CN103793677A - Method for information extraction and identity authentication by identifying raster graphics - Google Patents

Method for information extraction and identity authentication by identifying raster graphics Download PDF

Info

Publication number
CN103793677A
CN103793677A CN201410053931.8A CN201410053931A CN103793677A CN 103793677 A CN103793677 A CN 103793677A CN 201410053931 A CN201410053931 A CN 201410053931A CN 103793677 A CN103793677 A CN 103793677A
Authority
CN
China
Prior art keywords
information
code value
file
dot pattern
carry out
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410053931.8A
Other languages
Chinese (zh)
Other versions
CN103793677B (en
Inventor
姚为
朱黎明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Desmil Intelligent Technology Co Ltd
Original Assignee
Beijing Leader Tech Digtal Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=50669325&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=CN103793677(A) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Beijing Leader Tech Digtal Technology Co Ltd filed Critical Beijing Leader Tech Digtal Technology Co Ltd
Priority to CN201410053931.8A priority Critical patent/CN103793677B/en
Publication of CN103793677A publication Critical patent/CN103793677A/en
Application granted granted Critical
Publication of CN103793677B publication Critical patent/CN103793677B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Image Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a method for information extraction and identity authentication by identifying raster graphics. The method comprises the steps that the raster graphics are read, and obtained images are fed back; the fed-back images are automatically processed and placed in a cache; the images in the cache are analyzed and verified, so that code value information corresponding to the images is generated; information files corresponding to the code value information are found in a code value data base and extracted; the information files are decoded, so that multi-media files are formed, and the multi-media files correspond to the information files and comprise identity authentication information; the multi-media files are played, so that identity information of products corresponding to the raster graphics is obtained. According to the method, the raster graphics replace existing RFID labels and other modes, the method, the digital technique and the network technique are combined, and the method has the advantages of being low in printing cost, terminal manufacturing cost and enterprise operating cost, and achieving user inquiry mode convenience, and effectively achieves the effects of copying difficulty, low price and identifying convenience.

Description

By identifying dot pattern to carry out information extraction and identity mirror method for distinguishing
Technical field
The present invention relates to a kind of Antiforge recognizing method, especially a kind of by identifying dot pattern to carry out information extraction and identity mirror method for distinguishing.
Background technology
At present, have on the market that anti-counterfeiting technology is generally divided into that common false proof, code anti-fake, DNA are false proof, nuclear track, laser holographic anti counterfeiting label and OVD technology, false proof, false proof anti-technology, RFID label and the safety line of taking off of ink be false proof.
But the weak point of above anti-counterfeiting technology is as follows:
1, common false proof, exist inquiry convenience inadequate, the problems such as continuous-query and consumer easily dial a wrong number cannot be preserved, can not be solved to Query Result;
, because its technology content is not high, itself there is easy stolen code, copy a yard serious technological deficiency of carrying out batch duplicating in 2, code anti-fake, is easily utilized by fraud clique, causes false proof inefficacy, and user enterprise has been produced to great negative effect;
3, DNA is false proof, and its false proof uniqueness is higher, but expensive, so the market share occupying is minimum, is unfavorable for the true and false of consumer's Direct Test product;
4, nuclear track, its maximum weak point is to reuse, and only need to, by clean the mark marking with pen etc. clean, just can reuse, and does not have the uniqueness of anti-fake mark, has left opportunity to fake producer;
5, laser holographic anti counterfeiting label and OVD technology, due to its mismanagement, the laser holographic mark that some are inferior and the mark of emulation are infiltrated market, and result is really untrue, and false is not false, has ruined the reputation of laser holographic anti counterfeiting label;
6, ink is false proof, and along with increasing of anti-forgery ink manufacturer, the effect of this anti-counterfeiting technology has not just had effect that anti-counterfeiting is of poor quality yet;
7, false proofly anti-take off technology, because manufacturer is a lot, do not possess uniqueness, do not get rid of producer and provide convenience for fake producer for interests;
8, RFID label, comparatively extensive in industry uses such as admission ticket, electronics, jewelry at present, but expensive, be not suitable in low side commodity and use on a large scale;
9, safety line is false proof, and because there are very strict administration and regulation limitations in country to paper mill in safety line paper production, therefore its application is also restricted.
Based on above-mentioned weak point, be badly in need of occurring a kind of anti-counterfeit recognition technology that can solve above-mentioned shortcoming.
Summary of the invention
For the weak point existing in the problems referred to above, the invention provides a kind ofly have that printing cost is low, the advantage such as terminal low cost of manufacture, company operation cost are low, user's inquiry mode pass through identification dot pattern to carry out information extraction and the identity method for distinguishing that reflects.
For achieving the above object, the invention provides one by identifying dot pattern to carry out information extraction and identity mirror method for distinguishing, comprise the following steps:
S10, infrared reading device send Infrared dot pattern are read, and when Infrared arrives at behind dot pattern surface, to obtain the image of dot pattern, and image are fed back;
S20, utilize infrared reading device to feedback image carry out automatic exposure processing so that the grey level of image reaches preset range, and put it into buffer memory;
S30, the image in buffer memory is resolved and CRC check, to form code value information corresponding thereto;
S40, in code value database, search the message file corresponding with code value information, and information extraction file;
S50, to message file decode to form corresponding thereto, with the multimedia file of identity authentication information;
S60, play multimedia file, to learn the identity information of the product corresponding with dot pattern.
Above-mentioned passes through identification dot pattern to carry out information extraction and identity mirror method for distinguishing, and wherein, in step S20, the step that image is carried out automatically processing comprises:
Filter out unnecessary spectrum;
Catch residue spectrum;
Regulate time shutter and figure frame per second, the brightness of image of the full graphics frame capturing is reached so that the grey level of image reaches between 110~200.
Above-mentioned passes through identification dot pattern to carry out information extraction and identity mirror method for distinguishing, and wherein, in step S30, the code value information obtaining after parsing and verification comprises that file starts field, header information and data message.
Above-mentioned passes through identification dot pattern to carry out information extraction and identity mirror method for distinguishing, wherein, in step S40, comprises the following steps:
S400, by buffer memory extract resolve with check after code value information;
S401, judge within the scope of the code value whether current code value information store in code value database, if the determination result is YES, carry out S402, if if judged result be, perform step S403, feedback code value information is invalid, judges that article are as vacation;
S402, code value database is scanned to form header index file group;
S404, judge in header index file group whether include the header index file corresponding with current code value information, if the determination result is YES, perform step S405, if judged result is no, perform step S406, feedback code value information is invalid, judges that article are as vacation;
S405, judge in header index file whether include the message file corresponding with current code value information, if the determination result is YES, perform step S407, if judged result is no, perform step S408, feedback code value information is invalid, judges that article are as vacation;
S409, by extraction document handle in message file;
S410, judge that whether header information (FileHeader) in current code value information is encrypt file, if the determination result is YES, perform step S411, if judged result is no, carry out S412;
S411, be decrypted according to the encryption type of the header information (FileHeader) in current code value information;
S412, select corresponding data directory to calculate message file according to message file, to obtain message file after treatment.
Above-mentioned passes through identification dot pattern to carry out information extraction and identity mirror method for distinguishing, and wherein, in step S411, the encryption and decryption mode of header information is the one in xTEA encryption and decryption mode, TEA encryption and decryption mode or AES encryption and decryption mode.
Above-mentioned passes through identification dot pattern to carry out information extraction and identity mirror method for distinguishing, wherein, in step S50, comprises the following steps:
S500, extract through step S40 current information file after treatment, and import in data distribution device;
S501, judge whether to be decrypted it according to the type of current information file in data distribution device, if judge, the type of current information file is text, performs step S60, if judge, the type of current information file is non-document file, carry out S502, it is decoded;
S502, decode according to current non-document file, to form the multimedia file with identity authentication information.
Above-mentioned passes through identification dot pattern to carry out information extraction and identity mirror method for distinguishing, wherein, in step S502, is the one in xTEA decoding process, TEA decoding process or AES decoding process to the decoding process of non-document file.
Compared with prior art, the present invention has the following advantages:
1, the present invention adopts dot pattern to replace the modes such as existing RFID label, and combine with digital technology, network technology, have that printing cost is low, terminal low cost of manufacture, company operation cost are low, user's inquiry mode advantage easily, effectively reach the false proof object of transreplication not, inexpensive, convenient identification, can be widely used in logistic management system, be regarded as one of direction of in the future false proof, logistics management;
2, owing to adopting multistage determining step, therefore, can improve the security performance of operation steps.
Accompanying drawing explanation
Fig. 1 is the process flow diagram in the present invention;
Fig. 2 is the structured flowchart of code value information in the present invention;
Fig. 3 is the particular flow sheet of step S40 in Fig. 1;
Fig. 4 is the particular flow sheet of step S50 in Fig. 1.
Embodiment
As shown in Figures 1 to 4, the invention provides one by identifying dot pattern to carry out information extraction and identity mirror method for distinguishing, comprise the following steps:
S10, infrared reading device send Infrared dot pattern are read, and when Infrared arrives at behind dot pattern surface, to obtain the image of dot pattern, and image are fed back.
S20, utilize infrared reading device to feedback image carry out automatic exposure processing so that the grey level of image reaches preset range, and put it into buffer memory.
Wherein, step S20 comprises:
Filter out unnecessary spectrum by optical filter;
Catch residue spectrum by optical lens;
When the exposure of adjustable lens and figure frame per second, the grey level of the image of the full graphics frame capturing is reached between 110~200.
S30, the image in buffer memory is resolved and CRC check, to form code value information corresponding thereto.
Wherein, in step S30, the code value information obtaining after parsing and verification comprises that file starts field (FileBeginFields), header information (FileHeader) and data message, and data message comprises code value concordance list (CodeIndexTable), code value bulleted list (CodeTable), RAW data item table (RawDataItemTable) and resource/RAW data (Resource/RawData).
S40, in code value database, search the message file corresponding with code value information, and information extraction file.
Wherein, in step S40, comprise the following steps:
S400, by buffer memory extract resolve with check after code value information.
S401, judge within the scope of the code value whether current code value information store in code value database, if the determination result is YES, carry out S402, if if judged result be, perform step S403, feedback code value information is invalid, judges that article are as vacation.
Code value database is not before upgrading, the code value scope of its storage inside is fixed, if the code value information drawing is not included in code value database, even if this code value information is real, in S401, can judge successively that this code value information is as invalid code value after resolving and checking.
S402, code value database is scanned to form header index file group.
S404, judge in header index file group whether include the header index file corresponding with current code value information, if the determination result is YES, perform step S405, if judged result is no, perform step S406, feedback code value information is invalid, judges that article are as vacation.
S405, judge in header index file whether include the message file corresponding with current code value information, if the determination result is YES, perform step S407, if judged result is no, perform step S408, feedback code value information is invalid, judges that article are as vacation.
S407, by extraction document handle in message file.
S409, judge that whether header information (FileHeader) in current code value information is encrypt file, if the determination result is YES, perform step S410, if judged result is no, play.
S410, be decrypted according to the encryption type of the header information (FileHeader) in current code value information; Wherein, the encryption and decryption mode of header information is the one in xTEA encryption and decryption mode, TEA encryption and decryption mode or AES encryption and decryption mode.
The header information encrypted of judgement belongs to any in above-mentioned three kinds of cipher modes, and carries out deciphering corresponding thereto according to corresponding cipher mode.
S411, select corresponding data directory to calculate message file according to message file, to obtain message file after treatment.
Wherein, data directory is divided into Hash table, simple in-order table and increment sequence list, showing corresponding algorithm with Hash is Hash location algorithm, and the algorithm corresponding with simple in-order table is simple tab order algorithm, and the algorithm corresponding with increment sequence list is increment sequential algorithm.
S50, to message file decode to form corresponding thereto, with the multimedia file of identity authentication information;
Wherein, in step S50, comprise the following steps:
S500, the current information file of extraction behind step S40 location, and imported in data distribution device.
S501, judge whether to be decrypted it according to the type of current information file in data distribution device, if judge, the type of current information file is text, performs step S60, if judge, the type of current information file is non-document file, carry out S502, it is decoded.
Wherein, include identity authentication information in text, this health authentication information is that article corresponding with dot pattern are corresponding.
S502, decode according to current non-document file, to form the multimedia file with identity authentication information.
Wherein, in step S502, be the one in xTEA decoding process, TEA decoding process or AES decoding process to the decoding process of non-document file.
If not the type of text is picture file, adopt picture demoder to decode to it;
If not the type of text is video file, adopt Video Decoder to decode to it;
If not the type of text is audio file, adopt audio decoder to decode to it.
S60, play multimedia file, to learn the identity information of the product corresponding with dot pattern.
Wherein, if be text with the file type of identity authentication information, directly show by display screen;
If the file type with identity authentication information is picture file, directly show by display screen;
If be video file with the file type of identity authentication information, its image section directly shows by display screen, and sound part is exported by power amplifier loudspeaker;
If be audio file with the file type of identity authentication information, export by power amplifier loudspeaker.
In addition, the dot pattern in the present invention cannot be differentiated with designated shape and naked eyes, and its useful area is not less than 3*3 square millimeter.Because the area of dot pattern is less, therefore, dot pattern is being attached to after article surface, can not impact its outward appearance.
The information point that this dot pattern is 30~40 microns by least one group of diameter rearranges by rule, and with the shape of specifying.Because the diameter of information point is small, and be preset with corresponding spacing distance between two adjacent information points, after the mode that is copied or scans copies, distance between adjacent two information points can be found deviation, the shape of specifying also can change, thereby form the invalid code that cannot be identified, therefore, the position of information point and the distance between the two can improve the anti-counterfeiting performance of dot pattern.In two adjacent information points, the spacing between the center of center to the second information point of being put by the first information is 80 microns.Information point in this dot pattern comprises direction reference point, center reference point and check code.
Dot pattern adopts the coating that can be identified by naked eyes invisible light to be attached on the white space of carrier, one in the visible coating that the coating that can be identified by naked eyes invisible light is carbon containing or the invisible coating of carbon containing, visible ink or ink that the visible coating of carbon containing is carbon containing, the colorless ink that the invisible coating of carbon containing is carbon containing or ink.Due to visible ink or the ink of carbon containing, and the colorless ink of carbon containing or ink can absorb the infrared ray of specific band, therefore, only has infrared ray recognition device to identify the information in label layer.
Only as described above, be only preferred embodiment of the present invention, such as professional who are familiar with this art.After understanding technological means of the present invention, natural energy, according to actual needs, is changed under instruction of the present invention.Therefore all equal variation and modifications of doing according to the present patent application the scope of the claims, once should still remain within the scope of the patent.

Claims (7)

1. by identifying dot pattern to carry out information extraction and an identity mirror method for distinguishing, comprise the following steps:
S10, infrared reading device send Infrared dot pattern are read, and when Infrared arrives at behind dot pattern surface, to obtain the image of dot pattern, and image are fed back;
S20, utilize infrared reading device to feedback image carry out automatic exposure processing so that the grey level of image reaches preset range, and put it into buffer memory;
S30, the image in buffer memory is resolved and CRC check, to form code value information corresponding thereto;
S40, in code value database, search the message file corresponding with code value information, and information extraction file;
S50, to message file decode to form corresponding thereto, with the multimedia file of identity authentication information;
S60, play multimedia file, to learn the identity information of the product corresponding with dot pattern.
According to claim 1 by identification dot pattern to carry out information extraction and identity mirror method for distinguishing, it is characterized in that, in step S20, the step of image being carried out to processing automatically comprises:
Filter out unnecessary spectrum;
Catch residue spectrum;
Regulate time shutter and figure frame per second, the gradation of image rank of the full graphics frame capturing is reached between 110~200.
3. according to claim 1 by identifying dot pattern to carry out information extraction and identity mirror method for distinguishing, it is characterized in that, in step S30, the code value information obtaining after parsing and verification comprises that file starts field, header information and data message, and described data message comprises code value concordance list, code value bulleted list, RAW data item table and resource/RAW data.
According to claim 1 by identification dot pattern to carry out information extraction and the identity method for distinguishing that reflects, it is characterized in that, in step S40, comprise the following steps:
S400, by buffer memory extract resolve with check after code value information;
S401, judge within the scope of the code value whether current code value information store in code value database, if the determination result is YES, carry out S402, if if judged result be, perform step S403, feedback code value information is invalid, judges that article are as vacation;
S402, code value database is scanned to form header index file group;
S404, judge in header index file group whether include the header index file corresponding with current code value information, if the determination result is YES, perform step S405, if judged result is no, perform step S406, feedback code value information is invalid, judges that article are as vacation;
S405, judge in header index file whether include the message file corresponding with current code value information, if the determination result is YES, perform step S407, if judged result is no, perform step S408, feedback code value information is invalid, judges that article are as vacation;
S409, by extraction document handle in message file;
S410, judge that whether header information (FileHeader) in current code value information is encrypt file, if the determination result is YES, perform step S411, if judged result is no, carry out S412;
S411, be decrypted according to the encryption type of the header information (FileHeader) in current code value information;
S412, select corresponding data directory to calculate message file according to message file, to obtain message file after treatment.
5. identify dot pattern to carry out information extraction and identity mirror method for distinguishing according to passing through described in claim 4, it is characterized in that, in step S411, the encryption and decryption mode of header information is the one in xTEA encryption and decryption mode, TEA encryption and decryption mode or AES encryption and decryption mode.
According to claim 1 by identification dot pattern to carry out information extraction and the identity method for distinguishing that reflects, it is characterized in that, in step S50, comprise the following steps:
S500, extract through step S40 current information file after treatment, and import in data distribution device;
S501, judge whether to be decrypted it according to the type of current information file in data distribution device, if judge, the type of current information file is text, performs step S60, if judge, the type of current information file is non-document file, carry out S502, it is decoded;
S502, decode according to current non-document file, to form the multimedia file with identity authentication information.
7. according to claim 6 by identifying dot pattern to carry out information extraction and identity mirror method for distinguishing, it is characterized in that, in step S502, be the one in xTEA decoding process, TEA decoding process or AES decoding process to the decoding process of non-document file.
CN201410053931.8A 2014-02-18 2014-02-18 By identifying that dot pattern is to carry out information retrieval and identity mirror method for distinguishing Active CN103793677B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410053931.8A CN103793677B (en) 2014-02-18 2014-02-18 By identifying that dot pattern is to carry out information retrieval and identity mirror method for distinguishing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410053931.8A CN103793677B (en) 2014-02-18 2014-02-18 By identifying that dot pattern is to carry out information retrieval and identity mirror method for distinguishing

Publications (2)

Publication Number Publication Date
CN103793677A true CN103793677A (en) 2014-05-14
CN103793677B CN103793677B (en) 2016-08-17

Family

ID=50669325

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410053931.8A Active CN103793677B (en) 2014-02-18 2014-02-18 By identifying that dot pattern is to carry out information retrieval and identity mirror method for distinguishing

Country Status (1)

Country Link
CN (1) CN103793677B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104376354A (en) * 2014-11-14 2015-02-25 深圳三元色数码科技有限公司 Dot-matrix graphic, constructing method for dot-matrix graphic and method for identifying true dot-matrix graphic
CN106060806A (en) * 2016-05-24 2016-10-26 中国科学院信息工程研究所 Public/secret communication identification method applicable to circuit domain encrypted communication
JP2018518919A (en) * 2015-09-17 2018-07-12 シェンゼン・キアンハイ・クアンタム・クラウド・テクノロジー・カンパニー・リミテッド Anti-counterfeiting method
CN112447274A (en) * 2020-11-17 2021-03-05 北京全域医疗技术集团有限公司 Verification method and device for radiotherapy dose and computer equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007156722A (en) * 2005-12-02 2007-06-21 Three M Innovative Properties Co Functional sheet
CN101079114A (en) * 2007-04-23 2007-11-28 天津市阿波罗信息技术有限公司 Printing medium multimedia system multimedia broadcasting part implementation method
CN102110224A (en) * 2009-12-25 2011-06-29 金辉文 Method for preventing counterfeiting and preventing goods from fleeing by intelligent code
CN102248825A (en) * 2004-10-15 2011-11-23 吉田健治 Printing methods of dot pattern and medium surface as well as printed matters
US20120199731A1 (en) * 2011-02-08 2012-08-09 Fuji Xerox Co., Ltd. Recording medium and infrared reading method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102248825A (en) * 2004-10-15 2011-11-23 吉田健治 Printing methods of dot pattern and medium surface as well as printed matters
JP2007156722A (en) * 2005-12-02 2007-06-21 Three M Innovative Properties Co Functional sheet
CN101079114A (en) * 2007-04-23 2007-11-28 天津市阿波罗信息技术有限公司 Printing medium multimedia system multimedia broadcasting part implementation method
CN102110224A (en) * 2009-12-25 2011-06-29 金辉文 Method for preventing counterfeiting and preventing goods from fleeing by intelligent code
US20120199731A1 (en) * 2011-02-08 2012-08-09 Fuji Xerox Co., Ltd. Recording medium and infrared reading method

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104376354A (en) * 2014-11-14 2015-02-25 深圳三元色数码科技有限公司 Dot-matrix graphic, constructing method for dot-matrix graphic and method for identifying true dot-matrix graphic
JP2018518919A (en) * 2015-09-17 2018-07-12 シェンゼン・キアンハイ・クアンタム・クラウド・テクノロジー・カンパニー・リミテッド Anti-counterfeiting method
CN106060806A (en) * 2016-05-24 2016-10-26 中国科学院信息工程研究所 Public/secret communication identification method applicable to circuit domain encrypted communication
CN106060806B (en) * 2016-05-24 2019-06-25 中国科学院信息工程研究所 A kind of bright close communication identification method suitable for circuit domain coded communication
CN112447274A (en) * 2020-11-17 2021-03-05 北京全域医疗技术集团有限公司 Verification method and device for radiotherapy dose and computer equipment
CN112447274B (en) * 2020-11-17 2024-02-20 北京全域医疗技术集团有限公司 Verification method and device for radiotherapy dosage and computer equipment

Also Published As

Publication number Publication date
CN103793677B (en) 2016-08-17

Similar Documents

Publication Publication Date Title
US10373033B2 (en) Two dimensional barcode and method of authentication of such barcode
CN107194449B (en) Printing anti-counterfeiting and information tracing method based on combination of digital watermark and two-dimensional code
CN112352245A (en) Composite code pattern, generation device, reading device, method, and program
CN107038594A (en) A kind of commodity counterfeit prevention traceability system based on two-dimensional bar code
JP6403085B1 (en) Composite code pattern, generating device, reading device, method and program
RU2458395C2 (en) Methods and apparatus for ensuring integrity and authenticity of documents
CN107633413A (en) A kind of anti-fake traceability system and method
CN101537751A (en) Novel method for processing anti-counterfeit printing
CN101877095A (en) Product anti-counterfeit method based on QR codes, short messages and internet
CN103810457A (en) Offline license anti-counterfeiting method based on reliable digital signature and two-dimensional code
CN104766111A (en) Combined-type anti-counterfeiting mark based on same ID, generating method and device
CN106650545A (en) Anti-counterfeiting two-dimensional code tracing label and the method for generating and identifying the same
CN103793677A (en) Method for information extraction and identity authentication by identifying raster graphics
CN109472335A (en) A kind of lottery ticket anti-counterfeiting system and method for anti-counterfeit
CN1691087B (en) System and method for decoding digital coding image
CN108960387A (en) A kind of anti-counterfeiting two dimensional code and its generation and recognition methods
CN106301775A (en) A kind of QR code encryption method based on RSA Algorithm
CN115860033B (en) Anti-counterfeiting method and device for color partition micro-point code mark capable of classifying and identifying counterfeiting
CN1321507C (en) Soft certification anti-false method based on graphic code primary and secondary signet series information association mechanism
CN111428532A (en) Encryptable three-dimensional code and encoding and decoding method
CN101248474A (en) Method for encryption and decryption of data using pixel
CN103824044A (en) Method for extracting information and identifying identities through recognizing invisible light spot array patterns
JP2007011560A (en) Document data management system
CN108646993A (en) Output file uniqueness ensuring method based on biological attribute and fluorescent printing technology
CN102609851A (en) Method and system for carrying out anti-counterfeit authentication on commodity by two-dimensional bar code

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent of invention or patent application
CB03 Change of inventor or designer information

Inventor after: Yao Wei

Inventor after: Wan Hongyu

Inventor before: Yao Wei

Inventor before: Zhu Liming

COR Change of bibliographic data

Free format text: CORRECT: INVENTOR; FROM: YAO WEI ZHU LIMING TO: YAO WEI WAN HONGYU

C14 Grant of patent or utility model
GR01 Patent grant
DD01 Delivery of document by public notice

Addressee: LEADER TECH DIGITAL TECHNOLOGY Co.,Ltd.

Document name: Notification that Application Deemed not to be Proposed

DD01 Delivery of document by public notice
TR01 Transfer of patent right

Effective date of registration: 20191105

Address after: Room 10602, Building 1, Wangjing International Building, Fengcheng Sixth Road, Xi'an Economic and Technological Development Zone, Shaanxi 710000

Patentee after: SHAANXI ZHUANYI INTELLECTUAL PROPERTY OPERATION CO.,LTD.

Address before: 100081 Beijing city Haidian District Daliushu Road No. 17 Fu Hai Hong Kong International room 803

Patentee before: LEADER TECH DIGITAL TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20191111

Address after: 215400 A, building 88, Beijing East Road, Taicang Development Zone, Suzhou, Jiangsu

Patentee after: Suzhou Desmir Intelligent Technology Co.,Ltd.

Address before: Room 10602, Building 1, Wangjing International Building, Fengcheng Sixth Road, Xi'an Economic and Technological Development Zone, Shaanxi 710000

Patentee before: SHAANXI ZHUANYI INTELLECTUAL PROPERTY OPERATION CO.,LTD.

TR01 Transfer of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A method of information extraction and identification by recognizing dot matrix graphics

Effective date of registration: 20220630

Granted publication date: 20160817

Pledgee: China Construction Bank Taicang branch

Pledgor: Suzhou Desmir Intelligent Technology Co.,Ltd.

Registration number: Y2022980009615