CN103324894B - A kind of composite anti-fake document structure tree method and system - Google Patents

A kind of composite anti-fake document structure tree method and system Download PDF

Info

Publication number
CN103324894B
CN103324894B CN201310292562.3A CN201310292562A CN103324894B CN 103324894 B CN103324894 B CN 103324894B CN 201310292562 A CN201310292562 A CN 201310292562A CN 103324894 B CN103324894 B CN 103324894B
Authority
CN
China
Prior art keywords
page
security documents
specifying
false proof
documentation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310292562.3A
Other languages
Chinese (zh)
Other versions
CN103324894A (en
Inventor
张丽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZOOM COMMERCE TECHNOLOGY Co Ltd
Original Assignee
ZOOM COMMERCE TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=49193628&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=CN103324894(B) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by ZOOM COMMERCE TECHNOLOGY Co Ltd filed Critical ZOOM COMMERCE TECHNOLOGY Co Ltd
Priority to CN201310292562.3A priority Critical patent/CN103324894B/en
Publication of CN103324894A publication Critical patent/CN103324894A/en
Application granted granted Critical
Publication of CN103324894B publication Critical patent/CN103324894B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention relates to field of anti-counterfeit technology, particularly a kind of composite anti-fake document structure tree method and system.The method, comprising: the false proof figure adding true-to-shape by preset rules in the documentation page of specifying, and generates security documents page; Wherein, false proof figure comprises: one or more in false proof shading figure, anti-duplicating figure, micro text figure and two-dimension code pattern; Receive the request instruction that user triggers, after the security documents page of being specified by request instruction encryption, be issued to client; Client is combined into security documents to after the security documents page deciphering received.This system comprises: server end, and the security documents page for generating security documents page and specified by request instruction is issued to client after encrypting; Client, for being combined into security documents to after the security documents page deciphering received.The security documents that these composite anti-fake document structure tree method and system generate, reduces the difficulty that consumer identifies true and false document, improves the antifalse effect of security documents.

Description

A kind of composite anti-fake document structure tree method and system
Technical field
The present invention relates to field of anti-counterfeit technology, in particular to a kind of composite anti-fake document structure tree method and system.
Background technology
In correlation technique, the generation method of security documents mainly contains: by adding laser anti-counterfeit label in a document, or, by adding query formulation numerical code anti-fake label in a document, or, generate security documents by adding the various ways such as texture anti-fake label in a document.
But because laser anti-counterfeit label and query formulation digital code anti-false are easy to be forged, when lacking comparison, the antifalsification label of forgery is difficult to be identified.And texture anti-fake label also can scan by high precision the mode copied forges, thereby increase the difficulty that consumer identifies true and false document, reduce the antifalse effect of security documents.
Summary of the invention
The object of the present invention is to provide a kind of composite anti-fake document structure tree method and system, to solve the above problems.
Provide a kind of composite anti-fake document structure tree method in an embodiment of the present invention, comprising:
In the documentation page of specifying, add the false proof figure of true-to-shape by preset rules, generate security documents page;
Wherein said false proof figure comprises: one or more in false proof shading figure, anti-duplicating figure, micro text figure and two-dimension code pattern;
In the documentation page of specifying, add two-dimension code pattern, comprising:
Extract the key message of documentation page of specifying, according to the described key message extracted generate be used for the character information that carries by Quick Response Code;
According to described character information generator matrix two-dimension code pattern;
Described matrix two-dimensional code figure is added in the assigned address of the documentation page of specifying.
Except generate according to the described key message extracted to be used for by Quick Response Code except the character information that carries, also comprise: according to Antiforge inquiry website information generate be used for the character information that carries by Quick Response Code.
Receive the request instruction that user triggers, after the security documents page of described request instruction being specified encryption, be issued to client;
Client is combined into security documents to after the security documents page deciphering received.
A kind of composite anti-fake document creating system, comprising:
Server end, for adding the false proof figure of true-to-shape in the documentation page of specifying by preset rules, generates security documents page; Wherein said false proof figure comprises: one or more in false proof shading figure, anti-duplicating figure, micro text figure and two-dimension code pattern; Receive the request instruction that user triggers, and be issued to client after the security documents page of described request instruction being specified encryption;
Client, for being combined into security documents to after the security documents page deciphering received.
In the security documents that composite anti-fake document structure tree method and system according to the above embodiment of the present invention generate, according to false proof demand, one or more the false proof figures in false proof shading figure, anti-duplicating figure, micro text figure and two-dimension code pattern can be added in documentation page.Can make to demonstrate the figure different from original paper in the documentation page copied according to the anti-duplicating figure added, consumer can the true and false of identification document intuitively.When adding micro text figure in security documents, key message micro in document can be generated micro text figure, realize key message to a certain degree hide, two-dimension code pattern can also be added in addition in security documents, realize the inquiry being carried out anti-counterfeiting information by Quick Response Code, be convenient to the Antiforge inquiry of consumer to document.Therefore the security documents of composite anti-fake document structure tree method and system generation according to the above embodiment of the present invention, reduces the difficulty that consumer identifies true and false document, improves the antifalse effect of security documents.
Accompanying drawing explanation
Fig. 1 shows the process flow diagram of embodiment of the present invention composite anti-fake document structure tree method;
Fig. 2 shows the structural representation of embodiment of the present invention composite anti-fake document creating system.
Embodiment
Also by reference to the accompanying drawings the present invention is described in further detail below by specific embodiment.
The embodiment of the present invention provides a kind of composite anti-fake document structure tree method, and as shown in Figure 1, main processing steps comprises:
Step S11: the false proof figure adding true-to-shape by preset rules in the documentation page of specifying, generates security documents page;
Wherein said false proof figure comprises: one or more in false proof shading figure, anti-duplicating figure, micro text figure and two-dimension code pattern;
Step S12: receive the request instruction that user triggers, is issued to client after the security documents page of described request instruction being specified encryption;
Step S13: client is combined into security documents to after the security documents page deciphering received.
According in the security documents that the composite anti-fake document structure tree method of the embodiment of the present invention generates, according to false proof demand, one or more the false proof figures in false proof shading figure, anti-duplicating figure, micro text figure and two-dimension code pattern can be added in documentation page.Can make to demonstrate the figure different from original paper in the documentation page copied according to the anti-duplicating figure added, consumer can the true and false of identification document intuitively.When adding micro text figure in security documents, key message micro in document can be generated micro text figure, realize key message to a certain degree hide, two-dimension code pattern can also be added in addition in security documents, realize the inquiry being carried out anti-counterfeiting information by Quick Response Code, be convenient to the Antiforge inquiry of consumer to document.Therefore the security documents of security documents generation method generation according to the above embodiment of the present invention, reduces the difficulty that consumer identifies true and false document, improves the antifalse effect of security documents.
In the embodiment of the present invention, in the documentation page of specifying, the false proof figure of true-to-shape is added by preset rules, generate security documents page, the false proof figure wherein added can be one or more in false proof shading figure, anti-duplicating figure, micro text figure and two-dimension code pattern.
When adding false proof shading figure in the documentation page of specifying, comprising: in the documentation page of specifying, determine multiple reference mark; Generate the SPL by multiple described reference mark; False proof shading figure is formed by multiple described SPL; Described false proof shading figure is joined the assigned address in the documentation page of specifying, generate security documents page.
In the embodiment of the present invention, structure batten is exactly by given one group of reference mark (one group of XY value) in the O-XY coordinate system of specifying, such as given following four reference mark (X is value between 1 to 100);
A(10,15)、B(28,78)、C(68,32)、D(76,12)
According to four reference mark provided, calculate a function Y=F (X);
Then X is substituted into this function entirely from 1 to 100, just obtain 100 points, by 100 the some structure SPL drawn.
When the number ratio at reference mark is more, by reference mark segmentation computing function, such as front 4 dot generation Y=F1 (X), lower four another functions of dot generation Y=F2 (X) ... SPL is combined into by multiple sectional curve.
Keep level and smooth for making the junction of the curve of segmentation, certain condition of continuity (continuitycondition) need be determined, by the parametric derivative connected at the public semi-match of segment of curve, thus set up parametric continuity (parametriccontinuity).
Particularly, generate the SPL by multiple described reference mark in the embodiment of the present invention, comprising: determine the SPL by multiple reference mark by cubic spline interpolation.
The piecewise function that cubic spline generates is cubic polynomial, cubic spline differential technique is provide a rational half-way house between the dirigibility of SPL and computing velocity, compared with higher level polynomial expression, cubic spline function only needs less calculating and storage space, and it is more stable, compared with polynomial of lower degree, cubic spline seems more flexible when simulating Arbitrary groove profile.
Mathematically, the quantitative description of smooth degree is: the k order derivative of function (curve) exists and continuously, then claims this curve to have k rank slickness.Wherein the smooth degree of the higher curve of exponent number is better.
Can the curve obtained be made to have higher-order slickness in the situation compared with polynomial of lower degree by cubic spline difference.
Particularly, determine that the method for cubic spline function is in the documentation page of specifying, set up O-XY coordinate system, in the O-XY coordinate system set up, note cubic spline function is designated as s (x), and its interval of definition is [a, b];
This cubic spline function s (x) meets at each minizone [Xi-1, Xi] on be a cubic polynomial function, and on whole interval [a, b], its second derivative exists and continuously, so can ensure that cubic spline function is continuous in the second derivative of each Nodes.
Cubic spline functions defining method is: given function f (x) at n+1 node x0, x1 ..., the functional value at xn place is y0, y1, ..., yn, asks cubic spline function s (x), make its meet
s(xi)=yi,i=0,1,…,n;
Piecewise linear interpolation, in two parameters of the linear function of each section, is uniquely determined by two equations (functional value of two end points is set-point); For cubic spline interpolation, the cubic function on each interval has four parameters, and is that set-point is merely able to generation two equations by the functional value of two end points on this interval, and only this is not enough to uniquely determine four parameters.Notice the requirement of cubic spline function to whole smooth, its second derivative exists and continuously, considers that the relation of number of parameters and equation number is as follows from the angle of the overall situation:
Parameter: each segment is determined 4 parameters, n segment determines 4n parameter altogether;
Equation: each segment obtains 2 by given function value, equation, n segment amounts to 2n equation;
Slickness requires that the single order at each internal node place, second derivative are continuous, and show that its Derivative on the left or on the right is equal, therefore, each node produces 2 equations, amounts to 2 (n-1) individual, can obtain 4n-2 equation thus, now also need to determine two equations.
For this reason, conventional method is to boundary node subsidiary boundary condition except functional value, by respectively determining that a boundary condition obtains two required equations for two, left and right end points, wherein determines that the mode of end points boundary condition has three kinds:
(1) m boundary condition: s'(X0)=m0, s'(Xn)=mn, namely the first derivative values of two boundary nodes is set-point: m0, mn.
(2) M boundary condition: s " (x0)=m0, s " (xn)=mn, namely the second derivative values of two boundary nodes is set-point: m0, mn.
Especially, when m0 and mn is zero, natural boundary conditions is called.
(3) periodic boundary condition: s'(x0)=s'(xn); S " (x0)=s " (xn).
Further, when adding anti-duplicating figure in the documentation page of specifying, comprising:
Determine background image and the foreground image of described anti-duplicating figure;
The described background image determined and described foreground image are joined the assigned address in the documentation page of specifying by preset rules, generate security documents page.
When adding micro text figure in the documentation page of specifying, comprising: extract the key message in the documentation page of specifying; By the described key message micro extracted, generate micro text figure; The described micro text figure generated is added to the assigned address in the documentation page of specifying.Particularly, the micro text figure generated can join in the frame line being arranged on whole document, realize hiding of key message, wherein, the information content in the micro text figure generated can be inquired about by Quick Response Code, carries out inquiry be convenient to consumer and inquire about false proof content by Quick Response Code.
When adding two-dimension code pattern in the documentation page of specifying, comprising: extract the key message of documentation page of specifying, according to the described key message extracted generate be used for the character information that carries by Quick Response Code; According to described character information generator matrix two-dimension code pattern; Described matrix two-dimensional code figure is added in the assigned address of the documentation page of specifying.
Described except generate according to the described key message extracted to be used for by Quick Response Code except the character information that carries, also comprise: according to Antiforge inquiry website information generate be used for the character information that carries by Quick Response Code.
Described client is combined into security documents to after the security documents page deciphering received, and comprising:
Client according to the filename of the security documents page received, check that password, document Modify password, the page number and Layer Order number are by security documents page synthesis security documents.
The embodiment of the present invention also provides a kind of composite anti-fake document creating system, as shown in Figure 2, comprising:
Server end 21, for adding the false proof figure of true-to-shape in the documentation page of specifying by preset rules, generates security documents page; Wherein said false proof figure comprises: one or more in false proof shading figure, anti-duplicating figure, micro text figure and two-dimension code pattern; Receive the request instruction that user triggers, and be issued to client after the security documents page of described request instruction being specified encryption;
Client 22, for being combined into security documents to after the security documents page deciphering received.
Described server end, comprising: one or more in false proof shading generation server, anti-duplicating processing server, micro processing server and Quick Response Code processing server.
According to the security documents that the composite anti-fake document structure tree method and system of the embodiment of the present invention generate, the mode of Quick Response Code can be scanned by mobile phone terminal, show the summary info of false proof content, and Antiforge inquiry network address is provided, by Antiforge inquiry network address, can represent the false proof shading of every a anti-fake material, anti-duplicating label, micro text content and particular location.
Obviously, those skilled in the art should be understood that, above-mentioned of the present invention each module or each step can realize with general calculation element, they can concentrate on single calculation element, or be distributed on network that multiple calculation element forms, alternatively, they can realize with the executable program code of calculation element, thus, they can be stored and be performed by calculation element in the storage device, or they are made into each integrated circuit modules respectively, or the multiple module in them or step are made into single integrated circuit module to realize.Like this, the present invention is not restricted to any specific hardware and software combination.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (8)

1. a composite anti-fake document structure tree method, is characterized in that, comprising:
In the documentation page of specifying, add the false proof figure of true-to-shape by preset rules, generate security documents page;
Wherein said false proof figure comprises: one or more in false proof shading figure, anti-duplicating figure, micro text figure and two-dimension code pattern;
In the documentation page of specifying, add two-dimension code pattern, comprising:
Extract the key message of documentation page of specifying, according to the described key message extracted generate be used for the character information that carries by Quick Response Code;
According to described character information generator matrix two-dimension code pattern;
Described matrix two-dimensional code figure is added in the assigned address of the documentation page of specifying;
Except generate according to the described key message extracted to be used for by Quick Response Code except the character information that carries, also comprise: according to Antiforge inquiry website information generate be used for the character information that carries by Quick Response Code;
Receive the request instruction that user triggers, after the security documents page of described request instruction being specified encryption, be issued to client;
Client is combined into security documents to after the security documents page deciphering received.
2. method according to claim 1, is characterized in that, the described false proof figure adding true-to-shape by preset rules in the documentation page of specifying, and generates security documents page, comprising:
In the documentation page of specifying, add false proof shading figure, comprising:
Multiple reference mark is determined in the documentation page of specifying;
Generate the SPL by multiple described reference mark;
False proof shading figure is formed by multiple described SPL;
Described false proof shading figure is joined the assigned address in the documentation page of specifying, generate security documents page.
3. method according to claim 2, is characterized in that, generates the SPL by multiple described reference mark, comprising:
The SPL by multiple reference mark is determined by cubic spline interpolation.
4. method according to claim 1, is characterized in that, the described false proof figure adding true-to-shape by preset rules in the documentation page of specifying, and generates security documents page, comprising:
In the documentation page of specifying, add anti-duplicating figure, comprising:
Determine background image and the foreground image of described anti-duplicating figure;
The described background image determined and described foreground image are joined the assigned address in the documentation page of specifying by preset rules, generate security documents page.
5. method according to claim 1, is characterized in that, the described false proof figure adding true-to-shape by preset rules in the documentation page of specifying, and generates security documents page, comprising:
In the documentation page of specifying, add micro text figure, comprising:
Extract the key message in the documentation page of specifying;
By the described key message micro extracted, generate micro text figure;
The described micro text figure generated is added to the assigned address in the documentation page of specifying.
6. the method according to any one of claim 1 to 5, is characterized in that, described client is combined into security documents to after the security documents page deciphering received, and comprising:
Client according to the filename of the security documents page received, check that password, document Modify password, the page number and Layer Order number are by security documents page synthesis security documents.
7. a composite anti-fake document creating system, is characterized in that, comprising:
Server end, for adding the false proof figure of true-to-shape in the documentation page of specifying by preset rules, generates security documents page; Wherein said false proof figure comprises: one or more in false proof shading figure, anti-duplicating figure, micro text figure and two-dimension code pattern; In the documentation page of specifying, add two-dimension code pattern, comprising:
Extract the key message of documentation page of specifying, according to the described key message extracted generate be used for the character information that carries by Quick Response Code;
According to described character information generator matrix two-dimension code pattern;
Described matrix two-dimensional code figure is added in the assigned address of the documentation page of specifying;
Except generate according to the described key message extracted to be used for by Quick Response Code except the character information that carries, also comprise: according to Antiforge inquiry website information generate be used for the character information that carries by Quick Response Code;
Receive the request instruction that user triggers, and be issued to client after the security documents page of described request instruction being specified encryption;
Client, for being combined into security documents to after the security documents page deciphering received.
8. system according to claim 7, is characterized in that, described server end, comprising:
One or more in false proof shading generation server, anti-duplicating processing server, micro processing server and Quick Response Code processing server.
CN201310292562.3A 2013-07-11 2013-07-11 A kind of composite anti-fake document structure tree method and system Expired - Fee Related CN103324894B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310292562.3A CN103324894B (en) 2013-07-11 2013-07-11 A kind of composite anti-fake document structure tree method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310292562.3A CN103324894B (en) 2013-07-11 2013-07-11 A kind of composite anti-fake document structure tree method and system

Publications (2)

Publication Number Publication Date
CN103324894A CN103324894A (en) 2013-09-25
CN103324894B true CN103324894B (en) 2016-01-06

Family

ID=49193628

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310292562.3A Expired - Fee Related CN103324894B (en) 2013-07-11 2013-07-11 A kind of composite anti-fake document structure tree method and system

Country Status (1)

Country Link
CN (1) CN103324894B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104463412A (en) * 2014-10-29 2015-03-25 中冶天工集团有限公司 Method for carrying out kiln project technical disclosure by utilization of two-dimension codes
CN107302645B (en) * 2017-04-27 2019-08-16 珠海赛纳打印科技股份有限公司 A kind of image processing apparatus and its image processing method
CN108805787B (en) * 2018-04-17 2022-08-23 北京数科网维技术有限责任公司 Paper document tampering and authenticating method and device
CN109299763B (en) * 2018-10-17 2021-11-02 国网江苏省电力有限公司无锡供电分公司 Paper secret-involved carrier tamper-proof counterfeiting method based on RFID key chain
CN113313782A (en) * 2021-06-15 2021-08-27 福建正孚软件有限公司 File anti-counterfeiting method and system based on three-dimensional grains

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101841411A (en) * 2005-10-28 2010-09-22 北京书生数字技术有限公司 Data resource anti-copying encrypted transmission method and device system
CN103065101A (en) * 2012-12-14 2013-04-24 北京思特奇信息技术股份有限公司 Anti-counterfeiting method for documents

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009508240A (en) * 2005-09-12 2009-02-26 サンド ボックス テクノロジーズ インク. System and method for controlling the distribution of electronic information

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101841411A (en) * 2005-10-28 2010-09-22 北京书生数字技术有限公司 Data resource anti-copying encrypted transmission method and device system
CN103065101A (en) * 2012-12-14 2013-04-24 北京思特奇信息技术股份有限公司 Anti-counterfeiting method for documents

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
防伪版纹设计系统研究;王丰军等;《天津科技大学学报》;20081231;第23卷(第4期);第66-68页 *

Also Published As

Publication number Publication date
CN103324894A (en) 2013-09-25

Similar Documents

Publication Publication Date Title
US11475176B2 (en) Method and system for automatically ordering and fulfilling architecture, design and construction product sample requests
CN103324894B (en) A kind of composite anti-fake document structure tree method and system
CN112148932B (en) Visualization method, system, computer device and storage medium
CN103400415B (en) Plane space structure three-dimensional digital model generates and the implementation method of online interaction automatically
Nishida et al. Example‐driven procedural urban roads
US8754884B2 (en) 3D virtual environment for generating variable data images
EP2774110A1 (en) Systems and methods for dynamic digital product synthesis, commerce, and distribution
US20140267268A1 (en) Apparatus and methods for detailing subdivision surfaces
CN104050699B (en) The application example of general three-dimensional contextual data
Ellul et al. Investigating approaches to improving rendering performance of 3D city models on mobile devices
Zhang et al. Machine learning aided 2D-3D architectural form finding at high resolution
Barnsley et al. Fractal homeomorphism for bi-affine iterated function systems
Prechtel On strategies and automation in upgrading 2D to 3D landscape representations
Tanaka et al. Feature extraction from sketches of objects
CN106021228A (en) Method and system for performing text analysis by utilizing knowledge topographic map
CN105881910A (en) Object faxing method based on 3D scanning, 3D printing and cloud services
Rhyne Scientific visualization in the next millennium
CN114595673A (en) Collaborative creation method of digital works, task release method and device
US20170092012A1 (en) Specification-based method for generating views in 3d reports
Zhu et al. Mid-surface abstraction for complex thin-wall models based on virtual decomposition
CN107291725B (en) Method and device for generating multi-directional tree
Yoo Rapid three-dimensional urban model production using bilayered displacement mapping
Wu Application of Virtual Reality Technology in the Digital Inheritance of Intangible Cultural Heritage
Huang et al. Interactive 3D character modeling from 2D orthogonal drawings with annotations
Zhao et al. A Face Changing Animation Framework Based on Landmark Mapping

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160106

CF01 Termination of patent right due to non-payment of annual fee