CN110648148A - Fake and inferior article identification method and device based on Internet of things operating system - Google Patents

Fake and inferior article identification method and device based on Internet of things operating system Download PDF

Info

Publication number
CN110648148A
CN110648148A CN201910864534.1A CN201910864534A CN110648148A CN 110648148 A CN110648148 A CN 110648148A CN 201910864534 A CN201910864534 A CN 201910864534A CN 110648148 A CN110648148 A CN 110648148A
Authority
CN
China
Prior art keywords
target
fake
information
item
article
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910864534.1A
Other languages
Chinese (zh)
Inventor
徐志方
刘超
尹德帅
王方前
崔原
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao Haier Technology Co Ltd
Original Assignee
Qingdao Haier Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qingdao Haier Technology Co Ltd filed Critical Qingdao Haier Technology Co Ltd
Priority to CN201910864534.1A priority Critical patent/CN110648148A/en
Publication of CN110648148A publication Critical patent/CN110648148A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/60Type of objects
    • G06V20/62Text, e.g. of license plates, overlay texts or captions on TV images

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Medical Treatment And Welfare Office Work (AREA)

Abstract

The invention provides a fake and inferior object identification method and device based on an Internet of things operating system, wherein the method comprises the following steps: acquiring a target image of a target object to be identified; identifying target item information of the target item in the target image; judging whether the target object is a fake object or not according to the target object information and a pre-stored fake object blacklist, wherein the fake object blacklist comprises object information of fake objects; and if so, initiating alarm information for prompting that the target object is a fake object, solving the problem that whether the object is a fake object cannot be determined in time in the related technology so that high risk caused by the fake object is solved, and rapidly determining whether the object is the fake object by photographing or scanning so as to reduce the risk of using the fake object and further improve the user experience.

Description

Fake and inferior article identification method and device based on Internet of things operating system
Technical Field
The invention relates to the field of Internet of things, in particular to a fake and inferior object identification method and device based on an Internet of things operating system.
Background
Counterfeit drugs often have adverse effects on the user's health, particularly for infants. After purchasing a counterfeit medicine, a user often uses the counterfeit medicine unknowingly, thereby causing adverse effects on the body. At present, the news reports can expose the fake medicines, but the users probably do not pay attention to the news reports of the fake medicines in time due to reasons such as busy work, and the risk that the users use the fake medicines is high.
Aiming at the problem that whether an article is a fake article or not cannot be determined in time in the related art, so that high risk brought by the fake article is not provided, a solution is not provided.
Disclosure of Invention
The embodiment of the invention provides a method and a device for identifying fake and inferior goods based on an operating system of the Internet of things, which are used for at least solving the problem that whether goods are fake and inferior goods cannot be determined in time in the related art, so that high risk is brought by the fake and inferior goods.
According to an embodiment of the invention, a fake and inferior article identification method based on an operating system of the internet of things is provided, and comprises the following steps:
acquiring a target image of a target object to be identified;
identifying target item information of the target item in the target image;
judging whether the target object is a fake object or not according to the target object information and a pre-stored fake object blacklist, wherein the fake object blacklist comprises object information of fake objects;
and if so, initiating alarm information for prompting that the target object is a fake object.
Optionally, the determining whether the target item is a counterfeit item according to the target item information and a pre-stored counterfeit item blacklist includes:
determining the target object as a fake object under the condition that the target object information is matched with at least one item of object information of the fake object contained in the fake object blacklist;
and under the condition that the target article information is not matched with the article information of the fake article contained in the fake article blacklist, determining that the target article is a non-fake article.
Optionally, identifying the target item information of the target item in the target image includes:
performing character recognition on the target image to obtain the target article information; and/or
And identifying a digital object identifier in the target image to obtain the target article information, wherein the digital object identifier comprises a two-dimensional code and/or a bar code.
Optionally, before acquiring the target image of the target item to be identified, the method further includes:
monitoring one or more target network addresses in a preset monitoring period;
acquiring article information of one or more fake and inferior articles contained in the webpage information in each target network address;
and storing the acquired article information of the fake and inferior articles into the fake and inferior article blacklist.
Optionally, the method further comprises:
identifying a production date and an expiration date of the target item from the target image;
determining whether the target item has expired according to the current date, the production date and the validity period;
and initiating the alarm information for prompting that the target object is a fake object under the condition that the target object is out of date as a result of the determination.
Optionally, the target item information includes at least one of: the product comprises an article name, a commercial name, an approved document number, a production enterprise name, a trademark, a product batch number and an electronic supervision code; the article information of the counterfeit article includes at least one of: article name, business name, approval document number, production enterprise name, trademark, product batch number, and electronic supervision code.
According to another embodiment of the present invention, there is also provided a counterfeit item identification device based on an operating system of the internet of things, including:
the first acquisition module is used for acquiring a target image of a target object to be identified;
the first identification module is used for identifying the target article information of the target article in the target image;
the judging module is used for judging whether the target object is a fake object or not according to the target object information and a pre-stored fake object blacklist, wherein the fake object blacklist comprises object information of fake objects;
and the warning module is used for initiating warning information for prompting that the target object is a fake object under the condition that the judgment result is yes.
Optionally, the determining module includes:
a first determining sub-module, configured to determine that the target item is a counterfeit item when the target item information matches at least one item of item information of the counterfeit item included in the counterfeit item blacklist;
a second determining sub-module, configured to determine that the target item is a non-counterfeit item if the target item information does not match with the item information of the counterfeit item included in the counterfeit item blacklist.
Optionally, the first identification module includes:
the first identification submodule is used for carrying out character identification on the target image to obtain the information of the target object; and/or
And the second identification submodule is used for identifying a digital object identifier in the target image to obtain the target article information, wherein the digital object identifier comprises a two-dimensional code and/or a bar code.
Optionally, the apparatus further comprises:
the monitoring module is used for monitoring one or more target network addresses in a preset monitoring period;
the second acquisition module is used for acquiring the article information of one or more fake and inferior articles contained in the webpage information in each target network address;
and the storage module is used for storing the acquired article information of the fake and inferior articles into the fake and inferior article blacklist.
Optionally, the apparatus further comprises:
the second identification module is used for identifying the production date and the valid period of the target object from the target image;
a determining module, configured to determine whether the target item has expired according to the current date, the production date, and the validity period;
and the prompting module is used for initiating the alarm information for prompting that the target object is a fake object under the condition that the determined result is that the target object is out of date.
Optionally, the target item information includes at least one of: the product comprises an article name, a commercial name, an approved document number, a production enterprise name, a trademark, a product batch number and an electronic supervision code; the article information of the counterfeit article includes at least one of: article name, business name, approval document number, production enterprise name, trademark, product batch number, and electronic supervision code.
According to a further embodiment of the present invention, a computer-readable storage medium is also provided, in which a computer program is stored, wherein the computer program is configured to perform the steps of any of the above-described method embodiments when executed.
According to yet another embodiment of the present invention, there is also provided an electronic device, including a memory in which a computer program is stored and a processor configured to execute the computer program to perform the steps in any of the above method embodiments.
According to the invention, the target image of the target object to be identified is obtained; identifying target item information of the target item in the target image; judging whether the target object is a fake object or not according to the target object information and a pre-stored fake object blacklist, wherein the fake object blacklist comprises object information of fake objects; and if so, initiating alarm information for prompting that the target object is a fake object, solving the problem that whether the object is a fake object cannot be determined in time in the related technology so that high risk caused by the fake object is solved, and rapidly determining whether the object is the fake object by photographing or scanning so as to reduce the risk of using the fake object and further improve the user experience.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
fig. 1 is a block diagram of a hardware structure of a mobile terminal of a counterfeit item identification method based on an operating system of the internet of things according to an embodiment of the present invention;
fig. 2 is a flowchart of a counterfeit item identification method based on an operating system of the internet of things according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of a counterfeit drug reminder operating system according to an embodiment of the present invention;
fig. 4 is a block diagram of a counterfeit item identification apparatus based on an operating system of the internet of things according to an embodiment of the present invention;
fig. 5 is a block diagram of a counterfeit item identification apparatus based on an operating system of the internet of things according to a preferred embodiment of the present invention.
Detailed Description
The invention will be described in detail hereinafter with reference to the accompanying drawings in conjunction with embodiments. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order.
Example 1
The method provided by the first embodiment of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Taking a mobile terminal as an example, fig. 1 is a block diagram of a hardware structure of the mobile terminal of a counterfeit item identification method based on an operating system of the internet of things according to an embodiment of the present invention, as shown in fig. 1, a mobile terminal 10 may include one or more processors 102 (only one is shown in fig. 1) (the processor 102 may include, but is not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA, etc.), and a memory 104 for storing data, and optionally, the mobile terminal may further include a transmission device 106 for a communication function and an input/output device 108. It will be understood by those skilled in the art that the structure shown in fig. 1 is only an illustration, and does not limit the structure of the mobile terminal. For example, the mobile terminal 10 may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
The memory 104 may be used to store a computer program, for example, a software program of application software and a module, such as a computer program corresponding to the message receiving method in the embodiment of the present invention, and the processor 102 executes various functional applications and data processing by running the computer program stored in the memory 104, so as to implement the method described above. The memory 104 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some instances, the memory 104 may further include memory located remotely from the processor 102, which may be connected to the mobile terminal 10 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 106 is used for receiving or transmitting data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the mobile terminal 10. In one example, the transmission device 106 includes a Network adapter (NIC) that can be connected to other Network devices through a base station to communicate with the internet. In one example, the transmission device 106 can be a Radio FrequeNcy (RF) module, which is used to communicate with the internet in a wireless manner.
Based on the above mobile terminal or network architecture, in this embodiment, a counterfeit article identification method based on an operating system of the internet of things is provided, and fig. 2 is a flowchart of the counterfeit article identification method based on the operating system of the internet of things according to an embodiment of the present invention, as shown in fig. 2, the flowchart includes the following steps:
step S202, acquiring a target image of a target object to be identified; specifically, the target image can be acquired by a video acquisition device such as a camera.
Step S204, identifying the target article information of the target article in the target image;
step S206, judging whether the target object is a fake object or not according to the target object information and a pre-stored fake object blacklist, wherein the fake object blacklist comprises object information of fake objects;
and step S208, initiating alarm information for prompting that the target object is a fake object under the condition that the judgment result is yes.
The target item information includes at least one of: the product comprises an article name, a commercial name, an approved document number, a production enterprise name, a trademark, a product batch number and an electronic supervision code; the article information of the counterfeit article includes at least one of: article name, business name, approval document number, production enterprise name, trademark, product batch number, and electronic supervision code.
Through the steps S202 to S208, a target image of a target object to be identified is obtained; identifying target item information of the target item in the target image; judging whether the target object is a fake object or not according to the target object information and a pre-stored fake object blacklist, wherein the fake object blacklist comprises object information of fake objects; and if so, initiating alarm information for prompting that the target object is a fake object, solving the problem that whether the object is a fake object cannot be determined in time in the related technology so that high risk caused by the fake object is solved, and rapidly determining whether the object is the fake object by photographing or scanning so as to reduce the risk of using the fake object and further improve the user experience.
Taking the article as a medicine as an example, when the medicine is a fake medicine, the user is prompted, so that adverse effects caused by the fake medicine can be facilitated. The method comprises the steps that a video acquisition device such as a camera acquires a medicine box image of a medicine used by a user, related information such as a medicine name, an approval character number or a manufacturing enterprise of the medicine used by the user is acquired from the medicine box image, the related information of the medicine used by the user is matched with the existing related information in the blacklist, when the matching is achieved, the medicine used by the user is possibly a fake medicine, an operating system reminds the user, and therefore the risk that the user uses the fake medicine is reduced.
In an embodiment of the present invention, the step S206 may specifically include:
determining the target object as a fake object under the condition that the target object information is matched with at least one item of object information of the fake object included in the fake object blacklist;
and under the condition that the target article information is not matched with the article information of the fake and inferior articles included in the fake and inferior article blacklist, determining that the target article is a non-fake and inferior article.
In an embodiment of the present invention, the step S204 may specifically include:
performing character recognition on the target image to obtain the target article information; and/or
And identifying a digital object identifier in the target image to obtain the target article information, wherein the digital object identifier comprises a two-dimensional code and/or a bar code.
In the embodiment of the present invention, before step S202, a blacklist is created, and one or more target network addresses are monitored in a preset monitoring period; acquiring article information of one or more fake and inferior articles contained in the webpage information in each target network address; and storing the acquired article information of the fake and inferior articles into the fake and inferior article blacklist.
By monitoring network information, including information on a news website, microblogs, a social network and the like, relevant information of the fake and inferior drugs exposed on the network, such as drug names (which can be drug names or business names), production enterprises, approval numbers and the like, is acquired, and the relevant information of the fake and inferior drugs can be used for uniquely distinguishing the fake and inferior drugs or the production enterprises thereof. After the relevant information of the fake medicine is obtained, the relevant information of the manufacturing enterprise, the medicine name, the approval document number and the like of the fake medicine is added to the blacklist.
The embodiment of the invention can also prompt the expired articles, specifically, identify the production date and the valid period of the target articles from the target images; determining whether the target item has expired according to the current date, the production date and the validity period; and initiating alarm information for prompting that the target object is a fake object or an expired commodity to prompt that the target object is expired under the condition that the target object is expired.
The following describes embodiments of the present invention in detail, taking articles as examples of medicines.
Fig. 3 is a schematic diagram of a counterfeit drug presentation operating system according to an embodiment of the present invention, as shown in fig. 3, including:
the operating system establishes a blacklist in advance, and specifically the mode of establishing the blacklist is as follows:
the operating system monitors the network information through the monitoring module 31, and the monitored objects can be main news websites, microblog hotspots, Baidu hotspots, main websites in the vertical field of medicines (such as the official website of the national food and drug administration), and the like. In practical applications, in order to prevent monitoring omission, the user may also input the website of the target website to be monitored through the input module, so that the monitoring module 31 can monitor the target website.
When the network information is monitored to have a news report of a counterfeit drug, the obtaining module 32 of the operating system obtains the related information of the counterfeit drug, where the related information can be used to uniquely distinguish the counterfeit drug or the manufacturing enterprise thereof, for example, the related information of the counterfeit drug may specifically be a drug name (drug name or business name) of the counterfeit drug, an approval document number of the counterfeit drug, the manufacturing enterprise of the counterfeit drug, and the like.
After the obtaining module 32 of the operating system obtains the related information of the counterfeit medicine, the related information is added to the blacklist through the adding module 33.
For convenience of understanding, the above-mentioned blacklist establishing process may be described in detail by way of example. For example, if a fake drug exists in the drug a blown out from the Baidu hotspot, the monitoring module 31 of the operating system acquires at least one of the drug name, the manufacturing company, or the approval document number of the drug a through the acquiring module 32 after monitoring the network information, and adds the information to the blacklist.
After the blacklist is established, the user can be actively reminded by using the blacklist, so that the risk of using the fake and inferior medicines by the user is reduced. One of the ways of actively reminding a user by using a blacklist includes:
the image acquisition module 34 of the operating system acquires the image of the medicine cartridge of the medicine used by the user, where the image acquisition module 34 may be a camera or the like.
Since the pharmaceutical cartridge may include information related to the pharmaceutical name, the business name, the approval document number, the manufacturing company, etc. of the pharmaceutical according to the relevant national regulations, after the pharmaceutical cartridge image is acquired, the operating system may extract at least one of the pharmaceutical name, the business name, the approval document number, the manufacturing company from the pharmaceutical cartridge image through the information extraction module 35.
The identification module 36 of the operating system matches the drug name, the business name, the approval document number and/or the manufacturing enterprise extracted from the image of the drug cartridge with the related information in the pre-established blacklist, and when any one of the drug name, the business name, the approval document number and/or the manufacturing enterprise is matched, it is indicated that the drug may be a counterfeit drug, and at this time, the operating system reminds the user through the identification module 36.
In practical applications, some pharmaceutical cases may include a two-dimensional code or a bar code (called a digital object id), and the name of the pharmaceutical, the name of the business, the approval document number, the manufacturing company, etc. of the pharmaceutical can be obtained by scanning the digital object id. Therefore, another way to actively remind the user by using the blacklist can be as follows:
the scanning module of the operating system scans the digital object identifier on the pharmaceutical box to obtain at least one of the pharmaceutical name, the business name, the approval document number and the manufacturing enterprise of the pharmaceutical, and then matches the pharmaceutical name, the business name, the approval document number and/or the manufacturing enterprise with the related information in the pre-established blacklist through the identification module 36, when any one of the pharmaceutical name, the business name, the approval document number and/or the manufacturing enterprise is matched, it is stated that the pharmaceutical may be a counterfeit pharmaceutical, and at this time, the operating system reminds the user through the identification module 36.
In addition, after the image acquisition module 34 of the operating system acquires the medicine box image of the medicine used by the user, the operating system may further extract the production date and the valid period of the medicine from the medicine box image through the information extraction module 35, and when the valid period (such as 1 week before the valid period or other preset time) is about to exceed, the reminding module 38 reminds the user to prevent the user from using the expired medicine.
It should be further noted that the operating system of the embodiment of the present invention may be applied to smart homes in the internet of things, that is, the operating system and the method may be combined with specific hardware devices, so as to obtain other technical effects, for example, the monitoring module 31, the obtaining module, and the adding module 33 are arranged on terminal devices such as a mobile phone and a tablet computer in the internet of things, the image obtaining module 34 is arranged on a camera or other devices having an image obtaining function in the internet of things, and other modules are arranged in corresponding devices in the internet of things, so that the technology of the present disclosure is implemented through cooperation between a plurality of devices, and by combining the hardware devices, the commercial value of the hardware devices may be improved.
Through the above description of the embodiments, those skilled in the art can clearly understand that the method according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
Example 2
The embodiment also provides a counterfeit and bad article identification device based on an operating system of the internet of things, which is used for implementing the above embodiments and preferred embodiments, and the description of the device is omitted. As used below, the term "module" may be a combination of software and/or hardware that implements a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated.
Fig. 4 is a block diagram of a counterfeit item identification device based on an operating system of the internet of things according to an embodiment of the present invention, as shown in fig. 4, including:
a first obtaining module 42, configured to obtain a target image of a target object to be identified;
a first identification module 44, configured to identify target item information of the target item in the target image;
a judging module 46, configured to judge whether the target item is a counterfeit item according to the target item information and a pre-stored counterfeit item blacklist, where the counterfeit item blacklist includes item information of the counterfeit item;
and the warning module 48 is configured to initiate warning information for prompting that the target object is a counterfeit object if the determination result is yes.
It should be noted that the function of the first acquiring module 42 corresponds to the image acquiring module 34, the function of the first identifying module 44 can be implemented by the information extracting module 35, the identifying module 36 and the scanning module 37, and the function of the warning module 48 can be implemented by the prompting module 38.
Optionally, the determining module 46 includes:
a first determining sub-module, configured to determine that the target item is a counterfeit item when the target item information matches at least one item of item information of the counterfeit item included in the counterfeit item blacklist;
a second determining sub-module, configured to determine that the target item is a non-counterfeit item if the target item information does not match with the item information of the counterfeit item included in the counterfeit item blacklist.
Optionally, the first identification module 44 includes:
the first identification submodule is used for carrying out character identification on the target image to obtain the information of the target object; and/or
And the second identification submodule is used for identifying a digital object identifier in the target image to obtain the target article information, wherein the digital object identifier comprises a two-dimensional code and/or a bar code.
Fig. 5 is a block diagram of a counterfeit item identification apparatus based on an operating system of the internet of things according to a preferred embodiment of the present invention, as shown in fig. 5, the apparatus further includes:
a monitoring module 52, configured to monitor one or more target network addresses in a preset monitoring cycle;
a second obtaining module 54, configured to obtain item information of one or more counterfeit items included in the webpage information in each of the target network addresses;
and the storage module 56 is configured to store the acquired article information of the counterfeit articles in the counterfeit article blacklist.
It should be noted that the function of the monitoring module 52 corresponds to the function of the monitoring module 31, and the functions of the second obtaining module 54 and the storing module 56 can be implemented by the obtaining module 32 and the adding module 33 together.
Optionally, the apparatus further comprises:
the second identification module is used for identifying the production date and the valid period of the target object from the target image;
a determining module, configured to determine whether the target item has expired according to the current date, the production date, and the validity period;
and the prompting module is used for initiating the alarm information for prompting that the target object is a fake object under the condition that the determined result is that the target object is out of date.
Optionally, the target item information includes at least one of: the product comprises an article name, a commercial name, an approved document number, a production enterprise name, a trademark, a product batch number and an electronic supervision code; the article information of the counterfeit article includes at least one of: article name, business name, approval document number, production enterprise name, trademark, product batch number, and electronic supervision code.
It should be noted that, the above modules may be implemented by software or hardware, and for the latter, the following may be implemented, but not limited to: the modules are all positioned in the same processor; alternatively, the modules are respectively located in different processors in any combination.
Example 3
Embodiments of the present invention also provide a storage medium having a computer program stored therein, wherein the computer program is arranged to perform the steps of any of the above method embodiments when executed.
Alternatively, in the present embodiment, the storage medium may be configured to store a computer program for executing the steps of:
s1, acquiring a target image of a target object to be identified;
s2, identifying the target item information of the target item in the target image;
s3, judging whether the target object is a fake object or not according to the target object information and a pre-stored fake object blacklist, wherein the fake object blacklist comprises object information of fake objects;
and S4, if the judgment result is yes, initiating alarm information for prompting that the target object is a fake object.
Optionally, in this embodiment, the storage medium may include, but is not limited to: various media capable of storing computer programs, such as a usb disk, a Read-ONly Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk.
Example 4
Embodiments of the present invention also provide an electronic device comprising a memory having a computer program stored therein and a processor arranged to run the computer program to perform the steps of any of the above method embodiments.
Optionally, the electronic apparatus may further include a transmission device and an input/output device, wherein the transmission device is connected to the processor, and the input/output device is connected to the processor.
Optionally, in this embodiment, the processor may be configured to execute the following steps by a computer program:
s1, acquiring a target image of a target object to be identified;
s2, identifying the target item information of the target item in the target image;
s3, judging whether the target object is a fake object or not according to the target object information and a pre-stored fake object blacklist, wherein the fake object blacklist comprises object information of fake objects;
and S4, if the judgment result is yes, initiating alarm information for prompting that the target object is a fake object.
Optionally, the specific examples in this embodiment may refer to the examples described in the above embodiments and optional implementation manners, and this embodiment is not described herein again.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and alternatively, they may be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, and in some cases, the steps shown or described may be performed in an order different than that described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple ones of them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A counterfeit article identification method based on an Internet of things operating system is characterized by comprising the following steps:
acquiring a target image of a target object to be identified;
identifying target item information of the target item in the target image;
judging whether the target object is a fake object or not according to the target object information and a pre-stored fake object blacklist, wherein the fake object blacklist comprises object information of fake objects;
and if so, initiating alarm information for prompting that the target object is a fake object.
2. The method of claim 1, wherein determining whether the target item is a counterfeit item based on the target item information and a pre-stored blacklist of counterfeit items comprises:
determining the target object as a fake object under the condition that the target object information is matched with at least one item of object information of the fake object included in the fake object blacklist;
and under the condition that the target article information is not matched with the article information of the fake and inferior articles included in the fake and inferior article blacklist, determining that the target article is a non-fake and inferior article.
3. The method of claim 1, wherein identifying target item information for the target item in the target image comprises:
performing character recognition on the target image to obtain the target article information; and/or
And identifying a digital object identifier in the target image to obtain the target article information, wherein the digital object identifier comprises a two-dimensional code and/or a bar code.
4. The method of claim 1, wherein prior to acquiring the target image of the target item to be identified, the method further comprises:
monitoring one or more target network addresses in a preset monitoring period;
acquiring article information of one or more fake and inferior articles contained in the webpage information in each target network address;
and storing the acquired article information of the fake and inferior articles into the fake and inferior article blacklist.
5. The method of claim 1, further comprising:
identifying a production date and an expiration date of the target item from the target image;
determining whether the target item has expired according to the current date, the production date and the validity period;
and initiating the alarm information for prompting that the target object is a fake object under the condition that the target object is out of date as a result of the determination.
6. The method according to any one of claims 1 to 5, wherein the target item information comprises at least one of: the product comprises an article name, a commercial name, an approved document number, a production enterprise name, a trademark, a product batch number and an electronic supervision code;
the article information of the counterfeit article includes at least one of: article name, business name, approval document number, production enterprise name, trademark, product batch number, and electronic supervision code.
7. The utility model provides a fake and inferior goods recognition device based on thing networking operating system which characterized in that includes:
the first acquisition module is used for acquiring a target image of a target object to be identified;
the first identification module is used for identifying the target article information of the target article in the target image;
the judging module is used for judging whether the target object is a fake object or not according to the target object information and a pre-stored fake object blacklist, wherein the fake object blacklist comprises object information of fake objects;
and the warning module is used for initiating warning information for prompting that the target object is a fake object under the condition that the judgment result is yes.
8. The apparatus of claim 7, wherein the determining module comprises:
a first determining sub-module, configured to determine that the target item is a counterfeit item when the target item information matches at least one item of item information of the counterfeit item included in the counterfeit item blacklist;
and the second determining sub-module is used for determining that the target object is a non-counterfeit object under the condition that the target object information is not matched with the object information of the counterfeit object contained in the counterfeit object blacklist.
9. A computer-readable storage medium, in which a computer program is stored, wherein the computer program is configured to carry out the method of any one of claims 1 to 6 when executed.
10. An electronic device comprising a memory and a processor, wherein the memory has stored therein a computer program, and wherein the processor is arranged to execute the computer program to perform the method of any of claims 1 to 6.
CN201910864534.1A 2019-09-09 2019-09-09 Fake and inferior article identification method and device based on Internet of things operating system Pending CN110648148A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910864534.1A CN110648148A (en) 2019-09-09 2019-09-09 Fake and inferior article identification method and device based on Internet of things operating system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910864534.1A CN110648148A (en) 2019-09-09 2019-09-09 Fake and inferior article identification method and device based on Internet of things operating system

Publications (1)

Publication Number Publication Date
CN110648148A true CN110648148A (en) 2020-01-03

Family

ID=68991292

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910864534.1A Pending CN110648148A (en) 2019-09-09 2019-09-09 Fake and inferior article identification method and device based on Internet of things operating system

Country Status (1)

Country Link
CN (1) CN110648148A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112733755A (en) * 2021-01-15 2021-04-30 广州富港生活智能科技有限公司 Article management method and device based on identification

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101118600A (en) * 2006-07-31 2008-02-06 海尔集团公司 Article management system based on radio frequency recognition technology
CN101980271A (en) * 2010-10-15 2011-02-23 银川市高新电子应用技术研究所 Radio frequency identification technology-based commodity anti-counterfeiting system and method, and anti-counterfeiting electronic device
CN103745188A (en) * 2014-01-23 2014-04-23 惠州Tcl移动通信有限公司 Method and electronic terminal for reminding expired product by image identification
CN204926164U (en) * 2015-06-12 2015-12-30 湖北省科技信息研究院 Product security traces back management system based on thing networking
CN106600287A (en) * 2016-12-01 2017-04-26 程烨 Intelligent anti-counterfeiting early warning method and device
US20180005043A1 (en) * 2016-07-01 2018-01-04 International Business Machines Corporation Counterfeit detection

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101118600A (en) * 2006-07-31 2008-02-06 海尔集团公司 Article management system based on radio frequency recognition technology
CN101980271A (en) * 2010-10-15 2011-02-23 银川市高新电子应用技术研究所 Radio frequency identification technology-based commodity anti-counterfeiting system and method, and anti-counterfeiting electronic device
CN103745188A (en) * 2014-01-23 2014-04-23 惠州Tcl移动通信有限公司 Method and electronic terminal for reminding expired product by image identification
CN204926164U (en) * 2015-06-12 2015-12-30 湖北省科技信息研究院 Product security traces back management system based on thing networking
US20180005043A1 (en) * 2016-07-01 2018-01-04 International Business Machines Corporation Counterfeit detection
CN106600287A (en) * 2016-12-01 2017-04-26 程烨 Intelligent anti-counterfeiting early warning method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112733755A (en) * 2021-01-15 2021-04-30 广州富港生活智能科技有限公司 Article management method and device based on identification
CN112733755B (en) * 2021-01-15 2024-04-19 广州富港生活智能科技有限公司 Article management method and device based on identification

Similar Documents

Publication Publication Date Title
CN106330685B (en) Group message reminding method and terminal
US20160360385A1 (en) Multi-terminal-based message pushing method and device
CN108389014B (en) Method, device and system for displaying article information and intelligent communication equipment
CN106921804B (en) Method and device for creating schedule in terminal and terminal equipment
CN105100220A (en) Drug information sharing method, client and server
CN104410680A (en) Method, client terminal, server and system of sharing file/file folder
CN104835295A (en) Expiration date prompting method and system
CN110197386B (en) Media resource pushing method and device, storage medium and electronic device
CN111880887A (en) Message interaction method and device, storage medium and electronic equipment
CN103685254B (en) The safety detection method and server of public account information
EP2779710B1 (en) Method of combining network data and mobile device using the same
CN110648148A (en) Fake and inferior article identification method and device based on Internet of things operating system
CN102571371A (en) Network information pushing method and system
CN109389306B (en) User order synchronization method and device
CN106658446B (en) Statistical analysis method for short message
CN113569646A (en) Abnormal article prompting method and device for refrigerator, storage medium and electronic device
CN106453587A (en) Message pushing based task tracking method and system
KR20110124931A (en) Service method for information of medicine
WO2017167068A1 (en) Method, apparatus and system for checking change of telephone number
CN103927646A (en) Information processing method and electronic equipment
CN114390452B (en) Message sending method and related equipment
CN109711512A (en) Two-dimensional code generation method and device
CN105472162B (en) A kind of information processing method and electronic equipment
WO2017166790A1 (en) Method and device for determining roaming state of mobile terminal
CN110334786B (en) Virtual resource adjusting method and device, storage medium and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200103

RJ01 Rejection of invention patent application after publication