CN112733973A - Image anti-counterfeiting method, device, terminal and computer readable medium - Google Patents

Image anti-counterfeiting method, device, terminal and computer readable medium Download PDF

Info

Publication number
CN112733973A
CN112733973A CN201910959520.8A CN201910959520A CN112733973A CN 112733973 A CN112733973 A CN 112733973A CN 201910959520 A CN201910959520 A CN 201910959520A CN 112733973 A CN112733973 A CN 112733973A
Authority
CN
China
Prior art keywords
user
image
layer
counterfeiting
images
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910959520.8A
Other languages
Chinese (zh)
Inventor
益爱丽
高筱禹
李文婷
米雪碧
柯栋
容敬民
贾聪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai, Zhuhai Lianyun Technology Co Ltd filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201910959520.8A priority Critical patent/CN112733973A/en
Publication of CN112733973A publication Critical patent/CN112733973A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Marketing (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Engineering & Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention relates to an image anti-counterfeiting method, an image anti-counterfeiting device, a terminal and a computer readable medium, wherein the method comprises the following steps: receiving a scanning result, wherein a superposed image corresponding to the scanning result is a bottom image in a composite anti-counterfeiting layer or a compound image containing the bottom image; judging whether each layer of the composite anti-counterfeiting layer is not scanned according to the scanning result; if yes, sending identification information for judging that the image is valid to a first user, wherein the first user is a user for feeding back a scanning result for the first time aiming at the superposed image, and the method and the device can reduce the probability of product counterfeiting.

Description

Image anti-counterfeiting method, device, terminal and computer readable medium
Technical Field
The present invention relates to the field of image anti-counterfeiting technologies, and in particular, to an image anti-counterfeiting method, an image anti-counterfeiting device, a terminal, and a computer readable medium.
Background
The image anti-counterfeiting technology is one of anti-counterfeiting technologies, encrypted image product information can be generated one by one corresponding to products through an image anti-counterfeiting system, images are printed or labeled on product packages, and a user can know a series of genuine product safety information of the products only through a specified image anti-counterfeiting system or mobile phone software for decoding and checking, so that the effects of purchase reassurance and supervision and counterfeiting are achieved. The image commonly used at present is a single-layer image, and is easily identified and stolen by a bad merchant, and once the image of a genuine merchant is stolen, the image is greatly lost for both the genuine merchant and a consumer, so the invention provides an image anti-counterfeiting method, a device, a terminal and a computer readable medium, and the anti-counterfeiting performance of the image can be improved.
Disclosure of Invention
To solve the above technical problems or to at least partially solve the above technical problems, the present invention provides a method, a terminal and a computer-readable medium for image anti-counterfeiting.
In order to solve the technical problems, the invention adopts the technical scheme that:
an image anti-counterfeiting method, characterized in that the method comprises:
receiving a scanning result, wherein a superposed image corresponding to the scanning result is a bottom image in a composite anti-counterfeiting layer or a compound image containing the bottom image;
judging whether each layer of the composite anti-counterfeiting layer is not scanned according to the scanning result;
and if so, sending identification information for judging that the image is effective to a first user, wherein the first user is the user for feeding back the scanning result for the first time aiming at the superposed image.
Alternatively,
if not, judging whether the first user is a related user of the second user;
and sending identification information for judging that the image is valid to the second user under the condition that the first user is an associated user, wherein the second user is a user who feeds back a scanning result for the composite anti-counterfeiting layer for the non-first time.
Optionally, the determining, according to the scanning result, whether each layer of the composite anti-counterfeit layer has not been scanned includes:
determining whether the overlay image was scanned;
and under the condition that the superposed image is not scanned, verifying whether other superposed images in the composite anti-counterfeiting layer to which the superposed image belongs are not scanned.
Optionally, in a case that the composite anti-counterfeiting image layer has at least two layers, the identification information is sent to the first user and/or the second user, so that the first user and/or the second user can determine that the image is valid in a case that at least two of the identification information are consistent.
Optionally, before receiving the scanning result, the method includes: and superposing the images through a preset rule, wherein the preset rule is that the patterns of at least two layers of images in the superposed images are different.
Optionally, the pattern positions of the images of different patterns do not overlap.
Optionally, the first user and/or the associated user of the overlay image of the non-top layer is binding-scanned.
Optionally, in response to a scanning result of a non-associated user of the 1+ nth time of the overlay image, pushing abnormal login information to the first user and/or the associated user;
wherein N is more than or equal to 1.
Optionally, a third user is also included,
and in the situation that the third user identifies that the image is effective, receiving intermediate information input by the third user and bringing the intermediate information into an information base.
An image security device comprising at least two superimposed images, wherein at least two of the images have different patterns.
Optionally, the size of each layer of the image is gradually reduced from bottom to top layer by layer.
A terminal comprising a memory and a processor, the memory having stored thereon a computer program operable on the processor, wherein the processor implements the steps of any of the above methods when executing the computer program.
A computer readable medium having non-volatile program code executable by a processor, wherein the program code causes the processor to perform any of the methods.
Compared with the prior art, the technical scheme provided by the embodiment of the invention has the following advantages: each product is correspondingly provided with a composite anti-counterfeiting layer connected with the information base, a user can judge whether the product is a counterfeit product according to whether the identification information is received, and further can judge whether the product is a counterfeit product according to whether the received at least two identification information are consistent, so that the probability of product counterfeiting is reduced; in addition, the image is formed by overlapping a plurality of layers of images, at least two layers of images have different patterns, and the pattern positions of different pattern images are not overlapped, so that the counterfeiting difficulty is increased; in the production, transportation and circulation stage of the product, the authenticity of the image can be verified every time when the image arrives at one node, the authenticity of the product in the circulation stage is ensured, in addition, product information can be input at the middle node, and the product information content is enriched.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
FIG. 1 is a schematic flow chart of an image anti-counterfeiting method according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart of determining whether each of the stacked images has not been scanned according to an embodiment of the present invention;
FIG. 3-1 is a schematic diagram of an underlying image provided by an embodiment of the present invention;
FIG. 3-2 is a schematic illustration of an interlayer image provided in accordance with an embodiment of the present invention;
3-3 are schematic diagrams of a composite image provided by an embodiment of the invention in which a bottom layer image is superimposed with a middle layer image;
FIGS. 3-4 are schematic diagrams of a top-level image provided by an embodiment of the present invention;
3-5 are schematic diagrams of a composite image of a three-layer image overlay provided by an embodiment of the present invention;
fig. 4 is a block diagram of a terminal according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
One embodiment of the present invention provides an image anti-counterfeiting method, as shown in fig. 1, the image anti-counterfeiting method may include the following steps:
step 101: receiving a scanning result, wherein a superposed image corresponding to the scanning result is a bottom image in a composite anti-counterfeiting layer or a compound image containing the bottom image;
step 102: judging whether each layer of the composite anti-counterfeiting layer is not scanned according to the scanning result;
step 103: and if so, sending identification information for judging that the image is effective to a first user, wherein the first user is the user for feeding back the scanning result for the first time aiming at the superposed image.
Receiving a scanning result, wherein a superposed image corresponding to the scanning result is a bottom image in a composite anti-counterfeiting layer or a compound image containing the bottom image; judging whether each layer of the composite anti-counterfeiting layer is not scanned according to the scanning result; if yes, sending identification information for judging that the image is valid to a first user, wherein the first user is a user for feeding back a scanning result for the first time of the superposed image, and in the embodiment of the invention, the user is an account identification, specifically, the user is an ID for feeding back the scanning result for the superposed image.
[ METHOD EXAMPLE 1 ]
In embodiment 1, all the steps of the method shown in fig. 1 are included, wherein step 101 is implemented by the following processing:
and receiving a scanning result, wherein the superposed image corresponding to the scanning result is a bottom image in the composite anti-counterfeiting layer or a compound image containing the bottom image. The composite anti-counterfeiting layer in the application document is a single-layer or multi-layer image, wherein when the composite anti-counterfeiting layer is a single layer, the superposed image is a bottom-layer image, namely a single-layer image; when the composite anti-counterfeiting layer is multilayer, the superposed image is a composite image containing a bottom image, the composite image is at least two layers of images containing the bottom image, wherein for the N layers of composite anti-counterfeiting layers, one bottom image is provided, and the number of the composite images is (N-1). For example, the composite anti-counterfeiting image layer has four layers, the lowest two layers of images can be called composite images, the lowest three layers of images can be called composite images, and the whole four layers of images can be called composite images.
[ METHOD EXAMPLE 2 ]
In embodiment 2, all the steps of the method shown in fig. 1 described above are included, wherein for step 102: judging whether each layer of the composite anti-counterfeiting layer is not scanned according to the scanning result, and performing the following processing modes as shown in fig. 2:
step 201: determining whether the overlay image was scanned;
step 202; and under the condition that the superposed image is not scanned, verifying whether other superposed images in the composite anti-counterfeiting layer to which the superposed image belongs are not scanned.
According to the scanning result of the superposed image, judging whether the superposed image is scanned by other users before the current scanning, determining the composite anti-counterfeiting layer where the superposed image is located under the condition that the superposed image is not scanned before the superposed image, and judging whether other superposed images of the composite anti-counterfeiting layer are scanned, wherein the judgment of whether other superposed images of the composite anti-counterfeiting layer are scanned is carried out by judging whether identification information is sent to the users according to other superposed images to verify.
And sending identification information for judging the effectiveness of the image to a first user under the condition that each layer of superposed images of the composite anti-counterfeiting image layer is not scanned, wherein the first user is a user for feeding back a scanning result for the first time aiming at the superposed images.
Judging whether the first user is a related user of the second user or not under the condition that at least one layer of the superposed images of each layer of the composite anti-counterfeiting image layer is scanned; and if so, sending identification information for judging that the image is valid to the second user, wherein the second user is a user who does not feed back a scanning result for the composite anti-counterfeiting layer for the first time.
Receiving a scanning result, if the composite anti-counterfeiting layer is judged to be scanned once, judging whether a user scanning the superposed image in the composite anti-counterfeiting layer is an associated user, specifically, the associated user is a user related to information of a second user, exemplarily, the relationship between the associated user and the second user is a user related to each other such as a parent and a friend, if so, indicating that the associated user has scanned one or more layers of superposed images in the composite anti-counterfeiting layer before the scanning, the scanning result of the associated user has no influence on the second user, and still sending identification information for judging the effectiveness of the image to the second user; if the product is judged not to be the associated user, the fact that the superposed image is scanned by irrelevant personnel before the scanning indicates that the product with the superposed image is forged, and identification information is not sent to the second user, so that the second user can know that the product is a forged product, the sales volume of the forged product is reduced, and the forging rate is reduced.
[ METHOD EXAMPLE 3 ]
In embodiment 3, all the steps of the method shown in fig. 1 are included, where in a case that the composite anti-counterfeiting layer has at least two layers, the identification information is respectively sent to the first user and/or the second user, so that the first user and/or the second user determines that the image is valid in a case that at least two of the identification information are consistent, and the following processing is performed:
and under the condition that the composite anti-counterfeiting layer is at least two layers, respectively sending identification information to the first user and/or the second user according to the scanning layer number of the user, wherein the identification information corresponding to different superposed images on each layer is consistent, and if the user judges that the received at least two identification information are consistent, judging that a product with the superposed images is true.
Binding the first user and/or the associated user scanning the overlay image of the non-top layer.
For the first user or the associated user who feeds back the scanning result by the superimposed image, information of the first user or the associated user may be bound, and in each embodiment of the application document, the binding includes but is not limited to information binding such as a mobile phone number, a microblog, a WeChat, and the like.
And receiving at least two scanning results under the condition that the image is at least two layers, and identifying the first user and/or the associated user according to the scanning results, wherein the scanning results refer to results of scanning the surface layer of the image or results of scanning the non-surface layer of the image. And under the condition that the image is at least two layers, identifying the first user and/or the associated user according to the result of scanning the non-surface layer of the image, preventing the image from being randomly scanned, and avoiding the product from being randomly bound when not sold.
Responding to the scanning result of the 1+ N times of non-associated users of the superposed image, and pushing abnormal login information to the first user and/or the associated users, wherein N is larger than or equal to 1. It can be known from the above description that the first user of the scanned image is identified, and the first user is the first scanning user of the corresponding scanning result, therefore, in the case that the 1+ N scanning of the image is not the associated user, the scanning of the counterfeit image can be identified, and in order to ensure the rights and interests of the first user, when the superimposed image is scanned by the 1+ N non-associated users, the abnormal login information is sent to the first user and/or the associated user, and meanwhile, the non-associated users scanning the superimposed image for the 1+ N times cannot receive the identification information, in this case, the first user, the associated user, and the non-associated users scanning the superimposed image for the 1+ N times can all know that the product is forged, and the authenticity of the counterfeit image is improved from the user side.
[ METHOD EXAMPLE 4 ]
In embodiment 4, all the steps of the method shown in fig. 1 are included, wherein the following processing procedures are further included:
in an embodiment of the present invention, the first user and the second user are last nodes in a product circulation process, and specifically, the first user is a consumer. After receiving the scanning result of the first user and/or the second user, sending identification information corresponding to the scanning result to the first user and/or the second user, wherein the identification information can enable the first user and/or the second user to know information such as production and circulation of a product corresponding to the image. The identification information may be all information of the product corresponding to the scanned image, or key information of the product, so that the first user and/or the second user can conveniently identify the authenticity of the scanned image.
And the third user is used for receiving the intermediate information input by the third user and bringing the intermediate information into the information base, wherein the third user can be an intermediate node for production or circulation of the product. In the production or circulation process of the product, information needs to be continuously input into the information base of the product, intermediate information input by a third user is received and brought into the information base, the information content of the product can be enriched, and better experience is provided for the first user and the second user.
The third user can scan the image and recognize the image according to the received identification information, so that the authenticity of the product is ensured, the authenticity of the product is ensured at the first user and the second user, namely the final node, the authenticity of the product can be ensured at the third user, namely the intermediate node, the difficulty of image imitation is increased, and the third user can be preferably recognized according to the scanning result of the non-first-layer superposed image.
Preferably, for the composite anti-counterfeiting layer, the images are superimposed according to a preset rule, wherein the preset rule is that the patterns of at least two layers of images in the superimposed image are different, and the pattern positions of the images with different patterns are not overlapped.
Based on the same conception, the embodiment of the application also provides an image anti-counterfeiting device, the device is formed by overlapping at least two layers of images, wherein the patterns of at least two layers of images are different, and the size of each layer of image is gradually reduced from bottom to top layer by layer.
In each embodiment of the invention, the image anti-counterfeiting device is formed by superposing at least two layers of images, the patterns of each layer of image are the same or different, wherein the patterns of at least two layers of images are different, so that the counterfeiting difficulty can be increased, and in addition, the pattern positions of the images are not overlapped for the images with different patterns.
The composite anti-counterfeiting image layer is formed by pasting multiple layers of images in the vertical direction, wherein the size of each layer of images is gradually reduced from bottom to top layer by layer, so that the edges of the images can be distinguished conveniently by a first user, a second user and a third user, the images are more convenient to tear off the top layer of the image, and the images with the same size are prevented from being simultaneously torn off.
The following describes the overlay images of different patterns with reference to the drawings, such as fig. 3-1, which is a schematic diagram of the bottom layer image provided by an embodiment of the present invention; FIG. 3-2 is a schematic illustration of an interlayer image provided in accordance with an embodiment of the present invention; it can be seen that the patterns of the bottom layer image and the middle layer image are different, as shown in fig. 3-3, the positions of the patterns after the two layer images are superimposed are not overlapped, the patterns of the top layer image of fig. 3-4 are different from the patterns of the composite image of fig. 3-3, and the positions of the patterns of the composite image of fig. 3-5 formed after the two layer images are superimposed are not overlapped.
Based on the same concept, the embodiment of the present application further provides a terminal, which includes a memory and a processor, where the memory stores a computer program that can be run on the processor, and the processor implements the control method when executing the computer program.
Based on the same concept, the embodiment of the present application further provides a terminal, as shown in fig. 4, where the terminal mainly includes: a processor 401, a communication interface 402, a memory 403 and a communication bus 404, wherein the processor 401, the communication interface 402 and the memory 403 communicate with each other via the communication bus 404. The communication interface 302 is used for communication between the electronic device and other devices. The memory 403 stores a program executable by the processor 401, and the processor 401 executes the program stored in the memory 403 to realize the control method described above when executing the computer program.
The communication bus 404 mentioned in the above electronic device may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus 404 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 4, but this does not indicate only one bus or one type of bus.
The memory 403 may include a Random Access Memory (RAM), and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory. Optionally, the memory may also be at least one memory device located remotely from the processor.
The processor 401 may be a general-purpose processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the integrated circuit may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic device, or discrete hardware components.
In yet another embodiment of the present application, there is also provided a computer readable medium having non-volatile program code executable by a processor, the program code causing the processor to execute the above-described control method.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions according to the embodiments of the application to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions can be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wire (e.g., coaxial cable, fiber optics, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that includes one or more of the available media. The available media may be magnetic media (e.g., floppy disks, hard disks, tapes, etc.), optical media (e.g., DVDs), or semiconductor media (e.g., solid state drives), among others.
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The foregoing are merely exemplary embodiments of the present invention, which enable those skilled in the art to understand or practice the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (13)

1. An image anti-counterfeiting method, characterized in that the method comprises:
receiving a scanning result, wherein a superposed image corresponding to the scanning result is a bottom image in a composite anti-counterfeiting layer or a compound image containing the bottom image;
judging whether each layer of the composite anti-counterfeiting layer is not scanned according to the scanning result;
and if so, sending identification information for judging that the image is effective to a first user, wherein the first user is the user for feeding back the scanning result for the first time aiming at the superposed image.
2. The method of claim 1,
if not, judging whether the first user is a related user of the second user;
and sending identification information for judging that the image is valid to the second user under the condition that the first user is an associated user, wherein the second user is a user who feeds back a scanning result for the composite anti-counterfeiting layer for the non-first time.
3. The method of claim 1, wherein determining whether each of the stacked images of the composite anti-counterfeiting layer has not been scanned based on the scanning result comprises:
determining whether the overlay image was scanned;
and under the condition that the superposed image is not scanned, verifying whether other superposed images in the composite anti-counterfeiting layer to which the superposed image belongs are not scanned.
4. The method according to claim 2, wherein, in a case that the composite anti-counterfeiting layer has at least two layers, the identification information is sent to the first user and/or the second user, respectively, so that the first user and/or the second user can determine that the image is valid in a case that at least two of the identification information are consistent.
5. The method of any of claims 1 to 4, comprising, prior to receiving the scan results: and superposing the images through a preset rule, wherein the preset rule is that the patterns of at least two layers of images in the superposed images are different.
6. The method of claim 5, wherein the pattern positions of the images of different patterns do not overlap.
7. The method of claim 2, further comprising: binding the first user and/or the associated user scanning the overlay image of the non-top layer.
8. The method of claim 1, further comprising:
responding to the scanning result of the 1+ N times of non-associated users of the superposed image, and pushing abnormal login information to the first user and/or the associated users;
wherein N is more than or equal to 1.
9. The method of claim 1, further comprising a third user, wherein in a case where the third user identifies that the image is valid, receiving intermediate information input by the third user and incorporating the intermediate information into an information base.
10. An image security device comprising at least two superimposed images, wherein at least two of the images have different patterns.
11. The apparatus of claim 10, wherein the size of each layer of the image is progressively reduced from bottom to top layer.
12. A terminal comprising a memory, a processor, and a computer program stored in the memory and operable on the processor, wherein the processor, when executing the computer program, performs the steps of the method according to any of the preceding claims 1 to 9.
13. A computer-readable medium having non-volatile program code executable by a processor, wherein the program code causes the processor to perform the method of any of claims 1-9.
CN201910959520.8A 2019-10-10 2019-10-10 Image anti-counterfeiting method, device, terminal and computer readable medium Pending CN112733973A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910959520.8A CN112733973A (en) 2019-10-10 2019-10-10 Image anti-counterfeiting method, device, terminal and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910959520.8A CN112733973A (en) 2019-10-10 2019-10-10 Image anti-counterfeiting method, device, terminal and computer readable medium

Publications (1)

Publication Number Publication Date
CN112733973A true CN112733973A (en) 2021-04-30

Family

ID=75588402

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910959520.8A Pending CN112733973A (en) 2019-10-10 2019-10-10 Image anti-counterfeiting method, device, terminal and computer readable medium

Country Status (1)

Country Link
CN (1) CN112733973A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN204360695U (en) * 2014-12-23 2015-05-27 江苏工程职业技术学院 A kind of separate type two-dimension code anti-counterfeit structure
CN105374282A (en) * 2015-11-17 2016-03-02 立德高科(北京)数码科技有限责任公司 Holographic label generated through layered lamination method, as well as generating method and system
CN206431659U (en) * 2017-01-12 2017-08-22 内蒙古智牧溯源技术开发有限公司 Two-dimensional code anti-counterfeiting label

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN204360695U (en) * 2014-12-23 2015-05-27 江苏工程职业技术学院 A kind of separate type two-dimension code anti-counterfeit structure
CN105374282A (en) * 2015-11-17 2016-03-02 立德高科(北京)数码科技有限责任公司 Holographic label generated through layered lamination method, as well as generating method and system
CN206431659U (en) * 2017-01-12 2017-08-22 内蒙古智牧溯源技术开发有限公司 Two-dimensional code anti-counterfeiting label

Similar Documents

Publication Publication Date Title
CN108351932B (en) CAPTCHA challenge based on images
CN105763521B (en) A kind of device authentication method and device
CN108154367B (en) Block chain service checking method and device
US10692167B2 (en) System and method for digitally watermarking digital facial portraits
US20150324879A1 (en) Challenge-based fraud detection
CN103077467B (en) A kind of method and system verifying authenticity of products
CN101350043A (en) Method and apparatus for detecting consistency of digital content
JP7235258B2 (en) GENERATOR OF GENUINE AUTHENTICATION CONTENT AND INTEGRATED AUTHENTICATION SYSTEM USING THE SAME
CN114553515B (en) Block chain-based NFT asset checking method, business processing method and hardware
CN106447358A (en) Method and system for examining authenticity of goods
US11405504B1 (en) System and methods for using real-time context to proactively start a communication with a customer through a different device
US8208375B2 (en) Selective filtering of network traffic requests
CN111950673A (en) Commodity anti-counterfeiting verification method, device and equipment based on two-dimensional code and storage medium
CN108010097B (en) Verification method and verification device for verification code image
US20190385623A1 (en) Solution for determining an authenticity of an audio stream of a voice call
US10460163B2 (en) System and method for digitally watermarking digital facial portraits
CN112733973A (en) Image anti-counterfeiting method, device, terminal and computer readable medium
CN104778166B (en) Pages Security identification display method, device and network system
CN113033746A (en) Filter element anti-counterfeiting method, filter element anti-counterfeiting equipment and filter element anti-counterfeiting system
US20110296170A1 (en) Tolerant key verification method
CN110427736B (en) Copyright management method, device, equipment and system
CN113422687B (en) Verification method, verification server and verification system
EP3933676B1 (en) A document identification method and system
KR102337582B1 (en) Security-enhanced genuine product certification system and the method thereof
CN104408499A (en) Product anti-counterfeiting system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210430

RJ01 Rejection of invention patent application after publication