CN103824044A - Method for extracting information and identifying identities through recognizing invisible light spot array patterns - Google Patents

Method for extracting information and identifying identities through recognizing invisible light spot array patterns Download PDF

Info

Publication number
CN103824044A
CN103824044A CN201410054077.7A CN201410054077A CN103824044A CN 103824044 A CN103824044 A CN 103824044A CN 201410054077 A CN201410054077 A CN 201410054077A CN 103824044 A CN103824044 A CN 103824044A
Authority
CN
China
Prior art keywords
information
code value
file
dot pattern
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410054077.7A
Other languages
Chinese (zh)
Other versions
CN103824044B (en
Inventor
姚为
朱黎明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Desmil Intelligent Technology Co Ltd
Original Assignee
Beijing Leader Tech Digtal Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=50759098&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=CN103824044(A) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Beijing Leader Tech Digtal Technology Co Ltd filed Critical Beijing Leader Tech Digtal Technology Co Ltd
Priority to CN201410054077.7A priority Critical patent/CN103824044B/en
Publication of CN103824044A publication Critical patent/CN103824044A/en
Application granted granted Critical
Publication of CN103824044B publication Critical patent/CN103824044B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention provides a method for extracting information and identifying identities through recognizing invisible light spot array patterns. The method includes the following steps that: an invisible light material is printed on a tag so as to form a spot array pattern; the spot array pattern on the surface of the tag is read, and the gray level of an image is adjusted to a preset range; an image which accords with the gray level is intercepted; analysis and CRC check are performed on the image, such that code value information corresponding to the image can be formed; an information file corresponding to the code value information is searched in a code value database, and is extracted; the information file is decoded, such that a multimedia file which is corresponding to the information file and carries identity identification information can be formed; and the multimedia file is played, such that the identity information of a product corresponding to the spot array pattern can be known. According to the method of the invention, a mode in which an existing RFID tag and the like is replaced by the spot array pattern is adopted, and the mode is combined with a digital technology and a network technology. Thus, the method has the advantage of low printing cost, low terminal manufacturing cost, difficulty in copy, low price and convenient recognition.

Description

By identifying invisible light dot pattern with information extraction and the method discriminating one's identification
Technical field
The present invention relates to a kind of Antiforge recognizing method, especially a kind of by identifying invisible light dot pattern with information extraction and the method discriminating one's identification.
Background technology
At present, have on the market that anti-counterfeiting technology is generally divided into that common false proof, code anti-fake, DNA are false proof, nuclear track, laser holographic anti counterfeiting label and OVD technology, false proof, false proof anti-technology, RFID label and the safety line of taking off of ink be false proof.
But the weak point of above anti-counterfeiting technology is as follows:
1, common false proof, exist inquiry convenience inadequate, the problems such as continuous-query and consumer easily dial a wrong number cannot be preserved, can not be solved to Query Result;
, because its technology content is not high, itself there is easy stolen code, copy a yard serious technological deficiency of carrying out batch duplicating in 2, code anti-fake, is easily utilized by fraud clique, causes false proof inefficacy, and user enterprise has been produced to great negative effect;
3, DNA is false proof, and its false proof uniqueness is higher, but expensive, so the market share occupying is minimum, is unfavorable for the true and false of consumer's Direct Test product;
4, nuclear track, its maximum weak point is to reuse, and only need to, by clean the mark marking with pen etc. clean, just can reuse, and does not have the uniqueness of anti-fake mark, has left opportunity to fake producer;
5, laser holographic anti counterfeiting label and OVD technology, due to its mismanagement, the laser holographic mark that some are inferior and the mark of emulation are infiltrated market, and result is really untrue, and false is not false, has ruined the reputation of laser holographic anti counterfeiting label;
6, ink is false proof, and along with increasing of anti-forgery ink manufacturer, the effect of this anti-counterfeiting technology has not just had effect that anti-counterfeiting is of poor quality yet;
7, false proofly anti-take off technology, because manufacturer is a lot, do not possess uniqueness, do not get rid of producer and provide convenience for fake producer for interests;
8, RFID label, comparatively extensive in industry uses such as admission ticket, electronics, jewelry at present, but expensive, be not suitable in low side commodity and use on a large scale;
9, safety line is false proof, and because there are very strict administration and regulation limitations in country to paper mill in safety line paper production, therefore its application is also restricted.
Based on above-mentioned weak point, be badly in need of occurring a kind of anti-counterfeit recognition technology that can solve above-mentioned shortcoming.
Summary of the invention
For the weak point existing in the problems referred to above, the invention provides a kind ofly have that printing cost is low, terminal low cost of manufacture, company operation cost are low, user inquires about the advantage such as convenient passes through identification invisible light dot pattern with information extraction and the method discriminating one's identification.
For achieving the above object, the invention provides a kind of by identification invisible light dot pattern with information extraction and the method discriminating one's identification, comprise the following steps:
S10, the dot pattern generating with the printing of invisible light material on label;
The dot pattern on S20, reading tag surface, is adjusted to preset range by gradation of image rank;
S30, intercepting meet the image with dot pattern of grey level
S40, image is resolved and CRC check, to form code value information corresponding thereto;
S50, in code value database, search the message file corresponding with code value information, and information extraction file;
S60, to message file decode to form corresponding thereto, with the multimedia file of identity authentication information;
S70, play multimedia file, to learn the identity information of the product corresponding with dot pattern.
Above-mentioned passes through identification invisible light dot pattern with information extraction and the method discriminating one's identification, and wherein, in step S10, comprises the following steps:
The code value defining is converted to dot pattern pattern;
Dot pattern pattern is generated as to the dot pattern of TIFF or BMP form by dedicated software tool;
Adopt infrared anti-false image printing mode that dot pattern is printed on to label surface.
Above-mentioned passes through identification invisible light dot pattern with information extraction and the method discriminating one's identification, and wherein, in step S20, comprises the following steps:
Infrared reading device sends Infrared the dot pattern that is solidificated in label surface is read, and when Infrared arrives at behind dot pattern surface, to obtain the image of dot pattern, and image is fed back;
Utilize infrared reading device to carry out automatic exposure processing to the image of feedback, so that the grey level of image reaches preset range, and puts it into buffer memory, wherein, the step of image being carried out to automatic exposure processing comprises:
Filter out unnecessary spectrum;
Catch residue spectrum;
Regulate time shutter and figure frame per second, the brightness of image of the full graphics frame capturing is reached so that the grey level of image reaches between 110~200.
Above-mentioned passes through identification invisible light dot pattern with information extraction and the method discriminating one's identification, wherein, in step S40, the code value information obtaining after parsing and verification comprises that file starts field, header information and data message, and described data message comprises code value concordance list, code value bulleted list, RAW data item table and resource/RAW data.
Above-mentioned passes through identification invisible light dot pattern with information extraction and the method discriminating one's identification, and wherein, in step S50, comprises the following steps:
S500, by buffer memory extract resolve with check after code value information;
S501, judge within the scope of the code value whether current code value information store in code value database, if the determination result is YES, carry out S502, if if judged result be, perform step S503, feedback code value information is invalid, judges that article are as vacation;
S502, code value database is scanned to form header index file group;
S504, judge in header index file group whether include the header index file corresponding with current code value information, if the determination result is YES, perform step S505, if judged result is no, perform step S506, feedback code value information is invalid, judges that article are as vacation;
S505, judge in header index file whether include the message file corresponding with current code value information, if the determination result is YES, perform step S507, if judged result is no, perform step S508, feedback code value information is invalid, judges that article are as vacation;
S509, by extraction document handle in message file;
S510, judge that whether header information (FileHeader) in current code value information is encrypt file, if the determination result is YES, perform step S511, if judged result is no, carry out S512;
S511, be decrypted according to the encryption type of the header information (FileHeader) in current code value information;
S512, select corresponding data directory to calculate message file according to message file, to obtain message file after treatment.
Above-mentioned passes through identification invisible light dot pattern with information extraction and the method discriminating one's identification, and wherein, in step S511, the Encrypt and Decrypt mode of header information is the one in xTEA Encrypt and Decrypt mode, TEA Encrypt and Decrypt mode or AES Encrypt and Decrypt mode.
Above-mentioned passes through identification invisible light dot pattern with information extraction and the method discriminating one's identification, and wherein, in step S60, comprises the following steps:
S600, extract through step S50 current information file after treatment, and import in data distribution device;
S601, judge whether to be decrypted it according to the type of current information file in data distribution device, if judge, the type of current information file is text, performs step S70, if judge, the type of current information file is non-document file, carry out S602, it is decoded;
S602, decode according to current non-document file, to form the multimedia file with identity authentication information.
Above-mentioned passes through identification invisible light dot pattern with information extraction and the method discriminating one's identification, and wherein, in step S602, is the one in xTEA decoding process, TEA decoding process or AES decoding process to the decoding process of non-document file.
Compared with prior art, the present invention has the following advantages:
1, the present invention adopts dot pattern to replace the modes such as existing RFID label, and combine with digital technology, network technology, have that printing cost is low, terminal low cost of manufacture, company operation cost are low, user's inquiry mode advantage easily, effectively reach the false proof object of transreplication not, inexpensive, convenient identification, can be widely used in logistic management system, be regarded as one of direction of in the future false proof, logistics management;
2, owing to adopting multistage determining step, therefore, can improve the security performance of operation steps.
Accompanying drawing explanation
Fig. 1 is the process flow diagram in the present invention;
Fig. 2 is the structured flowchart of code value information in the present invention;
Fig. 3 is the particular flow sheet of step S50 in Fig. 1.
embodiment
As shown in Figures 1 to 4, the invention provides a kind of by identification invisible light dot pattern with information extraction and the method discriminating one's identification, comprise the following steps:
S10, the dot pattern generating with the printing of invisible light material on label.
Concrete, comprise the following steps:
The code value defining is converted to dot pattern pattern;
Dot pattern pattern is generated as to the dot pattern of TIFF or BMP form by dedicated software tool;
Adopt infrared anti-false image printing mode that dot pattern is printed on to label surface.Wherein, utilize CMYK IR printing technology, introduce the infrared image that cannot observe under visible spectrum, and design the ink usage of infrared response image with it, reach that the pel that is printed on label surface part under Infrared irradiation is visible, the sightless effect of part, be convenient to optical lens identification.
The dot pattern on S20, reading tag surface, is adjusted to preset range by gradation of image rank.
Concrete, infrared reading device sends Infrared the dot pattern that is solidificated in label surface is read, and when Infrared arrives at behind dot pattern surface, to obtain the image of dot pattern, and image is fed back;
Utilize infrared reading device to carry out automatic exposure processing to the image of feedback, so that the grey level of image reaches preset range, and puts it into buffer memory, wherein, the step of image being carried out to automatic exposure processing comprises:
Filter out unnecessary spectrum by optical filter;
Catch residue spectrum by optical lens;
When the exposure of adjustable lens and figure frame per second, the grey level of the image of the full graphics frame capturing is reached between 110~200.
S30, intercepting meet the image with dot pattern of grey level.
If it is all the pictures with dot pattern that infrared reading device is fed back to several, picture, after automatic exposure is processed, selects to approach most in several pictures a picture with dot pattern of the grey scale values upper limit, to carry out follow-up processing so.
If infrared reading device is fed back to the video image with dot pattern, be several picture frames by this Video Image Segmentation so, by each picture frame through automatic exposure process after, select to approach most in several picture frames a picture frame of the grey scale values upper limit, to carry out follow-up processing.
S40, image is resolved and CRC check, to form code value information corresponding thereto.
Concrete, in step S40, the code value information obtaining after parsing and verification comprises that file starts field (FileBeginFields), header information (FileHeader) and data message, and data message comprises code value concordance list (CodeIndexTable), code value bulleted list (CodeTable), RAW data item table (RawDataItemTable) and resource/RAW data (Resource/RawData).
S50, in code value database, search the message file corresponding with code value information, and information extraction file.
Wherein, in step S50, comprise the following steps:
S500, by buffer memory extract resolve with check after code value information.
S501, judge within the scope of the code value whether current code value information store in code value database, if the determination result is YES, carry out S502, if if judged result be, perform step S503, feedback code value information is invalid, judges that article are as vacation.
Code value database is not before upgrading, the code value scope of its storage inside is fixed, if the code value information drawing is not included in code value database, even if this code value information is real, in S501, can judge successively that this code value information is as invalid code value after resolving and checking.
S502, code value database is scanned to form header index file group.
S504, judge in header index file group whether include the header index file corresponding with current code value information, if the determination result is YES, perform step S505, if judged result is no, perform step S506, feedback code value information is invalid, judges that article are as vacation.
S505, judge in header index file whether include the message file corresponding with current code value information, if the determination result is YES, perform step S507, if judged result is no, perform step S508, feedback code value information is invalid, judges that article are as vacation.
S507, by extraction document handle in message file.
S509, judge that whether header information (FileHeader) in current code value information is encrypt file, if the determination result is YES, perform step S510, if judged result is no, play.
S510, be decrypted according to the encryption type of the header information (FileHeader) in current code value information; Wherein, the encryption and decryption mode of header information is the one in xTEA encryption and decryption mode, TEA encryption and decryption mode or AES encryption and decryption mode.
The header information encrypted of judgement belongs to any in above-mentioned three kinds of cipher modes, and carries out deciphering corresponding thereto according to corresponding cipher mode.
S511, select corresponding data directory to calculate message file according to message file, to obtain message file after treatment.
Wherein, data directory is divided into Hash table, simple in-order table and increment sequence list, showing corresponding algorithm with Hash is Hash location algorithm, and the algorithm corresponding with simple in-order table is simple tab order algorithm, and the algorithm corresponding with increment sequence list is increment sequential algorithm.
S60, to message file decode to form corresponding thereto, with the multimedia file of identity authentication information.
Wherein, in step S60, comprise the following steps:
S500, the current information file of extraction behind step S50 location, and imported in data distribution device.
S501, judge whether to be decrypted it according to the type of current information file in data distribution device, if judge, the type of current information file is text, performs step S70, if judge, the type of current information file is non-document file, carry out S602, it is decoded.
Wherein, include identity authentication information in text, this health authentication information is that article corresponding with dot pattern are corresponding.
S602, decode according to current non-document file, to form the multimedia file with identity authentication information.
Wherein, in step S602, be the one in xTEA decoding process, TEA decoding process or AES decoding process to the decoding process of non-document file.
If not the type of text is picture file, adopt picture demoder to decode to it;
If not the type of text is video file, adopt Video Decoder to decode to it;
If not the type of text is audio file, adopt audio decoder to decode to it.
S70, play multimedia file, to learn the identity information of the product corresponding with dot pattern.
Wherein, if be text with the file type of identity authentication information, directly show by display screen;
If the file type with identity authentication information is picture file, directly show by display screen;
If be video file with the file type of identity authentication information, its image section directly shows by display screen, and sound part is exported by power amplifier loudspeaker;
If be audio file with the file type of identity authentication information, export by power amplifier loudspeaker.
In addition, the dot pattern in the present invention cannot be differentiated with designated shape and naked eyes, and its useful area is not less than 3*3 square millimeter.Because the area of dot pattern is less, therefore, dot pattern is being attached to after article surface, can not impact its outward appearance.
The information point that this dot pattern is 30~40 microns by least one group of diameter rearranges by rule, and with the shape of specifying.Because the diameter of information point is small, and be preset with corresponding spacing distance between two adjacent information points, after the mode that is copied or scans copies, distance between adjacent two information points can be found deviation, the shape of specifying also can change, thereby form the invalid code that cannot be identified, therefore, the position of information point and the distance between the two can improve the anti-counterfeiting performance of dot pattern.In two adjacent information points, the spacing between the center of center to the second information point of being put by the first information is 80 microns.Information point in this dot pattern comprises direction reference point, center reference point and check code.
Dot pattern adopts the coating that can be identified by naked eyes invisible light to be attached on the white space of carrier, one in the visible coating that the coating that can be identified by naked eyes invisible light is carbon containing or the invisible coating of carbon containing, visible ink or ink that the visible coating of carbon containing is carbon containing, the colorless ink that the invisible coating of carbon containing is carbon containing or ink.Due to visible ink or the ink of carbon containing, and the colorless ink of carbon containing or ink can absorb the infrared ray of specific band, therefore, only has infrared ray recognition device to identify the information in label layer.
Only as described above, be only preferred embodiment of the present invention, such as professional who are familiar with this art.After understanding technological means of the present invention, natural energy, according to actual needs, is changed under instruction of the present invention.Therefore all equal variation and modifications of doing according to the present patent application the scope of the claims, once should still remain within the scope of the patent.

Claims (8)

1. by identifying invisible light dot pattern with information extraction and the method discriminating one's identification, comprise the following steps:
S10, the dot pattern generating with the printing of invisible light material on label;
The dot pattern on S20, reading tag surface, is adjusted to preset range by gradation of image rank;
S30, intercepting meet the image with dot pattern of grey level;
S40, image is resolved and CRC check, to form code value information corresponding thereto;
S50, in code value database, search the message file corresponding with code value information, and information extraction file;
S60, to message file decode to form corresponding thereto, with the multimedia file of identity authentication information;
S70, play multimedia file, to learn the identity information of the product corresponding with dot pattern.
According to claim 1 by identification invisible light dot pattern with information extraction and the method discriminating one's identification, it is characterized in that, in step S10, comprise the following steps:
The code value defining is converted to dot pattern pattern;
Dot pattern pattern is generated as to the dot pattern of TIFF or BMP form by dedicated software tool;
Adopt infrared anti-false image printing mode that dot pattern is printed on to label surface.
According to claim 1 by identification invisible light dot pattern with information extraction and the method discriminating one's identification, it is characterized in that, in step S20, comprise the following steps:
Infrared reading device sends Infrared the dot pattern that is solidificated in label surface is read, and when Infrared arrives at behind dot pattern surface, to obtain the image of dot pattern, and image is fed back;
Utilize infrared reading device to carry out automatic exposure processing to the image of feedback, so that the grey level of image reaches preset range, and puts it into buffer memory, wherein, the step of image being carried out to automatic exposure processing comprises:
Filter out unnecessary spectrum;
Catch residue spectrum;
Regulate time shutter and figure frame per second, the brightness of image of the full graphics frame capturing is reached so that the grey level of image reaches between 110~200.
4. according to claim 1 by identifying invisible light dot pattern with information extraction and the method discriminating one's identification, it is characterized in that, in step S40, the code value information obtaining after parsing and verification comprises that file starts field, header information and data message, and described data message comprises code value concordance list, code value bulleted list, RAW data item table and resource/RAW data.
According to claim 1 by identification invisible light dot pattern with information extraction and the method discriminating one's identification, it is characterized in that, in step S50, comprise the following steps:
S500, by buffer memory extract resolve with check after code value information;
S501, judge within the scope of the code value whether current code value information store in code value database, if the determination result is YES, carry out S502, if if judged result be, perform step S503, feedback code value information is invalid, judges that article are as vacation;
S502, code value database is scanned to form header index file group;
S504, judge in header index file group whether include the header index file corresponding with current code value information, if the determination result is YES, perform step S505, if judged result is no, perform step S506, feedback code value information is invalid, judges that article are as vacation;
S505, judge in header index file whether include the message file corresponding with current code value information, if the determination result is YES, perform step S507, if judged result is no, perform step S508, feedback code value information is invalid, judges that article are as vacation;
S509, by extraction document handle in message file;
S510, judge that whether header information (FileHeader) in current code value information is encrypt file, if the determination result is YES, perform step S511, if judged result is no, carry out S512;
S511, be decrypted according to the encryption type of the header information (FileHeader) in current code value information;
S512, select corresponding data directory to calculate message file according to message file, to obtain message file after treatment.
6. according to claim 5 by identifying invisible light dot pattern with information extraction and the method discriminating one's identification, it is characterized in that, in step S511, the encryption and decryption mode of header information is the one in xTEA encryption and decryption mode, TEA encryption and decryption mode or AES encryption and decryption mode.
According to claim 5 by identification invisible light dot pattern with information extraction and the method discriminating one's identification, it is characterized in that, in step S60, comprise the following steps:
S600, extract through step S50 current information file after treatment, and import in data distribution device;
S601, judge whether to be decrypted it according to the type of current information file in data distribution device, if judge, the type of current information file is text, performs step S70, if judge, the type of current information file is non-document file, carry out S602, it is decoded;
S602, decode according to current non-document file, to form the multimedia file with identity authentication information.
8. according to claim 7 by identifying invisible light dot pattern with information extraction and the method discriminating one's identification, it is characterized in that, in step S602, be the one in xTEA decoding process, TEA decoding process or AES decoding process to the decoding process of non-document file.
CN201410054077.7A 2014-02-18 2014-02-18 By identifying that black light dot pattern is with extraction information and the method discriminated one's identification Active CN103824044B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410054077.7A CN103824044B (en) 2014-02-18 2014-02-18 By identifying that black light dot pattern is with extraction information and the method discriminated one's identification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410054077.7A CN103824044B (en) 2014-02-18 2014-02-18 By identifying that black light dot pattern is with extraction information and the method discriminated one's identification

Publications (2)

Publication Number Publication Date
CN103824044A true CN103824044A (en) 2014-05-28
CN103824044B CN103824044B (en) 2016-09-28

Family

ID=50759098

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410054077.7A Active CN103824044B (en) 2014-02-18 2014-02-18 By identifying that black light dot pattern is with extraction information and the method discriminated one's identification

Country Status (1)

Country Link
CN (1) CN103824044B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115310468A (en) * 2022-08-08 2022-11-08 北京微晶物联科技有限公司 Microcrystal code scanning device and method for explosion-proof environment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5946427A (en) * 1994-12-09 1999-08-31 Fujitsu Limited Image reading method and image reading apparatus
CN101079114A (en) * 2007-04-23 2007-11-28 天津市阿波罗信息技术有限公司 Printing medium multimedia system multimedia broadcasting part implementation method
CN102110224A (en) * 2009-12-25 2011-06-29 金辉文 Method for preventing counterfeiting and preventing goods from fleeing by intelligent code
US20120199731A1 (en) * 2011-02-08 2012-08-09 Fuji Xerox Co., Ltd. Recording medium and infrared reading method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5946427A (en) * 1994-12-09 1999-08-31 Fujitsu Limited Image reading method and image reading apparatus
CN101079114A (en) * 2007-04-23 2007-11-28 天津市阿波罗信息技术有限公司 Printing medium multimedia system multimedia broadcasting part implementation method
CN102110224A (en) * 2009-12-25 2011-06-29 金辉文 Method for preventing counterfeiting and preventing goods from fleeing by intelligent code
US20120199731A1 (en) * 2011-02-08 2012-08-09 Fuji Xerox Co., Ltd. Recording medium and infrared reading method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115310468A (en) * 2022-08-08 2022-11-08 北京微晶物联科技有限公司 Microcrystal code scanning device and method for explosion-proof environment

Also Published As

Publication number Publication date
CN103824044B (en) 2016-09-28

Similar Documents

Publication Publication Date Title
US10373033B2 (en) Two dimensional barcode and method of authentication of such barcode
CN107194449B (en) Printing anti-counterfeiting and information tracing method based on combination of digital watermark and two-dimensional code
CN104820854B (en) A kind of combined anti-fake mark and its generation method and generating means
CN1259634C (en) Encryption antiforgery method based on substance characteristics
US20150235118A1 (en) Two-Dimensional Barcodes Having A Plurality of Different Regions
CN104766111B (en) Combined anti-fake mark and generation method based on the same ID and device
KR101535534B1 (en) A Creating and Verifying Method Of A Document Having Printed Means Of Preventing From Forging/Manipulating
CN1635533A (en) Digital stamp system
JP2019192193A (en) Complex code pattern, generating device, reading device, method, and program
CN103810457A (en) Offline license anti-counterfeiting method based on reliable digital signature and two-dimensional code
CN104794514A (en) Combined anti-counterfeiting mark based on same ID (Identity) as well as generation method and device
CN106650545A (en) Anti-counterfeiting two-dimensional code tracing label and the method for generating and identifying the same
CN1691087B (en) System and method for decoding digital coding image
CN103793677A (en) Method for information extraction and identity authentication by identifying raster graphics
CN104778436A (en) Method and device for identifying and reading combined anti-fake label
CN109472335A (en) A kind of lottery ticket anti-counterfeiting system and method for anti-counterfeit
CN108960387A (en) A kind of anti-counterfeiting two dimensional code and its generation and recognition methods
CN106301775A (en) A kind of QR code encryption method based on RSA Algorithm
CN103824044A (en) Method for extracting information and identifying identities through recognizing invisible light spot array patterns
CN111428532A (en) Encryptable three-dimensional code and encoding and decoding method
CN1321507C (en) Soft certification anti-false method based on graphic code primary and secondary signet series information association mechanism
KR20160027947A (en) A Document Having Printed Means Of Preventing From Forging/Manipulating
CN103942521A (en) Method for extracting and distinguishing dot-matrix patterns after filtering through optical filter
CN107222506A (en) A kind of signature method and system
CN115860033B (en) Anti-counterfeiting method and device for color partition micro-point code mark capable of classifying and identifying counterfeiting

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent of invention or patent application
CB03 Change of inventor or designer information

Inventor after: Yao Wei

Inventor after: Wan Hongyu

Inventor before: Yao Wei

Inventor before: Zhu Liming

COR Change of bibliographic data

Free format text: CORRECT: INVENTOR; FROM: YAO WEI ZHU LIMING TO: YAO WEI WAN HONGYU

C14 Grant of patent or utility model
GR01 Patent grant
DD01 Delivery of document by public notice
DD01 Delivery of document by public notice

Addressee: LEADER TECH DIGITAL TECHNOLOGY Co.,Ltd.

Document name: Notification that Application Deemed not to be Proposed

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20191101

Address after: Room 10602, Building 1, Wangjing International Building, Fengcheng Sixth Road, Xi'an Economic and Technological Development Zone, Shaanxi 710000

Patentee after: SHAANXI ZHUANYI INTELLECTUAL PROPERTY OPERATION CO.,LTD.

Address before: 100081 Beijing city Haidian District Daliushu Road No. 17 Fu Hai Hong Kong International room 803

Patentee before: LEADER TECH DIGITAL TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20191111

Address after: 215400 A, building 88, Beijing East Road, Taicang Development Zone, Suzhou, Jiangsu

Patentee after: Suzhou Desmir Intelligent Technology Co.,Ltd.

Address before: Room 10602, Building 1, Wangjing International Building, Fengcheng Sixth Road, Xi'an Economic and Technological Development Zone, Shaanxi 710000

Patentee before: SHAANXI ZHUANYI INTELLECTUAL PROPERTY OPERATION CO.,LTD.

PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A method of extracting information and identifying identity by identifying invisible light dot matrix graphics

Effective date of registration: 20220630

Granted publication date: 20160928

Pledgee: China Construction Bank Taicang branch

Pledgor: Suzhou Desmir Intelligent Technology Co.,Ltd.

Registration number: Y2022980009615