CN112801254A - High-precision sawtooth anti-counterfeiting method - Google Patents

High-precision sawtooth anti-counterfeiting method Download PDF

Info

Publication number
CN112801254A
CN112801254A CN202110253595.1A CN202110253595A CN112801254A CN 112801254 A CN112801254 A CN 112801254A CN 202110253595 A CN202110253595 A CN 202110253595A CN 112801254 A CN112801254 A CN 112801254A
Authority
CN
China
Prior art keywords
isolated
ink dots
counterfeiting
dots
isolated ink
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110253595.1A
Other languages
Chinese (zh)
Inventor
陈明发
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Take A Picture Of Hainan Artificial Intelligence Co ltd
Original Assignee
Take A Picture Of Hainan Artificial Intelligence Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Take A Picture Of Hainan Artificial Intelligence Co ltd filed Critical Take A Picture Of Hainan Artificial Intelligence Co ltd
Publication of CN112801254A publication Critical patent/CN112801254A/en
Priority to PCT/CN2021/126999 priority Critical patent/WO2022166272A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes

Landscapes

  • Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Printing Methods (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

The invention relates to a high-precision sawtooth anti-counterfeiting method, which comprises the steps of setting a plurality of isolated ink dots for a code, and slightly diffusing the isolated ink dots to generate sawtooth edges, generate deformation and generate directionality; acquiring and storing the characteristic information of the isolated point into a database of an anti-counterfeiting checking system; matching the characteristic information of the isolated points with the record information; if most of the characteristic information of the isolated points is consistent, the anti-counterfeiting checking system feeds back the information with the true identification conclusion to the smart phone. The invention can avoid preprinting a diffusant coating, simplify the sawtooth anti-counterfeiting printing process, reduce the printing and manufacturing difficulty, improve the accuracy of the identification conclusion, avoid the trouble of plate changing and improve the user experience.

Description

High-precision sawtooth anti-counterfeiting method
Technical Field
The invention belongs to the technical field of information inquiry anti-counterfeiting, and particularly relates to a high-precision sawtooth anti-counterfeiting method which is an improved technology of a mobile phone identification code sawtooth anti-counterfeiting method (CN104794629B) of the applicant's own Chinese patent.
Background
The Chinese patent 'mobile phone identification code sawtooth anti-counterfeiting method (CN 104794629B)', authorizes a sawtooth anti-counterfeiting method of the applicant, and comprises the steps of printing codes or/and pictures and texts on a printing stock, and enabling the edges of the codes or/and the pictures and texts to randomly generate personalized sawtooth edges; amplifying and shooting the printed codes or/and the pictures and texts to obtain sawtooth characteristic information and codes by shooting; the sawtooth characteristic information obtained by amplifying and shooting and the corresponding code are stored and filed in an anti-counterfeiting checking system database accessed to the Internet to serve as anti-counterfeiting characteristic filing information for the public to check the authenticity by using the smart phone. In order to enable the existing camera mobile phone (i.e. smart phone) with the lens resolution of more than or equal to 800 ten thousand pixels in the hands of the vast consumers to accurately identify the saw teeth, the size S of the saw teeth is optimized in the patent specification, and the size S of the saw teeth is set to be 0.3mm multiplied by 0.3mm to be more than or equal to S to be more than or equal to 0.05mm multiplied by 0.05 mm. In order to enlarge the sawteeth as much as possible so that smart phones with various lens resolutions can accurately identify the sawteeth, the patent specifications [0014] to [0024] innovate more than ten kinds of production and manufacturing methods for enlarging the sawteeth. The practical summary shows that: the most stable, versatile and practical solution for expanding serrations is the manufacturing solution in paragraph [0117] of the third embodiment of the patent specification: a coating of a diffusing agent (commonly known as a wetting or wetting agent) is pre-printed, and then codes or/and graphics are printed on the coating of the diffusing agent to promote the rapid diffusion of the undried ink, so that large saw teeth which are about 0.3mm by 0.3mm and meet the accurate identification requirement are formed. However, the scheme of preprinting the diffusant coating needs to occupy one printing unit, and for many current code-spraying printing units, no redundant printing unit is used for preprinting the diffusant coating, which causes great difficulty in printing production.
The study showed that: the large saw teeth with the size of about 0.3mm multiplied by 0.3mm are manufactured in the two-dimensional code, the production quality is difficult to control, the two-dimensional code reading rate is easy to reduce, and even the two-dimensional code can not be read. In order to avoid that the larger saw teeth interfere the identification and reading of the two-dimensional code, the inventor of the application develops a code edge saw tooth anti-counterfeiting method and a product (CN 112101500A and CN 110866579A), which comprises the step of printing the two-dimensional code on a printed matter (the two-dimensional code is usually printed by black and white ink blocks at intervals); printing some sparse isolated ink dots in a blank area with the width of 0-2 mm near the two-dimensional code; promoting the ink of the isolated ink dots to randomly diffuse to form sawteeth; the two-dimensional code is shot in an amplification mode to obtain microscopic characteristic information of the sawtooth; and correspondingly storing the acquired microscopic characteristic information and the two-dimensional code into an anti-counterfeiting checking system database to serve as an anti-counterfeiting characteristic information file.
In summary, in order to improve the accuracy of identifying the saw teeth of various existing smart phones in the hands of consumers, the embodiments of the above patents and the like require preprinting of a coating of a diffusing agent to produce large saw teeth with a size of approximately 0.3mm × 0.3mm, which causes great difficulty in printing production.
Disclosure of Invention
The purpose of the invention is as follows: the high-precision sawtooth anti-counterfeiting method is provided, so that a diffusion agent coating is prevented from being pre-printed, the printing production process is simplified, the printing manufacturing difficulty is reduced, the accuracy of a conclusion is improved, and the user experience is improved.
A high-precision sawtooth anti-counterfeiting method comprises the step of printing at least one code with uniqueness on each product, and is characterized by comprising the following steps of:
firstly, allocating (preferably spraying) a plurality of isolated ink dots to the codes, so that each code has the total number n of the isolated ink dots which is more than or equal to 9, 12, 24, 36, 48, 60, 72, 80, 92 or 200; the study showed that: the more total number of isolated ink dots each code has, the easier it is to identify and the harder it is to forge; especially, a technical scheme of encoding and allocating 36-72 isolated ink dots has the advantages that user identification is the most rapid and the inspection accuracy is the highest; the code can be a code with uniqueness, such as a one-dimensional code, a numerical code, an alphabetic code and the like;
printing the isolated ink dots on a printing surface which has wettability (also called diffusibility) to ink of the isolated ink dots, and randomly diffusing the isolated ink dots so as to form (random) sawtooth edges, generate (random) deformation and generate (random) directionality; for example, when isolated ink dots are printed on standard coated paper, even if a diffusant coating is not pre-printed, the isolated ink dots can generate micro diffusion and micro deformation, some isolated ink dots are changed into irregular ellipses, some isolated ink dots are changed into irregular polygons, and some isolated ink dots are changed into curved polygons, so that the isolated ink dots have directionality;
thirdly, shooting and collecting individual characteristic information, such as the shape and the like of the isolated ink dots after random diffusion, namely the isolated dot characteristic information for short, by using shooting equipment such as a digital camera during production of a manufacturer; the isolated point characteristic information comprises one or more of individual characteristic information such as the shape, the area, the perimeter, the direction, the accurate position, the quality defect, the number of saw teeth, the gradient, the color and the like of the isolated ink points; the characteristic information of the isolated point is taken as record (anti-counterfeiting) information and is correspondingly stored in an anti-counterfeiting checking system database with the code;
when checking, the user scans (including shoots) the codes and the isolated ink points thereof by using the smart phone to obtain isolated point characteristic information of the isolated ink points, namely information to be checked;
matching and identifying the information to be detected (for example, uploading the information to an anti-counterfeiting checking system) and the record information, and counting the number of the isolated ink dots with the characteristic information of the isolated dots, namely the number x of the corresponding dots for short; when the coincidence rate x/nx100% reaches 70-100%, the anti-counterfeiting checking system feeds back conclusion information of which the identification conclusion is true to the smart phone.
Preferably, in order to further improve the accuracy of the identification conclusion, in the high-precision sawtooth anti-counterfeiting method, when the compliance rate x/nx100% reaches 85-100% or 90-100%, the anti-counterfeiting checking system feeds back the information that the identification conclusion is true to the smart phone.
More preferably, in order to further improve the accuracy of the identification conclusion, in the high-precision sawtooth anti-counterfeiting method, when the matching rate x/nx100% is lower than 69% or lower than 84% or lower than 89%, the anti-counterfeiting checking system prompts the user to swipe again or feeds back the conclusion information that the identification conclusion is false to the smartphone.
Still more preferably, in order to improve user experience and prevent misjudgment, the anti-counterfeiting checking system continues to scan isolated ink dots or prompts the user to re-scan when the compliance rate x/nx100% is 61-69%, or 61-84%, or 61-89%.
More importantly, in order to improve user experience and prevent misjudgment, according to the high-precision sawtooth anti-counterfeiting method, when the coincidence rate x/nx100% is lower than 60%, the anti-counterfeiting checking system feeds back conclusion information for identifying a false conclusion to the smart phone.
The applicant takes the isolated ink points (which can be called isolated points for short) as anti-counterfeiting identification objects, costs billions of positive and negative training samples, takes three years, collects billions of positive and negative training samples, and obtains an isolated point feature identification algorithm model through deep learning and training of a DNN neural network. Because the light and shade forming degrees of the code scanning environment of a user are different, the code scanning actions are different, and the types of smart phones used for code scanning are different, when a simulation test user uploads the acquired to-be-detected information of isolated ink dots of a positive sample to an anti-counterfeiting inspection system and performs matching identification by using an isolated dot feature identification algorithm model, the statistical result of the coincidence rate x/n x 100% is 85-100% (the theoretical value should be 100%), and the statistical result of the positive sample coincidence rate x/n x 100% with a slightly large diffusion deformation amplitude is 90-100%. When the simulation test user uploads the acquired to-be-detected information of isolated ink dots of the one-code multi-print negative sample to the anti-counterfeiting inspection system and performs matching identification by using the isolated dot feature identification algorithm model, the statistical result of the number of the coincidence rate x/n multiplied by 100% is 3-51% (the sawtooth anti-counterfeiting theoretical value should be 0%). In other words, practice has demonstrated that: the method is characterized in that a code multi-print counterfeit product adopting the same processing equipment and materials has isolated ink points, wherein the isolated ink points distort 49-97% of the isolated ink points due to a plurality of uncontrollable factors such as random diffusion and the like, and the isolated ink points are identified by an isolated point feature identification algorithm model. Practice has also shown that: different process equipment such as copying, high-definition printing and the like are adopted for one-code multi-print copy counterfeiting, tiny sawteeth at the edge of an isolated ink dot are distorted by 10-15% and are identified by an isolated dot feature identification algorithm model. In summary, after the margin of about 10% is relaxed, the determination is true when the matching rate x/n × 100% reaches 70-100%, the determination is false when the matching rate x/n × 100% is lower than 60%, and the rescanning or the manual assistance is determined when the matching rate x/n × 100% reaches 61-69%, and the true and false determination threshold value is a true and false distinguishing characteristic parameter obtained through scientific research and statistical analysis.
The research proves that: the wettability of the printing material determines the wettability of the printing surface, and after the printing material is selected, the wettability is fixed, for example, the diffusion deformation amplitude of the UV ink sprayed on the coated paper is 0.25mm on average. For an isolated ink dot having a width (including a diameter) of 1.2mm, the deformation ratio thereof is 0.25/1.2 × 100% = 20.8%; for an isolated dot having a width (including a diameter) of 0.65mm, the deformation ratio thereof is 0.25/0.65 × 100% = 38.5%. Therefore, the larger the size of the isolated ink dots is, the smaller the deformation rate is, and the less the individual characteristics of the isolated ink dots are extracted by software; the smaller the size of the isolated ink dots is, the larger the deformation rate is, and the more easily the software extracts the individual characteristics of the isolated ink dots; in other words, the deformation ratio of an isolated dot is inversely proportional to its width. However, when the width (including the diameter) of the isolated ink dot is less than 0.65mm, it is not easy for the user to accurately scan and collect the individual characteristic information of the isolated ink dot by using a low-end smart phone, so that the collected information is distorted, and the accuracy rate does not increase or decrease.
To sum up, in order to facilitate software such as an isolated dot feature recognition algorithm model to accurately extract individual features of isolated dots, so that a user can quickly and accurately check a code, according to the high-precision sawtooth anti-counterfeiting method, the width of the isolated dots or the isolated dots after color reversal is preferably set to be 0.65mm to 1.2mm, more preferably 0.68mm to 0.92mm, and most preferably 0.72mm to 0.83 mm. The optimization of the width parameter is not easy, and the beneficial technical effects are unexpected. After the over-range test, the width (including the diameter) of the isolated ink dots smaller than 0.65mm and the width (including the diameter) of the isolated ink dots larger than 1.2mm, when the simulation test user uploads the acquired information to be detected of the isolated ink dots of the positive sample to the anti-counterfeiting checking system and the isolated dot characteristic recognition algorithm model is used for matching recognition, the recognition accuracy is only 50-70%, and cannot be improved, so that the consumers of the existing middle and low-end smart phone crowd cannot check the authenticity. Therefore, the width of the isolated ink dots can not be larger than 1.2mm and can not be smaller than 0.65mm, so that the strategy of setting the width of the isolated ink dots to be 0.65 mm-1.2 mm is scientific and certain, consumers of the existing high, middle and low-end smart phone crowd can check the authenticity, the user can feel that the code scanning check is quick and accurate, and the beneficial technical effect is obvious.
Baidu encyclopedia: adhesion is the mutual attraction between the contacting parts of two different substances. The phenomenon of wetting of a solid with a liquid is a result of the adhesion forces acting in the liquid adhesion layer in contact with the solid. Wettability f = adhesion-cohesion, when the wettability f is positive, the liquid wets out (also called out-diffusion) along the solid surface, and when the wettability f is negative, the liquid shrinks (also called negative diffusion).
In production practice, the adhesive force of the printing surface of some materials is similar to the cohesive force of ink drops, the wetting force f is almost zero, and isolated ink dots are difficult to diffuse and deform. In order to overcome the difficulty that the isolated ink dots are not deformed and are slightly deformed, the applicant proposes to open an eyelet in the center of the isolated ink dot. The research proves that: the ink drop of the isolated ink point with the hole at the center is simultaneously acted by the wetting forces f in two opposite directions, namely inward direction, outward direction and the like, so that the ink drop can be twisted and deformed to reach the required deformation amplitude; in other words, the isolated dots are provided with perforations that cause the isolated dots to deform.
Two sets of print contrast tests with and without holes in the center of isolated dots show that: the black UV ink is sprayed and printed on the gravure ink white bottom layer, and the group of isolated ink points without holes are almost in a right circular shape due to the action of the uniform outward wetting force f; the group of isolated dots with holes is almost completely deformed into random shapes such as ellipses due to the action of wetting forces f in two directions, namely outward and inward. The design of the central hole of the isolated ink dot overcomes the defect that certain printing surfaces are not deformed when the isolated ink dot is printed, and saves the working procedure of preprinting a diffusant coating and material consumption. In addition, after the isolated ink dots are diffused, the holes are randomly deformed, and the deformed holes have extremely strong individual characteristics and can be used as auxiliary anti-counterfeiting characteristics. In other words, the individual characteristic information such as the shape of the hole after diffusion deformation is collected and can be used as auxiliary anti-counterfeiting characteristic information which is one of the isolated point characteristic information.
In summary, in order to promote the random deformation of the isolated ink dots, the center of the isolated ink dots of the high-precision sawtooth anti-counterfeiting method is provided with an eyelet; alternatively, random-shaped holes having a diameter of 0.1mm to 0.6mm or 0.35mm to 0.45mm are preferably provided, and the diameter of the holes is preferably 0.35mm to 0.45 mm. The holes are formed by ink random diffusion and have similar shape characteristics of isolated ink dots, so that the holes can be used as an additional anti-counterfeiting characteristic to improve the counterfeiting difficulty and the identification accuracy.
Preferably, in the high-precision sawtooth anti-counterfeiting method, one small photo is extracted from each isolated ink dot, n small photos of n isolated ink dots of the same code are taken as a group and are respectively identified by the isolated dot characteristic identification algorithm model, and the number of the isolated ink dots which are consistent with each group of isolated dot characteristic information, namely the consistent point number x, is counted.
Preferably, in order to cut out a small photo of each isolated ink dot from the whole large photo, the small photos are respectively identified by the isolated dot feature identification algorithm model, and the isolated ink dots in the small photos are prevented from being damaged due to inaccurate cutting; according to the high-precision sawtooth anti-counterfeiting method, the width of a (blank) gap between two adjacent isolated ink dots is 0.1-1.5 mm or 0.25-0.5 mm; thus, because the (blank) gap is wider, it is possible to avoid cutting isolated dots in the small photograph, and to keep the information to be inspected of the isolated dots in the small photograph complete.
Preferably, in order to make the user feel fast and accurate in checking, the high-precision accurate sawtooth anti-counterfeiting method is characterized in that isolated ink dots are diffused to become irregular curved edge ellipses or (diffused to become irregular curved edge) polygons, and the length-width difference of some isolated ink dots after deformation is 0.05-0.25 mm; and/or the aspect ratio of some isolated ink dots after deformation is 1.1-1.3.
Preferably, in the high-precision sawtooth anti-counterfeiting method, the ratio w/y of the width w of the isolated ink dots arranged outside the two-dimensional code to the width y of the square in the two-dimensional code internal position detection graph is set to be 0.42-0.98. In a specific application, the size of the printed matter is large or small, and the two-dimensional code is printed with the large or small printed matter. When the two-dimensional code size is large, the picture resolution of the two-dimensional code and the isolated ink dots collected and uploaded by the smart phone by the consumer is low, when the two-dimensional code size is small, the picture resolution of the two-dimensional code and the isolated ink dots collected and uploaded by the smart phone by the consumer is high, and after the two-dimensional code is uniformly cut and adaptively processed by the anti-counterfeiting checking system, the situations that the printed matter printed with the two-dimensional code with a large size is low in identification accuracy and the printed matter printed with the two-dimensional code with a small size is high in identification accuracy can occur. After w/y is set to be 0.42-0.98, the printing basis is provided for the size relation between the two-dimensional code and the isolated ink dots, and any foreign printing factory can print and typeset according to the w/y ratio standard. More preferably, three blocks in the two-dimensional code position detection pattern are used as isolated ink dots. Therefore, the isolated ink dots and the two-dimensional code form an organic whole, so that a counterfeiter can be prevented from manually changing and counterfeiting, and the counterfeiting difficulty is further improved.
Preferably, in order to visually sense that the isolated ink dots and the two-dimensional code are an organic whole and are not extra matters so as to avoid the reprinting of a user, the high-precision sawtooth anti-counterfeiting method has the advantages that the isolated ink dots are inserted from the outside of the two-dimensional code form code body or/and are separated from the connection positions of adjacent ink blocks in the two-dimensional code form code body. The isolated ink dots are preferably separated by breaking from the narrowest part of the three-side blank adjacent ink blocks in the coding body in the two-dimensional code form.
Preferably, the high-precision sawtooth anti-counterfeiting method is characterized in that the isolated ink dots are arranged in rows and positioned on the coding edge in the form of a two-dimensional code.
Baidu encyclopedia: adhesion is the mutual attraction between the contacting parts of two different substances. The phenomenon of wetting of a solid with a liquid is a result of the adhesion forces acting in the liquid adhesion layer in contact with the solid. Wettability f = adhesion-cohesion, when the wettability f is positive, the liquid wets out (also called out-diffusion) along the solid surface, and when the wettability f is negative, the liquid shrinks (also called negative diffusion).
In production practice, the adhesive force of the printing surface of some materials is similar to the cohesive force of ink drops, the wetting force f is almost zero, and isolated ink dots are difficult to diffuse and deform. In order to overcome the difficulty that the isolated ink dots are not deformed and are slightly deformed, the applicant provides a smart technical scheme that the center of the isolated ink dots is provided with an eyelet with the aperture of 0.1-0.6mm, and preferably an eyelet with the aperture of 0.35-0.45 mm. The ink drop of the isolated ink dot with the hole is simultaneously subjected to the wetting forces f in two opposite directions, namely inward direction, outward direction and the like, so that the ink drop is distorted and deformed to meet the technical requirements of required deformation amplitude and the like. In summary, the presence of the holes in the isolated dots can promote a large random deformation of the isolated dots.
The applicant shows by two sets of print contrast tests with and without holes in the centre of an isolated dot: the black UV ink is sprayed and printed on the gravure ink white bottom layer, and the group of isolated ink points without holes are almost in a right circular shape due to the action of the uniform outward wetting force f; the group of isolated dots with holes is almost completely deformed into random shapes such as ellipses due to the action of wetting forces f in two directions, namely outward and inward. The design of the central hole of the isolated ink dot overcomes the defect that certain printing surfaces are not deformed when the isolated ink dot is printed, and saves the working procedure of preprinting a diffusant coating and material consumption. In addition, after the isolated ink dots are diffused, the holes are randomly deformed, and the deformed holes have extremely strong individual characteristics and can be used as auxiliary anti-counterfeiting characteristics. In other words, the individual characteristic information such as the shape of the hole after diffusion deformation is collected and can be used as auxiliary anti-counterfeiting characteristic information which is one of the isolated point characteristic information.
Those of ordinary skill in the art of inkjet printing processes know that: before drying, random micro-diffusion of ink on a paper surface is inevitably generated, for example, when isolated ink dots are sprayed and printed on coated paper, micro-diffusion meeting requirements can be generated even if a diffusion agent coating is not pre-printed, 10-20% of the isolated ink dots with the width of 0.25-1.2 mm can be deformed and form directional characteristics, and the exponential change and amplification of individual parameter values such as the area, the direction and the like of the isolated ink dots can be generated. In summary, micro-diffusion will amplify the individual dot personality parameter values. The invention selects the isolated ink dots as the anti-counterfeiting identification object, and skillfully utilizes the natural phenomenon that micro diffusion can cause the isolated ink dots to deform, form sawtooth edges and generate directionality. In other words, the shape, area and direction of the isolated ink dots with the proper size can change to amplify micro-diffusion change values, and the isolated ink dots with the proper size can be used as micro-diffusion feature amplifiers to facilitate the identification of individual features such as shape, area and direction of the isolated dot feature identification algorithm model.
The isolated ink dots generally refer to colored dots with blank areas around, and are colored dots which are not connected with adjacent dots, lines and pictures. The invention selects and uses the isolated ink dots, so as to avoid accidental damage to the ink dots of the anti-counterfeiting identification object in the process of cutting the photo by software, and also to accurately count the consistent points by the software.
Compared with the prior information inquiry anti-counterfeiting technology, the method has the following beneficial effects.
First, a preprinted diffuser coating can be omitted, and the serrations need not be intentionally enlarged. Most of the current copper plate paper and other printing stocks can be identified by the method of the invention for the individual characteristics such as sawtooth and isolated point deformation generated by micro diffusion action such as natural infiltration of code-spraying ink, so that most of the printing stocks can omit preprinting diffusant coating, the printing production process can be simplified, and the printing manufacturing difficulty can be reduced. In other words, even if the sawtooth-shaped forgery-preventing packaging material is printed by using a paper or film having low wettability, the preprinted diffusing agent coating can be omitted. Of course, printing plants with equipment conditions still recommend that the preprinting of the diffuser coating be continued, and that the accuracy of the identification conclusion will be higher by printing isolated dots on the preprinting of the diffuser coating.
And secondly, the direction characteristics generated by the deformation of the isolated ink dots are easy to identify. Isolated dots can produce directional features even without preprinting a diffuser coating; the direction characteristics can be roughly divided into a plurality of direction characteristics such as east, south, west, north, southeast, northeast, southwest and northwest, and the plurality of direction characteristics are easily identified by software such as a lone point characteristic identification algorithm model, so that the inspection speed and the inspection accuracy can be improved.
Thirdly, the accuracy of the identification conclusion is high, and the consumer experiences quickly. The discrimination conclusion given by adopting a rounding strategy that the absolute majority (for example, more than 70 percent) of the isolated ink point characteristics are consistent is high in precision. This is because few isolated ink dots with errors are identified, and the error conclusion is ignored by the rounding strategy and cannot be fed back to the smart phone of the consumer, so that the accuracy of the identification conclusion felt by the consumer is high, and the query speed experienced by the consumer is high. In the rule of the five-game three-win volleyball match, the score won by the lost is always ignored and never counted as the score. Since the beginning of the patent of 'mobile phone identification code sawtooth anti-counterfeiting method (CN 104794629B)' application in 2015, the applicant took six years and invested in software identification and development to take billions of dollars. In recent three years, the accuracy of the inquiry and identification conclusion can only reach the level A of the national standard of information inquiry anti-counterfeiting technology, and is always about 99 percent in wandering. In the last month, by adopting the technical scheme of rounding strategies and the like according to the characteristics of most (for example, more than 70%) isolated ink dots, the accuracy of the obtained inquiry and identification conclusion is improved by two orders of magnitude, reaches more than 99.99%, and far exceeds the national standard.
And fourthly, the isolated ink dots can be hidden in the two-dimensional code, so that a user can not notice the ink dots, and compared with a code edge sawtooth anti-counterfeiting method and products (CN 112101500A and CN 110866579A) in the background technology, the appearance of a printed matter is not damaged, and the edition does not need to be changed.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a schematic plan view of a current two-dimensional code master.
FIG. 2 is a schematic plan view of FIG. 1 with isolated ink dots inserted from outside the body.
FIG. 3 is a schematic plan view of FIG. 1 showing the ink stick in a blank space on three sides of the body after it has been broken at its narrowest point.
Fig. 4 is a schematic plan view of fig. 1 with isolated dots added from the inside and outside of the body, respectively.
Fig. 5 is a schematic plan view of the added isolated dots arranged in rows and located at two edges of the two-dimensional code.
Fig. 6 is a schematic plan view of the added isolated dots arranged in rows and located at four edges of the two-dimensional code.
FIG. 7 is a schematic plan view of a two-dimensional code with adjacent ink stick connections broken.
FIG. 8 is a schematic plan view of another two-dimensional code with adjacent ink stick connections broken.
Fig. 9 is a schematic plan view of a two-dimensional code and isolated dots around the two-dimensional code before (a) and after (b) micro-diffusion.
Fig. 10 is a schematic plan view of a two-dimensional code with an isolated dot center provided with an aperture.
FIG. 11 is an enlarged view of isolated dots after a diffusion deformation to form irregular ellipses.
Fig. 12 is a schematic view showing the action of the wetting force f of the isolated dots (a) and the isolated dots (b) having the holes.
FIG. 13 is a schematic layout of isolated dots on a printed matter with perforations.
FIG. 14 is a schematic diagram of a layout of isolated dots after a reverse color is applied to a printed matter.
The reference numbers illustrate: 1-isolated ink dots, 2-coding, 3-narrowest junctions, 4-holes, 5-directions, 6-prints, 7-squares.
Detailed Description
The technical solutions in the embodiments of the present invention will be described clearly and completely with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The first embodiment.
Fig. 1 is a schematic plan view of a current two-dimensional code master.
As shown in fig. 2, in the blank gaps of the current two-dimensional code original edition in fig. 1, additional isolated dots 1 with a width (or diameter) of 0.6-0.8mm are inserted (the current two-dimensional code original edition in fig. 1 has only 16 isolated dots 1, which is not satisfactory, and therefore needs to be inserted and supplemented from the outside of the body). The total number n of isolated ink dots 1 added to the number of inserted isolated ink dots 1 inherent to the two-dimensional code master is preferably greater than 12, 24, 36, 48, 60, 72, 80, 92, 100, 200, or 300.
Each printed matter 6 is printed with a code 2, preferably a two-dimensional code having uniqueness.
After the ink is naturally micro-diffused (shrinkage is understood as negative diffusion) to form sawteeth and cause the isolated ink dots 1 to deform, drying, curing and shaping, and amplifying and shooting the two-dimensional code to acquire isolated dot characteristic information such as shape characteristics of the isolated ink dots 1; and the characteristic information of the isolated points such as the shape and the like is taken as the record information and is correspondingly stored and recorded in the anti-counterfeiting checking system database accessed to the Internet with the two-dimensional code.
When a consumer checks, the two-dimensional code on the printed matter 6 is shot by the smart phone to obtain isolated point characteristic information, namely to-be-detected information, such as the shape of the isolated ink point 1.
The anti-counterfeiting checking system matches the acquired isolated point characteristic information such as the characteristic to be detected of the isolated ink point 1 with the isolated point characteristic information (including one or more of the individual characteristic information such as the shape, the area, the perimeter, the direction, the precise position, the quality defect, the number of teeth of a saw, the gradient and the color of the isolated ink point 1) recorded in the database; if the coincidence rate x/nx100% is higher than 70%, the anti-counterfeiting checking system feeds back conclusion information of which the identification conclusion is true to the smart phone; if the coincidence rate x/nx100% is lower than 60%, the anti-counterfeiting checking system feeds back conclusion information of which the identification conclusion is false to the smart phone; if the matching rate x/nx100% is 61-69%, the anti-counterfeiting checking system prompts the user to rephoto or request manual help.
Preferably, when the coincidence rate x/nx100% is higher than 90%, the anti-counterfeiting checking system feeds back conclusion information of which the identification conclusion is true to the smart phone; otherwise, the anti-counterfeiting checking system feeds back the conclusion information of which the identification conclusion is false to the smart phone or feeds back the rephoto prompt information to the smart phone. Thus, the accuracy of the discrimination conclusion is higher.
In this example, the position of the isolated ink dot 1 is not fixed, and the two-dimensional code generation software needs to be modified when the code is printed.
Example two.
Fig. 1 is a schematic plan view of a current two-dimensional code master.
As shown in fig. 3, in the current two-dimensional code original in fig. 1, the narrowest connection 3 of the three-sided blank ink patch is broken to separate some isolated ink dots 1, and the width of the isolated ink dots 1 is set to 0.8 mm. In other words, the broken filaments of adjacent ink sticks are broken to separate some isolated ink dots 1. The total number n of the isolated dots 1 added to the number of isolated dots 1 inherent to the original two-dimensional code is preferably 36 to 72.
Each printed matter 6 is printed with a code 2, preferably a two-dimensional code having uniqueness.
After the ink forms sawteeth by natural micro diffusion (contraction is understood as negative diffusion) and causes the isolated ink dots 1 to deform, drying, curing and shaping, and amplifying and shooting the two-dimensional code to acquire isolated dot characteristic information of the isolated ink dots 1; and the characteristic information of the isolated point is taken as record information and is correspondingly stored and recorded in an anti-counterfeiting checking system database accessed to the Internet with the two-dimensional code.
When a consumer checks, the two-dimensional code on the printed matter 6 is shot by the smart phone to obtain isolated ink dot 1 isolated point characteristic information, namely to-be-detected (characteristic) information.
The anti-counterfeiting checking system matches the acquired isolated point characteristic information such as the characteristic to be detected of the isolated ink point 1 with the isolated point characteristic information (including one or more of the individual characteristic information such as the shape, the area, the perimeter, the direction, the precise position, the quality defect, the number of teeth of a saw, the gradient and the color of the isolated ink point 1) recorded in the database; if the coincidence rate x/nx100% is higher than 90%, the anti-counterfeiting checking system feeds back conclusion information of which the identification conclusion is true to the smart phone; if the coincidence rate x/nx100% is lower than 69%, the anti-counterfeiting checking system feeds back conclusion information of which the identification conclusion is false to the smart phone; if the matching rate x/nx100 percent is 70-89 percent, the anti-counterfeiting checking system prompts the user to reprint or request manual help.
Example three.
As shown in fig. 4, in combination with the two examples, some isolated ink dots 1 are additionally inserted and printed in the blank gaps of the current original two-dimensional code in fig. 1 (for the convenience of the reader to look at and distinguish, the figure is represented by the screened ink dots, and no screening and no distinction should be made in the actual implementation), and the three blank ink blocks are disconnected from the narrowest connecting part 3 of the three blank ink blocks to separate some isolated ink dots 1.
Other steps can be combined with the two embodiments.
Example four.
As shown in fig. 5, in combination with the above three examples, a two-dimensional code with a fault tolerance rate of 30% is generated, and the edge areas on the right side and the lower side of the two-dimensional code are replaced (or covered) with 25 isolated dots 1 arranged in a row and a column. Preferably, as shown in fig. 6, the edge area around the two-dimensional code is replaced (or covered) with 37 isolated dots 1 arranged in rows and columns. Therefore, when the code is sprayed, the two-dimensional code generation software does not need to be modified, and the isolated ink dots 1 which are arranged in a row and a column and are fixed in position are used for covering the edge area, so that the production and the identification are convenient. Of course, the isolated dots 1 can be arranged and combined arbitrarily and arranged beside the two-dimensional code, see fig. 13. A white dot matrix (or an eyelet matrix) that is an isolated dot 1 after inversion can also be placed next to the two-dimensional code, see fig. 14.
Other steps may be combined with the above embodiments.
Example five.
As shown in fig. 9 (a), 13 × 4=52 isolated dots 1 are designed around a two-dimensional code having a width of 12mm, the isolated dots 1 are circular, the diameter is 0.7mm, and the distance from the isolated dots 1 to the edge of the two-dimensional code is 1 mm.
Spraying and printing the isolated ink dots 1 and the two-dimensional code together at 80g/m by using a UV (ultraviolet) code spraying machine2After the ink is naturally micro-diffused (shrinkage is understood as negative diffusion) for 30 milliseconds, the surface of the coated paper is dried, cured and shaped by UV light, and then the isolated ink dots 1 and the two-dimensional code which are shown in figure 9 (b) and are randomly deformed can be formed.
Actually measuring and displaying: most of the isolated ink dots 1 in fig. 9 (b) are changed from a perfect circle with a diameter of 0.7mm into an irregular ellipse, and some areas protrude by about 0.1mm, so that the isolated ink dots 1 are changed into a pear shape; the small colored dots printed on some materials by the laser marking machine can also be deformed into irregular ellipses with certain randomness.
Amplifying and shooting the two-dimensional code and the isolated ink dots 1 to acquire isolated dot characteristic information such as the shapes of the isolated ink dots 1; and the isolated point characteristic information such as the shape and the like is taken as the record information and the two-dimensional code data thereof are correspondingly stored in an anti-counterfeiting checking system database accessed to the Internet.
When a consumer checks, the two-dimensional code on the printed matter 6 is scanned (including shooting) by using the smart phone to obtain isolated point characteristic information, namely to-be-detected information, such as the shape of the isolated ink dot 1.
The anti-counterfeiting checking system matches the acquired information to be detected of the isolated ink dots 1 with the record information (including one or more of the individual characteristic information of the isolated ink dots 1, such as shape, area, perimeter, direction 5, accurate position, quality defect, saw tooth number, gradient, color and the like) in the database; if the coincidence rate x/nx100% is higher than 70%, the anti-counterfeiting checking system feeds back conclusion information of which the identification conclusion is true to the smart phone; if the coincidence rate x/nx100% is lower than 60%, the anti-counterfeiting checking system feeds back conclusion information of which the identification conclusion is false to the smart phone; if the matching rate x/nx100% is 61-69%, the anti-counterfeiting checking system prompts the user to rephoto or request manual help.
Preferably, when the coincidence rate x/nx100% is higher than 90%, the anti-counterfeiting checking system feeds back conclusion information of which the identification conclusion is true to the smart phone; otherwise, the anti-counterfeiting checking system feeds back the conclusion information of which the identification conclusion is false to the smart phone or feeds back the rephoto prompt information to the smart phone. Thus, the accuracy of the discrimination conclusion is higher.
Most of the isolated dots 1 in this example are deformed from a perfect circle having a diameter of 0.6mm into an irregular ellipse as shown in fig. 11, and one or more ends thereof are protruded by about 0.1mm, so that the isolated dots 1 have directions 1 such as major and minor axes. Although the spread of the coated paper is weak, two ends of some isolated ink dots 1 are only slightly protruded by 0.1mm, the isolated ink dots 1 have the long axis direction 1 which is very easy to be detected by the isolated dot feature recognition algorithm model.
Example six.
13 x 4=52 isolated ink dots 1 are designed around a two-dimensional code with the width of 12mm, the isolated ink dots 1 are circular, the diameter is set to be 0.9mm, an eyelet 4 with the aperture of 0.5mm is designed in the center of the isolated ink dots 1, and the distance from the isolated ink dots 1 to the edge of the two-dimensional code is set to be 1 mm. The ratio w/y of the width w of the isolated ink dots around the two-dimensional code to the width y of the square 7 in the two-dimensional code position detection pattern is set to 0.39-0.96. Therefore, any printing factory can print and typeset according to the ratio w/y specification to adapt to the software algorithm.
Spraying and printing the isolated ink dots 1 and the two-dimensional code together at 80g/m by using a UV (ultraviolet) code spraying machine2After the ink is naturally micro-diffused (shrinkage is understood as negative diffusion) for 30 milliseconds, the surface of the coated paper is dried, cured and shaped by UV light, and then the holes 4 which are randomly deformed and reduced to 0.4mm in aperture, the isolated ink dots 1 and the two-dimensional codes can be formed, as shown in figure 10.
As shown in fig. 12a, isolated dots 1 without holes 4 are almost perfectly circular, as they are only subjected to a uniform outward wetting force f. As shown in fig. 12b, the isolated dots 1 with the holes 4 are deformed into random shapes such as ellipses by the wetting force f in two directions, i.e., outward and inward. In a word, the holes arranged on the isolated ink dots can promote the isolated ink dots to generate larger random deformation; the design of the central hole of the isolated ink dot overcomes the defect that certain printing surfaces are not deformed when the isolated ink dot is printed, and saves the working procedure of preprinting a diffusant coating and material consumption. In addition, after the isolated ink dots 1 are diffused, the holes 4 are randomly deformed, and the deformed holes 4 have extremely strong individual characteristics and can be used as auxiliary anti-counterfeiting characteristics. In other words, the individual characteristic information such as the shape of the hole 4 after diffusion deformation is collected and can be used as auxiliary anti-counterfeiting characteristic information which is one of the isolated point characteristic information.
Amplifying and shooting the two-dimensional code and the isolated ink dots 1 to acquire isolated ink dots 1 and isolated dot characteristic information such as shapes of holes 4 of the isolated ink dots; and correspondingly storing the isolated point characteristic information such as the shape and the like and the two-dimensional code data thereof into an anti-counterfeiting checking system database accessed to the Internet as anti-counterfeiting characteristic archive information.
When a consumer checks, the two-dimensional code on the printed matter 6 is scanned (including shooting) by using the smart phone to obtain isolated ink dot 1, the shape of the eyelet 4 of the isolated ink dot and other isolated dot characteristic information, namely the information to be checked.
The anti-counterfeiting checking system matches the acquired information to be detected of the isolated ink dots 1 and the holes 4 thereof with the record information (including one or more of the individual characteristic information of the isolated ink dots 1 and the holes 4 thereof, such as shape, area, perimeter, direction 5, accurate position, quality defect, saw tooth number, gradient, color and the like) in the database; if the coincidence rate x/nx100% is higher than 70%, the anti-counterfeiting checking system feeds back conclusion information of which the identification conclusion is true to the smart phone; if the coincidence rate x/nx100% is lower than 60%, the anti-counterfeiting checking system feeds back conclusion information of which the identification conclusion is false to the smart phone; if the matching rate x/nx100% is 61-69%, the anti-counterfeiting checking system prompts the user to rephoto or request manual help.
Preferably, when the coincidence rate x/nx100% is higher than 90%, the anti-counterfeiting checking system feeds back conclusion information of which the identification conclusion is true to the smart phone; otherwise, the anti-counterfeiting checking system feeds back the conclusion information of which the identification conclusion is false to the smart phone or feeds back the rephoto prompt information to the smart phone. Thus, the accuracy of the discrimination conclusion is higher.
In this example, most of the isolated dots 1 and their holes 4 are deformed into irregular curved edge ellipses with directions 1, such as major and minor axes.
Example seven.
As shown in fig. 7 and 8, in combination with the above embodiments, a two-dimensional code with a fault tolerance of 30% is generated, and the joints between some adjacent ink blocks in the two-dimensional code are disconnected to form a group of isolated ink dots 1.
Other steps may be combined with the above embodiments.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (8)

1. A high-precision sawtooth anti-counterfeiting method comprises the step of printing at least one code with uniqueness on each product, and is characterized by comprising the following steps of:
firstly, allocating a plurality of isolated ink dots to the codes, wherein the total number n of the isolated ink dots owned by each code is more than or equal to 9, 12, 24, 36, 48, 60, 72, 80, 92 or 200;
printing the isolated ink dots on a printing surface which has wettability to the ink of the isolated ink dots, and randomly diffusing the isolated ink dots to form a sawtooth edge, deform and generate directionality;
shooting and collecting individual characteristic information-isolated point characteristic information after the random diffusion of the isolated ink points; correspondingly storing the characteristic information of the isolated points as record information and codes into an anti-counterfeiting checking system database;
fourthly, scanning the codes and the isolated ink dots thereof by using the smart phone to obtain isolated dot characteristic information, namely the information to be detected, of the isolated ink dots;
matching and identifying the information to be detected and the recorded information, and counting the number of the isolated ink dots with the matching isolated ink dots characteristic information, namely the matching dot number x; when the coincidence rate x/nx100% reaches 70-100%, the anti-counterfeiting checking system feeds back information of which the identification conclusion is true to the smart phone.
2. The high-precision sawtooth anti-counterfeiting method according to claim 1, characterized in that: when the compliance rate x/nx100% reaches 85-100% or 90-100%, the anti-counterfeiting checking system feeds back the information of which the identification conclusion is true to the smart phone.
3. The high-precision sawtooth anti-counterfeiting method according to claim 2, characterized in that: when the matching rate x/n x 100% is lower than 69% or lower than 84% or lower than 89%, the anti-counterfeiting checking system prompts the user to swipe or feed back information that the identification result is false to the smart phone.
4. A high precision anti-counterfeiting method according to any one of claims 1 to 3, characterized in that it comprises one or more of the following:
firstly, the width of the isolated ink dots after the isolated ink dots or the reversed ink dots is 0.65 mm-1.2 mm or 0.68 mm-0.92 mm or 0.72 mm-0.83 mm;
secondly, an eyelet is arranged at the center of the isolated ink dot; or provided with holes with the aperture of 0.1 mm-0.6 mm or 0.35 mm-0.45 mm;
the width of a gap between two adjacent isolated ink dots is 0.1-1.5 mm or 0.25-0.5 mm;
diffusing the isolated ink points into irregular curved oval or polygon, wherein the length-width difference of some of the deformed isolated ink points is 0.05-0.25 mm; and/or, the aspect ratio of some isolated ink points after deformation is 1.1-1.3;
the two-dimension code is selected for coding, the ratio w/y of the width w of the isolated ink dots arranged outside the two-dimension code to the width y of the square in the two-dimension code internal position detection graph is set to be 0.42-0.98.
5. The high-precision sawtooth anti-counterfeiting method according to claim 4, characterized in that: and collecting the characteristic information of the diffused and deformed holes to be used as auxiliary anti-counterfeiting characteristic information of one of the isolated point characteristic information.
6. A high precision anti-counterfeiting method according to any one of claims 1 to 3, characterized in that: the isolated ink dots are inserted from the outside of the code body in the two-dimensional code form or/and are separated from the connection positions of the adjacent ink blocks in the code body in the two-dimensional code form in a breaking mode.
7. The high-precision sawtooth anti-counterfeiting method according to claim 6, characterized in that: the isolated ink dots are arranged in rows and are positioned at the coding edge of the two-dimensional code form.
8. The high-precision sawtooth anti-counterfeiting method according to claim 4, characterized in that: three squares in the two-dimensional code position detection graph are used as isolated ink dots.
CN202110253595.1A 2021-02-07 2021-03-09 High-precision sawtooth anti-counterfeiting method Pending CN112801254A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/126999 WO2022166272A1 (en) 2021-02-07 2021-10-28 High-precision method for performing anti-counterfeiting using jagged patterns

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN202110175420 2021-02-07
CN2021101754203 2021-02-07
CN202110223014 2021-03-01
CN202110223014X 2021-03-01

Publications (1)

Publication Number Publication Date
CN112801254A true CN112801254A (en) 2021-05-14

Family

ID=75816616

Family Applications (3)

Application Number Title Priority Date Filing Date
CN202110253595.1A Pending CN112801254A (en) 2021-02-07 2021-03-09 High-precision sawtooth anti-counterfeiting method
CN202110322995.3A Pending CN112884106A (en) 2021-02-07 2021-03-26 Point-to-sawtooth anti-counterfeiting method
CN202110382530.7A Pending CN113326906A (en) 2021-02-07 2021-04-09 In-code isolated point sawtooth anti-counterfeiting method

Family Applications After (2)

Application Number Title Priority Date Filing Date
CN202110322995.3A Pending CN112884106A (en) 2021-02-07 2021-03-26 Point-to-sawtooth anti-counterfeiting method
CN202110382530.7A Pending CN113326906A (en) 2021-02-07 2021-04-09 In-code isolated point sawtooth anti-counterfeiting method

Country Status (2)

Country Link
CN (3) CN112801254A (en)
WO (1) WO2022166272A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022166272A1 (en) * 2021-02-07 2022-08-11 拍拍看(海南)人工智能有限公司 High-precision method for performing anti-counterfeiting using jagged patterns

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1564148A (en) * 2004-04-09 2005-01-12 寇建国 Micro-image anti-fraud method for objects surface
WO2016177301A1 (en) * 2015-05-01 2016-11-10 励元科技(上海)有限公司 Micro-texture anti-counterfeit method
CN106845590A (en) * 2016-12-15 2017-06-13 郝孔旭 A kind of concealed anti-false gold eyeball cloud code and its identifying device and method for anti-counterfeit
CN108615066A (en) * 2018-04-25 2018-10-02 海南亚元防伪技术研究所(普通合伙) Transfinite color code anti-counterfeiting method and printed article
CN110866579A (en) * 2019-11-15 2020-03-06 拍拍看(海南)人工智能有限公司 Code edge sawtooth anti-counterfeiting method and product

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6328209B1 (en) * 1999-02-03 2001-12-11 American Bank Note Holographics, Inc. Card security system
CN104794629B (en) * 2014-05-20 2016-04-06 海南亚元防伪技术研究所(普通合伙) Handset identity coding sawtooth method for anti-counterfeit
CN106067277B (en) * 2015-05-01 2017-12-05 无锡新光印标识科技有限公司 Micro- line method for anti-counterfeit
CN106446866B (en) * 2016-10-12 2018-07-13 无锡新光印标识科技有限公司 A kind of false-proof texture recognition methods
JP2018156120A (en) * 2017-02-21 2018-10-04 横浜ゴム株式会社 Two-dimensional code inspection method and two-dimensional inspection apparatus
CN107345922A (en) * 2017-09-21 2017-11-14 韩伟 Method based on microcosmic mark characteristic differentiation seal impression generation type
CN109711511A (en) * 2018-01-02 2019-05-03 海南亚元防伪技术研究所(普通合伙) Transfinite ink dot method for anti-counterfeit and printed article
CN108520423B (en) * 2018-03-23 2020-10-16 拍拍看(海南)人工智能有限公司 Natural gradient anti-fake method and product
CN108647980B (en) * 2018-05-14 2020-02-18 励元科技(上海)有限公司 Anti-counterfeiting identification method for micro-fine diffusion print
CN110428272B (en) * 2018-09-13 2020-11-27 拍拍看(海南)人工智能有限公司 Sawtooth micropore anti-counterfeiting method and printed matter
CN111091394A (en) * 2019-01-27 2020-05-01 海南亚元防伪技术研究所(普通合伙) Product anti-fake safety packing method
CN109919640A (en) * 2019-04-12 2019-06-21 海南亚元防伪技术研究所(普通合伙) Three-dimensional sawtooth anti-fake product
CN112801254A (en) * 2021-02-07 2021-05-14 拍拍看(海南)人工智能有限公司 High-precision sawtooth anti-counterfeiting method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1564148A (en) * 2004-04-09 2005-01-12 寇建国 Micro-image anti-fraud method for objects surface
WO2016177301A1 (en) * 2015-05-01 2016-11-10 励元科技(上海)有限公司 Micro-texture anti-counterfeit method
CN106845590A (en) * 2016-12-15 2017-06-13 郝孔旭 A kind of concealed anti-false gold eyeball cloud code and its identifying device and method for anti-counterfeit
CN108615066A (en) * 2018-04-25 2018-10-02 海南亚元防伪技术研究所(普通合伙) Transfinite color code anti-counterfeiting method and printed article
CN110866579A (en) * 2019-11-15 2020-03-06 拍拍看(海南)人工智能有限公司 Code edge sawtooth anti-counterfeiting method and product
CN112101500A (en) * 2019-11-15 2020-12-18 拍拍看(海南)人工智能有限公司 Code edge sawtooth anti-counterfeiting method and product

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022166272A1 (en) * 2021-02-07 2022-08-11 拍拍看(海南)人工智能有限公司 High-precision method for performing anti-counterfeiting using jagged patterns

Also Published As

Publication number Publication date
CN112884106A (en) 2021-06-01
WO2022166272A1 (en) 2022-08-11
CN113326906A (en) 2021-08-31

Similar Documents

Publication Publication Date Title
US7306149B2 (en) Ballot form and method for making and using same
AU669752B2 (en) Apparatus and method for checking printed matter
KR102386833B1 (en) Inspection system and game token
CN106067277A (en) Micro-stricture of vagina method for anti-counterfeit
CN103559473A (en) Method and system using feature images to achieve printing stock security
WO2016177301A1 (en) Micro-texture anti-counterfeit method
CN101091185B (en) Information input/output method using dot pattern
CN112801254A (en) High-precision sawtooth anti-counterfeiting method
CN111814616A (en) Automatic examination paper marking processing system without answer sheet and implementation method thereof
CN213211060U (en) Code edge sawtooth anti-fake mark
CN110428272B (en) Sawtooth micropore anti-counterfeiting method and printed matter
CN111144270A (en) Evaluation method and evaluation device for handwritten text neatness based on neural network
US11288475B2 (en) Two-dimensional barcode generating method, verification method, server and two-dimensional barcode
US7889930B2 (en) 2-D encoded symbol quality assessment
CN111709258A (en) High-efficiency artificial intelligence anti-counterfeiting image identification system and method
JPH06282686A (en) Method for character recognition
WO2015022872A1 (en) Method for automatically determining authenticity of individual article using micro contour shape of printing as identifier
CN103279784A (en) Two-dimensional anti-counterfeit label and producing method thereof
CN110570218A (en) genuine product responsibility insurance policy setting method and inquiry and registration system
CN109583549A (en) A kind of compound two dimensional code, watermark, the security code production of miniature word and verification method
CN107451644B (en) Method for manufacturing anti-counterfeiting two-dimensional code
CN112884107A (en) Three-dimensional code label with side solid texture, anti-counterfeiting system and anti-counterfeiting method
JP3785497B2 (en) Booklet with replacement prevention mark
JP2001138699A (en) Authenticity discriminating device, having minute perforations
CN114663118B (en) Anti-counterfeiting method based on laser random combination image

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210514