WO2017047619A1 - Authenticity determination system, and server - Google Patents

Authenticity determination system, and server Download PDF

Info

Publication number
WO2017047619A1
WO2017047619A1 PCT/JP2016/077059 JP2016077059W WO2017047619A1 WO 2017047619 A1 WO2017047619 A1 WO 2017047619A1 JP 2016077059 W JP2016077059 W JP 2016077059W WO 2017047619 A1 WO2017047619 A1 WO 2017047619A1
Authority
WO
WIPO (PCT)
Prior art keywords
image data
data
server
authenticity determination
image
Prior art date
Application number
PCT/JP2016/077059
Other languages
French (fr)
Japanese (ja)
Inventor
水津克己
正壽 山本
Original Assignee
株式会社サードプラステクノロジー
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 株式会社サードプラステクノロジー filed Critical 株式会社サードプラステクノロジー
Publication of WO2017047619A1 publication Critical patent/WO2017047619A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/04Manufacturing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/387Composing, repositioning or otherwise geometrically modifying originals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/40Picture signal circuits
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Definitions

  • the present invention relates to an authenticity determination system and a server that enable authenticity determination of an object.
  • the authenticity determination system described in Patent Document 1 includes an information terminal and a log management server.
  • the information terminal reads code information of a digital watermark captured by a camera.
  • the information terminal transmits the read code information as read log data to the log management server via the network.
  • the log management server accumulates read log data in the database.
  • the log management server analyzes the read log data stored in the database, and creates a warning list including a code that can not be the original shipping route and a code that is frequently detected abnormally.
  • the log management server sends the alert list to the information terminal via the network.
  • the information terminal displays a warning list on the display unit.
  • read log data and a warning list are transmitted and received via a network. For this reason, the read log data and the warning list may be read by another person in the communication path on the network, and the information included in the read log data and the warning list may be leaked.
  • An object of the present invention is to provide an authenticity determination system and a server that reduce the possibility of information leakage.
  • a plurality of devices including the first device are connected via a network, and it is possible to determine the authenticity of the object based on information attached to the object.
  • the first apparatus is a plagiarism image which is data of a first image data which is data of a first image corresponding to the information and which is data of a decoy image which the first image is culled
  • the false image data converted by the first conversion means is transmitted and received via the network, and the authenticity determination of the object is provided. It is used in the authenticity determination process that enables
  • the information may be information stored in a storage medium attached to an object.
  • the authenticity determination can be enabled based on the information stored in the storage medium.
  • the plurality of devices include a server and a second device, and the first device converts the false image data converted by the first conversion unit into the server.
  • Storage control means for storing the decoy image data transmitted by the first transmission means in a storage unit; and the server stores the data in the storage unit by the storage control means.
  • second transmission means for transmitting the forged image data to the second device, wherein the second device performs a Fourier transform on the forged image data transmitted by the second transmission means.
  • the second image data corresponding to the information read from the storage medium by the reading device, the second image data being the data of the second image after the super resolution processing.
  • the information processing apparatus may further include an authenticity determination unit that executes the authenticity determination process using one image and the second image based on the second image data created by the creation unit.
  • link data is further stored in the storage medium
  • the first transmission unit transmits the decoy image data and the link data to the server
  • the storage control unit Among the decoy image data stored in the storage unit, the decoy image data and the link data transmitted by the first transmission unit are associated with each other and stored in the storage unit. Transmitting the decoy image data associated with the same link data as the link data transmitted from the second device to the second device, and the second device reads the storage medium from the storage medium by the reading device
  • the link data transmitting unit transmits the read link data to the server, and the creating unit transmits the link data to the server by the link data transmitting unit. It performs the super-resolution processing on the blurred image data transmitted by said second transmitting means in response to said link data, may create the second image data.
  • the generation unit may perform the super-resolution processing on the false image data a plurality of times to generate the second image data.
  • the second image is clearer than when the super-resolution processing is performed only once. Therefore, the accuracy of the authenticity determination is improved.
  • the first device, the server, and the second device are connected via a network, and it is possible to determine the authenticity of the object based on the information attached to the object.
  • the server included in the authenticity determination system wherein in the first device, first image data, which is data of a first image corresponding to the information, is data of a decoy image in which the first image is overlooked
  • the second apparatus for performing the authenticity determination process that enables the image processing apparatus further includes a transmission unit that transmits the decoy image data stored in the storage unit by the storage control unit.
  • FIG. It is a figure which shows the structure of the authenticity determination system 1, and the flow of data. It is a data block diagram of corresponding
  • FIG. It is a flowchart which shows a teasing apparatus process. It is a flowchart which shows server processing. It is a data block diagram of the corresponding
  • the authenticity determination system 1 is a system that enables the authenticity determination of the object 70 based on the information given to the object 70.
  • the object 70 is an eyebrow, but may be another product.
  • the authenticity determination system 1 includes a network 2, a data center 3, a first base 4, a second base 5, and a third base 6.
  • the data center 3 is provided with a server 30.
  • the first base 4 is provided with a whistle device 40, a dedicated writer 41, and a work PC 42.
  • the tampering device 40, the dedicated writer 41, and the work PC 42 are electrically connected to one another.
  • the second site 5 is provided with a super-resolution device 50, a dedicated reader 51, and a work PC 52.
  • the super-resolution device 50, the dedicated reader 51, and the working PC 52 are electrically connected to one another.
  • the third base 6 is provided with a super resolution device 60, a dedicated reader 61, and a work PC 62.
  • the super resolution device 60, the dedicated reader 61, and the working PC 62 are electrically connected to one another.
  • Each of the forgery device 40, the super resolution device 50, and the super resolution device 60 can communicate with the server 30 via the network 2.
  • the authenticity determination system 1 the fraudulent image data of the fraudulent image 85 (see FIGS. 1 and 6) described later is transmitted and received mutually, and the authenticity determination of the object 70 is performed.
  • the first base 4 is, for example, a base of a manufacturer of the object 70.
  • An RFID (Radio Frequency Identifier) tag 71 is embedded in the object 70.
  • the object 70 is manufactured by the manufacturer and shipped from the first location 4 (see arrow 711).
  • the second base 5 is a base of a distribution manager, and is, for example, a warehouse, an export port, an import port, an airport, or the like.
  • the authenticity determination of the object 70 is performed based on the information stored in the RFID tag 71.
  • the object 70 determined to be an authentic product at the second location is delivered to the third location 6 (see arrow 712).
  • the third base 6 is a base of a distributor, for example, a store. At the third base 6, the authenticity determination of the object 70 is performed based on the information stored in the RFID tag 71.
  • the object 70 determined to be a genuine product by the authenticity determination is sold to the customer of the seller.
  • the electrical configuration of the server 30 will be described.
  • the server 30 is provided with a CPU 301, a hard disk drive (hereinafter, HDD) 302, and a RAM 303.
  • the CPU 301 controls the server 30.
  • the RAM 303 temporarily stores various data.
  • the HDD 302 stores programs for causing the CPU 301 to execute various processes, such as server processing (see FIG. 4) described later.
  • the HDD 302 also stores a corresponding data table 95 (see FIG. 2) described later.
  • the electrical configuration of the tanning device 40 will be described.
  • the forgery device 40 is provided with a CPU 401, an HDD 402, and a RAM 403.
  • the CPU 401 controls the whistle device 40.
  • the RAM 403 temporarily stores various data.
  • the HDD 402 stores programs for causing the CPU 401 to execute various processes, such as a tumbling apparatus process (see FIG. 3) described later.
  • the electrical configuration of the super resolution device 50 will be described.
  • the super resolution device 50 is provided with a CPU 501, an HDD 502, and a RAM 503.
  • the CPU 501 controls the super resolution device 50.
  • the RAM 503 temporarily stores various data.
  • the HDD 502 stores programs for causing the CPU 501 to execute various types of processing, such as super-resolution device processing (see FIG. 6) described later.
  • the electrical configuration of the super resolution device 60 will be described.
  • the super resolution device 60 is provided with a CPU 601, an HDD 602, and a RAM 603.
  • the CPU 601 controls the super resolution device 60.
  • the RAM 603 temporarily stores various data.
  • the HDD 602 stores programs for causing the CPU 601 to execute various types of processing such as super-resolution processing (see FIG. 6) described later.
  • the correspondence data table 95 will be described with reference to FIG.
  • the correspondence data table 95 is stored in the HDD 302 of the server 30.
  • the link data and the blurred image data of the blurred images 81 to 84 are associated.
  • the forgery images 81 to 84 are generated by the first image data being garbled by the process of S12 (see FIG. 3, later described) by the forgery device 40.
  • the first image data includes the number of the lot number of the object.
  • the first images including lot numbers “55-35”, “23-82”, “15-96”, and “91-75” are overlooked as the decoy images 81 to 84 shown in FIG. 2 respectively. Image.
  • the link data is information associated with the decoy image data.
  • the link data is a character string.
  • the generated decoy image data and link data are transmitted to the server 30 by the decoy apparatus 40 (see S13 in FIG. 3) and stored in the HDD 302 by the server 30 (S23 in FIG. 4). reference).
  • the process in the authenticity determination system 1 will be described.
  • the case where the authenticity determination of the object 70 (FIG. 1) is performed will be described as an example.
  • the object 70 is manufactured at the first base 4 which is the base of the manufacturer, and the authenticity determination is made at the second base 5 which is the base of the distribution manager. Further, the object 70 is subjected to the authenticity determination at the third base 6 which is the base of the distributor.
  • an object 70 is manufactured at the first base 4 and an RFID tag 71 is attached.
  • the operator of the first base 4 operates the dedicated writer 41 and the whistle device 40 via the work PC 42.
  • the CPU (not shown) of the work PC 42 generates first image data, which is data of the first image 80, and link data "fblk”.
  • the first image 80 includes the lot number “58-21”.
  • the CPU of the work PC 42 controls the dedicated writer 41 and stores the first image data of the first image 80 and the link data “fblk” in the RFID tag 71 by wireless communication (arrow 701). Further, the CPU of the work PC 42 transmits the first image data of the first image 80 and the link data “fblk” to the tweezer 40.
  • the tanning device 40 executes tanning device processing (see FIG. 3) described later, creates tanning image data based on the first image data (see S12 in FIG. 3), and transmits it to the server 30 (arrow 702 and S13 of FIG. 3).
  • the first image data and the link data transmitted to the server 30 are stored in the correspondence data table 95 by the CPU 301 of the server 30 (see S23 of FIG. 4 and FIG. 5).
  • the object 70 is shipped from the first base 4 and transported to the second base 5 which is the base of the distribution manager (arrow 711).
  • the operator at the second site 5 operates the dedicated reader 51 and the super resolution device 50 via the work PC 52.
  • the CPU (not shown) of the working PC 52 controls the dedicated reader 51 and reads the first image data of the first image 80 and the link data “fblk” from the RFID tag 71 by wireless communication (see arrow 703) ).
  • the CPU of the work PC 52 transmits the read first image 80 and the link data “fblk” to the super resolving device 50.
  • the CPU 501 of the super resolving device 50 transmits the link data “fblk” transmitted from the work PC 52 to the server 30 (arrow 704, see S32 in FIG. 6).
  • the CPU 301 of the server 30 refers to the corresponding data table 95 (see FIG. 5), and transmits the deceased image data associated with the same link data “fblk” as the link data “fblk” transmitted from the super resolution device 50. It identifies (refer to S24 of FIG. 4). That is, the forgery image data of the forgery image 85 is specified.
  • the CPU 301 of the server 30 transmits the identified image data of the identified false image 85 to the super-resolution device 50 (arrow 705, see S25 of FIG. 4).
  • the CPU 501 of the super-resolution device 50 performs super-resolution processing on the decoy image data transmitted from the server 30, and creates second image data (see S34 in FIG. 6).
  • Super-resolution processing is processing that includes a Fourier transform and sharpens the decoy image 85.
  • second image data of the second image 851 in which the false image 85 is sharpened is obtained.
  • the second image 851 in which the first image 80 is restored is obtained from the false image 85.
  • the CPU 501 enables the authenticity determination using the first image data of the first image 80 read by the dedicated reader 51 and the second image data of the created second image 851. An example of a method for enabling the authenticity determination will be described later.
  • the object 70 determined to be a genuine product is delivered to the third base 6 which is the base of the distributor (see arrow 712).
  • the authenticity determination is performed as in the case of the second base 5. That is, the worker at the third base 6 operates the dedicated reader 61 and the super resolving device 60 via the work PC 62.
  • the CPU (not shown) of the working PC 52 controls the dedicated reader 61 and reads the first image data of the first image 80 and the link data “fblk” from the RFID tag 71 by wireless communication (see arrow 706). ).
  • the CPU of the work PC 62 transmits the read first image 80 and the link data “fblk” to the super resolving device 60.
  • the CPU 601 of the super resolving device 60 transmits the link data “fblk” transmitted from the working PC 62 to the server 30 (see the arrow 707 and S32 in FIG. 6).
  • the CPU 301 of the server 30 refers to the correspondence data table 95 (see FIG. 5), and transmits the decoy image data associated with the same link data “fblk” as the link data “fblk” transmitted from the super resolution device 60 It identifies (refer to S24 of FIG. 4). That is, the forgery image data of the forgery image 85 is specified.
  • the CPU 301 of the server 30 transmits the identified image data of the identified false image 85 to the super-resolution device 60 (arrow 708, see S25 in FIG. 4).
  • the CPU 601 of the super-resolution device 60 performs super-resolution processing on the decoy image data transmitted from the server 30, and creates second image data (see S34 in FIG. 6). As a result, second image data of the second image 851 in which the false image 85 is sharpened is obtained.
  • the CPU 601 enables the authenticity determination using the first image data of the first image 80 read by the dedicated reader 61 and the second image data of the created second image 851.
  • the process executed in the authenticity determination system 1 will be described in more detail with reference to FIGS. 3 to 6.
  • a tanning device process executed by the CPU 401 of the tanning device 40 will be described.
  • the CPU 401 reads a tanning device processing program from the HDD 402.
  • the CPU 401 loads the read program on the RAM 403 and executes the device processing.
  • the CPU 401 returns the process to S11.
  • the acquired first image data is converted into a crawl image data (S12).
  • the forged image data of the forged image 85 (refer to FIG. 1) on which the first image 80 (refer to FIG. 1) is extracted is created.
  • the decoy image data created in S12 and the link data “fblk” acquired in S11 are transmitted to the server 30 (S13, see arrow 702 in FIG. 1).
  • the CPU 401 returns the process to S11.
  • the server processing by the server 30 will be described with reference to FIG.
  • the CPU 301 reads a program of the server process from the HDD 302.
  • the CPU 301 loads the read program in the RAM 303 and executes server processing.
  • the server process first, it is determined whether or not the decoy image data and the link data (see arrow 702 in FIG. 1) transmitted in S13 (see FIG. 3) are acquired (S21). When the image data and the link data are not acquired (S21: NO), the link data (FIG. 1) transmitted by S32 (see FIG. 6, later described) of the super resolution device 50 or the super resolution device 60. It is determined whether or not the arrows 704 and 707 have been received (S22). If the link data is not received (S22: NO), the CPU 301 returns the process to S21.
  • the decoy image data and the link data transmitted in S13 are acquired (S21: YES)
  • the acquired decoy image data and the link data are correlated and stored in the HDD 302 (S23).
  • the correspondence data table 95 shown in FIG. 3 is updated as shown in the correspondence data table 95 shown in FIG. That is, the link data “fblk” and the blurred image data of the blurred image 85 are stored in the corresponding data table 95.
  • the CPU 301 returns the process to S21.
  • the decoy image data identified in S24 is transmitted to the super resolution device 50 or the super resolution device 60 (S25). If the link data acquired in S22 is the data transmitted from the super resolution device 50 (see the arrow 704 in FIG. 1), the decoy image data is transmitted to the super resolution device 50 (FIG. 1). Arrow 705). If the link data acquired in S22 is the data transmitted from the super resolution device 60 (see arrow 707 in FIG. 1), the decoy image data is transmitted to the super resolution device 60 (arrow in FIG. 1) See 708). Next, the CPU 301 returns the process to S21.
  • Super-resolution device processing by the super-resolution devices 50 and 60 will be described with reference to FIG.
  • the CPU 501 of the super resolving device 50 When the worker operates the work PC 52 and inputs an instruction to start super-resolution device processing, the CPU 501 reads the super-resolution device processing program from the HDD 502. The CPU 501 loads the read program on the RAM 503 and executes the super-resolution device processing.
  • the CPU 501 determines whether or not the first image data read from the RFID tag 71 by the dedicated reader 51 and the link data (see the arrow 703 in FIG. 1) are acquired. (S31). If the first image data and the link data are not acquired (S31: NO), the CPU 501 repeats the process of S31. If the first image data and the link data are acquired (S31: YES), the acquired link data “fblk” is transmitted to the server 30 (S32, see arrow 704 in FIG. 1). The transmitted link data is received by the CPU 301 of the server 30 (S22 in FIG. 4: YES).
  • the authenticity determination processing is processing that enables the authenticity determination of the object 70.
  • the authenticity determination process may be any process as long as the worker can determine the authenticity of the object 70, and the mode is not limited.
  • the authenticity determination process may be a process of displaying the first image 80 and the second image 851 on a display (not shown). In this case, the worker compares the first image 80 and the second image 851 displayed on the display, and determines that the product is a genuine product if they match, and determines that it is a counterfeit product if they do not match. Further, in the authenticity determination process, the CPU 501 compares the first image 80 and the second image 851, and notifies the worker that they match if they match, and notifies the worker that they do not match if they do not match. It may be a process.
  • the method of notification is not limited, and may be displayed on a display, for example, or may be notified by a lighting pattern of an LED (Light Emitting Diode).
  • LED Light Emitting Diode
  • the authenticity determination process is executed at the second site 5.
  • the object 70 determined as an authentic product as a result of the authenticity determination at the second base 5 is delivered to the third base 6 (see the arrow 712 in FIG. 1).
  • the super resolution device processing (see FIG. 6) is executed by the CPU 601 of the super resolution device 60. That is, the first image data read from the RFID tag 71 and the link data (see arrow 706 in FIG. 1) are acquired by the dedicated reader 61 (S31: YES), and the link data is transmitted to the server 30 (S32, See arrow 707 in FIG. 1).
  • the forgery image data see arrow 708 in FIG.
  • the processing in the authenticity determination system 1 of the present embodiment is performed.
  • the tweezers converted in S12 (see FIG. 3) Image data is transmitted and received via the network 2 (see arrows 702, 705 and 708 in FIG. 1).
  • the decoy image data is used in the authenticity determination process (see S34 and S35 in FIG. 6). What is transmitted and received via the network 2 is the limp image data of the decoy image 85 in which the first image 80 is decoyed.
  • the other person can not confirm the first image 80. Therefore, it is possible to reduce the possibility that the information included in the first image 80 (in the present embodiment, lot number “58-21”) leaks out.
  • information such as first image data is stored in the RFID tag 71 which is a storage medium attached to the object 70.
  • the authenticity determination system 1 can enable the authenticity determination based on the information stored in the RFID tag 71.
  • link data is stored in the RFID tag 71 (see an arrow 701 in FIG. 1).
  • the CPU 401 transmits the decoy image data and the link data based on the first image data to the server 30 (S13 in FIG. 3, arrow 702 in FIG. 1).
  • the transmitted decoy image data and link data are correlated by the CPU 301 and stored in the HDD 302 (S23 in FIG. 4).
  • the link data (see arrows 703 and 706 in FIG. 1) read from the RFID tag 71 by the dedicated reader 51 and 61 is transmitted to the server 30 by the CPUs 501 and 601 (S32 in FIG. 6, arrows 704 and 707 in FIG. 1). reference).
  • the decoy image data see FIG.
  • link data is used to perform processing. Therefore, data stored in the HDD 302 and transmitted by the CPU 501, 601 to the server 30 as compared with the case where arbitrary data not stored in the RFID tag 71 is created by the CPU 501, 601 and used instead of link data. It is easy to agree with the data Therefore, it is possible to transmit the false image data corresponding to the first image 80 from the server 30 to the super resolving devices 50 and 60 more reliably than when the link data is not used. Therefore, the accuracy of the authenticity determination is improved.
  • the tanning device 40 is an example of the "first device” in the present invention.
  • the RFID tag 71 is an example of the "storage medium” in the present invention.
  • the super resolution device 50 and the super resolution device 60 are examples of the “second device” in the present invention.
  • CPU401 which performs processing of S12 is an example of the "1st conversion means” of the present invention.
  • CPU401 which performs processing of S13 (refer to Drawing 3) is an example of the "1st transmission means” of the present invention.
  • the CPU 301 performing the process of S23 is an example of the "storage control means" in the present invention.
  • CPU301 which performs processing of S25 is an example of the "2nd transmission means" of the present invention.
  • the CPUs 501 and 601 that perform the process of S34 are an example of the “creation means” in the present invention.
  • the CPUs 501 and 601 that perform the process of S35 are an example of the "authority determination means” in the present invention.
  • the present invention is not limited to the above embodiment, and various modifications can be made. For example, although the super-resolution processing (see S34 in FIG. 6) is performed once and the second image data is created, the present invention is not limited to this.
  • the super-resolution processing may be performed multiple times on the decoy image data to create the second image data.
  • the second image 851 becomes clearer than when it is performed only once. Therefore, the accuracy of the authenticity determination is improved.
  • the link data may not be transmitted / received as long as the image data is transmitted / received among the server 30, the bookmarking apparatus 40, and the super-resolution devices 50, 60.
  • the link data may not be stored in the RFID tag 71, and only the first image data may be stored (arrow 701 in FIG. 1).
  • the decoy image data is created based on the first image data by the CPU 401 of the decoy apparatus 40 (S12 in FIG. 3) and transmitted to the server 30 (S13 in FIG. 3).
  • the CPU 301 of the server 30 stores the tweet image data in the HDD 302 (S23 in FIG. 4).
  • the CPUs 501 and 601 of the super-resolution devices 50 and 60 create hidden image data based on the first image data read from the RFID tag 71 by the dedicated readers 51 and 61 (not shown).
  • the CPUs 501 and 601 transmit not the link data but the persimmon image data to the server 30.
  • S24 see FIG.
  • the CPU 301 identifies, among the blurring image data stored in the HDD 302, the blurring image data that matches the blurring image data transmitted from the super-resolution device 50, 60.
  • the CPU 301 transmits the identified decoy image data to the super-resolution devices 50 and 60 in S25 (see FIG. 4).
  • the CPUs 501 and 601 perform super-resolution processing on the received decoy image data (S34 in FIG. 6), and execute authenticity determination processing (S35 in FIG. 6).
  • the first image data 80 stored in the RFID tag 71 may be a hidden image. If an image is stored in the RFID tag 71, even if the image data of the RFID tag 71 is read by another person, the other person confirms the first image 80 if there is no super resolution device. I can not do it. The outflow of the first image 80 can be reliably prevented.
  • the tanning image data is transmitted and received among the server 30, the tanning device 40, and the super-resolution devices 50 and 60. Therefore, even if the tweet image data transmitted / received among the server 30, the tweet device 40, and the super-resolution devices 50, 60 is read by another person, the other person confirms the first image 80. I can not Thus, the possibility of the information included in the first image 80 being leaked can be reduced.
  • RFID tag 71 although information, such as link data and 1st image data, was memorize
  • a storage medium other than the RFID tag 71 such as a USB (Universal Serial Bus) memory may be used.
  • the information such as the link data and the first image data may be attached to the object 70 and may not be stored in the storage medium.
  • information may be included in a barcode and a QR code (registered trademark) and the like, and may be attached to the object 70.
  • the authenticity determination system 1 may be any system as long as a plurality of devices including the forgery device 40 are connected via the network 2 and the authenticity determination of the object is possible based on the information attached to the object 70,
  • the server 30 and a part of the super resolution devices 50 and 60 may not be provided.
  • the server 30 and the super resolution device 50 may not be provided.
  • the whistle image data may be transmitted from the whistle device 40 to the super-resolution device 60 via the network 2 and used for the authenticity determination process.
  • a plurality of objects 70 may be packaged in a packaging material used for transportation.
  • the first image data and the link data are collectively read from the RFID tag 71 attached to each of the plurality of objects 70 in the packing material (arrow 703 in FIG. 1), and the plurality of link data It may be collectively transmitted to the server 30 (S32 in FIG. 6, see arrow 704 in FIG. 1).
  • a plurality of second image data corresponding to a plurality of link data are collectively transmitted from the server 30 to the super resolution device 50, 60 (see S25 in FIG.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Manufacturing & Machinery (AREA)
  • Marketing (AREA)
  • Artificial Intelligence (AREA)
  • Toxicology (AREA)
  • Electromagnetism (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Image Processing (AREA)
  • Facsimiles In General (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Facsimile Image Signal Circuits (AREA)

Abstract

[Problem] To provide an authenticity determination system and a server with which the possibility of information being leaked can be reduced. [Solution] An authenticity determination system 1 makes it possible to determine the authenticity of an object 70 on the basis of information attached to the object 70. In the authenticity determination system 1, a server 30, a blurring device 40, a super resolution device 50, and a super resolution device 60 are connected to each other via a network 2. A CPU 401 of the blurring device 40 converts first image data, which is data of a first image 80 corresponding to information associated with the object 70, into blurred image data which is data of a blurred image 85 obtained by blurring the first image 80. With regard to reciprocal communication among the plurality of devices, i.e. the server 30, the blurring device 40, the super resolution device 50 and the super resolution device 60, the blurred image data that has been converted by the CPU 401 is transmitted and received via the network 2, and the authenticity of the object 70 is thereby determined.

Description

真贋判定システム及びサーバAuthenticity judgment system and server
 本発明は、対象物の真贋判定を可能にする真贋判定システム及びサーバに関する。 The present invention relates to an authenticity determination system and a server that enable authenticity determination of an object.
 従来、対象物の真贋判定を可能にする真贋判定システムが知られている。例えば、特許文献1に記載の真贋判定システムは、情報端末とログ管理サーバとを備えている。情報端末は、カメラで撮影された電子透かしのコード情報を読み取る。情報端末は読み取ったコード情報を読取ログデータとして、ネットワークを介してログ管理サーバに送信する。ログ管理サーバは、読取ログデータをデータベースに蓄積する。ログ管理サーバは、データベースに蓄積した読取ログデータを解析し、本来の出荷ルートではありえないコード及び異常に多く検出されるコードを追記した警告リストを作成する。ログ管理サーバは、ネットワークを介して情報端末に警告リストを送信する。情報端末は、警告リストを表示部に表示する。 BACKGROUND Conventionally, an authenticity determination system that enables authenticity determination of an object is known. For example, the authenticity determination system described in Patent Document 1 includes an information terminal and a log management server. The information terminal reads code information of a digital watermark captured by a camera. The information terminal transmits the read code information as read log data to the log management server via the network. The log management server accumulates read log data in the database. The log management server analyzes the read log data stored in the database, and creates a warning list including a code that can not be the original shipping route and a code that is frequently detected abnormally. The log management server sends the alert list to the information terminal via the network. The information terminal displays a warning list on the display unit.
特開2015-22314号公報Unexamined-Japanese-Patent No. 2015-22314
 上記従来の真贋判定システムにおいては、ネットワークを介して、読取ログデータと警告リストが送受信される。このため、ネットワーク上の通信経路において読取ログデータと警告リストが他者に読み取られ、読取ログデータと警告リストに含まれる情報が流出する可能性がある。 In the above-described conventional authenticity determination system, read log data and a warning list are transmitted and received via a network. For this reason, the read log data and the warning list may be read by another person in the communication path on the network, and the information included in the read log data and the warning list may be leaked.
 本発明の目的は、情報が流出する可能性を低減する真贋判定システム及びサーバを提供することである。 An object of the present invention is to provide an authenticity determination system and a server that reduce the possibility of information leakage.
 本発明の第一の態様に係る真贋判定システムは、第一装置を含む複数の装置がネットワークを介して接続され、対象物に付される情報に基づいて、前記対象物の真贋判定を可能にする真贋判定システムであって、前記第一装置は、前記情報に対応する第一画像のデータである第一画像データを、前記第一画像が暈された暈し画像のデータである暈し画像データに変換する第一変換手段を備え、前記複数の装置相互間の通信において、前記第一変換手段によって変換された前記暈し画像データが前記ネットワークを介して送受信され、前記対象物の真贋判定を可能にする真贋判定処理に用いられる。 In the authenticity determination system according to the first aspect of the present invention, a plurality of devices including the first device are connected via a network, and it is possible to determine the authenticity of the object based on information attached to the object. The first apparatus is a plagiarism image which is data of a first image data which is data of a first image corresponding to the information and which is data of a decoy image which the first image is culled In the communication among the plurality of apparatuses, the false image data converted by the first conversion means is transmitted and received via the network, and the authenticity determination of the object is provided. It is used in the authenticity determination process that enables
 この場合、ネットワークを介して送受信されるのは、第一画像が暈された暈し画像の暈し画像データである。このため、仮に他者によって暈し画像データが読み取られた場合でも、他者は第一画像を確認することができない。よって、第一画像に含まれる情報が流出する可能性を低減できる。 In this case, what is transmitted and received via the network is the forehead image data of the forehead image on which the first image is forged. For this reason, even if the image data is read by another person, the other person can not confirm the first image. Therefore, the possibility of the information included in the first image being leaked can be reduced.
 前記真贋判定システムにおいて、前記情報は、対象物に付される記憶媒体に記憶された情報であってもよい。この場合、記憶媒体に記憶された情報に基づいて真贋判定を可能にすることができる。 In the authenticity determination system, the information may be information stored in a storage medium attached to an object. In this case, the authenticity determination can be enabled based on the information stored in the storage medium.
 前記真贋判定システムにおいて、前記複数の装置には、サーバと第二装置とが含まれ、前記第一装置は、前記第一変換手段によって変換された前記暈し画像データを、前記サー  In the authenticity determination system, the plurality of devices include a server and a second device, and the first device converts the false image data converted by the first conversion unit into the server.
バに送信する第一送信手段を備え、前記サーバは、前記第一送信手段によって送信された前記暈し画像データを記憶部に記憶する記憶制御手段と、前記記憶制御手段によって前記記憶部に記憶された前記暈し画像データを前記第二装置に送信する第二送信手段とを備え、前記第二装置は、前記第二送信手段によって送信された前記暈し画像データに対して、フーリエ変換を含む超解像処理を行い、前記超解像処理後の第二画像のデータである第二画像データを作成する作成手段と、読取装置によって前記記憶媒体から読み取られた前記情報に対応する前記第一画像と、前記作成手段によって作成された第二画像データに基づく前記第二画像とを用いて、前記真贋判定処理を実行する真贋判定手段とを備えてもよい。 Storage control means for storing the decoy image data transmitted by the first transmission means in a storage unit; and the server stores the data in the storage unit by the storage control means. And second transmission means for transmitting the forged image data to the second device, wherein the second device performs a Fourier transform on the forged image data transmitted by the second transmission means. And the second image data corresponding to the information read from the storage medium by the reading device, the second image data being the data of the second image after the super resolution processing. The information processing apparatus may further include an authenticity determination unit that executes the authenticity determination process using one image and the second image based on the second image data created by the creation unit.
 この場合、暈し画像データが、サーバ、第一装置、及び第二装置相互間で送受信される。よって、サーバ、第一装置、及び第二装置相互間で送受信される暈し画像データが他者によって読み取られた場合でも、他者は第一画像を確認することができない。よって、第一画像に含まれる情報が流出する可能性を低減できる。 In this case, false image data is transmitted and received among the server, the first device, and the second device. Therefore, even if another image data is read by another person between the server, the first device, and the second device, the other person can not confirm the first image. Therefore, the possibility of the information included in the first image being leaked can be reduced.
 前記真贋判定システムにおいて、前記記憶媒体には、リンクデータがさらに記憶され、前記第一送信手段は、前記暈し画像データと前記リンクデータとを前記サーバに送信し、前記記憶制御手段は、前記第一送信手段によって送信された前記暈し画像データと前記リンクデータとを対応付けて前記記憶部に記憶し、前記第二送信手段は、前記記憶部に記憶された前記暈し画像データのうち、前記第二装置から送信される前記リンクデータと同じ前記リンクデータに対応付けられた前記暈し画像データを前記第二装置に送信し、前記第二装置は、前記読取装置よって前記記憶媒体から読み取られた前記リンクデータを、前記サーバに送信するリンクデータ送信手段を備え、前記作成手段は、前記リンクデータ送信手段によって前記サーバに送信された前記リンクデータに応じて前記第二送信手段によって送信された前記暈し画像データに対して前記超解像処理を行い、前記第二画像データを作成してもよい。 In the authenticity determination system, link data is further stored in the storage medium, the first transmission unit transmits the decoy image data and the link data to the server, and the storage control unit Among the decoy image data stored in the storage unit, the decoy image data and the link data transmitted by the first transmission unit are associated with each other and stored in the storage unit. Transmitting the decoy image data associated with the same link data as the link data transmitted from the second device to the second device, and the second device reads the storage medium from the storage medium by the reading device The link data transmitting unit transmits the read link data to the server, and the creating unit transmits the link data to the server by the link data transmitting unit. It performs the super-resolution processing on the blurred image data transmitted by said second transmitting means in response to said link data, may create the second image data.
 この場合、リンクデータが用いられない場合に比べて、より確実に、第一画像に対応する暈し画像データをサーバから第二装置に送信することができる。よって、真贋判定の精度が向上する。 In this case, it is possible to transmit the false image data corresponding to the first image from the server to the second device more reliably than when the link data is not used. Therefore, the accuracy of the authenticity determination is improved.
 前記真贋判定システムにおいて、前記作成手段は、前記暈し画像データに対して前記超解像処理を複数回行い、前記第二画像データを作成してもよい。この場合、超解像処理が複数回行われるので、1回だけ超解像処理が行われる場合に比べて、第二画像がより鮮明になる。よって、真贋判定の精度が向上する。 In the authenticity determination system, the generation unit may perform the super-resolution processing on the false image data a plurality of times to generate the second image data. In this case, since the super-resolution processing is performed a plurality of times, the second image is clearer than when the super-resolution processing is performed only once. Therefore, the accuracy of the authenticity determination is improved.
 本発明の第二の態様に係るサーバは、第一装置、サーバ、及び第二装置がネットワークを介して接続され、対象物に付される情報に基づいて、前記対象物の真贋判定を可能にする真贋判定システムに含まれる前記サーバであって、前記第一装置において、前記情報に対応する第一画像のデータである第一画像データが、前記第一画像が暈された暈し画像のデータである暈し画像データに変換され、前記サーバに送信される前記暈し画像データを、前記サーバにおいて記憶部に記憶する記憶制御手段と、前記暈し画像データを用いて前記対象物の真贋判定を可能にする真贋判定処理を行う第二装置に、前記記憶制御手段によって前記記憶部に記憶された前記暈し画像データを送信する送信手段とを備えている。 In the server according to the second aspect of the present invention, the first device, the server, and the second device are connected via a network, and it is possible to determine the authenticity of the object based on the information attached to the object. The server included in the authenticity determination system, wherein in the first device, first image data, which is data of a first image corresponding to the information, is data of a decoy image in which the first image is overlooked Storage control means for storing the decoy image data, which is converted into decoy image data and transmitted to the server, in the storage unit in the server, and the authenticity determination of the object using the decoy image data The second apparatus for performing the authenticity determination process that enables the image processing apparatus further includes a transmission unit that transmits the decoy image data stored in the storage unit by the storage control unit.
 この場合、ネットワークを介して送受信されるのは、第一画像が暈された暈し画像の暈し画像データである。このため、仮に他者によって暈し画像データが読み取られた場合でも、他者は第一画像を確認することができない。よって、第一画像に含まれる情報が流出する可能性を低減できる。 In this case, what is transmitted and received via the network is the forehead image data of the forehead image on which the first image is forged. For this reason, even if the image data is read by another person, the other person can not confirm the first image. Therefore, the possibility of the information included in the first image being leaked can be reduced.
真贋判定システム1の構成とデータの流れを示す図である。It is a figure which shows the structure of the authenticity determination system 1, and the flow of data. 対応データテーブル95のデータ構成図である。It is a data block diagram of corresponding | compatible data table 95. FIG. 暈し装置処理を示すフローチャートである。It is a flowchart which shows a teasing apparatus process. サーバ処理を示すフローチャートである。It is a flowchart which shows server processing. 図2に示す状態から更新された対応データテーブル95のデータ構成図である。It is a data block diagram of the corresponding | compatible data table 95 updated from the state shown in FIG. 超解像装置処理を示すフローチャートである。It is a flowchart which shows a super-resolution apparatus process.
 以下、本発明を具現化した真贋判定システムについて、図面を参照して説明する。まず、図1を参照し、真贋判定システム1の概要について説明する。真贋判定システム1は、対象物70に付される情報に基づいて、対象物70の真贋判定を可能にするシステムである。本実施形態では、一例として、対象物70は鞄であるとするが、他の製品でもよい。真贋判定システム1は、ネットワーク2、データセンター3、第一拠点4、第二拠点5、及び第三拠点6を含む。データセンター3には、サーバ30が設けられている。第一拠点4には、暈し装置40、専用ライタ41、及び作業用PC42が設けられている。暈し装置40、専用ライタ41、及び作業用PC42は、互いに電気的に接続されている。第二拠点5には、超解像装置50、専用リーダ51、及び作業用PC52が設けられている。超解像装置50、専用リーダ51、及び作業用PC52は,互いに電気的に接続されている。第三拠点6には、超解像装置60、専用リーダ61、及び作業用PC62が設けられている。超解像装置60、専用リーダ61、及び作業用PC62は、互いに電気的に接続されている。 Hereinafter, an authenticity determination system embodying the present invention will be described with reference to the drawings. First, the outline of the authenticity determination system 1 will be described with reference to FIG. The authenticity determination system 1 is a system that enables the authenticity determination of the object 70 based on the information given to the object 70. In the present embodiment, as an example, the object 70 is an eyebrow, but may be another product. The authenticity determination system 1 includes a network 2, a data center 3, a first base 4, a second base 5, and a third base 6. The data center 3 is provided with a server 30. The first base 4 is provided with a whistle device 40, a dedicated writer 41, and a work PC 42. The tampering device 40, the dedicated writer 41, and the work PC 42 are electrically connected to one another. The second site 5 is provided with a super-resolution device 50, a dedicated reader 51, and a work PC 52. The super-resolution device 50, the dedicated reader 51, and the working PC 52 are electrically connected to one another. The third base 6 is provided with a super resolution device 60, a dedicated reader 61, and a work PC 62. The super resolution device 60, the dedicated reader 61, and the working PC 62 are electrically connected to one another.
 暈し装置40、超解像装置50、及び超解像装置60は、夫々、ネットワーク2を介してサーバ30と通信可能である。真贋判定システム1においては、後述する暈し画像85(図1及び図6参照)の暈し画像データが互いに送受信されて、対象物70の真贋判定が実施される。 Each of the forgery device 40, the super resolution device 50, and the super resolution device 60 can communicate with the server 30 via the network 2. In the authenticity determination system 1, the fraudulent image data of the fraudulent image 85 (see FIGS. 1 and 6) described later is transmitted and received mutually, and the authenticity determination of the object 70 is performed.
 第一拠点4は、例えば、対象物70の製造業者の拠点である。対象物70には、RFID(Radio Frequency Identifier)タグ71が埋め込まれている。対象物70は製造業者によって製造され、第一拠点4から出荷される(矢印711参照)。第二拠点5は流通管理者の拠点であり、例えば、倉庫、輸出港、輸入港、空港などである。第二拠点5を通過する際に、RFIDタグ71に記憶された情報に基づいて、対象物70の真贋判定が実施される。第二拠点において真正品であると判定された対象物70は、第三拠点6に納入される(矢印712参照)。第三拠点6は、販売業者の拠点であり、例えば、店舗である。第三拠点6においては、RFIDタグ71に記憶された情報に基づいて、対象物70の真贋判定が実施される。真贋判定によって真正品と判定された対象物70は、販売業者の顧客に販売される。 The first base 4 is, for example, a base of a manufacturer of the object 70. An RFID (Radio Frequency Identifier) tag 71 is embedded in the object 70. The object 70 is manufactured by the manufacturer and shipped from the first location 4 (see arrow 711). The second base 5 is a base of a distribution manager, and is, for example, a warehouse, an export port, an import port, an airport, or the like. When passing through the second base 5, the authenticity determination of the object 70 is performed based on the information stored in the RFID tag 71. The object 70 determined to be an authentic product at the second location is delivered to the third location 6 (see arrow 712). The third base 6 is a base of a distributor, for example, a store. At the third base 6, the authenticity determination of the object 70 is performed based on the information stored in the RFID tag 71. The object 70 determined to be a genuine product by the authenticity determination is sold to the customer of the seller.
 サーバ30の電気的構成について説明する。サーバ30には、CPU301、ハードディスクドライブ(以下、HDD)302、及びRAM303が設けられている。CPU301は、サーバ30の制御を行う。RAM303は、各種データを一時的に記憶する。HDD302には、後述するサーバ処理(図4参照)等、CPU301に各種の処理を実行させるためのプログラムが記憶されている。また、HDD302には、後述する対応データテーブル95(図2参照)が記憶されている。 The electrical configuration of the server 30 will be described. The server 30 is provided with a CPU 301, a hard disk drive (hereinafter, HDD) 302, and a RAM 303. The CPU 301 controls the server 30. The RAM 303 temporarily stores various data. The HDD 302 stores programs for causing the CPU 301 to execute various processes, such as server processing (see FIG. 4) described later. The HDD 302 also stores a corresponding data table 95 (see FIG. 2) described later.
 暈し装置40の電気的構成について説明する。暈し装置40には、CPU401、HDD402、及びRAM403が設けられている。CPU401は、暈し装置40の制御を行う。RAM403は、各種データを一時的に記憶する。HDD402には、後述する暈し装置処理(図3参照)等、CPU401に各種の処理を実行させるためのプログラムが記憶されている。 The electrical configuration of the tanning device 40 will be described. The forgery device 40 is provided with a CPU 401, an HDD 402, and a RAM 403. The CPU 401 controls the whistle device 40. The RAM 403 temporarily stores various data. The HDD 402 stores programs for causing the CPU 401 to execute various processes, such as a tumbling apparatus process (see FIG. 3) described later.
 超解像装置50の電気的構成について説明する。超解像装置50には、CPU501、HDD502、及びRAM503が設けられている。CPU501は、超解像装置50の制御を行う。RAM503は、各種データを一時的に記憶する。HDD502には、後述する超解像装置処理(図6参照)等、CPU501に各種の処理を実行させるためのプログラムが記憶されている。 The electrical configuration of the super resolution device 50 will be described. The super resolution device 50 is provided with a CPU 501, an HDD 502, and a RAM 503. The CPU 501 controls the super resolution device 50. The RAM 503 temporarily stores various data. The HDD 502 stores programs for causing the CPU 501 to execute various types of processing, such as super-resolution device processing (see FIG. 6) described later.
 超解像装置60の電気的構成について説明する。超解像装置60には、CPU601、HDD602、及びRAM603が設けられている。CPU601は、超解像装置60の制御を行う。RAM603は、各種データを一時的に記憶する。HDD602には、後述する超解像処理(図6参照)等、CPU601に各種の処理を実行させるためのプログラムが記憶されている。 The electrical configuration of the super resolution device 60 will be described. The super resolution device 60 is provided with a CPU 601, an HDD 602, and a RAM 603. The CPU 601 controls the super resolution device 60. The RAM 603 temporarily stores various data. The HDD 602 stores programs for causing the CPU 601 to execute various types of processing such as super-resolution processing (see FIG. 6) described later.
 図2を参照し、対応データテーブル95について説明する。対応データテーブル95は、サーバ30のHDD302に記憶されている。対応データテーブル95には、リンクデータと、暈し画像81~84の暈し画像データとが対応付けられている。暈し画像81~84は、暈し装置40によるS12(図3参照、後述)の処理によって、第一画像データが暈されて生成される。本実施形態では、一例として、第一画像データには、対象物のロットナンバーの数字が含まれるとする。図2に示す暈し画像81~84は、夫々、ロットナンバー「55-35」、「23-82」、「15-96」、及び「91-75」が含まれた第一画像が暈された画像である。リンクデータは、暈し画像データに対応付けられる情報である。本実施形態では一例として、リンクデータは、文字列であるとする。詳細は後述するが、生成された暈し画像データとリンクデータとは、暈し装置40によってサーバ30に送信され(図3のS13参照)、サーバ30によってHDD302に記憶される(図4のS23参照)。 The correspondence data table 95 will be described with reference to FIG. The correspondence data table 95 is stored in the HDD 302 of the server 30. In the correspondence data table 95, the link data and the blurred image data of the blurred images 81 to 84 are associated. The forgery images 81 to 84 are generated by the first image data being garbled by the process of S12 (see FIG. 3, later described) by the forgery device 40. In the present embodiment, as an example, it is assumed that the first image data includes the number of the lot number of the object. The first images including lot numbers “55-35”, “23-82”, “15-96”, and “91-75” are overlooked as the decoy images 81 to 84 shown in FIG. 2 respectively. Image. The link data is information associated with the decoy image data. In the present embodiment, as an example, the link data is a character string. Although details will be described later, the generated decoy image data and link data are transmitted to the server 30 by the decoy apparatus 40 (see S13 in FIG. 3) and stored in the HDD 302 by the server 30 (S23 in FIG. 4). reference).
 真贋判定システム1における処理について説明する。以下の説明においては、対象物70(図1)の真贋判定を行う場合を例示しながら説明する。前述したように、対象物70は、製造業者の拠点である第一拠点4において製造され、流通管理者の拠点である第二拠点5において真贋判定される。さらに、対象物70は、販売業者の拠点である第三拠点6において真贋判定される。 The process in the authenticity determination system 1 will be described. In the following description, the case where the authenticity determination of the object 70 (FIG. 1) is performed will be described as an example. As described above, the object 70 is manufactured at the first base 4 which is the base of the manufacturer, and the authenticity determination is made at the second base 5 which is the base of the distribution manager. Further, the object 70 is subjected to the authenticity determination at the third base 6 which is the base of the distributor.
 まず、真贋判定の概要について説明する。図1に示すように、第一拠点4において対象物70が製造され、RFIDタグ71が付される。第一拠点4の作業者は作業用PC42を介して、専用ライタ41と暈し装置40とを操作する。作業用PC42のCPU(図示せず)は、第一画像80のデータである第一画像データと、リンクデータ「fblk」を生成する。第一画像80には、ロットナンバー「58-21」が含まれている。 First, an outline of the authenticity determination will be described. As shown in FIG. 1, an object 70 is manufactured at the first base 4 and an RFID tag 71 is attached. The operator of the first base 4 operates the dedicated writer 41 and the whistle device 40 via the work PC 42. The CPU (not shown) of the work PC 42 generates first image data, which is data of the first image 80, and link data "fblk". The first image 80 includes the lot number “58-21”.
 作業用PC42のCPUは、専用ライタ41を制御し、無線通信によって、第一画像80の第一画像データと、リンクデータ「fblk」とをRFIDタグ71に記憶させる(矢印701)。また、作業用PC42のCPUは、第一画像80の第一画像データと、リンクデータ「fblk」とを暈し装置40に送信する。暈し装置40は、後述する暈し装置処理(図3参照)を実行し、第一画像データに基づいて暈し画像データを作成し(図3のS12参照)、サーバ30に送信する(矢印702、及び図3のS13参照)。サーバ30に送信された第一画像データとリンクデータとは、サーバ30のCPU301によって対応データテーブル95に記憶される(図4のS23、及び図5参照)。 The CPU of the work PC 42 controls the dedicated writer 41 and stores the first image data of the first image 80 and the link data “fblk” in the RFID tag 71 by wireless communication (arrow 701). Further, the CPU of the work PC 42 transmits the first image data of the first image 80 and the link data “fblk” to the tweezer 40. The tanning device 40 executes tanning device processing (see FIG. 3) described later, creates tanning image data based on the first image data (see S12 in FIG. 3), and transmits it to the server 30 (arrow 702 and S13 of FIG. 3). The first image data and the link data transmitted to the server 30 are stored in the correspondence data table 95 by the CPU 301 of the server 30 (see S23 of FIG. 4 and FIG. 5).
 対象物70は、第一拠点4から出荷され、流通管理者の拠点である第二拠点5に搬送される(矢印711)。第二拠点5の作業者は、作業用PC52を介して、専用リーダ51と超解像装置50とを操作する。作業用PC52のCPU(図示せず)は、専用リーダ51を制御し、無線通信によって、RFIDタグ71から、第一画像80の第一画像データとリンクデータ「fblk」とを読み取る(矢印703参照)。作業用PC52のCPUは、読み取った第一画像80とリンクデータ「fblk」とを超解像装置50に送信する。超解像装置50のCPU501は、作業用PC52から送信されたリンクデータ「fblk」をサーバ30に送信する(矢印704、図6のS32参照)。 The object 70 is shipped from the first base 4 and transported to the second base 5 which is the base of the distribution manager (arrow 711). The operator at the second site 5 operates the dedicated reader 51 and the super resolution device 50 via the work PC 52. The CPU (not shown) of the working PC 52 controls the dedicated reader 51 and reads the first image data of the first image 80 and the link data “fblk” from the RFID tag 71 by wireless communication (see arrow 703) ). The CPU of the work PC 52 transmits the read first image 80 and the link data “fblk” to the super resolving device 50. The CPU 501 of the super resolving device 50 transmits the link data “fblk” transmitted from the work PC 52 to the server 30 (arrow 704, see S32 in FIG. 6).
 サーバ30のCPU301は、対応データテーブル95(図5参照)を参照し、超解像装置50から送信されたリンクデータ「fblk」と同じリンクデータ「fblk」に対応付けられた暈し画像データを特定する(図4のS24参照)。すなわち、暈し画像85の暈し画像データが特定される。サーバ30のCPU301は、特定した暈し画像85の暈し画像データを超解像装置50に送信する(矢印705、図4のS25参照)。 The CPU 301 of the server 30 refers to the corresponding data table 95 (see FIG. 5), and transmits the deceased image data associated with the same link data “fblk” as the link data “fblk” transmitted from the super resolution device 50. It identifies (refer to S24 of FIG. 4). That is, the forgery image data of the forgery image 85 is specified. The CPU 301 of the server 30 transmits the identified image data of the identified false image 85 to the super-resolution device 50 (arrow 705, see S25 of FIG. 4).
 超解像装置50のCPU501は、サーバ30から送信された暈し画像データに対して超解像処理を行い、第二画像データを作成する(図6のS34参照)。超解像処理とは、フーリエ変換を含み、暈し画像85を鮮明にする処理である。これによって、暈し画像85が鮮明にされた第二画像851の第二画像データが得られる。言い換えると、暈し画像85から、第一画像80が復元された第二画像851が得られる。CPU501は、専用リーダ51によって読み取られた第一画像80の第一画像データと、作成した第二画像851の第二画像データとを用いて、真贋判定可能にする。真贋判定を可能にする方法の一例については、後述する。 The CPU 501 of the super-resolution device 50 performs super-resolution processing on the decoy image data transmitted from the server 30, and creates second image data (see S34 in FIG. 6). Super-resolution processing is processing that includes a Fourier transform and sharpens the decoy image 85. As a result, second image data of the second image 851 in which the false image 85 is sharpened is obtained. In other words, the second image 851 in which the first image 80 is restored is obtained from the false image 85. The CPU 501 enables the authenticity determination using the first image data of the first image 80 read by the dedicated reader 51 and the second image data of the created second image 851. An example of a method for enabling the authenticity determination will be described later.
 真贋判定の結果、真正品であると判定された対象物70は、販売業者の拠点である第三拠点6に納入される(矢印712参照)。第三拠点6においては、第二拠点5の場合と同様に真贋判定が行われる。すなわち、第三拠点6の作業者は、作業用PC62を介して、専用リーダ61と超解像装置60とを操作する。作業用PC52のCPU(図示せず)は、専用リーダ61を制御し、無線通信によって、RFIDタグ71から、第一画像80の第一画像データとリンクデータ「fblk」とを読み取る(矢印706参照)。作業用PC62のCPUは、読み取った第一画像80とリンクデータ「fblk」とを超解像装置60に送信する。超解像装置60のCPU601は、作業用PC62から送信されたリンクデータ「fblk」をサーバ30に送信する(矢印707、及び図6のS32参照)。 As a result of the authenticity determination, the object 70 determined to be a genuine product is delivered to the third base 6 which is the base of the distributor (see arrow 712). At the third base 6, the authenticity determination is performed as in the case of the second base 5. That is, the worker at the third base 6 operates the dedicated reader 61 and the super resolving device 60 via the work PC 62. The CPU (not shown) of the working PC 52 controls the dedicated reader 61 and reads the first image data of the first image 80 and the link data “fblk” from the RFID tag 71 by wireless communication (see arrow 706). ). The CPU of the work PC 62 transmits the read first image 80 and the link data “fblk” to the super resolving device 60. The CPU 601 of the super resolving device 60 transmits the link data “fblk” transmitted from the working PC 62 to the server 30 (see the arrow 707 and S32 in FIG. 6).
 サーバ30のCPU301は、対応データテーブル95(図5参照)を参照し、超解像装置60から送信されたリンクデータ「fblk」と同じリンクデータ「fblk」に対応付けられた暈し画像データを特定する(図4のS24参照)。すなわち、暈し画像85の暈し画像データが特定される。サーバ30のCPU301は、特定した暈し画像85の暈し画像データを超解像装置60に送信する(矢印708、図4のS25参照)。 The CPU 301 of the server 30 refers to the correspondence data table 95 (see FIG. 5), and transmits the decoy image data associated with the same link data “fblk” as the link data “fblk” transmitted from the super resolution device 60 It identifies (refer to S24 of FIG. 4). That is, the forgery image data of the forgery image 85 is specified. The CPU 301 of the server 30 transmits the identified image data of the identified false image 85 to the super-resolution device 60 (arrow 708, see S25 in FIG. 4).
 超解像装置60のCPU601は、サーバ30から送信された暈し画像データに対して超解像処理を行い、第二画像データを作成する(図6のS34参照)。これによって、暈し画像85が鮮明にされた第二画像851の第二画像データが得られる。CPU601は、専用リーダ61によって読み取られた第一画像80の第一画像データと、作成した第二画像851の第二画像データとを用いて、真贋判定可能にする。 The CPU 601 of the super-resolution device 60 performs super-resolution processing on the decoy image data transmitted from the server 30, and creates second image data (see S34 in FIG. 6). As a result, second image data of the second image 851 in which the false image 85 is sharpened is obtained. The CPU 601 enables the authenticity determination using the first image data of the first image 80 read by the dedicated reader 61 and the second image data of the created second image 851.
 図3~図6を参照し、真贋判定システム1において実行される処理をより詳細に説明する。まず、図3を参照し、暈し装置40のCPU401によって実行される暈し装置処理について説明する。作業者によって作業用PC42が操作され、暈し装置処理を開始する指示が入力されると、CPU401は、HDD402から暈し装置処理のプログラムを読み出す。CPU401は、読み出したプログラムをRAM403に展開し、暈し装置処理を実行する。 The process executed in the authenticity determination system 1 will be described in more detail with reference to FIGS. 3 to 6. First, with reference to FIG. 3, a tanning device process executed by the CPU 401 of the tanning device 40 will be described. When the worker operates the work PC 42 and inputs an instruction to start the tanning device processing, the CPU 401 reads a tanning device processing program from the HDD 402. The CPU 401 loads the read program on the RAM 403 and executes the device processing.
 暈し装置処理においては、まず、第一画像データ及びリンクデータが取得されたか否かが判断される(S11)。前述したように、第一画像データとリンクデータとは、作業用PC42によって暈し装置40に送信される。暈し装置40に送信される第一画像データとリンクデータとは、専用ライタ41によってRFIDタグ71に記憶された情報(図1の矢印701参照)と同じである。 In the forgery process, first, it is determined whether first image data and link data are acquired (S11). As described above, the first image data and the link data are transmitted to the tampering device 40 by the working PC 42. The first image data and the link data transmitted to the tampering device 40 are the same as the information (see the arrow 701 in FIG. 1) stored in the RFID tag 71 by the dedicated writer 41.
 第一画像データとリンクデータとが取得されていない場合(S11:NO)、CPU401は処理をS11に戻す。第一画像データとリンクデータとが取得された場合(S11:YES)、取得された第一画像データが、暈し画像データに変換される(S12)。これによって、第一画像80(図1参照)が暈された暈し画像85(図1参照)の暈し画像データが作成される。次いで、S12において作成された暈し画像データと、S11において取得されたリンクデータ「fblk」とが、サーバ30に送信される(S13、及び図1の矢印702参照)。次いで、CPU401は、処理をS11に戻す。 If the first image data and the link data are not acquired (S11: NO), the CPU 401 returns the process to S11. When the first image data and the link data are acquired (S11: YES), the acquired first image data is converted into a crawl image data (S12). As a result, the forged image data of the forged image 85 (refer to FIG. 1) on which the first image 80 (refer to FIG. 1) is extracted is created. Next, the decoy image data created in S12 and the link data “fblk” acquired in S11 are transmitted to the server 30 (S13, see arrow 702 in FIG. 1). Next, the CPU 401 returns the process to S11.
 図4を参照し、サーバ30によるサーバ処理について説明する。サーバ処理を実行する指示がサーバ30に入力されると、CPU301は、HDD302からサーバ処理のプログラムを読み出す。CPU301は、読み出したプログラムをRAM303に展開し、サーバ処理を実行する。 The server processing by the server 30 will be described with reference to FIG. When an instruction to execute the server process is input to the server 30, the CPU 301 reads a program of the server process from the HDD 302. The CPU 301 loads the read program in the RAM 303 and executes server processing.
 サーバ処理では、まず、S13(図3参照)において送信された暈し画像データとリンクデータ(図1の矢印702参照)とが取得されたか否かが判断される(S21)。暈し画像データとリンクデータとが取得されていない場合(S21:NO)、超解像装置50又は超解像装置60のS32(図6参照、後述)によって送信されるリンクデータ(図1の矢印704,707参照)が受信されたか否かが判断される(S22)。リンクデータが受信されていない場合(S22:NO)、CPU301は処理をS21に戻す。 In the server process, first, it is determined whether or not the decoy image data and the link data (see arrow 702 in FIG. 1) transmitted in S13 (see FIG. 3) are acquired (S21). When the image data and the link data are not acquired (S21: NO), the link data (FIG. 1) transmitted by S32 (see FIG. 6, later described) of the super resolution device 50 or the super resolution device 60. It is determined whether or not the arrows 704 and 707 have been received (S22). If the link data is not received (S22: NO), the CPU 301 returns the process to S21.
 S13(図3参照)において送信された暈し画像データとリンクデータとが取得された場合(S21:YES)、取得された暈し画像データとリンクデータとが対応付けられ、HDD302に記憶される(S23)。これによって、図3に示す対応データテーブル95が、図5に示す対応データテーブル95のように更新される。すなわち、リンクデータ「fblk」と、暈し画像85の暈し画像データとが、対応データテーブル95に記憶される。CPU301は処理をS21に戻す。 When the decoy image data and the link data transmitted in S13 (see FIG. 3) are acquired (S21: YES), the acquired decoy image data and the link data are correlated and stored in the HDD 302 (S23). As a result, the correspondence data table 95 shown in FIG. 3 is updated as shown in the correspondence data table 95 shown in FIG. That is, the link data “fblk” and the blurred image data of the blurred image 85 are stored in the corresponding data table 95. The CPU 301 returns the process to S21.
 超解像装置50又は超解像装置60から送信されるリンクデータ(図1の矢印704,707参照)が受信された場合(S22:YES)、HDD302に記憶された暈し画像データのうち、超解像装置50又は超解像装置60から送信されたリンクデータと同じリンクデータに対応付けられた暈し画像データが特定される(S24)。リンクデータ「fblk」が超解像装置50又は超解像装置60から送信された場合(図1の矢印704,707参照)、対応データテーブル95(図5参照)においてリンクデータ「fblk」に対応付けられた暈し画像85の暈し画像データが特定される。 When link data (see arrows 704 and 707 in FIG. 1) transmitted from the super resolution device 50 or the super resolution device 60 is received (S22: YES), of the decoy image data stored in the HDD 302, The false image data associated with the same link data as the link data transmitted from the super resolution device 50 or the super resolution device 60 is specified (S24). When link data “fblk” is transmitted from super resolution device 50 or super resolution device 60 (see arrows 704 and 707 in FIG. 1), it corresponds to link data “fblk” in corresponding data table 95 (see FIG. 5) Forgery image data of the attached forgery image 85 is specified.
 次いで、S24において特定された暈し画像データが超解像装置50又は超解像装置60に送信される(S25)。なお、S22において取得されたリンクデータが、超解像装置50から送信されたデータである場合(図1の矢印704参照)、暈し画像データは超解像装置50に送信される(図1の矢印705参照)。S22において取得されたリンクデータが、超解像装置60から送信されたデータである場合(図1の矢印707参照)、暈し画像データは超解像装置60に送信される(図1の矢印708参照)。次いで、CPU301は処理をS21に戻す。 Next, the decoy image data identified in S24 is transmitted to the super resolution device 50 or the super resolution device 60 (S25). If the link data acquired in S22 is the data transmitted from the super resolution device 50 (see the arrow 704 in FIG. 1), the decoy image data is transmitted to the super resolution device 50 (FIG. 1). Arrow 705). If the link data acquired in S22 is the data transmitted from the super resolution device 60 (see arrow 707 in FIG. 1), the decoy image data is transmitted to the super resolution device 60 (arrow in FIG. 1) See 708). Next, the CPU 301 returns the process to S21.
 図6を参照し、超解像装置50,60による超解像装置処理について説明する。以下の説明においては、超解像装置50のCPU501によって実行される場合を説明するが、超解像装置60のCPU601によって実行される場合も同様である。作業者によって作業用PC52が操作され、超解像装置処理を開始する指示が入力されると、CPU501は、HDD502から超解像装置処理のプログラムを読み出す。CPU501は、読み出したプログラムをRAM503に展開し、超解像装置処理を実行する。 Super-resolution device processing by the super-resolution devices 50 and 60 will be described with reference to FIG. In the following description, although the case where it is executed by the CPU 501 of the super resolving device 50 will be described, the same applies to the case where it is executed by the CPU 601 of the super resolving device 60. When the worker operates the work PC 52 and inputs an instruction to start super-resolution device processing, the CPU 501 reads the super-resolution device processing program from the HDD 502. The CPU 501 loads the read program on the RAM 503 and executes the super-resolution device processing.
 図6に示すように、超解像装置処理においては、専用リーダ51によってRFIDタグ71から読み取られた第一画像データとリンクデータ(図1の矢印703参照)とが取得されたか否かが判断される(S31)。第一画像データとリンクデータとが取得されていない場合(S31:NO)、CPU501はS31の処理を繰り返す。第一画像データとリンクデータとが取得された場合(S31:YES)、取得されたリンクデータ「fblk」が、サーバ30に送信される(S32、図1の矢印704参照)。送信されたリンクデータは、サーバ30のCPU301によって受信される(図4のS22:YES)。 As shown in FIG. 6, in the super-resolution device processing, it is determined whether or not the first image data read from the RFID tag 71 by the dedicated reader 51 and the link data (see the arrow 703 in FIG. 1) are acquired. (S31). If the first image data and the link data are not acquired (S31: NO), the CPU 501 repeats the process of S31. If the first image data and the link data are acquired (S31: YES), the acquired link data “fblk” is transmitted to the server 30 (S32, see arrow 704 in FIG. 1). The transmitted link data is received by the CPU 301 of the server 30 (S22 in FIG. 4: YES).
 次いで、S32によってサーバ30に送信されたリンクデータに応じてS25(図4参照)において送信された暈し画像データ(図1の矢印705参照)が取得されたか否かが判断される(S33)。暈し画像データが取得されていない場合(S33:NO)、CPU501はS33の処理を繰り返す。 Next, it is determined whether or not the decoy image data (see arrow 705 in FIG. 1) transmitted in S25 (see FIG. 4) is obtained according to the link data sent to the server 30 in S32 (S33) . When the forgery image data is not acquired (S33: NO), the CPU 501 repeats the process of S33.
 暈し画像データが取得された場合(S33:YES)、取得された暈し画像データに対して、超解像処理が実行され、超解像処理後の第二画像851(図1参照)の第二画像データが作成される(S34)。 When the forgery image data is acquired (S33: YES), the super-resolution processing is performed on the acquired forgery image data, and the second image 851 after the super-resolution processing (see FIG. 1) Second image data is created (S34).
 次いで、専用リーダ51によってRFIDタグ71から読み取られた情報に対応する第一画像80と、S34において作成された第二画像データに基づく第二画像851とが用いられ、真贋判定処理が実行される(S35)。真贋判定処理は、対象物70の真贋判定を可能にする処理である。 Then, the first image 80 corresponding to the information read from the RFID tag 71 by the dedicated reader 51 and the second image 851 based on the second image data created in S34 are used to execute the authenticity determination process. (S35). The authenticity determination processing is processing that enables the authenticity determination of the object 70.
 真贋判定処理は、作業者が対象物70の真贋判定できる処理であればよく、その態様は限定されない。例えば、真贋判定処理は、第一画像80と第二画像851とをディスプレイ(図示せず)に表示する処理であってもよい。この場合、作業者は、ディスプレイに表示された第一画像80と第二画像851とを比較し、一致する場合は真正品であると判断し、一致しない場合は偽造品であると判断できる。また、真贋判定処理は、CPU501が第一画像80と第二画像851とを比較し、一致する場合は一致することを作業者に通知し、一致しない場合は一致しないことを作業者に通知する処理であってもよい。通知の方法は限定されず、例えば、ディスプレイに表示されてもよいし、LED(Light Emitting Diode)の点灯パターンによって通知されてもよい。本実施形態においては、第一画像80に含まれる情報であるロットナンバー「58-21」と、第二画像851に含まれる情報である「58-21」とが同じであるため、真正品である。CPU501は、S35の処理を実行後、処理をS31に戻す。 The authenticity determination process may be any process as long as the worker can determine the authenticity of the object 70, and the mode is not limited. For example, the authenticity determination process may be a process of displaying the first image 80 and the second image 851 on a display (not shown). In this case, the worker compares the first image 80 and the second image 851 displayed on the display, and determines that the product is a genuine product if they match, and determines that it is a counterfeit product if they do not match. Further, in the authenticity determination process, the CPU 501 compares the first image 80 and the second image 851, and notifies the worker that they match if they match, and notifies the worker that they do not match if they do not match. It may be a process. The method of notification is not limited, and may be displayed on a display, for example, or may be notified by a lighting pattern of an LED (Light Emitting Diode). In the present embodiment, since the lot number “58-21” which is the information included in the first image 80 and the “58-21” which is the information included in the second image 851 are the same, they are genuine products. is there. After executing the process of S35, the CPU 501 returns the process to S31.
 以上のように、第二拠点5において、真贋判定処理が実行される。第二拠点5における真贋判定の結果、真正品と判定された対象物70は、第三拠点6に納入される(図1の矢印712参照)。前述したように、第三拠点6においては、超解像装置60のCPU601によって超解像装置処理(図6参照)が実行される。すなわち、専用リーダ61によってRFIDタグ71から読み取られた第一画像データとリンクデータ(図1の矢印706参照)とが取得され(S31:YES)、リンクデータがサーバ30に送信される(S32、図1の矢印707参照)。サーバ30から送信される暈し画像データ(図1の矢印708参照)が取得され(S33:YES)、超解像処理が実行される(S34)。さらに、真贋判定処理が実行される(S35)。第三拠点6における真贋判定の結果、真正品と判定された対象物70は、顧客に販売される。 As described above, the authenticity determination process is executed at the second site 5. The object 70 determined as an authentic product as a result of the authenticity determination at the second base 5 is delivered to the third base 6 (see the arrow 712 in FIG. 1). As described above, in the third base 6, the super resolution device processing (see FIG. 6) is executed by the CPU 601 of the super resolution device 60. That is, the first image data read from the RFID tag 71 and the link data (see arrow 706 in FIG. 1) are acquired by the dedicated reader 61 (S31: YES), and the link data is transmitted to the server 30 (S32, See arrow 707 in FIG. 1). The forgery image data (see arrow 708 in FIG. 1) transmitted from the server 30 is acquired (S33: YES), and the super-resolution processing is executed (S34). Further, the authenticity determination process is executed (S35). The object 70 determined to be an authentic product as a result of the authenticity determination at the third base 6 is sold to the customer.
 以上のように、本実施形態の真贋判定システム1における処理が実行される。本実施形態においては、複数の装置(本実施形態においては、サーバ30、暈し装置40、及び超解像装置50,60)相互間の通信において、S12(図3参照)で変換された暈し画像データがネットワーク2を介して送受信される(図1の矢印702,705,708参照)。そして、暈し画像データが真贋判定処理に用いられる(図6のS34及びS35参照)。ネットワーク2を介して送受信されるのは、第一画像80が暈された暈し画像85の暈し画像データである。よって、仮にネットワーク2上を送受信される暈し画像85の暈し画像データが他者によって読み取られた場合でも、他者は第一画像80を確認することができない。よって、第一画像80に含まれる情報(本実施形態ではロットナンバー「58-21」)が流出する可能性を低減できる。 As described above, the processing in the authenticity determination system 1 of the present embodiment is performed. In the present embodiment, in the communication among a plurality of devices (in the present embodiment, the server 30, the tanning device 40, and the super resolution devices 50 and 60), the tweezers converted in S12 (see FIG. 3) Image data is transmitted and received via the network 2 (see arrows 702, 705 and 708 in FIG. 1). Then, the decoy image data is used in the authenticity determination process (see S34 and S35 in FIG. 6). What is transmitted and received via the network 2 is the limp image data of the decoy image 85 in which the first image 80 is decoyed. Therefore, even if the false image data of the false image 85 transmitted and received on the network 2 is read by another person, the other person can not confirm the first image 80. Therefore, it is possible to reduce the possibility that the information included in the first image 80 (in the present embodiment, lot number “58-21”) leaks out.
 また、本実施形態においては、対象物70に付される記憶媒体であるRFIDタグ71に、第一画像データ等の情報が記憶される。真贋判定システム1は、RFIDタグ71に記憶された情報に基づいて真贋判定を可能にすることができる。 Further, in the present embodiment, information such as first image data is stored in the RFID tag 71 which is a storage medium attached to the object 70. The authenticity determination system 1 can enable the authenticity determination based on the information stored in the RFID tag 71.
 また、RFIDタグ71には、第一画像データに加え、リンクデータが記憶される(図1の矢印701参照)。CPU401によって、第一画像データに基づく暈し画像データとリンクデータとがサーバ30に送信される(図3のS13、図1の矢印702)。送信された暈し画像データとリンクデータとは、CPU301によって対応付けられ、HDD302に記憶される(図4のS23)。専用リーダ51,61によってRFIDタグ71から読み取られたリンクデータ(図1の矢印703,706参照)が、CPU501,601によってサーバ30に送信される(図6のS32、図1の矢印704,707参照)。CPU301によって、HDD302に記憶された暈し画像データ(図5参照)のうち、超解像装置50,60から送信されるリンクデータ(図1の矢印704,707参照)と同じリンクデータに対応付けられた暈し画像データが、超解像装置50,60に送信される(図4のS25、図1の矢印705,708参照)。CPU501,601によって、S32(図6)の処理においてサーバ30に送信されたリンクデータに応じて送信された暈し画像データに対して超解像処理が行われ、第二画像データが作成される(図6のS34参照)。そして、CPU501,601によって真贋判定処理が実行される(S35)。 In addition to the first image data, link data is stored in the RFID tag 71 (see an arrow 701 in FIG. 1). The CPU 401 transmits the decoy image data and the link data based on the first image data to the server 30 (S13 in FIG. 3, arrow 702 in FIG. 1). The transmitted decoy image data and link data are correlated by the CPU 301 and stored in the HDD 302 (S23 in FIG. 4). The link data (see arrows 703 and 706 in FIG. 1) read from the RFID tag 71 by the dedicated reader 51 and 61 is transmitted to the server 30 by the CPUs 501 and 601 (S32 in FIG. 6, arrows 704 and 707 in FIG. 1). reference). Of the decoy image data (see FIG. 5) stored in the HDD 302 by the CPU 301, it is associated with the same link data as the link data (see arrows 704 and 707 in FIG. 1) transmitted from the super resolving device 50, 60 The forged image data is transmitted to the super-resolution device 50, 60 (S25 in FIG. 4, see arrows 705, 708 in FIG. 1). The super-resolution processing is performed on the decoy image data transmitted according to the link data transmitted to the server 30 in the processing of S32 (FIG. 6) by the CPUs 501 and 601, and the second image data is created. (See S34 in FIG. 6). Then, the authenticity determination processing is executed by the CPUs 501 and 601 (S35).
 このように、本実施形態においては、リンクデータが用いられて、処理が行われる。このため、RFIDタグ71に記憶されていない任意のデータがCPU501,601によって作成され、リンクデータの代わりに用いられる場合に比べて、HDD302に記憶されているデータとCPU501,601によってサーバ30に送信されるデータとが一致しやすい。よって、リンクデータが用いられない場合に比べて、より確実に、第一画像80に対応する暈し画像データをサーバ30から超解像装置50,60に送信することができる。よって、真贋判定の精度が向上する。 Thus, in the present embodiment, link data is used to perform processing. Therefore, data stored in the HDD 302 and transmitted by the CPU 501, 601 to the server 30 as compared with the case where arbitrary data not stored in the RFID tag 71 is created by the CPU 501, 601 and used instead of link data. It is easy to agree with the data Therefore, it is possible to transmit the false image data corresponding to the first image 80 from the server 30 to the super resolving devices 50 and 60 more reliably than when the link data is not used. Therefore, the accuracy of the authenticity determination is improved.
 上記実施形態において、暈し装置40は本発明の「第一装置」の一例である。RFIDタグ71は本発明の「記憶媒体」の一例である。超解像装置50及び超解像装置60は本発明の「第二装置」の一例である。S12(図3参照)の処理を行うCPU401は本発明の「第一変換手段」の一例である。S13(図3参照)の処理を行うCPU401は本発明の「第一送信手段」の一例である。S23(図4参照)の処理を行うCPU301は本発明の「記憶制御手段」の一例である。S25(図4参照)の処理を行うCPU301は本発明の「第二送信手段」の一例である。S34(図6参照)の処理を行うCPU501,601は本発明の「作成手段」の一例である。S35(図6参照)の処理を行うCPU501,601は本発明の「真贋判定手段」の一例である。
請求項5の効果
 なお、本発明は上記の実施形態に限定されるものではなく、種々の変更が可能である。例えば、超解像処理(図6のS34参照)は1回行われ、第二画像データが作成されていたが、これに限定されない。例えば、S34において、暈し画像データに対して超解像処理が複数回行われ、第二画像データが作成されてもよい。この場合、超解像処理が複数回行われるので、1回だけ行われる場合に比べて、第二画像851がより鮮明になる。よって、真贋判定の精度が向上する。
請求項3について
 また、サーバ30、暈し装置40、及び超解像装置50,60の相互間で、暈し画像データが送受信されればよく、リンクデータが送受信されなくてもよい。例えば、RFIDタグ71には、リンクデータが記憶されず、第一画像データのみが記憶されてもよい(図1の矢印701)。この場合、例えば、暈し装置40のCPU401によって、第一画像データに基づいて暈し画像データが作成され(図3のS12)、サーバ30に送信される(図3のS13)。サーバ30のCPU301は、暈し画像データをHDD302に記憶する(図4のS23)。超解像装置50,60のCPU501,601は、専用リーダ51,61によってRFIDタグ71から読み取られた第一画像データに基づいて暈し画像データを作成する(図示せず)。CPU501,601は、S32(図6参照)において、リンクデータではなく、暈し画像データをサーバ30に送信する。CPU301は、S24(図4参照)において、HDD302に記憶された暈し画像データのうち、超解像装置50,60から送信された暈し画像データに一致する暈し画像データを特定する。CPU301は、S25(図4参照)において、特定した暈し画像データを超解像装置50,60に送信する。CPU501,601は、受信した暈し画像データに対して超解像処理を行い(図6のS34)、真贋判定処理を実行する(図6のS35)。さらに、RFIDタグ71に記憶する第一画像データ80を暈し画像としてもよい。RFIDタグ71に暈し画像が記憶されていれば、RFIDタグ71の暈し画像データが他者によって読み取られた場合でも、他者は、超解像装置がなければ第一画像80を確認することができない。第1画像80が流出することを確実に防止することができる。
In the above embodiment, the tanning device 40 is an example of the "first device" in the present invention. The RFID tag 71 is an example of the "storage medium" in the present invention. The super resolution device 50 and the super resolution device 60 are examples of the “second device” in the present invention. CPU401 which performs processing of S12 (refer to Drawing 3) is an example of the "1st conversion means" of the present invention. CPU401 which performs processing of S13 (refer to Drawing 3) is an example of the "1st transmission means" of the present invention. The CPU 301 performing the process of S23 (see FIG. 4) is an example of the "storage control means" in the present invention. CPU301 which performs processing of S25 (refer to Drawing 4) is an example of the "2nd transmission means" of the present invention. The CPUs 501 and 601 that perform the process of S34 (see FIG. 6) are an example of the “creation means” in the present invention. The CPUs 501 and 601 that perform the process of S35 (see FIG. 6) are an example of the "authority determination means" in the present invention.
The present invention is not limited to the above embodiment, and various modifications can be made. For example, although the super-resolution processing (see S34 in FIG. 6) is performed once and the second image data is created, the present invention is not limited to this. For example, in S34, the super-resolution processing may be performed multiple times on the decoy image data to create the second image data. In this case, since the super-resolution processing is performed a plurality of times, the second image 851 becomes clearer than when it is performed only once. Therefore, the accuracy of the authenticity determination is improved.
Regarding Claim 3, In addition, the link data may not be transmitted / received as long as the image data is transmitted / received among the server 30, the bookmarking apparatus 40, and the super-resolution devices 50, 60. For example, the link data may not be stored in the RFID tag 71, and only the first image data may be stored (arrow 701 in FIG. 1). In this case, for example, the decoy image data is created based on the first image data by the CPU 401 of the decoy apparatus 40 (S12 in FIG. 3) and transmitted to the server 30 (S13 in FIG. 3). The CPU 301 of the server 30 stores the tweet image data in the HDD 302 (S23 in FIG. 4). The CPUs 501 and 601 of the super-resolution devices 50 and 60 create hidden image data based on the first image data read from the RFID tag 71 by the dedicated readers 51 and 61 (not shown). In S32 (see FIG. 6), the CPUs 501 and 601 transmit not the link data but the persimmon image data to the server 30. In S24 (see FIG. 4), the CPU 301 identifies, among the blurring image data stored in the HDD 302, the blurring image data that matches the blurring image data transmitted from the super-resolution device 50, 60. The CPU 301 transmits the identified decoy image data to the super-resolution devices 50 and 60 in S25 (see FIG. 4). The CPUs 501 and 601 perform super-resolution processing on the received decoy image data (S34 in FIG. 6), and execute authenticity determination processing (S35 in FIG. 6). Furthermore, the first image data 80 stored in the RFID tag 71 may be a hidden image. If an image is stored in the RFID tag 71, even if the image data of the RFID tag 71 is read by another person, the other person confirms the first image 80 if there is no super resolution device. I can not do it. The outflow of the first image 80 can be reliably prevented.
 この場合においても、暈し画像データが、サーバ30、暈し装置40、及び超解像装置50,60の相互間で送受信される。よって、サーバ30、暈し装置40、及び超解像装置50,60の相互間で送受信される暈し画像データが他者によって読み取られた場合でも、他者は第一画像80を確認することができない。よって、第一画像80に含まれる情報が流出する可能性を低減できる。 Also in this case, the tanning image data is transmitted and received among the server 30, the tanning device 40, and the super-resolution devices 50 and 60. Therefore, even if the tweet image data transmitted / received among the server 30, the tweet device 40, and the super-resolution devices 50, 60 is read by another person, the other person confirms the first image 80. I can not Thus, the possibility of the information included in the first image 80 being leaked can be reduced.
 また、リンクデータ及び第一画像データ等の情報は、RFIDタグ71に記憶されていたが、これに限定されない。例えば、USB(Universal Serial Bus)メモリーなど、RFIDタグ71以外の記憶媒体であってもよい。また、リンクデータ及び第一画像データ等の情報は、対象物70に付されればよく、記憶媒体に記憶されなくてもよい。例えば、バーコード及びQRコード(登録商標)等に情報が含められ、対象物70に付されてもよい。 Moreover, although information, such as link data and 1st image data, was memorize | stored in RFID tag 71, it is not limited to this. For example, a storage medium other than the RFID tag 71 such as a USB (Universal Serial Bus) memory may be used. Further, the information such as the link data and the first image data may be attached to the object 70 and may not be stored in the storage medium. For example, information may be included in a barcode and a QR code (registered trademark) and the like, and may be attached to the object 70.
 真贋判定システム1は、暈し装置40を含む複数の装置がネットワーク2を介して接続され、対象物70に付される情報に基づいて対象物の真贋判定を可能にするシステムであればよく、サーバ30及び超解像装置50,60の一部が設けられなくてもよい。例えば、サーバ30及び超解像装置50が設けられなくてもよい。この場合、暈し画像データが、暈し装置40から、ネットワーク2を介して超解像装置60に送信され、真贋判定処理に用いられてもよい。 The authenticity determination system 1 may be any system as long as a plurality of devices including the forgery device 40 are connected via the network 2 and the authenticity determination of the object is possible based on the information attached to the object 70, The server 30 and a part of the super resolution devices 50 and 60 may not be provided. For example, the server 30 and the super resolution device 50 may not be provided. In this case, the whistle image data may be transmitted from the whistle device 40 to the super-resolution device 60 via the network 2 and used for the authenticity determination process.
 また、図3、図4、及び図6のフローチャートに示す処理など、真贋判定システム1において実行される処理の一部が、上記実施形態において処理を実行する装置とは異なる装置によって処理されてもよい。 Moreover, even if a part of the process performed in the authenticity determination system 1 such as the process shown in the flowcharts of FIGS. 3, 4 and 6 is processed by an apparatus different from the apparatus performing the process in the above embodiment Good.
 また、CPU501,601によって、対象物70の真贋判定が実行される場合に、1つの対象物70に対して実行されていたが、これに限定されない。例えば、輸送に使用される梱包材に複数の対象物70が梱包されている場合がある。この場合、梱包材内の複数の対象物70の夫々に付されたRFIDタグ71から、一括して第一画像データとリンクデータとが読み取られ(図1の矢印703)、複数のリンクデータが一括してサーバ30に送信されてもよい(図6のS32、図1の矢印704参照)。そして、複数のリンクデータに対応する複数の第二画像データが一括してサーバ30から超解像装置50,60に送信され(図4のS25、及び図1の矢印705,708参照)、超解像装置50,60によって取得される(図6のS33:YES)。そして、複数の第二画像データに対して超解像処理が実行される(図6のS34及びS35)。 Moreover, when the authenticity determination of the target object 70 is executed by the CPUs 501 and 601, although the processing is performed on one target object 70, the present invention is not limited to this. For example, a plurality of objects 70 may be packaged in a packaging material used for transportation. In this case, the first image data and the link data are collectively read from the RFID tag 71 attached to each of the plurality of objects 70 in the packing material (arrow 703 in FIG. 1), and the plurality of link data It may be collectively transmitted to the server 30 (S32 in FIG. 6, see arrow 704 in FIG. 1). Then, a plurality of second image data corresponding to a plurality of link data are collectively transmitted from the server 30 to the super resolution device 50, 60 (see S25 in FIG. 4 and arrows 705, 708 in FIG. 1). It is acquired by the resolving devices 50 and 60 (S33 in FIG. 6: YES). Then, super-resolution processing is performed on the plurality of second image data (S34 and S35 in FIG. 6).
1  真贋判定システム
2  ネットワーク
30  サーバ
40  暈し装置
41  専用ライタ
50,60  超解像装置
51,61  専用リーダ
70  対象物
71  RFIDタグ
80  第一画像
81~85  暈し画像
95  対応データテーブル
301,401,501,601  CPU
302,402,502,602  HDD
851  第二画像
DESCRIPTION OF SYMBOLS 1 True / false judgment system 2 Network 30 Server 40 Trick device 41 Special writer 50, 60 Super resolution device 51, 61 Special reader 70 Target object 71 RFID tag 80 First image 81 to 85 Till image 95 Correspondence data table 301, 401 , 501, 601 CPU
302, 402, 502, 602 HDD
851 second image

Claims (6)

  1.  第一装置を含む複数の装置がネットワークを介して接続され、対象物に付される情報に基づいて、前記対象物の真贋判定を可能にする真贋判定システムであって、
     前記第一装置は、前記情報に対応する第一画像のデータである第一画像データを、前記第一画像が暈された暈し画像のデータである暈し画像データに変換する第一変換手段を備え、
     前記複数の装置相互間の通信において、前記第一変換手段によって変換された前記暈し画像データが前記ネットワークを介して送受信され、前記対象物の真贋判定を可能にする真贋判定処理に用いられることを特徴とする真贋判定システム。
    A plurality of devices including a first device are connected via a network, and the authenticity determination system enables authenticity determination of the object based on information given to the object,
    First conversion means for converting first image data, which is data of a first image corresponding to the information, into decoy image data, which is data of a decoy image of the first image. Equipped with
    In communication among the plurality of devices, the false image data converted by the first conversion means is transmitted and received via the network, and is used in an authenticity determination process that enables authenticity determination of the object. An authenticity judgment system characterized by
  2.  前記情報は、対象物に付される記憶媒体に記憶された情報であることを特徴とする請求項1に記載の真贋判定システム。 The authenticity determination system according to claim 1, wherein the information is information stored in a storage medium attached to the object.
  3.  前記複数の装置には、サーバと第二装置とが含まれ、
     前記第一装置は、
     前記第一変換手段によって変換された前記暈し画像データを、前記サーバに送信する第一送信手段を備え、
     前記サーバは、
     前記第一送信手段によって送信された前記暈し画像データを記憶部に記憶する記憶制御手段と、
     前記記憶制御手段によって前記記憶部に記憶された前記暈し画像データを前記第二装置に送信する第二送信手段と
    を備え、
     前記第二装置は、
     前記第二送信手段によって送信された前記暈し画像データに対して、フーリエ変換を含む超解像処理を行い、前記超解像処理後の第二画像のデータである第二画像データを作成する作成手段と、
     読取装置によって前記記憶媒体から読み取られた前記情報に対応する前記第一画像と、前記作成手段によって作成された第二画像データに基づく前記第二画像とを用いて、前記真贋判定処理を実行する真贋判定手段と
    を備えたことを特徴とする請求項2に記載の真贋判定システム。
    The plurality of devices include a server and a second device,
    The first device is
    And a first transmission unit configured to transmit the decoy image data converted by the first conversion unit to the server.
    The server is
    Storage control means for storing the decoy image data transmitted by the first transmission means in a storage unit;
    And second transmission means for transmitting the decoy image data stored in the storage unit by the storage control means to the second device.
    The second device is
    Super-resolution processing including Fourier transform is performed on the decoy image data transmitted by the second transmission unit, and second image data which is data of the second image after the super-resolution processing is created. Means of creation,
    The authenticity determination process is performed using the first image corresponding to the information read from the storage medium by the reader and the second image based on the second image data generated by the generation unit. The authenticity determination system according to claim 2, further comprising: authenticity determination means.
  4.  前記記憶媒体には、リンクデータがさらに記憶され、
     前記第一送信手段は、前記暈し画像データと前記リンクデータとを前記サーバに送信し、
     前記記憶制御手段は、前記第一送信手段によって送信された前記暈し画像データと前記リンクデータとを対応付けて前記記憶部に記憶し、
     前記第二送信手段は、前記記憶部に記憶された前記暈し画像データのうち、前記第二装置から送信される前記リンクデータと同じ前記リンクデータに対応付けられた前記暈し画像データを前記第二装置に送信し、
     前記第二装置は、前記読取装置よって前記記憶媒体から読み取られた前記リンクデータを、前記サーバに送信するリンクデータ送信手段を備え、
     前記作成手段は、前記リンクデータ送信手段によって前記サーバに送信された前記リンクデータに応じて前記第二送信手段によって送信された前記暈し画像データに対して前記超解像処理を行い、前記第二画像データを作成することを特徴とする請求項3に記載の真贋判定システム。
    The storage medium further stores link data,
    The first transmission unit transmits the decoy image data and the link data to the server.
    The storage control unit associates the decoy image data transmitted by the first transmission unit with the link data, and stores the association in the storage unit.
    The second transmission unit is configured to, of the decoy image data stored in the storage unit, the decoy image data associated with the same link data as the link data transmitted from the second device. Send to the second device,
    The second device includes link data transmission means for transmitting the link data read from the storage medium by the reader to the server.
    The creating means performs the super-resolution processing on the decoy image data transmitted by the second transmission means in accordance with the link data transmitted to the server by the link data transmission means, The authenticity determination system according to claim 3, wherein two image data are created.
  5.  前記作成手段は、前記暈し画像データに対して前記超解像処理を複数回行い、前記第二画像データを作成することを特徴とする請求項3又は4に記載の真贋判定システム。 5. The authenticity determination system according to claim 3, wherein the creating unit creates the second image data by performing the super-resolution processing multiple times on the decoy image data.
  6.  第一装置、サーバ、及び第二装置がネットワークを介して接続され、対象物に付される情報に基づいて、前記対象物の真贋判定を可能にする真贋判定システムに含まれる前記サーバであって、
     前記第一装置において、前記情報に対応する第一画像のデータである第一画像データが、前記第一画像が暈された暈し画像のデータである暈し画像データに変換され、前記サーバに送信される前記暈し画像データを、前記サーバにおいて記憶部に記憶する記憶制御手段と、
     前記暈し画像データを用いて前記対象物の真贋判定を可能にする真贋判定処理を行う第二装置に、前記記憶制御手段によって前記記憶部に記憶された前記暈し画像データを送信する送信手段と
    を備えたことを特徴とするサーバ。
    A first device, a server, and a second device are connected via a network, and the server is included in an authenticity determination system that enables authenticity determination of the object based on information attached to the object. ,
    In the first device, first image data, which is data of a first image corresponding to the information, is converted into false image data, which is data of a false image where the first image is false, and the server Storage control means for storing the decoy image data to be transmitted in a storage unit in the server;
    A transmitting unit that transmits the decoy image data stored in the storage unit by the storage control unit to the second device that performs authenticity determination processing that enables authenticity determination of the object using the decoy image data. And a server characterized in that
PCT/JP2016/077059 2015-09-16 2016-09-14 Authenticity determination system, and server WO2017047619A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2015-182479 2015-09-16
JP2015182479A JP2017059970A (en) 2015-09-16 2015-09-16 Authenticity determination system and server

Publications (1)

Publication Number Publication Date
WO2017047619A1 true WO2017047619A1 (en) 2017-03-23

Family

ID=58288699

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2016/077059 WO2017047619A1 (en) 2015-09-16 2016-09-14 Authenticity determination system, and server

Country Status (2)

Country Link
JP (1) JP2017059970A (en)
WO (1) WO2017047619A1 (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006229852A (en) * 2005-02-21 2006-08-31 Dainippon Printing Co Ltd Product authentication system, server, program, and recording medium
EP1791079A1 (en) * 2005-11-25 2007-05-30 Fuji Xerox Co., Ltd. Method and apparatus for making tags, tag, and system for managing articles
JP2007299179A (en) * 2006-04-28 2007-11-15 Toppan Printing Co Ltd Distribution management device and processing method for it
JP2008234537A (en) * 2007-03-23 2008-10-02 Nec Corp Forged merchandise detecting system and forged merchandise detecting method
JP2009531251A (en) * 2006-03-31 2009-09-03 ブリティッシュ・テレコミュニケーションズ・パブリック・リミテッド・カンパニー Acquisition of product information
JP2011118842A (en) * 2009-12-07 2011-06-16 Canon Inc Information processing apparatus, display control method, and program
JP2014522010A (en) * 2011-04-28 2014-08-28 ウェセックス テクノロジー オプト−エレクトロニック プロダクツ リミテッド Monitor of portable goods
JP2015072539A (en) * 2013-10-02 2015-04-16 コニカミノルタ株式会社 Display system, display device, and transfer data display method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008065649A2 (en) * 2006-11-27 2008-06-05 Authix Technologies Ltd System for product authentication and tracking

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006229852A (en) * 2005-02-21 2006-08-31 Dainippon Printing Co Ltd Product authentication system, server, program, and recording medium
EP1791079A1 (en) * 2005-11-25 2007-05-30 Fuji Xerox Co., Ltd. Method and apparatus for making tags, tag, and system for managing articles
JP2009531251A (en) * 2006-03-31 2009-09-03 ブリティッシュ・テレコミュニケーションズ・パブリック・リミテッド・カンパニー Acquisition of product information
JP2007299179A (en) * 2006-04-28 2007-11-15 Toppan Printing Co Ltd Distribution management device and processing method for it
JP2008234537A (en) * 2007-03-23 2008-10-02 Nec Corp Forged merchandise detecting system and forged merchandise detecting method
JP2011118842A (en) * 2009-12-07 2011-06-16 Canon Inc Information processing apparatus, display control method, and program
JP2014522010A (en) * 2011-04-28 2014-08-28 ウェセックス テクノロジー オプト−エレクトロニック プロダクツ リミテッド Monitor of portable goods
JP2015072539A (en) * 2013-10-02 2015-04-16 コニカミノルタ株式会社 Display system, display device, and transfer data display method

Also Published As

Publication number Publication date
JP2017059970A (en) 2017-03-23

Similar Documents

Publication Publication Date Title
US9697298B2 (en) ID tag authentication system and method
US8140852B2 (en) Authenticating serialized commodities
KR20200092194A (en) System and method for preventing forgery and illegal replacement of goods using blockchain
US10068237B2 (en) Transmit an authentication mark
CN104091140B (en) A kind of information processing method and electronic equipment
KR102260493B1 (en) Contents generating device for certificating genuine product and system for integrated certification of using the same
US9473303B2 (en) Method and system for product authentication
CN111919215A (en) Authentication of packaged products
CN107016430B (en) Authenticity tag and method of encoding and verifying
JP2017016615A (en) Genuine product verification means and genuine product verification system
CN105930179A (en) Method and apparatus for upgrading transaction terminal
CN114140132B (en) Anti-counterfeiting tracing system
CN103577996B (en) Online verification method and system
CN104871194A (en) Item authenticity
US10193883B2 (en) Systems and methods for product authentication
WO2017047619A1 (en) Authenticity determination system, and server
JP2020197937A (en) Authenticity determining apparatus, authenticity determining system, and authenticity determining method
CN114140133B (en) Method for processing tracing data
US20200160353A1 (en) Anti-Counterfeiting System Using Near Field Communication (NFC) Tag
CN114830599B (en) Managing physical objects using encryption anchors
KR20150101007A (en) Payment System which coupon is automatically applied, user terminal, payment terminal and device for providing coupon
CN103502996B (en) Anti-double increment information object
CN108830622A (en) A kind of novel commodity cloud anti-counterfeiting system method
JPWO2018143059A1 (en) Authentication server, authentication system, authentication method, authentication program
US10372944B2 (en) Anti-counterfeiting serialization system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16846490

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16846490

Country of ref document: EP

Kind code of ref document: A1