information and check positional information.
10. according to the method for claim 6, also comprise:
From decoded result, extract coded markings.
11. according to the method for claim 10, wherein, relatively the action of decoded result comprises:
From encoded information database, retrieve authentication image; And
To separate code labeling and the authentication image mark compares.
12. according to the method for claim 10, wherein, comparison comprises:
To separate code labeling and the object specific information compares.
13., wherein, receive the object specific information with digital picture according to the method for claim 12.
14. according to the method for claim 12, wherein, searching object specific information at least one from the set that constitutes by following content: database, smart card, magnetic stripe, bar code, processor chips and storage chip.
15., wherein, from digital picture, extract the object specific information according to the method for claim 12.
16. the method according to claim 6 also comprises:
In authentication database, store at least one in the set that constitutes by decoded result and authentication result.
17. the method according to claim 6 also comprises:
Reception is from the request as a result of the authentication result of monitoring processor;
Determine whether request as a result is effective; And
Effectively determine in response to request as a result, send authentication result to monitoring processor.
18., wherein,, and send authentication result to monitoring processor by the request as a result of network reception from monitoring processor according to the method for claim 17.
19. according to the method for claim 18, wherein, network is the internet.
20. whether a definite tested object is the system that has been employed the authentication object of expectation coded image, comprises by use that the set of one or more coding parameters is encoded to authentication image and constructs the expectation coded image, this system comprises:
Digital picture is obtained equipment, is suitable for catching the digital picture of at least a portion of tested object;
Data handling system has:
The image receiver module is suitable for obtaining equipment from digital picture and receives digital picture;
Encoded information database is configured to store at least one in the set of the set be made up of authentication image and one or more coding parameters;
Decoder module is suitable for the coded image decoding algorithm is applied to digital picture, to produce decoded result; And
Authentication module is suitable for decoded result and object authentication criterion are compared, to determine authentication result.
21. according to the system of claim 20, wherein, data handling system comprises the inspection data processor, described inspection data processor comprises the image receiver module.
22., wherein, check that data processor also comprises at least one in the set that is made of decoder module and authentication module according to the system of claim 21.
23., wherein, check that data processor comprises also optionally and the data transmission blocks of network service that described data transmission blocks is suitable for by the Network Transmission digital picture, wherein according to the system of claim 21
Data handling system also comprises certificate server, and described certificate server comprises optionally with network service and is suitable for receiving the data reception module of the digital picture of self-check data processor.
24. according to the system of claim 23, wherein, certificate server comprises at least one in the set of being made up of decoder module and authentication module.
25. according to the system of claim 23, wherein, data handling system also comprises database server, described database server comprises encoded information database, database server optionally with network service.
26. according to the system of claim 20, also comprise the authentication result database, be suitable for the authentication storage result.
27. whether a definite tested object is the system that has been employed the authentication object of expectation coded image, comprises by use that the set of one or more coding parameters is encoded to authentication image and constructs described expectation coded image, this system comprises:
At least one digital picture is obtained equipment, is suitable for catching the digital picture of at least a portion of tested object;
At least one checks data processor, comprising:
The image receiver module is suitable for receiving the digital picture of obtaining the correlated digital image acquisition equipment in the equipment from least one digital picture,
Data transmission blocks, optionally with first network service, described data transmission blocks is suitable for sending digital picture by first network;
Certificate server comprises:
Data reception module optionally with first network service, is suitable for receiving the digital picture of checking data processor from least one,
First decoder module is suitable for the coded image decoding algorithm is applied to digital picture, with produce decoded result and
First authentication module is suitable for decoded result and object authentication criterion are compared, to determine authentication result;
First database server comprises:
Encoded information database is configured to store at least one in the set of the set that is made of authentication image and one or more coding parameters.
28. system according to claim 27, also comprise second database server, optionally communicate by letter with certificate server, second database server comprises the authentication result database, and wherein second database server can be the server identical with first database server.
29. system according to claim 28, also comprise the authentication monitoring processor, optionally communicate by letter with second database server by second network, the authentication monitoring processor is suitable for asking and receives authentication result information from second database server, and wherein second network can be the network identical with first network.
CNA2005800486019A 2005-02-28 2005-08-23 System and method for network-based object authentication Pending CN101160772A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US11/068,350 US7512249B2 (en) 2004-04-26 2005-02-28 System and method for decoding digital encoded images
US11/068,350 2005-02-28
US11/207,437 2005-08-19

Publications (1)

Publication Number Publication Date
CN101160772A true CN101160772A (en) 2008-04-09

Family

ID=39307998

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2005800486019A Pending CN101160772A (en) 2005-02-28 2005-08-23 System and method for network-based object authentication

Country Status (2)

Country Link
CN (1) CN101160772A (en)
ZA (1) ZA200707192B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106778402A (en) * 2016-12-27 2017-05-31 张家港市欧微自动化研发有限公司 For the test device and method of testing of test-strips shape code decoding algorithm
CN108701272A (en) * 2016-02-29 2018-10-23 因温特奥股份公司 Enter mandate using mobile monitoring device inspection

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108701272A (en) * 2016-02-29 2018-10-23 因温特奥股份公司 Enter mandate using mobile monitoring device inspection
CN106778402A (en) * 2016-12-27 2017-05-31 张家港市欧微自动化研发有限公司 For the test device and method of testing of test-strips shape code decoding algorithm
CN106778402B (en) * 2016-12-27 2018-11-16 赣州东辰科技有限公司 Test device and test method for test-strips shape code decoding algorithm

Also Published As

Publication number Publication date
ZA200707192B (en) 2008-08-27

Similar Documents

Publication Publication Date Title
US7558401B2 (en) System and method for network-based object authentication
US7860268B2 (en) Object authentication using encoded images digitally stored on the object
US8019115B2 (en) Object authentication using a portable digital image acquisition device
KR100774058B1 (en) The authentication system and the authentication method which use a portable communication terminal
JP2007272320A (en) Entry management system
US20050177726A1 (en) Method and system for controlling encoded image production using image signatures
CN105827612B (en) Salary payment system based on mobile internet service application
JP7090938B2 (en) Dynamic 2D code evaluation method, dynamic 2D code evaluation system, and dynamic 2D code evaluation program
CN101160772A (en) System and method for network-based object authentication
CN101124589A (en) System and method for authenticating objects using multiple-level encoding and decoding
CN107944326A (en) A kind of data capture method, data processing method and system
CN101296299A (en) A system and method for determining whether a test object is an authentic object
KR102085561B1 (en) QR code forgery prevention apparatus and method
WO2022174354A1 (en) Identity-based enablement of event access control
AU2017227932B2 (en) Checking access authorizations using mobile control devices
JP2009169838A (en) Questionnaire statistical system
CN112418371A (en) Secure three-dimensional code for blockchains and methods of generating and decoding
CN111766244A (en) Anti-counterfeiting element verification method and system
JP2008061178A (en) Authentication server, enterpriser server and e-commerce method
GB2600924A (en) Information encoding
CN114979536A (en) Method for making credit card and its module and system
Paras Two Level QR Code for Document Authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20080409