CN117745306A - Commodity anti-counterfeiting method based on visual identification - Google Patents

Commodity anti-counterfeiting method based on visual identification Download PDF

Info

Publication number
CN117745306A
CN117745306A CN202311803660.9A CN202311803660A CN117745306A CN 117745306 A CN117745306 A CN 117745306A CN 202311803660 A CN202311803660 A CN 202311803660A CN 117745306 A CN117745306 A CN 117745306A
Authority
CN
China
Prior art keywords
dimensional code
commodity
visual identification
steps
counterfeiting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311803660.9A
Other languages
Chinese (zh)
Inventor
赵策
孙世国
胡振升
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Hailian Yimao Shandong Information Technology Co Ltd
Original Assignee
Inspur Hailian Yimao Shandong Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Hailian Yimao Shandong Information Technology Co Ltd filed Critical Inspur Hailian Yimao Shandong Information Technology Co Ltd
Priority to CN202311803660.9A priority Critical patent/CN117745306A/en
Publication of CN117745306A publication Critical patent/CN117745306A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a commodity anti-counterfeiting method based on visual identification, which mainly generates a unique two-dimensional code through an advanced coding algorithm. The two-dimensional codes are combined with various character sets, dynamic information and a safe encryption layer are embedded, and data safety and information real-time updating capability are improved. And a high-precision printing technology is adopted to manufacture the two-dimensional code on the special material, and hidden safety features such as micro-characters are added to improve durability and tamper resistance. The software system allows the flexible editing of the commodity information in the two-dimension code, supports the multimedia content and ensures the data security. In addition, efficient visual recognition systems have been developed, including algorithms such as edge detection and pattern recognition, to ensure accurate recognition under a variety of conditions. In the verification process, the system automatically records the time stamp and the geographic position, and confirms the authenticity of the commodity through background comparison data. The invention provides a comprehensive anti-counterfeiting solution for the whole life cycle management of the commodity, and combines the safety, dynamic updating and user friendliness.

Description

Commodity anti-counterfeiting method based on visual identification
Technical Field
The invention belongs to the technical field of commodity anti-counterfeiting, and particularly relates to a commodity anti-counterfeiting method based on visual identification.
Background
Commodity anti-counterfeiting technology is a key component of modern supply chain management and consumer protection. With the development of technology, various anti-counterfeiting methods have been widely used, including but not limited to bar codes, magnetic labels, radio Frequency Identification (RFID) technology, and the like. However, with advances in counterfeiting technology, existing anti-counterfeiting methods for goods face some challenges.
The prior art has the following disadvantages:
1. easy to imitate: many conventional anti-counterfeiting techniques, such as bar codes and simple two-dimensional codes, become easily imitated and tampered with due to their relatively simple coding and construction. This not only reduces the effectiveness of the anti-counterfeiting technique, but also makes it difficult for consumers to distinguish between authenticity.
2. Lack of dynamic information update: conventional anti-counterfeiting techniques generally provide only static information, such as lot number or date of manufacture, and cannot provide dynamically updated information, such as logistics tracking or product status. This limits the application of security labels in full life cycle management of goods.
3. The verification process is complex: for anti-counterfeit technologies that require specialized equipment or expertise to verify authenticity, such as certain chemical markings or special textures, it is difficult for an average consumer to verify. This complexity limits the popularity and effectiveness of anti-counterfeiting techniques.
Disclosure of Invention
The invention mainly aims to provide a commodity anti-counterfeiting method based on visual identification, which can effectively solve the problems related to the background technology.
In order to achieve the purpose, the invention adopts the technical means that:
a commodity anti-counterfeiting method based on visual identification comprises the steps of generating a unique two-dimensional code, wherein the two-dimensional code is combined with a marker to serve as an identity ID of a commodity, and integrating images, word descriptions, production batches, production dates, production places and logistics tracking information of the commodity.
Furthermore, the two-dimensional code is generated by adopting a coding algorithm, the coding algorithm converts the selected characters into binary data based on character set modes such as numbers, letters, chinese characters and the like, and the size and the structural layout of the two-dimensional code are determined according to the required data capacity and the scanning distance.
Furthermore, the two-dimensional code is manufactured on durable and tamper-resistant materials by adopting a high-precision printing technology, and the form comprises sticky tape, watermark or direct printing on commodity packages, so that the physical safety of the two-dimensional code is enhanced, and the two-dimensional code is prevented from being illegally copied or reused.
Further, the two-dimensional code coding process comprises the step of editing and modifying the two-dimensional code by using a handheld coding device so as to add or modify commodity information, including text description, images, official website links or other multimedia contents related to commodities.
Further, the method comprises a one-step visual identification feature extraction process, which comprises the steps of extracting key visual features from original image data, including image preprocessing, feature point detection, feature point coding and feature optimization.
Further, the time stamp is stored in an ISO8601 international standard format and is used for recording the time and date of each scanning or verification activity of the two-dimensional code.
Further, the method comprises a one-step two-dimension code verification process, wherein the process involves the steps of scanning the two-dimension code by using mobile equipment, performing advanced image comparison by a background system, and comparing a scanning result with original two-dimension code information in a database to verify the authenticity and origin of the commodity.
Further, the time stamp verification technology is used for recording time and frequency of each scanning activity of the two-dimensional code and geographic position information of a scanner.
Further, a security encryption measure is implemented in the two-dimensional code generation process, for example, advanced Encryption Standard (AES) or other encryption technology with equal security is used to ensure confidentiality and tamper resistance of the two-dimensional code data.
Furthermore, the combination of the two-dimensional code and the visual identification technology is not only used for realizing the anti-counterfeiting of the commodity, but also used for monitoring the circulation condition of the commodity in the whole supply chain, and realizing the management and tracking of the whole life cycle of the commodity.
Compared with the prior art, the invention has the following beneficial effects:
1. the security and the difficult imitation of the anti-counterfeiting technology are improved: advanced two-dimensional code designs in this invention employ complex data encoding and encryption techniques including, but not limited to, advanced Encryption Standard (AES) and dynamic data generation mechanisms. The advanced encryption ensures the security of the two-dimension code data and greatly increases the difficulty of copying or falsifying by counterfeiters. Compared with the traditional bar code or the simple two-dimensional code, the complex security measures greatly reduce the risk of counterfeiting and effectively prevent counterfeiting and fraud.
2. Dynamic information update and full lifecycle management: compared with the traditional anti-counterfeiting technology, the two-dimensional code can integrate information updated in real time, such as logistics tracking data, product states and production batch information. This function not only provides more data than static information, but also tracks the overall process of the commodity from production to final consumption. This dynamic data update capability enables an enterprise to monitor its products in real time while providing more transparent product information to consumers.
3. A simplified and easily generalized verification process: the invention uses widely popularized smart phones and mobile devices as verification tools, and consumers can verify the authenticity of commodities without professional knowledge or additional devices. Through a simple scanning action, the consumer can quickly receive feedback on the authenticity and related information of the commodity. This simplified authentication process not only increases the ease and popularity of anti-counterfeiting techniques, but also enhances consumer trust and loyalty to brands.
Detailed Description
The subject matter described herein will now be discussed with reference to example embodiments. It should be appreciated that these embodiments are discussed only to enable a person skilled in the art to better understand and thereby practice the subject matter described herein, and are not limiting of the scope, applicability, or examples set forth in the claims. Changes may be made in the function and arrangement of elements discussed without departing from the scope of the disclosure as set forth in the specification. Various examples may omit, replace, or add various procedures or components as desired. For example, the described methods may be performed in a different order than described, and various steps may be added, omitted, or combined. In addition, features described with respect to some examples may be combined in other examples as well.
As used herein, the term "comprising" and variations thereof mean open-ended terms, meaning "including, but not limited to. The term "based on" means "based at least in part on". The terms "one embodiment" and "an embodiment" mean "at least one embodiment. The term "another embodiment" means "at least one other embodiment". The terms "first," "second," and the like, may refer to different or the same object. Other definitions, whether explicit or implicit, may be included below. Unless the context clearly indicates otherwise, the definition of a term is consistent throughout this specification.
Examples
1. Two-dimensional code generation
Firstly, the invention utilizes an advanced coding algorithm to generate unique and complex two-dimensional codes. The algorithm not only synthesizes a variety of character sets including numbers, letters and Chinese characters, but also specifically designs the data structure to generate complex binary sequences. The sequence construction method considers the characteristics of characters in the aspects of vision and data density, and ensures that the two-dimensional code has high data capacity and is easy to scan and recognize.
The selected character set is not only used for representing basic information of the commodity (such as product name, production lot, production date), but also is combined with a dynamic information segment, which is designed for updating logistics tracking information and product status in real time. For example, the data in the two-dimensional code may be linked to a central database that stores information such as logistics updates, inventory levels, and sales history of the product. Thus, each time the two-dimensional code is scanned, the latest information can be acquired and displayed.
In order to further improve the security, a security encryption layer is embedded in the two-dimensional code. This layer of encryption uses the Advanced Encryption Standard (AES) to ensure that data is not illegally accessed or tampered with during storage and transmission. The encryption mechanism not only protects the sensitive data embedded in the two-dimensional code, such as production details and logistics information, but also ensures that only authorized users and systems can decode and access the information. Furthermore, to combat more advanced counterfeiting techniques, encryption algorithms are regularly updated to maintain the highest level of data security.
The two-dimensional code generated by the advanced coding and encryption technology becomes a data carrier with strong functions and high safety, and provides a comprehensive identity and dynamic information updating platform for commodities.
2. Printing and material of two-dimensional code
In the present invention, the generated two-dimensional code is printed on a specially selected durable and tamper-resistant material using a high precision printing technique. The materials are carefully selected, so that the integrity and the readability of the two-dimensional code can be kept under various environmental conditions. For example, special waterproof paper is suitable for humid environments, while abrasion resistant plastic films are suitable for applications that are often rubbed or exposed to the open air. The material selection not only improves the durability of the two-dimensional code, but also enhances the stability and reliability of the two-dimensional code under different environmental conditions.
During printing, a series of covert security features are introduced to further enhance security. For example, micro-text technology is used to embed text in two-dimensional codes that is nearly invisible to the naked eye, which may contain manufacturing details, copyright information, or other authentication data. In addition, special ink and printing technology are adopted to realize a color gradient effect, and the effect is not easy to notice under common conditions, but can be used for confirming the authenticity of the two-dimensional code under professional equipment. These covert features are difficult for counterfeiters to replicate, thereby greatly improving the security of the two-dimensional code.
In order to further enhance durability, the surface of the two-dimensional code may be coated with a transparent protective film, which can resist scratches, chemical attack and ultraviolet irradiation, so as to ensure that the two-dimensional code remains clear and readable after long-term use. In addition, the materials and printing process selected both conform to environmental standards in view of environmental factors, ensuring that an efficient anti-counterfeiting solution is provided while also minimizing environmental impact.
3. Coding and editing of two-dimensional codes
In the invention, a set of special software system is developed for realizing effective management and updating of information in the two-dimension code. The system has the core function of allowing a user to endow and edit commodity information in the generated two-dimensional code through an intuitive and user-friendly interface.
The software interface design allows for ease and flexibility of operation. The operator can add or modify information in the two-dimensional code through simple drag and drop and click operations. Such information includes basic text descriptions, detailed image presentations, video links, and even interactive elements such as user surveys or feedback forms. The software also supports rich multimedia content editing functions, allowing operators to embed high resolution pictures and videos, as well as other forms of digital content, in two-dimensional codes.
In addition, the software has the ability to link the two-dimensional code with the merchandise database. The link not only allows real-time updating of information in the two-dimensional code, such as real-time inventory status, sales location, market feedback, and product updating, but also automatically adjusts the content in the two-dimensional code according to changes in the database. For example, when the stock level of the product changes or new user feedback is recorded, the relevant information in the two-dimensional code is updated immediately, so that the consumer can always receive the latest information.
The software also incorporates data security and privacy protection mechanisms. All information input or edited by software is encrypted, so that the security of sensitive data in the transmission and storage processes is ensured. The operator can also set the authority control to limit the access and editing to the specific information, further improving the security of the data.
4. Visual recognition and feature extraction
In order to ensure that the two-dimensional code can be accurately and efficiently identified in various environments, an advanced visual identification system is developed in the invention. The system adopts a series of advanced image processing algorithms, aims to optimize the identification process of the two-dimensional code, and ensures that accurate reading can be realized under any illumination condition or scanning angle.
First, the system adopts an edge detection algorithm to identify the boundary and shape of the two-dimensional code. This step is critical to identifying two-dimensional codes in complex background or irregular lighting conditions. By identifying the accurate edge of the two-dimensional code, the system can locate and analyze the data in the two-dimensional code more quickly.
Next, contrast enhancement algorithms are used to improve the visibility of two-dimensional codes, especially in the case of darker or reflective light. According to the algorithm, the brightness and the contrast of the image are adjusted, so that the black and white grids of the two-dimensional code are clearer, and the accuracy and the speed of identification are improved.
In addition, the system incorporates pattern recognition techniques that are capable of recognizing specific patterns and symbols in the scanned image. This applies not only to standard two-dimensional code patterns, but also to the identification of special design elements, such as security marks or corporate logos, that are imparted by the software. This increases the anti-counterfeiting performance while also providing additional brand recognition functionality.
The system also comprises a feature extraction module which is responsible for extracting key information such as coded data and security marks from the scanned two-dimensional code image. This module uses complex algorithms to analyze each pixel in the image to extract all necessary information for subsequent verification and processing.
5. Two-dimensional code verification and time stamp recording
The two-dimensional code verification and time stamping process in the invention is a key step for ensuring the authenticity of the commodity and tracking the history of the commodity. When a consumer or a verifier scans a two-dimensional code on a commodity using a smart phone or a dedicated scanning device, the system automatically triggers a series of verification and recording operations.
First, the system will record the exact time and date of each scan, using the ISO8601 international standard format. The time stamp in this format provides an accurate and uniform way of time recording that facilitates subsequent data analysis and tracking. In addition to the time stamp, the system also records geographic location information of the scanner. This is accomplished by the GPS functionality of the smart device, providing accurate geographic coordinates for each scan. Such information is useful for understanding the circulation of the merchandise and consumer behavior patterns.
After the two-dimensional code is scanned, a background verification module of the system is started immediately. The module compares the scanned two-dimensional code data with original information stored in a database. This comparison process involves decoding of the data, security checking and information checking. If the scanned two-dimensional code data is matched with the information in the database, the system confirms the authenticity of the commodity and provides relevant product information such as production details, historical records and other relevant information for the user. The method not only enhances the confidence of consumers on the authenticity of the product, but also improves the transparency and the trust of brands.
Otherwise, if the scan result does not match the information in the database, the system will immediately issue a warning. This may indicate that the article is counterfeit or has been tampered with illegally. Unmatched scan events may be marked and recorded for further investigation and analysis. This mechanism is critical to combat counterfeiting, protect consumers and brand interests.
It will be appreciated by those skilled in the art that various changes and modifications can be made to the embodiments disclosed above without departing from the spirit of the invention. Accordingly, the scope of the invention should be limited only by the attached claims.
It should be noted that not all the steps and units in the above flowcharts and the system configuration diagrams are necessary, and some steps or units may be omitted according to actual needs. The order of execution of the steps is not fixed and may be determined as desired. The apparatus structures described in the above embodiments may be physical structures or logical structures, that is, some units may be implemented by the same physical entity, or some units may be implemented by multiple physical entities, or may be implemented jointly by some components in multiple independent devices.
The detailed description set forth above describes exemplary embodiments, but does not represent all embodiments that may be implemented or fall within the scope of the claims. The term "exemplary" used throughout this specification means "serving as an example, instance, or illustration," and does not mean "preferred" or "advantageous over other embodiments. The detailed description includes specific details for the purpose of providing an understanding of the described technology. However, the techniques may be practiced without these specific details. In some instances, well-known structures and devices are shown in block diagram form in order to avoid obscuring the concepts of the described embodiments.
The previous description of the disclosure is provided to enable any person skilled in the art to make or use the disclosure. Various modifications to the disclosure will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other variations without departing from the scope of the disclosure. Thus, the disclosure is not limited to the examples and designs described herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A commodity anti-counterfeiting method based on visual identification is characterized by comprising the following steps of: the commodity anti-counterfeiting method based on visual identification comprises the steps of generating a unique two-dimensional code, wherein the two-dimensional code is combined with a marker to serve as an identity ID of a commodity, and integrating images, word description, production batch, production date, production place and logistics tracking information of the commodity.
2. The visual identification-based commodity anti-counterfeiting method according to claim 1, wherein the method comprises the following steps of: the two-dimensional code is generated by adopting a coding algorithm, the coding algorithm converts the selected characters into binary data based on character set modes such as numbers, letters, chinese characters and the like, and the size and the structural layout of the two-dimensional code are determined according to the required data capacity and the scanning distance.
3. The visual identification-based commodity anti-counterfeiting method according to claim 1, wherein the method comprises the following steps of: the two-dimensional code is manufactured on durable and tamper-resistant materials by adopting a high-precision printing technology, and the form comprises a sticky tape, a watermark or a direct printing on a commodity package, so that the physical safety of the two-dimensional code is enhanced, and the two-dimensional code is prevented from being illegally copied or reused.
4. The visual identification-based commodity anti-counterfeiting method according to claim 1, wherein the method comprises the following steps of: the two-dimensional code coding process comprises the step of editing and modifying the two-dimensional code by using a handheld coding device so as to add or modify commodity information, including text descriptions, images, official website links or other multimedia contents related to commodities.
5. The visual identification-based commodity anti-counterfeiting method according to claim 1, wherein the method comprises the following steps of: the method comprises a one-step visual identification feature extraction process, which comprises the steps of extracting key visual features from original image data, including image preprocessing, feature point detection, feature point coding and feature optimization.
6. The visual identification-based commodity anti-counterfeiting method according to claim 1, wherein the method comprises the following steps of: the time stamp is stored by using an ISO8601 international standard format and is used for recording the time and date of each scanning or verification activity of the two-dimensional code.
7. The visual identification-based commodity anti-counterfeiting method according to claim 1, wherein the method comprises the following steps of: the method comprises a one-step two-dimension code verification process, wherein the process involves the steps of scanning a two-dimension code by using mobile equipment, comparing a high-level image through a background system, and comparing a scanning result with original two-dimension code information in a database to verify the authenticity and origin of the commodity.
8. The visual identification-based commodity anti-counterfeiting method according to claim 1, wherein the method comprises the following steps of: the time stamp verification technology is used for recording time, times and geographic position information of a scanner of each scanning activity of the two-dimensional code.
9. The visual identification-based commodity anti-counterfeiting method according to claim 1, wherein the method comprises the following steps of: and (3) implementing security encryption measures in the two-dimensional code generation process, such as using Advanced Encryption Standard (AES) or other encryption technology with equal security, so as to ensure confidentiality and tamper resistance of the two-dimensional code data.
10. The visual identification-based commodity anti-counterfeiting method according to claim 1, wherein the method comprises the following steps of: the combination of the two-dimensional code and the visual identification technology is not only used for realizing the anti-counterfeiting of the commodity, but also used for monitoring the circulation condition of the commodity in the whole supply chain, and realizing the management and tracking of the whole life cycle of the commodity.
CN202311803660.9A 2023-12-26 2023-12-26 Commodity anti-counterfeiting method based on visual identification Pending CN117745306A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311803660.9A CN117745306A (en) 2023-12-26 2023-12-26 Commodity anti-counterfeiting method based on visual identification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311803660.9A CN117745306A (en) 2023-12-26 2023-12-26 Commodity anti-counterfeiting method based on visual identification

Publications (1)

Publication Number Publication Date
CN117745306A true CN117745306A (en) 2024-03-22

Family

ID=90256610

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311803660.9A Pending CN117745306A (en) 2023-12-26 2023-12-26 Commodity anti-counterfeiting method based on visual identification

Country Status (1)

Country Link
CN (1) CN117745306A (en)

Similar Documents

Publication Publication Date Title
US10970615B2 (en) Systems and methods for generating secure tags
US10373033B2 (en) Two dimensional barcode and method of authentication of such barcode
US11664991B2 (en) Tracking apparel items using distributed ledgers
US20140119615A1 (en) Product, image, or document authentication, verification, and item identification
MXPA05001124A (en) Counterfeit and tamper resistant labels with randomly occurring features.
US20020146146A1 (en) Using digital watermarks to facilitate counterfeit inspection and inventory management
US9934457B2 (en) Method of securing a two-dimensional barcode
US20060163354A1 (en) System and method of product identification, authentication and verification
US8123139B2 (en) Virtual code window
Cozzella et al. Drug packaging security by means of white-light speckle
CN109831309A (en) A kind of safety code principle and method with multiple-authentication
RU2534952C1 (en) Method of labelling product or articles for identification and counterfeit protection thereof
US10977534B1 (en) Compositions, systems, and methods for unique identifiers embedded in machine verifiable marks having error correction features
RU2608240C2 (en) Method of protecting products from forgery and checking authenticity of counterfeit-protected products
CN117745306A (en) Commodity anti-counterfeiting method based on visual identification
US20190163944A1 (en) Composite information bearing devices
EP3992356B1 (en) Method for verifying product authenticity and establishing authorized product data with fabric features
EP3982289A1 (en) Method for validation of authenticity of an image present in an object, object with increased security level and method for preparation thereof, computer equipment, computer program and appropriate reading means
US20100008561A1 (en) System and method for authenticating products and/or packages
WO2023170656A1 (en) A system and a computer-implemented method for detecting counterfeit items or items which have been produced illicitly
CN112950232A (en) Anti-counterfeiting traceability code of iron can product and production method and system thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination